-
A revision of the forces exerted in the Rayleigh regime by a tighlty focused optical vortex tweezer
Authors:
Khalid Aloufi,
Vasileios E. Lembessis,
Omar M. Aldossary
Abstract:
Optical tweezers use light from a tightly focused laser beam to manipulate the motion of tiny particles. When the laser light is strongly focused, but still paraxial, its e/m field is characterized by a longitudinal component which is of magnitude comparable to the transverse ones and which has been ignored in the theoretical analysis of the tweezing forces. In our work we revise the calculations…
▽ More
Optical tweezers use light from a tightly focused laser beam to manipulate the motion of tiny particles. When the laser light is strongly focused, but still paraxial, its e/m field is characterized by a longitudinal component which is of magnitude comparable to the transverse ones and which has been ignored in the theoretical analysis of the tweezing forces. In our work we revise the calculations of the various components of the radiation pressure force, within the limits of Rayleigh regime or dipole approximation, in the case where a tiny particle interacts, in free space, with a circularly polarized optical vortex beam, by taking into account this ignored field term. We show that this term is responsible for considerable modifications in the magnitude of the various components, moreover and also for the appearance of terms involving the coupling of the spin angular momentum (SAM) and the orbital angular momentum (OAM) of the photons of the vortex beam. We compare our findings with the ones taken ignoring the longitudinal field component.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Performance Analysis of the Hybrid IoT Security Model of MQTT and UMA
Authors:
Khalid S. Aloufi,
Omar H. Alhazmi
Abstract:
IoT applications are promising for future daily activities; therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furthermore, IoT applications require higher security standards. In this work, an IoT application framework is presented with a security embedded structure using the integration between m…
▽ More
IoT applications are promising for future daily activities; therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furthermore, IoT applications require higher security standards. In this work, an IoT application framework is presented with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user managed access (UMA). The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The security in the model is a built-in feature in its structure. The model is built on recommended frameworks; therefore, it is ready for integration with other web standards for data sharing, which will help in making IoT application integrated from different develo** parties.
△ Less
Submitted 26 April, 2020;
originally announced May 2020.
-
Toward Efficient Web Publishing with Provenance of Information Using Trusty URIs: Applying the proposed model with the Quran
Authors:
Khalid S. Aloufi,
Abdulrahman A. Alsewari
Abstract:
This research presents a methodology for trusting the provenance of data on the web. The implication is that data does not change after publication and the source of the data is stable. There are different data that should not change over time, such as published information in books and similar documents as well as news or events reported on the web. If the data change after publication on the web…
▽ More
This research presents a methodology for trusting the provenance of data on the web. The implication is that data does not change after publication and the source of the data is stable. There are different data that should not change over time, such as published information in books and similar documents as well as news or events reported on the web. If the data change after publication on the web, the web pages that reference the unstable data will lose points of interest or link to different resources. With the current move to linked data and the semantic web, this is becoming a greater obstacle to be solved. This research presents a methodology for establishing trusted information using an encoded reference of the data embedded in its URI, which creates a stable reference of the data and a method for ensuring its provenance stability. After applying the methodology, the results showed that the methodology is highly applicable and has no overhead cost over the loading time. The novel solution can be applied directly to any data portals or web content management systems.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Dynamics of entangled states in squeezed reservoirs
Authors:
Khalid Aloufi,
Smail Bougouffa,
Zbigniew Ficek
Abstract:
Dynamics of entangled states of two independent single-mode cavities in squeezed reservoirs is investigated in the context of matching of the correlations contained in the entangled states to those contained in the squeezed reservoir. We illustrate our considerations by examining the time evolution of entanglement of single and double excitation NOON and EPR states. A comparison is made when each…
▽ More
Dynamics of entangled states of two independent single-mode cavities in squeezed reservoirs is investigated in the context of matching of the correlations contained in the entangled states to those contained in the squeezed reservoir. We illustrate our considerations by examining the time evolution of entanglement of single and double excitation NOON and EPR states. A comparison is made when each cavity is coupled to own reservoir or both cavities are coupled to a common reservoir. It is shown that the evolution of the initial entanglement and transfer of entanglement from the squeezed reservoir to the cavity modes depend crucially on the matching of the initial correlations to that contained in the squeezed reservoir. In particular, it is found that initially entangled modes with correlations different from the reservoir correlations prevent the transfer of the correlations from the squeezed field to the modes. In addition, we find that the transient entanglement exhibits several features unique to quantum nature of squeezing. In particular, we show that in the case of separate squeezed reservoirs a variation of the decay time of the initial entanglement with the squeezing phase is unique to quantum squeezing. In the case of a common reservoir a recurrence of entanglement occurs and we find that this feature also results from the reservoir correlations unique to quantum squeezing. There is no revival of entanglement when the modes interact with a classically squeezed field.
△ Less
Submitted 1 September, 2014; v1 submitted 16 March, 2014;
originally announced March 2014.