We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using thi...We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using this technique, an eavesdropper will never find an isolated authorized user's signal. When authorized users and virtual users transmit data synchronously and asynehronously, network security increases by 25% and 37.5%, respectively.展开更多
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different us...For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
Virtual Globes such as Google Earth TM, revolutionize the way scientists conduct their research and the way the general public use geospatial – related data and information. Improvement in the processing power and st...Virtual Globes such as Google Earth TM, revolutionize the way scientists conduct their research and the way the general public use geospatial – related data and information. Improvement in the processing power and storage capacities of computers, along with the increased Internet accessibility and connectivity, has supported the usage of Virtual Globes technologies. Even more, software releases of freely downloadable Virtual Globes, such as Google Earth and NASA World Wind, has sparked an enormous public interest and increased people’s awareness of spatial sciences.In this study, the Virtual Globes (VG) revolution is discussed and a client - server Graphical User Interface (GUI) application is presented. The developed application enables Google Earth TM Application Program Interface and activates spatial analysis, through enhanced JavaScripts and Visual Basic script codes. The main scope was to present the methodology followed during geological modeling along with the application capabilities when handling with data derived from digitized geological maps and field measurements.展开更多
This paper investigates the application of Natural Language Processing (NLP) in AI interaction design for virtual experiences. It analyzes the impact of various interaction methods on user experience, integrating Virt...This paper investigates the application of Natural Language Processing (NLP) in AI interaction design for virtual experiences. It analyzes the impact of various interaction methods on user experience, integrating Virtual Reality (VR) and Augmented Reality (AR) technologies to achieve more natural and intuitive interaction models through NLP techniques. Through experiments and data analysis across multiple technical models, this study proposes an innovative design solution based on natural language interaction and summarizes its advantages and limitations in immersive experiences.展开更多
为发挥多元用户侧资源协同作用,提高虚拟电厂(virtual power plant,VPP)参与电碳联合市场收益,降低风光及电价不确定性引起的风险,提出了一种市场环境下考虑多元用户侧资源协同的VPP低碳优化调度方法。首先,基于各种用户侧资源协同作用...为发挥多元用户侧资源协同作用,提高虚拟电厂(virtual power plant,VPP)参与电碳联合市场收益,降低风光及电价不确定性引起的风险,提出了一种市场环境下考虑多元用户侧资源协同的VPP低碳优化调度方法。首先,基于各种用户侧资源协同作用,形成了VPP参与电碳联合市场运行策略;然后,建立VPP奖惩阶梯型碳交易模型,根据碳交易量设定不同交易区间价格,实现了碳电耦合;最后,构建VPP参与电碳联合市场的低碳优化调度模型,在模型中引入条件风险价值,衡量市场收益与风险的关系,并将模型转换为混合整数线性规划问题求解。通过算例分析,证明了该方法可以发挥用户侧资源的协同作用,有效应对风光及电价的不确定性风险,实现VPP参与市场运行的经济性和低碳性。展开更多
文摘We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using this technique, an eavesdropper will never find an isolated authorized user's signal. When authorized users and virtual users transmit data synchronously and asynehronously, network security increases by 25% and 37.5%, respectively.
文摘For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.
文摘Virtual Globes such as Google Earth TM, revolutionize the way scientists conduct their research and the way the general public use geospatial – related data and information. Improvement in the processing power and storage capacities of computers, along with the increased Internet accessibility and connectivity, has supported the usage of Virtual Globes technologies. Even more, software releases of freely downloadable Virtual Globes, such as Google Earth and NASA World Wind, has sparked an enormous public interest and increased people’s awareness of spatial sciences.In this study, the Virtual Globes (VG) revolution is discussed and a client - server Graphical User Interface (GUI) application is presented. The developed application enables Google Earth TM Application Program Interface and activates spatial analysis, through enhanced JavaScripts and Visual Basic script codes. The main scope was to present the methodology followed during geological modeling along with the application capabilities when handling with data derived from digitized geological maps and field measurements.
文摘This paper investigates the application of Natural Language Processing (NLP) in AI interaction design for virtual experiences. It analyzes the impact of various interaction methods on user experience, integrating Virtual Reality (VR) and Augmented Reality (AR) technologies to achieve more natural and intuitive interaction models through NLP techniques. Through experiments and data analysis across multiple technical models, this study proposes an innovative design solution based on natural language interaction and summarizes its advantages and limitations in immersive experiences.
文摘为发挥多元用户侧资源协同作用,提高虚拟电厂(virtual power plant,VPP)参与电碳联合市场收益,降低风光及电价不确定性引起的风险,提出了一种市场环境下考虑多元用户侧资源协同的VPP低碳优化调度方法。首先,基于各种用户侧资源协同作用,形成了VPP参与电碳联合市场运行策略;然后,建立VPP奖惩阶梯型碳交易模型,根据碳交易量设定不同交易区间价格,实现了碳电耦合;最后,构建VPP参与电碳联合市场的低碳优化调度模型,在模型中引入条件风险价值,衡量市场收益与风险的关系,并将模型转换为混合整数线性规划问题求解。通过算例分析,证明了该方法可以发挥用户侧资源的协同作用,有效应对风光及电价的不确定性风险,实现VPP参与市场运行的经济性和低碳性。