|
This monograph solely presents the Fowler-Nordheim field emission (FNFE) from semiconductors and their nanostructures. The materials considered are quantum confined non-linear optical, III-V, II-VI, Ge, Te, carbon nanotubes, PtSb2, stressed materials, Bismuth, GaP, Gallium Antimonide, II-V, Bi2Te3, III-V, II-VI, IV-VI and HgTe/CdTe superlattices with graded interfaces and effective mass superlattices under magnetic quantization and quantum wires of the aforementioned superlattices. The FNFE in opto-electronic materials and their quantum confined counterparts is studied in the presence of light waves and intense electric fields on the basis of newly formulated electron dispersion laws that control the studies of such quantum effect devices. The importance of band gap measurements in opto-electronic materials in the presence of external fields is discussed from this perspective. This monograph contains 200 open research problems which form the very core and are useful for Ph. D students and researchers. The book can also serve as a basis for a graduate course on field emission from solids. |
|
|
Learning iOS Forensics
A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools
About This Book
-
Perform logical, physical, and file system acquisition along with jailbreaking the device
-
Get acquainted with various case studies on different forensic toolkits...
| | Frontiers of Evolutionary ComputationThis book is a collection of essays, authored by eminent scholars in evolutionary computation (EC), artificial intelligence (AI), operations research, complexity theory and mathematics. Each essay revolves around important, interesting and unresolved questions in the field of evolutionary computation. ... | | Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll ... |
|