In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ...In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.展开更多
In this paper, we present a multi-partner communication network protocol. The supervisor prepares numerous Einstein-Podolsky-Rosen (EPR) pairs and auxiliary qubits. He then performs a controlled-NOT(CNOT) gate ope...In this paper, we present a multi-partner communication network protocol. The supervisor prepares numerous Einstein-Podolsky-Rosen (EPR) pairs and auxiliary qubits. He then performs a controlled-NOT(CNOT) gate operation on one qubit of each EPR pair and an auxiliary, which induces the entanglement between the EPR pair and the auxiliary. The supervisor keeps one qubit sequence in his laboratory and sends the others to the outside world. After security approval, the network can be constructed successfully, which can be applied to quantum secret sharing and quantum secure direct communication.展开更多
We developed an IT (Information Technology) triage system for collecting disaster medical information in real time. FeliCa cards and card readers are used to obtain the number and condition of patients. The system i...We developed an IT (Information Technology) triage system for collecting disaster medical information in real time. FeliCa cards and card readers are used to obtain the number and condition of patients. The system is composed of two elements. First, the number of patients for each triage level and the accepted number of patients in each diagnosis and treatment department are obtained in real time, including response for changing triage level. Second, this information is shared in real time among hospitals, the admim'stration, and residents who are searching for their family. A disaster drill utilizing this system was held at the University of Yamanashi Hospital with 450 participants. From the result of that, the present system could work for those two elements. TRACY was examined its availability and practicability in this drill.展开更多
Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, he...Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, healthcare and public health, and transportation systems virtually at risk. Consequently, this is due primarily to the country’s heavy dependence on computer networks. With both domestic and international terrorists increasingly targeting any vulnerabilities in computer systems and networks, information sharing among security agencies has become critical. Cyberterrorism can be regarded as the purest form of information warfare. This literature review examines cyberterrorism and strategic communications, focusing on domestic cyberterrorism. Notable themes include the meaning of cyberterrorism, how cyberterrorism differs from cybercrime, and the threat posed by cyberterrorism to the USA. Prevention and deterrence of cyberterrorism through information sharing and legislation are also key themes. Finally, gaps in knowledge are identified, and questions warranting additional research are outlined.展开更多
The dilemma of modern mobile communications technology is analyzed. Aiming at some problems in the 3G systems, a new network architecture is proposed on the principle of mobile information sharing grid (MIS-Grid). The...The dilemma of modern mobile communications technology is analyzed. Aiming at some problems in the 3G systems, a new network architecture is proposed on the principle of mobile information sharing grid (MIS-Grid). The essence of MIS-Grid is to transfer the hot wide band information with cheap unidirectional broadcasting channels and the personalized services with relatively expensive interactive networks.展开更多
文摘In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.
文摘In this paper, we present a multi-partner communication network protocol. The supervisor prepares numerous Einstein-Podolsky-Rosen (EPR) pairs and auxiliary qubits. He then performs a controlled-NOT(CNOT) gate operation on one qubit of each EPR pair and an auxiliary, which induces the entanglement between the EPR pair and the auxiliary. The supervisor keeps one qubit sequence in his laboratory and sends the others to the outside world. After security approval, the network can be constructed successfully, which can be applied to quantum secret sharing and quantum secure direct communication.
文摘We developed an IT (Information Technology) triage system for collecting disaster medical information in real time. FeliCa cards and card readers are used to obtain the number and condition of patients. The system is composed of two elements. First, the number of patients for each triage level and the accepted number of patients in each diagnosis and treatment department are obtained in real time, including response for changing triage level. Second, this information is shared in real time among hospitals, the admim'stration, and residents who are searching for their family. A disaster drill utilizing this system was held at the University of Yamanashi Hospital with 450 participants. From the result of that, the present system could work for those two elements. TRACY was examined its availability and practicability in this drill.
文摘Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, healthcare and public health, and transportation systems virtually at risk. Consequently, this is due primarily to the country’s heavy dependence on computer networks. With both domestic and international terrorists increasingly targeting any vulnerabilities in computer systems and networks, information sharing among security agencies has become critical. Cyberterrorism can be regarded as the purest form of information warfare. This literature review examines cyberterrorism and strategic communications, focusing on domestic cyberterrorism. Notable themes include the meaning of cyberterrorism, how cyberterrorism differs from cybercrime, and the threat posed by cyberterrorism to the USA. Prevention and deterrence of cyberterrorism through information sharing and legislation are also key themes. Finally, gaps in knowledge are identified, and questions warranting additional research are outlined.
基金Supported by the Foundation of National 863 Programme of China (No.2002AA121063) and the National Natural Science Foundation of China (No.60272014)
文摘The dilemma of modern mobile communications technology is analyzed. Aiming at some problems in the 3G systems, a new network architecture is proposed on the principle of mobile information sharing grid (MIS-Grid). The essence of MIS-Grid is to transfer the hot wide band information with cheap unidirectional broadcasting channels and the personalized services with relatively expensive interactive networks.