A Highly Efficient Content Based Approach to Filter Pornography Websites

Author(s):  
Tarek M. Mahmoud ◽  
Tarek Abd-El-Hafeez ◽  
Ahmed Omar

With the ever-growing Web, the Websites with objectionable contents like pornography, violence, racism, etc. have been augmented rapidly during recent years. Among the offensive contents, the pornography is the most harmful one affecting children safety and causing many destructive side effects. A content filter is one or more pieces of software that work together to prevent users from viewing material found on the Internet. This paper presents an efficient content based software system for detecting and filtering pornography images in Web pages. The proposed system runs online in the background of Internet Explorer (IE) for the purpose of restricting access to pornography Web pages. Skin and face detection techniques are the main components of the proposed system. Because the proposed filter works online, the authors propose two fasting techniques that can be used to speed up the filtering system. The results obtained using the proposed system is compared with four commercial filtering programs. The success rate of the proposed filtering system is better than the considered filtering programs.

Author(s):  
Tarek M. Mahmoud ◽  
Tarek Abd-El-Hafeez ◽  
Ahmed Omar

The Internet is a powerful source of information. However, some of the information that is available on the Internet cannot be shown to every type of public. For instance, pornography is not desirable to be shown to children; pornography is the most harmful content affecting child safety and causing many destructive side effects. A content filter is one of more pieces of software that work together to prevent users from viewing material found on the Internet. In this chapter, the authors present an efficient content-based software system for detecting and filtering pornography images in Web pages. The proposed system runs online in the background of Internet Explorer (IE) for the purpose of restricting access to pornography Web pages. Skin and face detection techniques are the main components of the proposed system. Because the proposed filter works online, the authors propose two fasting techniques that can be used to speed up the filtering system. The results obtained using the proposed system are compared with four commercial filtering programs. The success rate of the proposed filtering system is better than the considered filtering programs.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Hai-Chen Wang ◽  
Silvana Botti ◽  
Miguel A. L. Marques

AbstractWe propose an efficient high-throughput scheme for the discovery of stable crystalline phases. Our approach is based on the transmutation of known compounds, through the substitution of atoms in the crystal structure with chemically similar ones. The concept of similarity is defined quantitatively using a measure of chemical replaceability, extracted by data-mining experimental databases. In this way we build 189,981 possible crystal phases, including 18,479 that are on the convex hull of stability. The resulting success rate of 9.72% is at least one order of magnitude better than the usual success rate of systematic high-throughput calculations for a specific family of materials, and comparable with speed-up factors of machine learning filtering procedures. As a characterization of the set of 18,479 stable compounds, we calculate their electronic band gaps, magnetic moments, and hardness. Our approach, that can be used as a filter on top of any high-throughput scheme, enables us to efficiently extract stable compounds from tremendously large initial sets, without any initial assumption on their crystal structures or chemical compositions.


VASA ◽  
2011 ◽  
Vol 40 (3) ◽  
pp. 235-240 ◽  
Author(s):  
Krnic ◽  
Sucic

Background: The aim of this study is to report our results in main stem vein closure using the bipolar radiofrequency induced thermotherapy (RFITT) system and the 1064nm Nd:Yag laser. Patients and methods: 44 incompetent main stem veins (37 great saphenous veins, one lesser saphenous vein, and 6 anterior accessory saphenous veins) in 29 patients were treated using RFITT. 53 incompetent main stem veins (45 great saphenous veins, 4 lesser saphenous veins, and 4 anterior accessory saphenous veins) in 43 patients were treated endovenously with 1064 nm Nd:Yag laser. All patients underwent postoperative duplex scanning within a month after procedure, as well as a short interview regarding postoperative discomfort. Results: In main stem veins treated with RFITT, the success rate within the first month was 86,4 % (38 out of 44 veins). Complete failure rate was 13,6 % (6 out of 44 veins). In 53 main stem veins treated by 1064 nm Nd:Yag laser, the success rate was 100 %, consisting of 98,1 % complete success (52/53 veins), and 1,9 % partial success (1/53 veins). None of the patients treated with RFITT experienced postoperative adverse effects, whereas 13/43 (30,2 %) patients treated with laser had to use oral analgesics after the treatment, and 21/43 (48,8 %) patients reported transient skin changes, such as bruising or skin redness. Conclusions: RFITT system was fairly efficient in the short term for closure of main trunk veins, whereas longer term results are still scarce. Postoperative side effects of RFITT were minimal. 1064nm Nd:Yag laser, according to short term results, proved to be very effective for main stem vein closure. Postoperative side effects related to 1064 nm Nd:Yag endovenous laser treatment proved to be minor, transient, and acceptable.


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 174-187
Author(s):  
Harmandeep Singh ◽  
Arwinder Singh

Nowadays, internet satisfying people with different services related to different fields. The profit, as well as non-profit organization, uses the internet for various business purposes. One of the major is communicated various financial as well as non-financial information on their respective websites. This study is conducted on the top 30 BSE listed public sector companies, to measure the extent of governance disclosure (non-financial information) on their web pages. The disclosure index approach to examine the extent of governance disclosure on the internet was used. The governance index was constructed and broadly categorized into three dimensions, i.e., organization and structure, strategy & Planning and accountability, compliance, philosophy & risk management. The empirical evidence of the study reveals that all the Indian public sector companies have a website, and on average, 67% of companies disclosed some kind of governance information directly on their websites. Further, we found extreme variations in the web disclosure between the three categories, i.e., The Maharatans, The Navratans, and Miniratans. However, the result of Kruskal-Wallis indicates that there is no such significant difference between the three categories. The study provides valuable insights into the Indian economy. It explored that Indian public sector companies use the internet for governance disclosure to some extent, but lacks symmetry in the disclosure. It is because there is no such regulation for web disclosure. Thus, the recommendation of the study highlighted that there must be such a regulated framework for the web disclosure so that stakeholders ensure the transparency and reliability of the information.


