• Title/Summary/Keyword: Ad Blocking Service

Search Result 3, Processing Time 0.019 seconds

YouTube Users' Awareness of Online Advertisements and Advertising Regulation Plan (유튜브 이용자들의 온라인광고에 대한 인식 및 광고규제 방안)

  • Kim, Sora
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.528-542
    • /
    • 2021
  • This study aims to examine the attitudes toward online advertisement targeting YouTube content users and to present implications for the direction and regulation of personal media broadcasting advertisement. The study used the data from 'Awareness of On-line Ads and Blocking Tools' conducted by the Korea Press Foundation in 2020. For the statistical analysis, correspondent analysis was employed. The main results followed as: women tended to perceive more discomfort about the ads before the start of the content compared to men, and women in twenties perceived the highest discomfort with intermediate advertisement. Second, respondents who watch more YouTube contents tended to accept more ads to use contents for free. Third, respondents who are willing to use the advertisement blocking service were most aware of the inconvenience of advertisements before starting of YouTube contents. Although users are aware of the inconvenience, the use of advertisement blocking service has not yet been found to be generalized. However, the use of ad blocking service is expected to increase gradually. It would be expected that efforts to regulate advertisement to reduce discomfort about advertisement among users are also required.

Lattice-based Threshold Ring Signature with Message Block Sharing

  • CHEN, Jiangshan;HU, Yupu;GAO, Wen;Liang, Hongmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1003-1019
    • /
    • 2019
  • Threshold ring signature scheme enables any t entities from N ring members to spontaneously generate a publicly verifiable t-out-of-N signature anonymously. The verifier is convinced that the signature is indeed generated by at least t users from the claimed group, but he cannot tell them apart. Threshold ring signatures are significant for ad-hoc groups such as mobile ad-hoc networks. Based on the lattice-based ring signature proposed by Melchor et al. at AFRICRYPT'13, this work presents a lattice-based threshold ring signature scheme, employing the technique of message block sharing proposed by Choi and Kim. Besides, in order to avoid the system parameter setup problems, we proposed a message processing technique called "pad-then-permute", to pre-process the message before blocking the message, thus making the threshold ring signature scheme more flexible. Our threshold ring signature scheme has several advantages: inherits the quantum immunity from the lattice structure; has considerably short signature and almost no signature size increase with the threshold value; provable to be correct, efficient, indistinguishable source hiding, and unforgeable.

Unified Model for Performance Analysis of IEEE 802.11 Ad Hoc Networks in Unsaturated Conditions

  • Xu, Changchun;Gao, Jingdong;Xu, Yanyi;He, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.683-701
    • /
    • 2012
  • IEEE 802.11 standard has achieved huge success in the past decade and is still under development to provide higher physical data rate and better quality of service (QoS). An important problem for the development and optimization of IEEE 802.11 networks is the modeling of the MAC layer channel access protocol. Although there are already many theoretic analysis for the 802.11 MAC protocol in the literature, most of the models focus on the saturated traffic and assume infinite buffer at the MAC layer. In this paper we develop a unified analytical model for IEEE 802.11 MAC protocol in ad hoc networks. The impacts of channel access parameters, traffic rate and buffer size at the MAC layer are modeled with the assistance of a generalized Markov chain and an M/G/1/K queue model. The performance of throughput, packet delivery delay and dropping probability can be achieved. Extensive simulations show the analytical model is highly accurate. From the analytical model it is shown that for practical buffer configuration (e.g. buffer size larger than one), we can maximize the total throughput and reduce the packet blocking probability (due to limited buffer size) and the average queuing delay to zero by effectively controlling the offered load. The average MAC layer service delay as well as its standard deviation, is also much lower than that in saturated conditions and has an upper bound. It is also observed that the optimal load is very close to the maximum achievable throughput regardless of the number of stations or buffer size. Moreover, the model is scalable for performance analysis of 802.11e in unsaturated conditions and 802.11 ad hoc networks with heterogenous traffic flows.