Essays about: "growth pattern"

Showing result 21 - 25 of 236 essays containing the words growth pattern.

  1. 21. BCP Lithography Defined Arrays of InAs NWs Grown Using MOVPE with Au Seeds

    University essay from Lunds universitet/Lunds Tekniska Högskola; Lunds universitet/Fasta tillståndets fysik

    Author : Björn Landeke-Wilsmark; [2022]
    Keywords : Physics and Astronomy;

    Abstract : In this report we outline a detailed process flow for a quick and inexpensive implementation of large dense arrays of InAs nanowires (NWs) grown in the reactive ion etching/etched (RIE) pores of a SiO2/SiNx mask on top of an InAs/Si(111) substrate. The self-assembled (hexagonally close-packed) pattern of poly(methyl-methacrylate) (PMMA) cylinders in a poly(styrene) (PS) matrix adopted by a linear diblock poly(styrene-block-methyl-methacrylate) P(S-b-MMA) block-copolymer (BCP) was transferred to the dielectric stack (consisting of a ≈10 nm plasma enhanced chemical vapour deposition/deposited (PECVD) SiNX layer topped by a thin atomic layer deposition/deposited (ALD) SiO2 film) using a two-step RIE procedure. READ MORE

  2. 22. Fatigue Crack Growth Analysis in Python algorithm with Finite Element Methods : Numerical Simulation of Fatigue Crack Growth

    University essay from Karlstads universitet

    Author : Hasan Majid; [2022]
    Keywords : ;

    Abstract : The goal of this thesis was to construct and develop a python-based finite element computer program for the evaluation of fatigue crack growth rate in notched metallic rods. The simulation was done by implementing elastic stress theory and linear elastic fracture mechanics techniques. READ MORE

  3. 23. Developing a passwordgenerating software : Regarding password memorability and security

    University essay from KTH/Hälsoinformatik och logistik

    Author : Anton Mogaddam; Khan Muhammad; [2022]
    Keywords : Passwords; keyboard patterns; password memorability; Python; Hashcat; Lösenord; tangentbords mönster; minnesvärdhet för lösenord; Python; Hashcat;

    Abstract : With the growth of digital information and technology, more websites require user authentication to access individuals' sensitive information. The main form of authentication are passwords which if chosen unwisely can easily be guessed or cracked by someone else. This is why it is important to create safe yet memorable passwords. READ MORE

  4. 24. Operational risk management (ORM) in the Industrial Symbiosis (IS) supply chain. : A qualitative study of ORM and the Triple Bottom Line (TBL) within the IS-supply chain.

    University essay from Umeå universitet/Företagsekonomi

    Author : David Wennerström; Jonas Marklund; [2022]
    Keywords : ;

    Abstract : One of the biggest challenges for society nowadays is the environmental crisis that is characterized by the continuing growth, and depletion of Earth's natural resources combined with vast amounts of carbon dioxide emissions putting a strain on the world's ecosystem. To tackle this impending calamity and preserve our way of life, countries, and companies are creating new innovations and solutions. READ MORE

  5. 25. Ornamentation in the Digital Age

    University essay from Lunds universitet/Institutionen för arkitektur och byggd miljö

    Author : Karl Östvall; [2022]
    Keywords : Ornament; Ornamentation; Digital Manufacturing; Digital Design; Complexity; Arts and Architecture;

    Abstract : Decoration has been central to architecture throughout history. Since the beginning of the 20th century, the question of ornament in architecture has been oscillating between the positions of redundant and essential. READ MORE