2020 ◽  
Author(s):  
Alberto Leira ◽  
Esteban Jove ◽  
Jose M Gonzalez-Cava ◽  
José-Luis Casteleiro-Roca ◽  
Héctor Quintián ◽  
...  

Abstract Closed-loop administration of propofol for the control of hypnosis in anesthesia has evidenced an outperformance when comparing it with manual administration in terms of drug consumption and post-operative recovery of patients. Unlike other systems, the success of this strategy lies on the availability of a feedback variable capable of quantifying the current hypnotic state of the patient. However, the appearance of anomalies during the anesthetic process may result in inaccurate actions of the automatic controller. These anomalies may come from the monitors, the syringe pumps, the actions of the surgeon or even from alterations in patients. This could produce adverse side effects that can affect the patient postoperative and reduce the safety of the patient in the operating room. Then, the use of anomaly detection techniques plays a significant role to avoid this undesirable situations. This work assesses different one-class intelligent techniques to detect anomalies in patients undergoing general anesthesia. Due to the difficulty of obtaining real data from anomaly situations, artificial outliers are generated to check the performance of each classifier. The final model presents successful performance.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 539 ◽  
Author(s):  
Arun Kumar Sangaiah ◽  
Ali Asghar Rahmani Hosseinabadi ◽  
Morteza Babazadeh Shareh ◽  
Seyed Yaser Bozorgi Rad ◽  
Atekeh Zolfagharian ◽  
...  

The Internet of Things (IoT) is a distributed system that connects everything via internet. IoT infrastructure contains multiple resources and gateways. In such a system, the problem of optimizing IoT resource allocation and scheduling (IRAS) is vital, because resource allocation (RA) and scheduling deals with the mapping between recourses and gateways and is also responsible for optimally allocating resources to available gateways. In the IoT environment, a gateway may face hundreds of resources to connect. Therefore, manual resource allocation and scheduling is not possible. In this paper, the whale optimization algorithm (WOA) is used to solve the RA problem in IoT with the aim of optimal RA and reducing the total communication cost between resources and gateways. The proposed algorithm has been compared to the other existing algorithms. Results indicate the proper performance of the proposed algorithm. Based on various benchmarks, the proposed method, in terms of “total communication cost”, is better than other ones.


2015 ◽  
Vol 47 (1) ◽  
pp. 5-17
Author(s):  
Jolanta Korycka-Skorupa

Abstract The author discuss effectiveness of cartographic presentations. The article includes opinions of cartographers regarding effectiveness, readability and efficiency of a map. It reminds the principles of map graphic design in order to verify them using examples of small-scale thematic maps. The following questions have been asked: Is the map effective? Why is the map effective? How do cartographic presentation methods affect effectiveness of the cartographic message? What else can influence effectiveness of a map? Each graphic presentation should be effective, as its purpose is to complete written word, draw the recipients’ attention, make text more readable, expose the most important information. Such a significant role of graphics results in the fact that graphic presentations (maps, diagrams) require proper preparation. Users need to have a chance to understand the graphics language in order to draw correct conclusions about the presented phenomenon. Graphics should demonstrate the most important elements, some tendencies, and directions of changes. It should generalize and present a given subject from a slightly different perspective. There are numerous examples of well-edited and poorly edited small-scale thematic maps. They include maps, which are impossible to interpret correctly. They are burdened with methodological defects and they cannot fulfill their task. Cartography practice indicates that the principles related to graphic design of cartographic presentation are frequently omitted during the process of developing small-scale thematic maps used – among others – in the press and on the Internet. The purpose of such presentations is to quickly interpret them. On such maps editors’ problems with the selection of an appropriate symbol and graphic variable (fig. 1A, 9B) are visible. Sometimes they use symbols which are not sufficiently distinguishable nor demonstrative (fig. 11), it does not increase their readability. Sometime authors try too hard to reflect presented phenomenon and therefore the map becomes more difficult to interpret (fig. 4A,B). The lack of graphic sense resulting in the lack of graphic balance and aesthetics constitutes a weak point of numerous cartographic presentations (fig. 13). Effectiveness of cartographic presentations consists of knowledge and skills of the map editor, as well as the recipients’ perception capabilities and their readiness to read and interpret maps. The qualifications of the map editor should include methodological qualifications supported by the knowledge of the principles for cartographic symbol design, as well as relevant technical qualifications, which allow to properly use the tools to edit a map. Maps facilitate the understanding of texts they accompany and they present relationships between phenomenon better than texts, appealing to the senses.


1982 ◽  
Vol 47 (2) ◽  
pp. 160-164
Author(s):  
Glenn L. Falkowski ◽  
Arthur M. Guilford ◽  
Jack Sandler

Utilizing airflow therapy, Schwartz (1976) has claimed an 89% success rate with stutterers following treatment and an 83% success rate at one year follow-up. Such claims have yet to be documented in the scientific literature. The purposes of this study were: (a) to investigate the effectiveness of a modified version of airflow therapy; (b) to examine the relative importance of its two main components—passive airflow and elongation of the first vowel spoken. The speech of two adult male stutterers with a lengthy history of stuttering, was assessed with spontaneous speaking and reading tasks. Results indicated marked improvement in both subjects' speech on the reading task was maintained at follow-up 10 weeks later. For spontaneous speech, results were generally weaker and less durable. Effects of the two treatment components were cumulative and did not allow determination of any differential effectiveness between components. Implications of these findings were considered and directions for future research discussed.


Sign in / Sign up

Export Citation Format

Share Document