SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Bose S.) ;mspu:(conferencepaper)"

Search: WFRF:(Bose S.) > Conference paper

  • Result 1-4 of 4
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Aamodt, K., et al. (author)
  • Alignment of the ALICE Inner Tracking System with cosmic-ray tracks
  • 2010
  • In: Journal of Instrumentation. - 1748-0221. ; 5
  • Conference paper (peer-reviewed)abstract
    • ALICE (A Large Ion Collider Experiment) is the LHC (Large Hadron Collider) experiment devoted to investigating the strongly interacting matter created in nucleus-nucleus collisions at the LHC energies. The ALICE ITS, Inner Tracking System, consists of six cylindrical layers of silicon detectors with three different technologies; in the outward direction: two layers of pixel detectors, two layers each of drift, and strip detectors. The number of parameters to be determined in the spatial alignment of the 2198 sensor modules of the ITS is about 13,000. The target alignment precision is well below 10 mu m in some cases (pixels). The sources of alignment information include survey measurements, and the reconstructed tracks from cosmic rays and from proton-proton collisions. The main track-based alignment method uses the Millepede global approach. An iterative local method was developed and used as well. We present the results obtained for the ITS alignment using about 10(5) charged tracks from cosmic rays that have been collected during summer 2008, with the ALICE solenoidal magnet switched off.
  •  
2.
  • Edoff, Marika, 1965-, et al. (author)
  • Ultrathin CIGS Solar Cells with Passivated and Highly Reflective Back Contacts – : Results from the ARCIGS-M Consortium
  • 2019
  • In: Proceedings of 36th European Photovoltaic Solar Energy Conference and Exhibition. ; , s. 597-600
  • Conference paper (other academic/artistic)abstract
    • In this work, we report results from the EU-funded project ARCIGS-M. The project started in 2016 and aims to reduce the use of indium and gallium by enabling the use of very thin Cu(In,Ga)Se2 (CIGS) layers while retaining high efficiency and developing innovative low-cost steel substrates as alternatives to glass. In the project, reflective layers containing TCO´s and silver have successfully been used to enhance the reflective properties of the rear contact. In addition, passivation layers based on alumina (Al2O3) deposited by atomic layer deposition (ALD) have been found to yield good passivation of the rear contact. Since the alumina layers are dielectric, perforation of these layers is necessary to provide adequate contacting. The design of the perforation patterns has been investigated by a combination of modeling and experimental verification by electron beam lithography. In parallel a nano-imprint lithography (NIL) process is further developed for scale-up and application in prototype modules. Advanced optoelectrical characterization supported by modeling is used to fill in the missing gaps in optical and electrical properties, regarding CIGS, interfaces and back contact materials.
  •  
3.
  •  
4.
  • Vijayakumar, P., et al. (author)
  • Hierarchical key management scheme for securing mobile agents with optimal computation time
  • 2012
  • In: International Conference on Modelling Optimization and Computing. - : Elsevier. ; , s. 1432-1443
  • Conference paper (peer-reviewed)abstract
    • The Mobile agents are well suited for accessing contents of distributed web based applications including internet business. Such kinds of access must be secure enough enabling only authorized mobile agents to retrieve the contents from the distributed servers. This kind of security is provided by several algorithms including RSA based digital signature and elliptic curve digital signature cryptography. The main differences among the algorithms of the past literatures lie in the computational time of encryption and decryption of the keys used for encrypting and decrypting the content. In this paper we propose a modified hierarchical date constrained key management scheme which potentially reduces the overall computation time needed for key derivation and key signature check operations. Different algorithms are compared with our proposed mechanism and the experimental results show that the proposed method reduces the overall key derivation and key signature check computational time.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-4 of 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view