-
Nonclassical Light in a Three-Waveguide Coupler with Second-Order Nonlinearity
Authors:
Mohd Syafiq M. Hanapi,
Abdel-Baset M. A. Ibrahim,
Rafael Julius,
Pankaj K. Choudhury,
Hichem Eleuch
Abstract:
Possible squeezed states generated in a three-waveguide nonlinear coupler operating with second harmonic generation is discussed. This study is carried out using two well-known techniques; the phase space method (based on positive P-representation) and the Heisenberg-based analytical perturbative method. The effect of the key design parameters is analyzed for both codirectional and contra-directio…
▽ More
Possible squeezed states generated in a three-waveguide nonlinear coupler operating with second harmonic generation is discussed. This study is carried out using two well-known techniques; the phase space method (based on positive P-representation) and the Heisenberg-based analytical perturbative method. The effect of the key design parameters is analyzed for both codirectional and contra-directional propagation. The optimal degree of feasible squeezing is identified. Also, the performance and capacities of both methods are critically evaluated. For low levels of key design parameters and in the early stages of evolution, a high level of agreement between the two methods is noticed. In the new era of quantum-based technology, the proposed system opens a new avenue for utilising nonlinear couplers in nonclassical light generation.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Eikonal amplitudes and non-global logarithms from the BMS equation
Authors:
Hana Benslama,
Yazid Delenda,
Kamel Khelifa-Kerfa,
Abdelaziz Mohamed Ibrahim
Abstract:
The Banfi-Marchesini-Smye (BMS) equation accounts for non-global logarithms to all orders in perturbation theory in the large-Nc approximation. We show that the squared amplitudes for the emission of soft energy-ordered gluons are correctly embedded in this equation, and explicitly verify that they coincide with those derived in our previous work in the large-Nc limit up to sixth order in the stro…
▽ More
The Banfi-Marchesini-Smye (BMS) equation accounts for non-global logarithms to all orders in perturbation theory in the large-Nc approximation. We show that the squared amplitudes for the emission of soft energy-ordered gluons are correctly embedded in this equation, and explicitly verify that they coincide with those derived in our previous work in the large-Nc limit up to sixth order in the strong coupling. We perform analytical calculations for the non-global logarithms up to fourth order for the specific hemisphere mass distribution in e+ e- collisions, thus confirming our previous semi-numerical results. We show that the solution to the BMS equation may be cast into a product of an infinite number of exponentials each of which resums a class of Feynman diagrams that manifest a symmetry pattern, and explicitly carry out the computation of the first of these exponentials.
△ Less
Submitted 11 September, 2020; v1 submitted 11 June, 2020;
originally announced June 2020.
-
Device-to-Device Coded Caching with Distinct Cache Sizes
Authors:
Abdelrahman M. Ibrahim,
Ahmed A. Zewail,
Aylin Yener
Abstract:
This paper considers a cache-aided device-to-device (D2D) system where the users are equipped with cache memories of different size. During low traffic hours, a server places content in the users' cache memories, knowing that the files requested by the users during peak traffic hours will have to be delivered by D2D transmissions only. The worst-case D2D delivery load is minimized by jointly desig…
▽ More
This paper considers a cache-aided device-to-device (D2D) system where the users are equipped with cache memories of different size. During low traffic hours, a server places content in the users' cache memories, knowing that the files requested by the users during peak traffic hours will have to be delivered by D2D transmissions only. The worst-case D2D delivery load is minimized by jointly designing the uncoded cache placement and linear coded D2D delivery. Next, a novel lower bound on the D2D delivery load with uncoded placement is proposed and used in explicitly characterizing the minimum D2D delivery load (MD2DDL) with uncoded placement for several cases of interest. In particular, having characterized the MD2DDL for equal cache sizes, it is shown that the same delivery load can be achieved in the network with users of unequal cache sizes, provided that the smallest cache size is greater than a certain threshold. The MD2DDL is also characterized in the small cache size regime, the large cache size regime, and the three-user case. Comparisons of the server-based delivery load with the D2D delivery load are provided. Finally, connections and mathematical parallels between cache-aided D2D systems and coded distributed computing (CDC) systems are discussed.
