14,313 research outputs found

    High Lifetime Solar Cell Processing and Design

    Get PDF
    In order to maximize efficiency a solar cell must: (1) absorb as much light as possible in electron-hole production, (2) transport as large a fraction as possible of the electrons to the n-type terminal and holes to the p-type terminal without their first recombining, and (3) produce as high as possible terminal voltage. Step (1) is largely fixed by the spectrum of sunlight and the fundamental absorption characteristics of silicon, although some improvements are possible through texturizing induced light trapping and back surface reflectors. Steps (2) and (3) are, however, dependent on the recombination mechanisms of the cell. The recombination, on the contrary, is strongly influenced by cell processing and design. Some of the lessons during the development of point-contact-cell are discussed. Cell dependence on recombination, surface recombination, and contact recombination are discussed. Results show the overwhelming influence of contact recombination on the operation of the cell when the other sources of recombination are reduced by careful processing

    Measurement of minority carrier transport parameters in heavily doped n-type silicon

    Get PDF
    Measurement of minority transport parameters in heavily doped silicon is covered. The basic transport equations were used to define two independent parameters. Use of special vertical and lateral transistor test devices permitted the measurement of both parameters. Prior studies were normalized to show excellent agreement over the heavy doping region

    Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem

    Get PDF
    We present the first formal mathematical presentation of the generalized Russian cards problem, and provide rigorous security definitions that capture both basic and extended versions of weak and perfect security notions. In the generalized Russian cards problem, three players, Alice, Bob, and Cathy, are dealt a deck of nn cards, each given aa, bb, and cc cards, respectively. The goal is for Alice and Bob to learn each other's hands via public communication, without Cathy learning the fate of any particular card. The basic idea is that Alice announces a set of possible hands she might hold, and Bob, using knowledge of his own hand, should be able to learn Alice's cards from this announcement, but Cathy should not. Using a combinatorial approach, we are able to give a nice characterization of informative strategies (i.e., strategies allowing Bob to learn Alice's hand), having optimal communication complexity, namely the set of possible hands Alice announces must be equivalent to a large set of t−(n,a,1)t-(n, a, 1)-designs, where t=a−ct=a-c. We also provide some interesting necessary conditions for certain types of deals to be simultaneously informative and secure. That is, for deals satisfying c=a−dc = a-d for some d≥2d \geq 2, where b≥d−1b \geq d-1 and the strategy is assumed to satisfy a strong version of security (namely perfect (d−1)(d-1)-security), we show that a=d+1a = d+1 and hence c=1c=1. We also give a precise characterization of informative and perfectly (d−1)(d-1)-secure deals of the form (d+1,b,1)(d+1, b, 1) satisfying b≥d−1b \geq d-1 involving d−(n,d+1,1)d-(n, d+1, 1)-designs

    Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval

    Get PDF
    We consider user-private information retrieval (UPIR), an interesting alternative to private information retrieval (PIR) introduced by Domingo-Ferrer et al. In UPIR, the database knows which records have been retrieved, but does not know the identity of the query issuer. The goal of UPIR is to disguise user profiles from the database. Domingo-Ferrer et al.\ focus on using a peer-to-peer community to construct a UPIR scheme, which we term P2P UPIR. In this paper, we establish a strengthened model for P2P UPIR and clarify the privacy goals of such schemes using standard terminology from the field of privacy research. In particular, we argue that any solution providing privacy against the database should attempt to minimize any corresponding loss of privacy against other users. We give an analysis of existing schemes, including a new attack by the database. Finally, we introduce and analyze two new protocols. Whereas previous work focuses on a special type of combinatorial design known as a configuration, our protocols make use of more general designs. This allows for flexibility in protocol set-up, allowing for a choice between having a dynamic scheme (in which users are permitted to enter and leave the system), or providing increased privacy against other users.Comment: Updated version, which reflects reviewer comments and includes expanded explanations throughout. Paper is accepted for publication by Advances in Mathematics of Communication

    Measurement of minority carrier lifetime, mobility and diffusion length in heavily doped silicon

    Get PDF
    Carrier transport and recombination parameters in heavily doped silicon were examined. Data were presented for carrier diffusivity in both p- and n-type heavily doped silicon covering a broad range of doping concentrations from 10 to the 15th power to 10 to the 20th power atoms/cu cm. One of the highlights of the results showed that minority carrier diffusivities are higher by a factor of 2 in silicon compared to majority carrier diffusivities

    A comparison of two central difference schemes for solving the Navier-Stokes equations

    Get PDF
    Five viscous transonic airfoil cases were computed by two significantly different computational fluid dynamics codes: An explicit finite-volume algorithm with multigrid, and an implicit finite-difference approximate-factorization method with Eigenvector diagonalization. Both methods are described in detail, and their performance on the test cases is compared. The codes utilized the same grids, turbulence model, and computer to provide the truest test of the algorithms. The two approaches produce very similar results, which, for attached flows, also agree well with experimental results; however, the explicit code is considerably faster

    Circular 78

    Get PDF
    Historically, sales of exotic meats have been limited only by supply. As supply has increased in recent years, national and international exotic game markets have grown rapidly. In the United States, growth has occurred primarily in the restaurant section, although over-the-counter sales have also increased. The Alaskan reindeer industry is exploring the potential of expanding its meat sales as well as antler sales. Meat production increased from 320,000 pounds in 1987 to 432,000 pounds in 1988. This production increase is reflected in a 27 percent increase in dollar value (Alaska Crop and Livestock Reporting Service, 1989). Under current management procedures, potential meat production has been estimated at 500,000 pounds (Pearson and Lewis, 1988). Any future market expansion is likely to occur in urban Alaska and in areas outside the state (Jones, 1988)

    Point contact silicon solar cells

    Get PDF
    The construction of a 22.2% efficient single-crystal silicon solar cell fabricated at Stanford University is described. The cell dimensions were 3 x 5 mm and 100 microns thick with a base lifetime of 500 microseconds. The cell featured light trapping between a texturized top surface and a reflective bottom surface, small point contact diffusions, alternating between n-type and p-type in a polka-dot pattern on the bottom surface, and a surface passivation on all surfaces between contact regions

    A linearized kinetic theory of spin-1/2 particles in magnetized plasmas

    Full text link
    We have considered linear kinetic theory including the electron spin properties in a magnetized plasma. The starting point is a mean field Vlasov-like equation, derived from a fully quantum mechanical treatment, where effects from the electron spin precession and the magnetic dipole force is taken into account. The general conductivity tensor is derived, including both the free current contribution, as well as the magnetization current associated with the spin contribution. We conclude the paper with an extensive discussion of the quantum-mechanical boundary where we list parameter conditions that must be satisfied for various quantum effects to be influential.Comment: 11 page
    • …
    corecore