Font Size: a A A

The Analysis On The Access Method And Network-building Of Bandwidth-based Business

Posted on:2011-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y FanFull Text:PDF
GTID:2248330338953874Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Alonging with the rapidly increasing of the technology in communication, puzzles of the information’s safe on the web have been crushed out, especially the spreading out of the porn, the violence, and the counteraction, undermined society’s ethos badly, and have been effected most of juveniles seriously. It has been a problem and a challenge which many countries have to face to. News are given to us by XinHuaWeb: according to some accounts, there are more than 317 hundreds million porn website on our Internet, and about twenty thousands porn pictures come into it. Another report the Center of Chinese Information of Internet suggested that, until 2009.7, the sum of browser in China has achieved 1.75 hundred million, and then, the number of young browsers, who are the main part, under the age of 24 accounts for 51.8 percent, in which the senior high school’s take up 50 percent. Since the Website can be entered with freedom, much of the minors come into the porn unwittingly. The porn in the Web has much hidden trouble in the growing up of juveniles. Sort of the illegal phenomena, which putting up the trend of increase, has been occurred sometimes. How to be master of it, protect the young’s browsing safely, has become to a puzzle which will be settled recently, has become to a puzzle that the whole society, school, and family have to face to.Firstly, my thesis introduces the development’s situation of the Internet now, aiming at the status leaching the information wicked based on the content understanding, introduces some conceptions and characteristics of it. Then, introduces its main calculation and the fundamental of its technology, at the same time, giving some systemic discussion and analysis. Finally, I give some arguments of problems with it and some expectations.
Keywords/Search Tags:Internet Information unconscionable, Filtration of text, Filtration of pictures
PDF Full Text Request
Related items