△ Less
Submitted 19 March, 2019;
originally announced March 2019.
-
Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes
Authors:
Abdelrahman M. Ibrahim,
Ahmed A. Zewail,
Aylin Yener
Abstract:
In this work, we study coded placement in caching systems where the users have unequal cache sizes and demonstrate its performance advantage. In particular, we propose a caching scheme with coded placement for three-user systems that outperforms the best caching scheme with uncoded placement. In our proposed scheme, users cache both uncoded and coded pieces of the files, and the coded pieces at th…
▽ More
In this work, we study coded placement in caching systems where the users have unequal cache sizes and demonstrate its performance advantage. In particular, we propose a caching scheme with coded placement for three-user systems that outperforms the best caching scheme with uncoded placement. In our proposed scheme, users cache both uncoded and coded pieces of the files, and the coded pieces at the users with large memories are decoded using the unicast/multicast signals intended to serve users with smaller memories. Furthermore, we extend the proposed scheme to larger systems and show the reduction in delivery load with coded placement compared to uncoded placement.
△ Less
Submitted 9 November, 2018;
originally announced November 2018.
-
Coded Caching for Heterogeneous Systems: An Optimization Perspective
Authors:
Abdelrahman M. Ibrahim,
Ahmed A. Zewail,
Aylin Yener
Abstract:
In cache-aided networks, the server populates the cache memories at the users during low-traffic periods, in order to reduce the delivery load during peak-traffic hours. In turn, there exists a fundamental trade-off between the delivery load on the server and the cache sizes at the users. In this paper, we study this trade-off in a multicast network where the server is connected to users with uneq…
▽ More
In cache-aided networks, the server populates the cache memories at the users during low-traffic periods, in order to reduce the delivery load during peak-traffic hours. In turn, there exists a fundamental trade-off between the delivery load on the server and the cache sizes at the users. In this paper, we study this trade-off in a multicast network where the server is connected to users with unequal cache sizes and the number of users is less than or equal to the number of library files. We propose centralized uncoded placement and linear delivery schemes which are optimized by solving a linear program. Additionally, we derive a lower bound on the delivery memory trade-off with uncoded placement that accounts for the heterogeneity in cache sizes. We explicitly characterize this trade-off for the case of three end-users, as well as an arbitrary number of end-users when the total memory size at the users is small, and when it is large. Next, we consider a system where the server is connected to the users via rate limited links of different capacities and the server assigns the users' cache sizes subject to a total cache budget. We characterize the optimal cache sizes that minimize the delivery completion time with uncoded placement and linear delivery. In particular, the optimal memory allocation balances between assigning larger cache sizes to users with low capacity links and uniform memory allocation.
△ Less
Submitted 13 March, 2019; v1 submitted 18 October, 2018;
originally announced October 2018.
-
On Coded Caching with Heterogeneous Distortion Requirements
Authors:
Abdelrahman M. Ibrahim,
Ahmed A. Zewail,
Aylin Yener
Abstract:
This paper considers heterogeneous coded caching where the users have unequal distortion requirements. The server is connected to the users via an error-free multicast link and designs the users' cache sizes subject to a total memory budget. In particular, in the placement phase, the server jointly designs the users' cache sizes and the cache contents. To serve the users' requests, in the delivery…
▽ More
This paper considers heterogeneous coded caching where the users have unequal distortion requirements. The server is connected to the users via an error-free multicast link and designs the users' cache sizes subject to a total memory budget. In particular, in the placement phase, the server jointly designs the users' cache sizes and the cache contents. To serve the users' requests, in the delivery phase, the server transmits signals that satisfy the users' distortion requirements. An optimization problem with the objective of minimizing the worst-case delivery load subject to the total cache memory budget and users' distortion requirements is formulated. The optimal solution for uncoded placement and linear delivery is characterized explicitly and is shown to exhibit a threshold policy with respect to the total cache memory budget. As a byproduct of the study, a caching scheme for systems with fixed cache sizes that outperforms the state-of-art is presented.
△ Less
Submitted 27 February, 2018;
originally announced February 2018.
