Technical Approaches for Blocking Obscenity in Internet Video Chatting
نویسندگان
چکیده
منابع مشابه
Eye Movements as Deception Indicators in Online Video Chatting
Online video chat is emerging as one of the common forms of computer-mediated communication (CMC). It can also be easily exploited by deceiver for persuasive conversation. Research on deception cues in CMC is gaining increasing attention in recent years but has largely ignored this new medium. This study aims to investigate the effect of eye movement behavior in the detection of deception in on...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملStreaming video over the Internet: approaches and directions
| Due to the explosive growth of the Internet and increasing demand for multimedia information on the web, streaming video over the Internet has received tremendous attention from academia and industry. Transmission of real-time video typically has bandwidth, delay and loss requirements. However, the current best-e ort Internet does not o er any quality of service (QoS) guarantees to streaming ...
متن کاملSex and obscenity in medieval art.
©FSRH J Fam Plann Reprod Health Care 2009: 35(1) Contemporary evidence When researching early or ‘forbidden’ historical subjects it can be a considerable challenge finding primary sources that give a first-hand experience of contemporary events. In some periods, such as post-Roman, there is very little documented evidence, to the point where we only know of the existence of some kings purely fr...
متن کاملVideo Streaming in Wireless Internet
2 Basics of Video Compression 9 2.1 Digital Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2 Intra-frame Coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2.1 Block Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.2.2 Discrete Cosine Transformation . . . . . . . . . . . . . . . . . . . . 12 2.2.3 Quantization . . . . ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartD
سال: 2004
ISSN: 1598-2866
DOI: 10.3745/kipstd.2004.11d.7.1499