Author of the publication

Encapsulation Strategies for Highly Stable Perovskite Solar Cells under Severe Stress Testing: Damp Heat, Freezing, and Outdoor Illumination Conditions

, , , , , and . ACS Applied Materials & Interfaces, 13 (38): 45455-45464 (September 2021)
DOI: https://doi.org/10.1021/acsami.1c11628

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boundary element analysis of uncoupled transient thermo-elastic problems with time- and space-dependent heat sources., , , and . Applied Mathematics and Computation, 218 (5): 1862-1882 (2011)Convergence analysis of general spectral methods., and . J. Computational Applied Mathematics, (2017)3 dimensional hydrodynamic analysis of concentric draft tube airlift reactors with different tube diameters., , , , , , and . Mathematical and Computer Modelling, 57 (5-6): 1184-1189 (2013)Extended Kantorovich method for static analysis of moderately thick functionally graded sector plates., , and . Mathematics and Computers in Simulation, (2012)An Improved Handwritten Text Line Segmentation Technique., , , and . ACC (3), volume 192 of Communications in Computer and Information Science, page 289-296. Springer, (2011)Encapsulation Strategies for Highly Stable Perovskite Solar Cells under Severe Stress Testing: Damp Heat, Freezing, and Outdoor Illumination Conditions, , , , , and . ACS Applied Materials & Interfaces, 13 (38): 45455-45464 (September 2021)PCA-based dictionary building for accurate facial expression recognition via sparse representation., , and . J. Visual Communication and Image Representation, 25 (5): 1082-1092 (2014)Non-negative sparse decomposition based on constrained smoothed ℓ0 norm., , and . Signal Processing, (2014)A criticism of the ACW algorithm., and . Computers & Mathematics with Applications, 64 (8): 2616-2620 (2012)Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme., and . J. King Saud Univ. Comput. Inf. Sci., 34 (2): 204-217 (2022)