Search results for "Transport layer"
showing 10 items of 13 documents
Attacks Against the WAP WTLS Protocol
1999
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.
Increased conductivity of a hole transport layer due to oxidation by a molecular nanomagnet
2008
Thin film transistors based on polyarylamine poly?N,N?-diphenyl-N,N ?bis?4-hexylphenyl?- ?1,1?biphenyl?-4,4?-diamine ?pTPD? were fabricated using spin coating in order to measure the mobility of pTPD upon oxidation. Partially oxidized pTPD with a molecular magnetic cluster showed an increase in mobility of over two orders of magnitude. A transition in the mobility of pTPD upon doping could also be observed by the presence of a maximum obtained for a given oxidant ratio and subsequent decrease for a higher ratio. Such result agrees well with a previously reported model based on the combined effect of dipolar broadening of the density of states and transport manifold filling. Peer Reviewed
Efficient Vacuum Deposited P-I-N Perovskite Solar Cells by Front Contact Optimization.
2020
Hole transport layers HTLs are of fundamental importance in perovskite solar cells PSCs , as they must ensure an efficient and selective hole extraction, and ohmic charge transfer to the corresponding electrodes. In p i n solar cells, the ITO HTL is usually not ohmic, and an additional interlayer such as MoO3 is usually placed in between the two materials by vacuum sublimation. In this work, we evaluated the properties of the MoO3 TaTm TaTm is the HTL N4,N4,N4 amp; 8243;,N4 amp; 8243; tetra [1,1 amp; 8242; biphenyl] 4 yl [1,1 amp; 8242; 4 amp; 8242;,1 amp; 8243; terphenyl] 4,4 amp; 8243; diamine hole extraction interface by selectively annealing either MoO3 prior to the deposition of TaTm o…
An object-oriented development platform for transport layer protocols
2002
Transport layer protocols have become a necessary communication element for new and classical real-time applications. The implementation of these protocols has never been structured and the designers of transport layer protocols have always developed without following any pattern. The library we have designed tries to avoid this. We propose a C++ library which could be used to develop transport layer protocols, considering every generic element inside a protocol as an object. At the end we apply the library to a well known transport layer protocol known as SNR.
Removing Leakage and Surface Recombination in Planar Perovskite Solar Cells
2019
Thin-film solar cells suffer from various types of recombination, of which leakage current usually dominates at lower voltages. Herein, we demonstrate first a three-order reduction of the shunt loss mechanism in planar methylammonium lead iodide perovskite solar cells by replacing the commonly used hole transport layer poly(3,4-ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS) with a better hole-selective polyarylamine. As a result, these cells exhibit superior operation under reduced light conditions, which we demonstrate for the extreme case of moonlight irradiance, at which open-circuit voltages of 530 mV can still be obtained. By the shunt removal we also observe the VOC to dro…
Efficient Perovskite Light-Emitting Diodes: Effect of Composition, Morphology, and Transport Layers
2018
Organic-inorganic metal halide perovskites are emerging as novel materials for light-emitting applications due to their high color purity, band gap tunability, straightforward synthesis, and inexpensive precursors. In this work, we improve the performance of three-dimensional perovskite light-emitting diodes (PeLEDs) by tuning the emissive layer composition and thickness and by using small-molecule transport layers. Additionally, we correlate PeLED efficiencies to the perovskite structure and morphology. The results show that the PeLEDs containing perovskites with an excess of methylammonium bromide (MABr) to lead bromide (PbBr2) in a 2:1 ratio and a layer thickness of 80 nm have the highes…
Charge Transport Layers Limiting the Efficiency of Perovskite Solar Cells: How To Optimize Conductivity, Doping, and Thickness
2019
Perovskite solar cells (PSCs) are one of the main research topics of the photovoltaic community; with efficiencies now reaching up to 24%, PSCs are on the way to catching up with classical inorganic solar cells. However, PSCs have not yet reached their full potential. In fact, their efficiency is still limited by nonradiative recombination, mainly via trap-states and by losses due to the poor transport properties of the commonly used transport layers (TLs). Indeed, state-of-the-art TLs (especially if organic) suffer from rather low mobilities, typically within 10(-5) and 10(-2) cm(-2) V-1 s(-1), when compared to the high mobilities, 1-10 cm(-2) V-1 s(-1), measured for perovskites. This work…
Intrinsic Organic Semiconductors as Hole Transport Layers in p–i–n Perovskite Solar Cells
2021
Thin polymeric and small-molecular-weight organic semiconductors are widely employed as hole transport layers (HTLs) in perovskite solar cells. To ensure ohmic contact with the electrodes, the use of doping or additional high work function (WF) interlayer is common. In some cases, however, intrinsic organic semiconductors can be used without any additive or buffer layers, although their thickness must be tuned to ensure selective and ohmic hole transport. Herein, the characteristics of thin HTLs in vacuum-deposited perovskite solar cells are studied, and it is found that only very thin (<5 nm) HTLs readily result inhigh-performing devices, as the HTL acts as a WF enhancer while still ens…
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
2015
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…
Testbed implementation of the meta-MAC protocol
2016
The meta-MAC protocol is a systematic and automatic method to dynamically combine any set of existing MAC protocols into a single higher layer MAC protocol. We present a proof-of-concept implementation of the meta-MAC protocol by utilizing a programmable wireless MAC processor (WMP) on top of a commodity wireless card in combination with a host-level software module. The implementation allows us to combine, with certain constraints, a number of protocols each represented as an extended finite state machine. To illustrate the combination principle, we combine protocols of the same type but with varying parameters in a wireless mesh network. Specifically, we combine TDMA protocols with all po…