• Title/Summary/Keyword: Harmful Contents

Search Result 253, Processing Time 0.027 seconds

The design and implementation of user interface based on contents rating service for blocking harmful Internet information (유해 인터넷 정보 차단을 위한 내용 등급 서비스 기반 사용자 인터페이스 설계 및 구현)

  • 이재선;전용희;장정숙
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.957-964
    • /
    • 2003
  • The circulation of unwholesome information such as obscene and violent information is gradually increasing based on the rapid expansion of information communications infrastructure. Those kinds of information are harmful to the adolescents and even cause social problems so that active countermeasure is requited. In order to cope with the spread of unwholesome information, appropriate regulating methods are absolutely in need by establishing or revising information communications-related laws. In this paper, we had analyzed domestic and foreign programs with existing harmful information blocking method, and then designed and implemented a selective blocking program based on Platform for Internet Contents Selection(PICS) by using selective blocking technology based on Internet contents rating system. We also proposed a compromised rating system blocking method that consists of selective filtering function by age and the popular blocking list. The proposed system has advantages in that there would be no increase in network load resulting from blocking list update and inquiry, it is possible to perform active selective filtering considering user's age, and it may introduce self-imposed rating.

A Harmful Site Judgement Technique based on Text (문자 기반 유해사이트 판별 기법)

  • Jung, Kyu-Cheol;Lee, Jin-Kwan;Lee, Taehun;Park, Kihong
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.5
    • /
    • pp.83-91
    • /
    • 2004
  • Through this research, it was possible to set up classification system between 'Harmful information site' and 'General site' that badly effect to teenagers emotional health. To intercept those entire harmful information sites, it using contents basis isolating. Instead of using existing methods, it picks most frequent using composed key words and adds all those harmful words' harmfulness degree point by using 'ICEC(Information Communication Ethics Committee)' suggested harmful word classification. To testify harmful information blocking system, to classify the harmful information site, set standard harmfulness degree point as 3.5 by the result of a fore study, after that pick up a hundred of each 'Harmful information site' and 'General site' randomly to classify them through new classification system. By this classification could found this new classification system classified 78% of 'Harmful Site' to "Harmful information site' and 96% of 'General Site' to 'General site'. As a result, successfully confirm validity of this new classification system.

  • PDF

Application of Image Analysis System for Red Tide Organisms

  • Cho Eun Seob;Kang Yoon Mi;Kim Gwang Hoon
    • Fisheries and Aquatic Sciences
    • /
    • v.2 no.2
    • /
    • pp.172-175
    • /
    • 1999
  • Relative DNA contents in some harmful algae were measured using DAPI staining and image analysis system. This method was useful to identify some morphologically similar species and isolates from harmful algal blooms (HABs). In exponential phase, Prorocentrum micans had higher relative DNA content (RD) of $1.83\pm0.52$ than any other isolates, followed by Cochlodinium polykrikoides $(1.10\pm0.46)$ Alexandrium tamarense $(0.93\pm0.32)$ Gyrodinium impudicum $(0.56\pm0.17)$, Scrippsiella trochoidea $(0.41\pm0.26)$ and P. minimum$(0.05\pm0.01)$. When they were fixed with Lugol's solution, it was difficult to d,iscern C. polykrikoides from G. impudicum under the light microscope, but the DNA contents were quite different in two species. C. polykrikoides contained about twice as much RD as G. impudicum under the same culture conditions and exponential phase. DAPI­stained DNA feature in C. polykrikodes showed concentrated in the peripheral part of the cell, but in G. impudicum showed a compact structure in the central part. Although A. tamarense and S. trochoidea were morphologically similar under the light microscope, nuclear DNA content of A. tamarense was twice as much as that of S. trochoidea.

  • PDF

Multimodal approach for blocking obscene and violent contents (멀티미디어 유해 콘텐츠 차단을 위한 다중 기법)

  • Baek, Jin-heon;Lee, Da-kyeong;Hong, Chae-yeon;Ahn, Byeong-tae
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.113-121
    • /
    • 2017
  • Due to the development of IT technology, harmful multimedia contents are spreading out. In addition, obscene and violent contents have a negative impact on children. Therefore, in this paper, we propose a multimodal approach for blocking obscene and violent video contents. Within this approach, there are two modules each detects obsceneness and violence. In the obsceneness module, there is a model that detects obsceneness based on adult and racy score. In the violence module, there are two models for detecting violence: one is the blood detection model using RGB region and the other is motion extraction model for observation that violent actions have larger magnitude and direction change. Through result of these three models, this approach judges whether or not the content is harmful. This can contribute to the blocking obscene and violent contents that are distributed indiscriminately.

Proposal of Technical Method for Solving Internet Harmful Contents (채팅, 화상채팅의 실태 분석 및 기술적 해결 방안의 제안(II)-기술적 해결 방안을 중심으로-)

  • 조동욱;정진우;한선아;전환규;정인호
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.40-47
    • /
    • 2004
  • This research proposes the technical solving method for blocking Internet harmful sites such as chatting and image chatting. For this, biometric verification using human front-faces is proposed. Also, signal processing method is proposed for blocking pornographic acts. Finally, the effectiveness of this paper is demostrated by experiments.

  • PDF

Harmful Traffic Detection by Protocol and Port Analysis (프로토콜과 포트 분석을 통한 유해 트래픽 탐지)

  • Shin Hyun-Jun;Choi Il-Jun;Oh Chang-Suk;Koo Hyang-Ohk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.172-181
    • /
    • 2005
  • The latest attack type against network traffic appeared by worm and bot that are advanced in DDoS. It is difficult to detect them because they are diversified, intelligent, concealed and automated. The exisiting traffic analysis method using SNMP has a vulnerable problem; it considers normal P2P and other application program to be harmful traffic. It also has limitation that does not analyze advanced programs such as worm and bot to harmful traffic. Therefore, we analyzed harmful traffic out Protocol and Port analysis. We also classified traffic by protocol, well-known port, P2P port, existing attack port, and specification port, apply singularity weight to detect, and analyze attack availability. As a result of simulation, it is proved that it can effectively detect P2P application, worm, bot, and DDoS attack.

  • PDF

Design and Implementation of Harmful Word Management Board for Web-based Instruction (웹 기반 수업을 위한 유해 단어 관리 게시판의 설계 및 구현)

  • Park, Ji Hyun;Kwak, Mira;Cho, Dong-sub
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.109-115
    • /
    • 2002
  • Nowadays, Web-based bulletin board system is widely used for e-learning because of its effectiveness in communicating and information sharing. But harmful or irrelevant contents are frequently posted and these affect students in learning community based on Web-boards and the ill effect of Web-board is revealed. Some Web-boards provide features that allow users can filter specific words to resolve this problem but those features have shortcomings. Using these features the content that contains harmful words is always removed even if the whole meaning of it isn't harm and user who uses harmful words habitually cannot have an opportunity of having his/her bad habit be corrected. In this paper, we proposed new way of dealing with harmful words that overcomes those shortcomings.

  • PDF

Attack Detection Algorithm Using Exponential Smoothing Method on the IPv6 Environment (IPv6 환경에서 지수 평활법을 이용한 공격 탐지 알고리즘)

  • Koo Hyang-Ohk;Oh Chang-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.378-385
    • /
    • 2005
  • Mistaking normal packets for harmful traffic may not offer service in conformity with the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DDoS(Distributed Denial of Service) attack. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWOX and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

Studies on the Harmful Heavy Metal of Food Stuff( I ) -Contents of Hg in edible Bean Sprouts- (식품중(食品中) 유해성중금속(有害性重金屬)에 관(關)한 연구(硏究) ( I ) -콩나물중의 수은 정량-)

  • Park, Jae-Hong;Nam, Hyun-Keun
    • Journal of Nutrition and Health
    • /
    • v.10 no.3
    • /
    • pp.7-9
    • /
    • 1977
  • Quantitative analysis of harmful Hg in edible bean sprouts was carried out by the Atomic Absorption Spectrophotometer (Perkin-Elmer Model 403). The samples studied as shown in Table 2. are edible bean sprouts (36) which wet·e collected from Gwangju area. It was investigated that the Mercury (Hg) content of edible bean sprouts was from 0.0098 ppm to 0.533 ppm (average 0.240). Mercury contaminated edible bean sprouts studied, was about 50 percentage of total samples.

  • PDF

Harmful Traffic Analysis on the IPv6 Environment (IPv6 환경에서의 유해 트래픽 분석)

  • Koo Hyang-Ohk;Baek Soon-Hwa;Oh Chang-Suk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.195-199
    • /
    • 2005
  • The IPv6 environment combined the home network and the Internet with has arrived, the damages cased by the attacks from the worm attacks and the various virus has been increased. In this paper we analyze the traffics of TCP, UDP and ICMP, and propose for a method to detect harmful traffics in the IPv6 environment.

  • PDF