• Title/Summary/Keyword: Blocking method

Search Result 769, Processing Time 0.04 seconds

Blocking of Internet Harmful Sex Sites by Accoustic Signal Processing (음향 신호 처리에 의한 음란 유해 사이트의 차단)

  • 이범주;김도연;장민형;박은배;신관철;유정선;조동욱;문창배
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.481-485
    • /
    • 2003
  • This paper proposes on the blocking method of Internet harmful sex sites by accoustic signal processing. Pre-existing methods mainly focused on directory-based blocking and words-based blocking. But these methods are not completely blocked the Internet harmful sites. Therefore, we propose the content-based blocking method which compose of the image-based blocking and the accoustic-based blocking. In this paper, we mainly deal with the accoustic -based blocking method. Finally, the effectiveness of this system is demonstrated by several experiments.

  • PDF

Proposal of Multiple Blocking and Its Efficiency in Matrix Operations

  • Tateno, Satoshi;Shigehara, Takaomi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.619-622
    • /
    • 2002
  • In this paper, we propose a new blocking method, multiple blocking, and examine the efficiency of the method in basic matrix operations. In the best case for the matrix multiplication C=AB+C, the multiple blocking improves the performance by more than 10%, compared to the conventional single blocking method.

  • PDF

Policy Proposal to Improve Illegal Web Blocking Policy Based on SNI Blocking Technique (SNI 차단 기법 기반의 불법 웹 차단 기술적 정책 개선)

  • Park, Jeonghun;Jeong, Wonchi;Oh, Sangik;Park, Namje
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.3
    • /
    • pp.430-439
    • /
    • 2020
  • The government of the Republic of Korea has introduced SNI blocking method since February 2019 to block illegal sites. Currently, this policy has been considered as a controversial policy in South Korea therefore, about 270,000 South Koreans have been calmed down by and the presidential office petition because people believe that blocking https by SNI would invasion of privacy and freedom of use of the Internet. As soon as the SNI blocking method was used, the bypass method was opened to the Internet, causing side effects. In this study, identifies the development of Internet blocking technology and the development of new technology that bypasses the technology. It also examines Internet censorship in other countries and identifies problems in blocking technology. Through this study would present policy suggestions and technical methodologies for sound Internet use.

AN APPROXIMATE ANALYSIS OF TANDEM QUEUES WITH GENERAL BLOCKING NODES

  • SHIN, YANG WOO;KIM, DONG OK;MOON, DUG HEE
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.26 no.1
    • /
    • pp.1-22
    • /
    • 2022
  • A tandem queue that consists of nodes with buffers of finite capacity and general blocking scheme is considered. The service time distribution of each node is exponential whose rate depends on the state of the node. The blocking scheme at a node may be different from that of other nodes. An approximation method for the system based on decomposition method is presented. The effectiveness of the method is investigated numerically.

Acoustic Signal Processing & Analysis for Blocking Internet Harmful Phonographic Sites (음란 유해사이트 차단을 위한 음향 신호 처리 및 분석)

  • 조동욱;김지영
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.2
    • /
    • pp.1-6
    • /
    • 2004
  • This paper proposes on the acoustic signal processing blocking method of Internet pornographicl sites by calculating correlation values between prototype acoustic signals and input acoustic signals. Pre-existing blocking methods mainly focused on directory-based bled(fin and pornographic related words-based blocking. But these methods are not completely blocked the Internet harmful pornographicl sites by several situations. For this, this paper proposes the content-based blocking method which composes of the image-based blocking and the acoustic-based blocking. This paper, mainly, deals with the acoustic -based blocking method. Finally, the effectiveness of this system is demonstrated by several experiments.

  • PDF

A Content-blocking Framework for Harmful Media Regulation

  • Lee, Sanghoon;Lee, Namkyung
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.202-204
    • /
    • 2020
  • We explored the blocking framework for regulating harmful content flooding the Internet. The procedure for obtaining content using the Internet was analyzed, and the technology for blocking content that can be applied at each stage of the acquisition process was investigated. Also, the characteristics and limitations of each blocking method were analyzed.

