4 resultados para Size-dependent phase transitions


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Doctorate in Biology, Specialty in Biotechnology

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dissertation presented to obtain a Ph.D. Degree in Chemical Physics

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Transparent conducting oxides (TCOs) have been largely used in the optoelectronic industry due to their singular combination of low electrical resistivity and high optical transmittance. They are usually deposited by magnetron sputtering systems being applied in several devices, specifically thin film solar cells (TFSCs). Sputtering targets are crucial components of the sputtering process, with many of the sputtered films properties dependent on the targets characteristics. The present thesis focuses on the development of high quality conductive Al-doped ZnO (AZO) ceramic sputtering targets based on nanostructured powders produced by emulsion detonation synthesis method (EDSM), and their application as a TCO. In this sense, the influence of several processing parameters was investigated from the targets raw-materials synthesis to the application of sputtered films in optoelectronic devices. The optimized manufactured AZO targets present a final density above 99 % with controlled grain size, an homogeneous microstructure with a well dispersed ZnAl2O4 spinel phase, and electrical resistivities of ~4 × 10-4 Ωcm independently on the Al-doping level among 0.5 and 2.0 wt. % Al2O3. Sintering conditions proved to have a great influence on the properties of the targets and their performance as a sputtering target. It was demonstrated that both deposition process and final properties of the films are related with the targets characteristics, which in turn depends on the initial powder properties. In parallel, the influence of several deposition parameters in the film´s properties sputtered from these targets was investigated. The sputtered AZO TCOs showed electrical properties at room temperature that are superior to simple oxides and comparable to a reference TCO – indium tin oxide (ITO), namely low electrical resistivity of 5.45 × 10-4 Ωcm, high carrier mobility (29.4 cm2V-1s-1), and high charge carrier concentration (3.97 × 1020 cm-3), and also average transmittance in the visible region > 80 %. These superior properties allowed their successful application in different optoelectronic devices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.