• Title/Summary/Keyword: Internet Filtering System

Search Result 257, Processing Time 0.027 seconds

Development of Filtering System ADDAVICHI for Fake Reviews using Big Data Analysis (빅데이터 분석을 활용한 가짜 리뷰 필터링 시스템 ADDAVICHI)

  • Jeong, Davichi;Rho, Young-J.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Recently, consumer distrust has deepened due to blog posts focusing only on public relations due to 'viral marketing'. In addition, marketing projects such as false writing or exaggerated use of the latter phase are one of the most popular programs in 2016 as they are cheaper and more effective than newspaper and TV ads, and the size of advertising costs is set to be a major means of advertising at '3 trillion 394.1 billion won. From this 'viral marketing,' it has become an Internet environment that needs tools to filter information. The fake review filtering application ADDAVICHI presented in this paper extracts, analyzes, and presents blog keywords, total number of searches, reliability and satisfaction when users search for content such as "event" and "taste restaurant." Reliability shows the number of ad posts on a blog, the total number of posts, and satisfaction shows a clean post with confidence divided into positive and negative posts. Finally, the keyword shows a list of the top three words in the review from a positive post. In this way, it helps users interpret information away from advertising.

A Kalman Filter based Video Denoising Method Using Intensity and Structure Tensor

  • Liu, Yu;Zuo, Chenlin;Tan, Xin;Xiao, Huaxin;Zhang, Maojun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2866-2880
    • /
    • 2014
  • We propose a video denoising method based on Kalman filter to reduce the noise in video sequences. Firstly, with the strong spatiotemporal correlations of neighboring frames, motion estimation is performed on video frames consisting of previous denoised frames and current noisy frame based on intensity and structure tensor. The current noisy frame is processed in temporal domain by using motion estimation result as the parameter in the Kalman filter, while it is also processed in spatial domain using the Wiener filter. Finally, by weighting the denoised frames from the Kalman and the Wiener filtering, a satisfactory result can be obtained. Experimental results show that the performance of our proposed method is competitive when compared with state-of-the-art video denoising algorithms based on both peak signal-to-noise-ratio and structural similarity evaluations.

Design of Traceback System using Selected Router (선택적 라우터를 이용한 역추적 시스템의 설계)

  • Lee, Jeong-Min;Lee, Kyoon-Ha
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.91-97
    • /
    • 2003
  • As increasing of Internet user and fast development of communication, many security problems occur. Because of Internet is design and development for speed not security, it is weak to attack from malicious user. furthermore attack is more developed to have high efficiency and intelligent. We proposed effective traceback system in network and consider that ability of constitution. Traceback by Selected Router system is consists of managed router and manager system. Selected router marks router ID to packet which passing selected router, and use this router ID for traceback and filtering. Consequently this system reduce damage of attack.

  • PDF

Positive Research of Client-Server Interlock System for m-PACS Rehalibitated Service in Wire less Mobile Environment (무선이동환경에서 m-PACS 재활지원 서비스를 위한 클라이언트-서버 연동시스템의 실증적연구)

  • Kim, Whi-Young;Choe, Jin-Yeong;Park, Seong-Jun;Kim, Jin-Yeong;Park, Seong-Jun;Kim, Hui-Je
    • Proceedings of the KIEE Conference
    • /
    • 2006.07d
    • /
    • pp.2169-2170
    • /
    • 2006
  • J2ME service technology has advantage that can embody independent and, more soft system in DICOM 3.0 and medicine reflex administration server, client's OS that is medical treatment reflex standard in radio Internet. Also, intranet that do web basedspread, and develop by system that can alternate existent client-server structure rapidly. Specially, posibility of improvement is much because is connecting being limited in internet environment that medical equipment and information system of various kinds of machine are wire in medical institution and so on. Because do medical treatment reflex transmission module development applying DICOM technology and filtering techniques of "m-PACS Rehalibitated " in this research, existence, by interlock in radio usable Mobile reflex conversion system design and embody. That is, patient's information which is stored to various systems to be transmited and can give big help in medical examination and treatment to reflex client without being wooed doctor's interpretation result and so on in place through environment to be radish tentacle bar see

  • PDF

Detection of Zombie PCs Based on Email Spam Analysis

  • Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Kim, Eun-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1445-1462
    • /
    • 2012
  • While botnets are used for various malicious activities, it is well known that they are widely used for email spam. Though the spam filtering systems currently in use block IPs that send email spam, simply blocking the IPs of zombie PCs participating in a botnet is not enough to prevent the spamming activities of the botnet because these IPs can easily be changed or manipulated. This IP blocking is also insufficient to prevent crimes other than spamming, as the botnet can be simultaneously used for multiple purposes. For this reason, we propose a system that detects botnets and zombie PCs based on email spam analysis. This study introduces the concept of "group pollution level" - the degree to which a certain spam group is suspected of being a botnet - and "IP pollution level" - the degree to which a certain IP in the spam group is suspected of being a zombie PC. Such concepts are applied in our system that detects botnets and zombie PCs by grouping spam mails based on the URL links or attachments contained, and by assessing the pollution level of each group and each IP address. For empirical testing, we used email spam data collected in an "email spam trap system" - Korea's national spam collection system. Our proposed system detected 203 botnets and 18,283 zombie PCs in a day and these zombie PCs sent about 70% of all the spam messages in our analysis. This shows the effectiveness of detecting zombie PCs by email spam analysis, and the possibility of a dramatic reduction in email spam by taking countermeasure against these botnets and zombie PCs.

