Search for dissertations about: "edge detection"

Showing result 21 - 25 of 87 swedish dissertations containing the words edge detection.

  1. 21. Experimental design and vortex analyses in turbulent wake flows

    Author : Bengt E. G. Fallenius; Jens H. M. Fransson; Henrik Alfredsson; Marianna Braza; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; bluff bodies; wake flow; experimental design; vortex detection; flow control; asymptotic suction boundary layer;

    Abstract : A new experimental setup for studies on wake flow instability and its control that successfully has been designed and manufactured, is introduced and de- scribed. The main body is a dual-sided flat plate with an elliptic leading edge and a blunt trailing edge. READ MORE

  2. 22. Microscale Tools for Sample Preparation, Separation and Detection of Neuropeptides

    Author : Andreas Dahlin; Jonas Bergquist; Karin E. Markides; Robert T. Kennedy; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Analytical chemistry; Neuropeptides; Microchip; Enhanced microdialysis; Poly dimethylsiloxane PDMS ; Electrospray ionization ESI ; Multidimensional separation; Electrochemical manipulation; Mass spectrometry MS ; Capillary electrophoresis CE ; Microdevice; Microfabrication; Micro total analysis system μ-TAS ; Analytisk kemi; Analytical chemistry; Analytisk kemi;

    Abstract : The analysis of low abundant biological molecules is often challenging due to their chemical properties, low concentration and limited sample volumes. Neuropeptides are one group of molecules that fits these criteria. Neuropeptides also play an important role in biological functions, which makes them extra interesting to analyze. READ MORE

  3. 23. Detection and removal of traps at the SiO2/SiC interface

    Author : Halldor Olafsson; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; interface states; thermally stimulated current TSC ; positron annihilation spectroscopy PAS ; silicon carbide SiC ; metal-oxide-semiconductor field-effect transistor MOSFET ; transmission electron microscopy TEM ; deep level transient spectroscopy DLTS ; metal-oxide-semiconductor MOS ; field-effect mobility; capacitance-voltage C-V ;

    Abstract : The interface between silicon dioxide (SiO2) and silicon carbide (SiC) is at the heart of the SiC metal-oxide-semiconductor field-effect (MOSFET) transistor. The technology to produce a high quality SiO2/SiC interface does not exist today, hampering further development of the SiC MOSFET. READ MORE

  4. 24. Enabling technologies for scalable graphene electronics

    Author : Naveen Shetty; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; edge contact; Hall effect; graphene; 2d-tech; array; 1 f; metrology;

    Abstract : This thesis addresses the challenges in scaling up graphene-based technologies, with a focus on the epitaxial growth of graphene (epigraphene) over SiC substrates and the establishment of reliable low-contact resistance electrical contacts. The scalable graphene growth and contact fabrication have enabled the development of three epigraphene-based devices, including large-scale Quantum Hall Arrays, highly sensitive Hall effect magnetometers with minimal noise, and quantum-limited ultraviolet (UV) detectors. READ MORE

  5. 25. Collaborative Network Security: Targeting Wide-area Routing and Edge-network Attacks

    Author : Rahul Gokulchand Hiran; Nahid Shahmehri; Niklas Carlsson; Olaf Maennel; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Collaboration; network security; BGP attacks; routing security; hijack;

    Abstract : To ensure that services can be delivered reliably and continuously over theInternet, it is important that both Internet routes and edge networks aresecured. However, the sophistication and distributed nature of many at-tacks that target wide-area routing and edge networks make it difficult foran individual network, user, or router to detect these attacks. READ MORE