  • PDF

Study on Providing Anonymity of HTTPS Web Site Blocking (HTTPS 웹 사이트 차단의 익명성 제공 방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.53-59
    • /
    • 2019
  • As the number of harmful sites increases, many social problems are occurring. Therefore, in order to solve this problem, the government is carrying out activities to block access to web sites to harmful sites based on the law. However, due to the change from HTTP to HTTPS protocol, it has become difficult to block the harmful sites in the existing method. In the existing HTTP protocol, a method of blocking the site corresponding to the harmful site domain list by utilizing the DNS information was used. However, due to the generalization of HTTPS, it is difficult to block the harmful sites in the existing method. Therefore, the ISP uses the method of blocking the website using the SNI field in the TLS (Transport Layer Security) Handshake protocol used for HTTPS. However, since the method using SNI field raises the concern of monitoring Internet users or exposing information about connected sites, in this paper, we proposed method which can support anonymity to Internet users while blocking harmful sites. The suggested method also can support integrity and source authentication to the transmitted data.

A Current Differential Relay for Transformer Protection with a Blocking Method Using the Difference-Function of a Differential Current (차전류 차분 블로킹 변압기 보호용 전류차동 계전기)

  • 강용철;원성호;김대성;양성채
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.12
    • /
    • pp.691-697
    • /
    • 2003
  • This paper proposes a current differential relay for transformer protection that operates in accordance with a blocking method based on the difference-function of a differential current. For magnetic inrush and over-excitation, discontinuities in the first-difference function of the differential current arise at the points of inflection, which correspond to the start and end of each saturation period of the core. These discontinuities are converted into the pulses in the second- and third-difference functions of the differential current. The magnitudes of the pulses are large enough to detect saturation of the core. A blocking signal is issued if the magnitude of the third-difference function exceeds the threshold and is maintained for three quarters of a cycle. The performance of the relay is assessed under various conditions with magnetic inrush, internal faults and external faults. The proposed blocking method can improve significantly the operating time of a relay and achieve high sensitivity of a relay.

Image Quality Assessment by Measuring Blocking Artifacts (블록화 현상의 측정을 통한 영상의 화질평가)

  • Lee, Sang-Woo;Park, Sang-Ju
    • The KIPS Transactions:PartB
    • /
    • v.15B no.5
    • /
    • pp.383-390
    • /
    • 2008
  • Block based transform coding is most popular approach for image and video compression. However it suffers from severe quality degradation especially from blocking artifacts. The subjective quality degradation caused by such blocking artifacts in general does not agree well with an objecive quality measurement such as PSNR. Hence new quality evaluation technique is necessary. We propose a new image quality assessment method by measuring blocking artifacts for block based transform coded images. In order to characterize blocking artifacts, proposed method utilizes the facts that, blocking artifacts, when occur, have different pixel values along the block boundaries and such differences usually continuously span along the whole boundaries. This method does not require the original uncompressed image. It operates on single block boundary and quantifies the amount of blocking artifacts on it. Experiments on various compressed images various bitrates show that proposed quantitative measure of blocking artifacts matches well with the subjective quality of them judged by human visual system.

Removing the Blocking Artifacts for Highly Compressed JPEG Images (고압축 JPEG 영상을 위한 블록킹 현상 제거)

  • Jin Soon-Jong;Kim Won-Ki;Jeong Je-Chang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9C
    • /
    • pp.869-875
    • /
    • 2006
  • Nowadays JPEG encoder uses block based DCT and quantization to compress the size of still image. JPEG encoding method performs better compression efficiency than the other still image encoding method. However, when encoding a still image at low bit-rate, high frequency coefficients could be lost because of the coarse quantization so the blocking artifacts occur. In this paper, we propose the method of eliminating the blocking artifacts which occur when the still image is encoded by JPEG at a high compression rate. The principle of proposed algorithm is that the eliminating the blocking artifacts, which occur in the boundary of blocks, in DCT domain with $4{\times}4$ block-based method. First of all, observe the blocking artifacts with $4{\times}4$ block in DCT domain. Then eliminate the blocking effects using effective filtering method that is $4{\times}4$ block-based. Experimental results have clearly shown that our algorithm presents substantially higher quality in subjective and objective point of view than the other algorithms.