-
Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting
Authors:
Abdelrahman M. Ibrahim,
Ozgur Ercetin,
Tamer ElBatt
Abstract:
Energy harvesting (EH) is a promising technology for realizing energy efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this work is to investigate the…
▽ More
Energy harvesting (EH) is a promising technology for realizing energy efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this work is to investigate the performance of a slotted Aloha random access wireless network consisting of two types of nodes, namely Type I which has unlimited energy supply and Type II which is solely powered by an RF energy harvesting circuit. The transmissions of a Type I node are recycled by a Type II node to replenish its battery. We characterize an inner bound on the stable throughput region under half-duplex and full-duplex energy harvesting paradigms as well as for the finite capacity battery case. We present numerical results that validate our analytical results, and demonstrate their utility for the analysis of the exact system.
△ Less
Submitted 27 July, 2015; v1 submitted 27 January, 2015;
originally announced January 2015.
-
Electronic structure and energy level schemes of RE3+:LaSi3N5 and RE2+:LaSi3N5-xOx phosphors (RE= Ce, Pr, Nd, Pm, Sm, Eu) from first principles
Authors:
Ismail A. M. Ibrahim,
Zoltan Lences,
Pavol Sajgalik,
Lubomir Benco,
Martijn Marsman
Abstract:
First principles calculations of rare earth (RE)-doped LaSi3N5 host lattice are performed to obtain the electronic structure, the band gap (BG), and the character of electronic transitions. Do** with both trivalent and bivalent RE cations is inspected. RE 4f states form two bands of occupied and unoccupied states separated by ~5 eV. In RE3+-doped compounds 4f states are shifted by ~6 eV to more…
▽ More
First principles calculations of rare earth (RE)-doped LaSi3N5 host lattice are performed to obtain the electronic structure, the band gap (BG), and the character of electronic transitions. Do** with both trivalent and bivalent RE cations is inspected. RE 4f states form two bands of occupied and unoccupied states separated by ~5 eV. In RE3+-doped compounds 4f states are shifted by ~6 eV to more negative energies compared with RE2+-compounds. This stabilization causes that RE3+ 4f bands are in a different position relative to the valence band and the conduction band than RE2+ 4f bands and therefore different electronic transitions apply. BG of RE3+-compounds decreases from ~4.6 eV (Ce) to ~0.5 eV (Eu). Except for Ce3+, exhibiting the 4f-5d transition, other RE3+-compounds show the charge transfer of the p - 4f character. BG of RE2+-compounds increases from ~0.80 eV (Ce, Pr) to ~0.95 eV (Nd, Pm), ~1.43 eV (Sm), and ~3.28 eV (Eu) and the electronic transition is of the 4f-5d character. The energy level scheme constructed from ab initio calculated electronic structures agrees well with the experimental energy level diagram. The agreement demonstrates the reliability of the hybrid functional HSE06 to describe correctly bands of nonbonding RE 4f electrons.
△ Less
Submitted 20 October, 2014;
originally announced October 2014.
-
Coverage Probability Analysis for Wireless Networks Using Repulsive Point Processes
Authors:
Abdelrahman M. Ibrahim,
Tamer ElBatt,
Amr El-Keyi
Abstract:
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using s…
▽ More
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using stochastic geometry, the downlink probability of coverage under a Matern hardcore point process to ensure minimum distance between the randomly located base stations. Assuming a mobile user connects to the nearest base station and Rayleigh fading, we derive two lower bounds expressions on the downlink probability of coverage that is within 4% from the simulated scenario. To validate our model, we compare the probability of coverage of the Matern hardcore topology against an actual base station deployment obtained from a public database. The comparison shows that the actual base station deployment can be fitted by setting the appropriate Matern point process density.
△ Less
Submitted 13 September, 2013;
originally announced September 2013.
-
Constructing Even Order Magic Squares By Consecutive Numbering
Authors:
A. M. Ibrahim,
H. M. Jibril,
A. Umar
Abstract:
The aim of this note is to introduce fastest new general methods for the construction of double and single even order magic squares. As in [5], the method for double even order magic squares is fairly straight-forward but some adjustments are necessary for the single even order magic squares.
The aim of this note is to introduce fastest new general methods for the construction of double and single even order magic squares. As in [5], the method for double even order magic squares is fairly straight-forward but some adjustments are necessary for the single even order magic squares.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.