Social Network based Sensibility Design Recommendation using {User - Associative Design} Matrix (소셜 네트워크 기반의 {사용자 - 연관 디자인} 행렬을 이용한 감성 디자인 추천)

  • Jung, Eun-Jin;Kim, Joo-Chang;Jung, Hoill;Chung, Kyungyong
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.313-318
    • /
    • 2016
  • The recommendation service is changing from client-server based internet service to social networking. Especially in recent years, it is serving recommendations with personalization to users through crowdsourcing and social networking. The social networking based systems can be classified depending on methods of providing recommendation services and purposes by using memory and model based collaborative filtering. In this study, we proposed the social network based sensibility design recommendation using associative user. The proposed method makes {user - associative design} matrix through the social network and recommends sensibility design using the memory based collaborative filtering. For the performance evaluation of the proposed method, recall and precision verification are conducted. F-measure based on recommendation of social networking is used for the verification of accuracy.

Analysis and Visualization for Comment Messages of Internet Posts (인터넷 게시물의 댓글 분석 및 시각화)

  • Lee, Yun-Jung;Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.45-56
    • /
    • 2009
  • There are many internet users who collect the public opinions and express their opinions for internet news or blog articles through the replying comment on online community. But, it is hard to search and explore useful messages on web blogs since most of web blog systems show articles and their comments to the form of sequential list. Also, spam and malicious comments have become social problems as the internet users increase. In this paper, we propose a clustering and visualizing system for responding comments on large-scale weblogs, namely 'Daum AGORA,' using similarity analysis. Our system shows the comment clustering result as a simple screen view. Our system also detects spam comments using Needleman-Wunsch algorithm that is a well-known algorithm in bioinformatics.

An Implementation of System for Detecting and Filtering Malicious URLs (악성 URL 탐지 및 필터링 시스템 구현)

  • Chang, Hye-Young;Kim, Min-Jae;Kim, Dong-Jin;Lee, Jin-Young;Kim, Hong-Kun;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.405-414
    • /
    • 2010
  • According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.

Complexity Analysis of Internet Video Coding (IVC) Decoding

  • Park, Sang-hyo;Dong, Tianyu;Jang, Euee S.
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.179-188
    • /
    • 2017
  • The Internet Video Coding (IVC) standard is due to be published by Moving Picture Experts Group (MPEG) for various Internet applications such as internet broadcast streaming. IVC aims at three things fundamentally: 1) forming IVC patents under a free of charge license, 2) reaching comparable compression performance to AVC/H.264 constrained Baseline Profile (cBP), and 3) maintaining computational complexity for feasible implementation of real-time encoding and decoding. MPEG experts have worked diligently on the intellectual property rights issues for IVC, and they reported that IVC already achieved the second goal (compression performance) and even showed comparable performance to even AVC/H.264 High Profile (HP). For the complexity issue, however, there has not been thorough analysis on IVC decoder. In this paper, we analyze the IVC decoder in view of the time complexity by evaluating running time. Through the experimental results, IVC is 3.6 times and 3.1 times more complex than AVC/H.264 cBP under constrained set (CS) 1 and CS2, respectively. Compared to AVC/H.264 HP, IVC is 2.8 times and 2.9 times slower in decoding time under CS1 and CS2, respectively. The most critical tool to be improved for lightweight IVC decoder is motion compensation process containing a resolution-adaptive interpolation filtering process.

Improved Snakes Algorithm for Tongue Image Segmentation in Oriental Tongue Diagnosis (한방 설진에서 혀 영상 분할을 위한 개선된 스네이크 알고리즘)

  • Jang, Myeong-Soo;Lee, Woo-Beom
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.125-131
    • /
    • 2016
  • Tongue image segmentation is critical for automation of the tongue diagnosis system. However, most image segmentation methods for tongue diagnosis systems in oriental medicine have been proposed as user-based manual types or semi-automatic types. This study proposed a new method for tongue image segmentation, which is the most important image processing stage for complete automation of the tongue diagnosis system in oriental medicine. The proposed method improved the conventional snake algorithm, by making improvement on the internal energy function so that, as the points move outward reversely, the snake energy function is minimized, by using the image characteristics of tongue images. To calculate external energy, hierarchical spatial filtering is applied to ensure resistance against noise. Also, The proposed method was tested by using sample images and actual images, and showed more robustness against the background noise than the conventional snake algorithm. And, when one selected point was moved by the improved snake algorithm, energy values at the starting, middle, and end points were analyzed, and showed robustness that does not fall in the local minima.