Preferred Language
Articles
/
ceb2_J0BmraWrQ4d711r
Compact free-electron lasers as enablers of beyond-6G and quantum communication systems
...Show More Authors

Free-electron lasers (FELs) are disruptive light sources that offer ultrashort pulses, wide spectral tunability, and superior coherence, making them promising candidates for next-generation photonic technologies. However, conventional FEL facilities are large-scale and complex, limiting their integration into communication systems. This study investigates the potential of compact FELs as scalable and versatile light sources for beyond-6G and quantum communication infrastructures. A theoretical framework was established to model resonance conditions, gain dynamics, coherence properties, pulse-duration-limited bit rates, and signal-to-noise ratio (SNR). These models were implemented in MATLAB simulations using parameters representative of state-of-the-art compact FEL prototypes. The results demonstrate that compact FELs provide: broad tunability from the terahertz to the X-ray regime through variation of beam energy and undulator period; high small-signal gain, strongly dependent on beam current, enabling efficient amplification; petabit-per-second bit rates, achievable with attosecond-scale pulses; and superior SNR performance, sustaining values above 80 dB even at low power levels, ensuring secure and reliable transmission. Collectively, these findings confirm that compact FELs combine ultrashort pulse generation, high coherence, and multi-band operation, making them cornerstone technologies for future ultra-fast and quantum-secure communication networks. While challenges remain in efficiency, beam stability, and integration, ongoing advances in laser–plasma accelerators, dielectric undulators, and hybrid photonic systems provide promising pathways toward practical implementation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Wireless Indoor Localization Systems and Techniques: Survey and Comparative Study
...Show More Authors

<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav

... Show More
View Publication
Scopus (49)
Crossref (37)
Scopus Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
On New Algebraic Systems
...Show More Authors

The purpose of this paper is to give some results theorems , propositions and corollaries concerning new algebraic systems flower , garden and farm with accustomed algebraic systems groupoid , group and ring.

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 30 2019
Journal Name
Cambridge Scholars Publishing.
Intelligent systems in building;
...Show More Authors

Publication Date
Sun Dec 01 2013
Journal Name
Political Sciences Journal
Scientific Activities political systems
...Show More Authors

نشاطات فرع النظم السياسية

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Tue Dec 01 2020
Journal Name
Sn Applied Sciences
Regressor-free adaptive vibration control of constrained smart beams with axial stretching
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Free Vibration Analysis of Laminated Composite plates with General Elastic Boundary Supports
...Show More Authors

In this investigation, Rayleigh–Ritz method is used to calculate the natural frequencies of rectangular isotropic and laminated symmetric and anti-symmetric cross and angle ply composite plate with general elastic supports along its edges. Each of the admissible functions here is composed of a trigonometric function and an arbitrary continuous function that is introduced to ensure the sufficient smoothness of the so-called residual displacement function at the edges. Perhaps more importantly, this study has developed a general approach for deriving a complete set of admissible functions that can be applied to various boundary conditions. Several numerical examples are studied to demonstrate the accuracy and convergence of the current s

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
The Journal Of Engineering
Experimental comparison of two linear machines developed for the free piston engine
...Show More Authors

: In this study, a linear synchronous machine is compared with a linear transverse flux machine. Both machines have been designed and built with the intention of being used as the power take off in a free piston engine. As both topologies are cylindrical, it is not possible to construct either using just flat laminations and so alternative methods are described and demonstrated. Despite the difference in topology and specification, the machines are compared on a common base in terms of rated force and suitability for use as a generator. Experience gained during the manufacture of two prototypes is described.

View Publication Preview PDF
Crossref (9)
Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials &amp; Continua
An Optimal Algorithm for Resource Allocation in D2D Communication
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref