The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

761-780hit(22683hit)

  • Low-Temperature Deposition of Yttrium Oxide on Flexible PET Films Using Time-Separated Yttrium Precursor and Oxidizer Injections

    Kentaro SAITO  Kazuki YOSHIDA  Masanori MIURA  Kensaku KANOMATA  Bashir AHMMAD  Shigeru KUBOTA  Fumihiko HIROSE  

     
    PAPER

      Pubricized:
    2022/06/27
      Vol:
    E105-C No:10
      Page(s):
    604-609

    Low-temperature deposition of Y2O3 at 80°C is studied using an yttrium precursor of tris(butylcyclopentadienyl)yttrium (Y(BuCp)3) and plasma exited humidified argon oxidizer. The deposition is demonstrated using an atomic-layer-deposition sequence; the Y(BuCp)3 and the oxidizing gases are time separately introduced to the reaction chamber and these injections are repeated. To determine the gas introduction conditions, surface reactions of Y(BuCp)3 adsorption and its oxidization are observed by an in-situ IR absorption spectroscopy. The deposited film is confirmed as fully oxidized Y2O3 by X-ray photoelectron spectroscopy. The present deposition is applicable for the deposition of Y2O3 film on flexible polyethylene terephthalate films.

  • The Effect of Inter Layers on the Ferroelectric Undoped HfO2 Formation

    Masakazu TANUMA  Joong-Won SHIN  Shun-ichiro OHMI  

     
    PAPER

      Pubricized:
    2022/06/27
      Vol:
    E105-C No:10
      Page(s):
    584-588

    In this research, we investigated the effect of Hf inter layer and chemical oxide on Si(100) substrate on the ferroelectric undoped HfO2 deposition. In case with 1 nm-thick Hf inter layer, equivalent oxide thickness (EOT) was decreased from 6.0 to 4.8 nm for 10 nm-thick HfO2 with decreasing annealing temperature. In case with 0.5 nm-thick chemical oxide, EOT was decreased from 3.9 to 3.6 nm in MFS diodes for 5 nm-thick HfO2. The MFSFET was fabricated with 10 nm-thick HfO2 utilizing Hf inter layer. The subthreshold swing was improved from 240 mV/dec. to 120 mV/dec. and saturation mobility was increased from 70 cm2/(Vs) to 140 cm2/(Vs) by inserting Hf inter layer.

  • Sputtering Gas Pressure Dependence on the LaBxNy Insulator Formation for Pentacene-Based Back-Gate Type Floating-Gate Memory with an Amorphous Rubrene Passivation Layer

    Eun-Ki HONG  Kyung Eun PARK  Shun-ichiro OHMI  

     
    PAPER

      Pubricized:
    2022/06/27
      Vol:
    E105-C No:10
      Page(s):
    589-595

    In this research, the effect of Ar/N2-plasma sputtering gas pressure on the LaBxNy tunnel and block layer was investigated for pentacene-based floating-gate memory with an amorphous rubrene (α-rubrene) passivation layer. The influence of α-rubrene passivation layer for memory characteristic was examined. The pentacene-based metal/insulator/metal/insulator/semiconductor (MIMIS) diode and organic field-effect transistor (OFET) were fabricated utilizing N-doped LaB6 metal layer and LaBxNy insulator with α-rubrene passivation layer at annealing temperature of 200°C. In the case of MIMIS diode, the leakage current density and the equivalent oxide thickness (EOT) were decreased from 1.2×10-2 A/cm2 to 1.1×10-7 A/cm2 and 3.5 nm to 3.1 nm, respectively, by decreasing the sputtering gas pressure from 0.47 Pa to 0.19 Pa. In the case of floating-gate type OFET with α-rubrene passivation layer, the larger memory window of 0.68 V was obtained with saturation mobility of 2.2×10-2 cm2/(V·s) and subthreshold swing of 199 mV/dec compared to the device without α-rubrene passivation layer.

  • Low-Temperature Atomic Layer Deposition of AlN Using Trimethyl Aluminum and Plasma Excited Ar Diluted Ammonia

    Kentaro SAITO  Kazuki YOSHIDA  Masanori MIURA  Kensaku KANOMATA  Bashir AHMMAD  Shigeru KUBOTA  Fumihiko HIROSE  

     
    PAPER

      Pubricized:
    2022/06/27
      Vol:
    E105-C No:10
      Page(s):
    596-603

    The low temperature deposition of AlN at 160 °C is examined by using trimethyl aluminum (TMA) and NH radicals from plasma excited Ar diluted ammonia. For the deposition, a plasma tube separated from the reaction chamber is used to introduce the neutral NH radicals on the growing surface without the direct impacts of high-speed species and UV photons, which might be effective in suppressing the plasma damage to the sample surfaces. To maximize the NH radical generation, the NH3 and Ar mixing ratio is optimized by plasma optical emission spectroscopy. To determine the saturated condition of TMA and NH radical irradiations, an in-situ surface observation of IR absorption spectroscopy (IRAS) with a multiple internal reflection geometry is utilized. The low temperature AlN deposition is performed with the TMA and NH radical exposures whose conditions are determined by the IRAS experiment. The spectroscopic ellipsometry indicates the all-round surface deposition in which the growth per cycles measured from front and backside surfaces of the Si sample are of the same range from 0.39∼0.41nm/cycle. It is confirmed that the deposited film contains impurities of C, O, N although we discuss the method to decrease them. X-ray diffraction suggests the AlN polycrystal deposition with crystal phases of AlN (100), (002) and (101). From the saturation curves of TMA adsorption and its nitridation, their chemical reactions are discussed in this paper. In the present paper, we discuss the possibility of the low temperature AlN deposition.

  • Magnetic-Field Dependent Electron Transport of Fe3Si Nanodots

    Jialin WU  Katsunori MAKIHARA  Hai ZHANG  Noriyuki TAOKA  Akio OHTA  Seiichi MIYAZAKI  

     
    PAPER

      Pubricized:
    2022/04/21
      Vol:
    E105-C No:10
      Page(s):
    616-621

    We fabricated Fe-silicide nanodots (NDs) on an ultrathin SiO2 layer and evaluated changes in electron transport properties with and without magnetic field application. High-density NDs with an areal density as high as ∼1011cm-2 were formed on thermally grown SiO2 by exposing ultrathin Fe/Si-NDs structures to a remote H2 plasma without external heating. In electron transport properties related to current-time characteristics for a diode with Fe electrode and charging energy to NDs, clear changes in current levels through NDs and electron injection modulation of NDs depending on intensity of magnetic fields were observed.

  • 28nm Atom-Switch FPGA: Static Timing Analysis and Evaluation

    Xu BAI  Ryusuke NEBASHI  Makoto MIYAMURA  Kazunori FUNAHASHI  Naoki BANNO  Koichiro OKAMOTO  Hideaki NUMATA  Noriyuki IGUCHI  Tadahiko SUGIBAYASHI  Toshitsugu SAKAMOTO  Munehiro TADA  

     
    BRIEF PAPER

      Pubricized:
    2022/06/27
      Vol:
    E105-C No:10
      Page(s):
    627-630

    A static timing analysis (STA) tool for a 28nm atom-switch FPGA (AS-FPGA) is introduced to validate the signal delay of an application circuit before implementation. High accuracy of the STA tool is confirmed by implementing a practical application circuit on the 28nm AS-FPGA. Moreover, dramatic improvement of delay and power is demonstrated in comparison with a previous 40nm AS-FPGA.

  • PPW Curves: a C2 Interpolating Spline with Hyperbolic Blending of Rational Bézier Curves

    Seung-Tak NOH  Hiroki HARADA  Xi YANG  Tsukasa FUKUSATO  Takeo IGARASHI  

     
    PAPER

      Pubricized:
    2022/05/26
      Vol:
    E105-D No:10
      Page(s):
    1704-1711

    It is important to consider curvature properties around the control points to produce natural-looking results in the vector illustration. C2 interpolating splines satisfy point interpolation with local support. Unfortunately, they cannot control the sharpness of the segment because it utilizes trigonometric function as blending function that has no degree of freedom. In this paper, we alternate the definition of C2 interpolating splines in both interpolation curve and blending function. For the interpolation curve, we adopt a rational Bézier curve that enables the user to tune the shape of curve around the control point. For the blending function, we generalize the weighting scheme of C2 interpolating splines and replace the trigonometric weight to our novel hyperbolic blending function. By extending this basic definition, we can also handle exact non-C2 features, such as cusps and fillets, without losing generality. In our experiment, we provide both quantitative and qualitative comparisons to existing parametric curve models and discuss the difference among them.

  • Strengthening Network-Based Moving Target Defense with Disposable Identifiers

    Taekeun PARK  Keewon KIM  

     
    LETTER-Information Network

      Pubricized:
    2022/07/08
      Vol:
    E105-D No:10
      Page(s):
    1799-1802

    In this paper, we propose a scheme to strengthen network-based moving target defense with disposable identifiers. The main idea is to change disposable identifiers for each packet to maximize unpredictability with large hopping space and substantially high hopping frequency. It allows network-based moving target defense to defeat active scanning, passive scanning, and passive host profiling attacks. Experimental results show that the proposed scheme changes disposable identifiers for each packet while requiring low overhead.

  • Design and Integration of Beyond-10MHz High Switching Frequency DC-DC Converter Open Access

    Kousuke MIYAJI  

     
    INVITED PAPER

      Pubricized:
    2022/04/20
      Vol:
    E105-C No:10
      Page(s):
    521-533

    There are continuous and strong demands for the DC-DC converter to reduce the size of passive components and increase the system power density. Advances in CMOS processes and GaN FETs enabled the switching frequency of DC-DC converters to be beyond 10MHz. The advancements of 3-D integrated magnetics will further reduce the footprint. In this paper, the overview of beyond-10MHz DC-DC converters will be provided first, and our recent achievements are introduced focusing on 3D-integration of Fe-based metal composite magnetic core inductor, and GaN FET control designs.

  • Multibeam Patterns Suitable for Massive MIMO Configurations

    Kentaro NISHIMORI  Jiro HIROKAWA  

     
    PAPER

      Pubricized:
    2022/07/13
      Vol:
    E105-B No:10
      Page(s):
    1162-1172

    A multibeam massive multiple input multiple output (MIMO) configuration employs beam selection with high power in the analog part and executes a blind algorithm such as the independent component analysis (ICA), which does not require channel state information in the digital part. Two-dimensional (2-D) multibeams are considered in actual power losses and beam steering errors regarding the multibeam patterns. However, the performance of these 2-D beams depends on the beam pattern of the multibeams, and they are not optimal multibeam patterns suitable for multibeam massive MIMO configurations. In this study, we clarify the performance difference due to the difference of the multibeam pattern and consider the multibeam pattern suitable for the system condition. Specifically, the optimal multibeam pattern was determined with the element spacing and beamwidth of the element directivity as parameters, and the effectiveness of the proposed method was verified via computer simulations.

  • A Review of GaN MMIC Power Amplifier Technologies for Millimeter-Wave Applications Open Access

    Keigo NAKATANI  Yutaro YAMAGUCHI  Takuma TORII  Masaomi TSURU  

     
    INVITED PAPER

      Pubricized:
    2022/07/13
      Vol:
    E105-C No:10
      Page(s):
    433-440

    GaN microwave monolithic integrated circuit (MMIC) power amplifiers (PAs) technologies for millimeter-wave (mm-wave) applications are reviewed in this paper. In the mm-wave band, GaN PAs have achieved high-output power as much as traveling wave tube amplifiers used in satellite communications. Additionally, GaN PAs have been integrated enough to be used for 5G and Beyond-5G. In this paper, a high accuracy large-signal GaN-HEMT modeling technique including the trapping effects is introduced in mm-waves. The prototyped PAs designed with the novel modeling technique have achieved RF performance comparable to that of the state-of-the-art GaN PAs in mm-wave.

  • Speech-Like Emotional Sound Generation Using WaveNet

    Kento MATSUMOTO  Sunao HARA  Masanobu ABE  

     
    PAPER-Speech and Hearing

      Pubricized:
    2022/05/26
      Vol:
    E105-D No:9
      Page(s):
    1581-1589

    In this paper, we propose a new algorithm to generate Speech-like Emotional Sound (SES). Emotional expressions may be the most important factor in human communication, and speech is one of the most useful means of expressing emotions. Although speech generally conveys both emotional and linguistic information, we have undertaken the challenge of generating sounds that convey emotional information alone. We call the generated sounds “speech-like,” because the sounds do not contain any linguistic information. SES can provide another way to generate emotional response in human-computer interaction systems. To generate “speech-like” sound, we propose employing WaveNet as a sound generator conditioned only by emotional IDs. This concept is quite different from the WaveNet Vocoder, which synthesizes speech using spectrum information as an auxiliary feature. The biggest advantage of our approach is that it reduces the amount of emotional speech data necessary for training by focusing on non-linguistic information. The proposed algorithm consists of two steps. In the first step, to generate a variety of spectrum patterns that resemble human speech as closely as possible, WaveNet is trained with auxiliary mel-spectrum parameters and Emotion ID using a large amount of neutral speech. In the second step, to generate emotional expressions, WaveNet is retrained with auxiliary Emotion ID only using a small amount of emotional speech. Experimental results reveal the following: (1) the two-step training is necessary to generate the SES with high quality, and (2) it is important that the training use a large neutral speech database and spectrum information in the first step to improve the emotional expression and naturalness of SES.

  • An Efficient Exponentiation Algorithm in GF(2m) Using Euclidean Inversion Open Access

    Wei HE  Yu ZHANG  Yin LI  

     
    LETTER-Numerical Analysis and Optimization

      Pubricized:
    2022/04/26
      Vol:
    E105-A No:9
      Page(s):
    1381-1384

    We introduce a new type of exponentiation algorithm in GF(2m) using Euclidean inversion. Our approach is based on the fact that Euclidean inversion cost much less logic gates than ordinary multiplication in GF(2m). By applying signed binary form of the exponent instead of classic binary form, the proposed algorithm can reduce the number of operations further compared with the classic algorithms.

  • The Lower Bound of Second-Order Nonlinearity of a Class of Boolean Functions Open Access

    Luozhong GONG  Shangzhao LI  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/03/10
      Vol:
    E105-A No:9
      Page(s):
    1317-1321

    The r-th nonlinearity of Boolean functions is an important cryptographic criterion associated with higher order linearity attacks on stream and block ciphers. In this paper, we tighten the lower bound of the second-order nonlinearity of a class of Boolean function over finite field F2n, fλ(x)=Tr(λxd), where λ∈F*2r, d=22r+2r+1 and n=7r. This bound is much better than the lower bound of Iwata-Kurosawa.

  • Approximability of the Distance Independent Set Problem on Regular Graphs and Planar Graphs

    Hiroshi ETO  Takehiro ITO  Zhilong LIU  Eiji MIYANO  

     
    PAPER-Algorithms and Data Structures, Graphs and Networks

      Pubricized:
    2022/03/09
      Vol:
    E105-A No:9
      Page(s):
    1211-1222

    This paper studies generalized variants of the MAXIMUM INDEPENDENT SET problem, called the MAXIMUM DISTANCE-d INDEPENDENT SET problem (MaxDdIS for short). For an integer d≥2, a distance-d independent set of an unweighted graph G=(V, E) is a subset S⊆V of vertices such that for any pair of vertices u, v∈S, the number of edges in any path between u and v is at least d in G. Given an unweighted graph G, the goal of MaxDdIS is to find a maximum-cardinality distance-d independent set of G. In this paper, we analyze the (in)approximability of the problem on r-regular graphs (r≥3) and planar graphs, as follows: (1) For every fixed integers d≥3 and r≥3, MaxDdIS on r-regular graphs is APX-hard. (2) We design polynomial-time O(rd-1)-approximation and O(rd-2/d)-approximation algorithms for MaxDdIS on r-regular graphs. (3) We sharpen the above O(rd-2/d)-approximation algorithms when restricted to d=r=3, and give a polynomial-time 2-approximation algorithm for MaxD3IS on cubic graphs. (4) Finally, we show that MaxDdIS admits a polynomial-time approximation scheme (PTAS) for planar graphs.

  • A Note on the Intersection of Alternately Orientable Graphs and Cocomparability Graphs

    Asahi TAKAOKA  

     
    PAPER-Graphs and Networks, Algorithms and Data Structures

      Pubricized:
    2022/03/07
      Vol:
    E105-A No:9
      Page(s):
    1223-1227

    We studied whether a statement similar to the Ghouila-Houri's theorem might hold for alternating orientations of cocomparability graphs. In this paper, we give the negative answer. We prove that it is NP-complete to decide whether a cocomparability graph has an orientation that is alternating and acyclic. Hence, cocomparability graphs with an acyclic alternating orientation form a proper subclass of alternately orientable cocomparability graphs. We also provide a separating example, that is, an alternately orientable cocomparability graph such that no alternating orientation is acyclic.

  • Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles

    Ren ISHIBASHI  Kazuki YONEYAMA  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/03/24
      Vol:
    E105-A No:9
      Page(s):
    1252-1269

    Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).

  • Constant-Round Fair SS-4PC for Private Decision Tree Evaluation

    Hikaru TSUCHIDA  Takashi NISHIDE  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/03/09
      Vol:
    E105-A No:9
      Page(s):
    1270-1288

    Multiparty computation (MPC) is a cryptographic method that enables a set of parties to compute an arbitrary joint function of the private inputs of all parties and does not reveal any information other than the output. MPC based on a secret sharing scheme (SS-MPC) and garbled circuit (GC) is known as the most common MPC schemes. Another cryptographic method, homomorphic encryption (HE), computes an arbitrary function represented as a circuit by using ciphertexts without decrypting them. These technologies are in a trade-off relationship for the communication/round complexities, and the computation cost. The private decision tree evaluation (PDTE) is one of the key applications of these technologies. There exist several constant-round PDTE protocols based on GC, HE, or the hybrid schemes that are secure even if a malicious adversary who can deviate from protocol specifications corrupts some parties. There also exist other protocols based only on SS-MPC that are secure only if a semi-honest adversary who follows the protocol specification corrupts some parties. However, to the best of our knowledge, there are currently no constant-round PDTE protocols based only on SS-MPC that are secure against a malicious adversary. In this work, we propose a constant-round four-party PDTE protocol that achieves malicious security. Our protocol provides the PDTE securely and efficiently even when the communication environment has a large latency.

  • Energy-Efficient KBP: Kernel Enhancements for Low-Latency and Energy-Efficient Networking Open Access

    Kei FUJIMOTO  Ko NATORI  Masashi KANEKO  Akinori SHIRAGA  

     
    PAPER-Network

      Pubricized:
    2022/03/14
      Vol:
    E105-B No:9
      Page(s):
    1039-1052

    Real-time applications are becoming more and more popular, and due to the demand for more compact and portable user devices, offloading terminal processes to edge servers is being considered. Moreover, it is necessary to process packets with low latency on edge servers, which are often virtualized for operability. When trying to achieve low-latency networking, the increase in server power consumption due to performance tuning and busy polling for fast packet receiving becomes a problem. Thus, we design and implement a low-latency and energy-efficient networking system, energy-efficient kernel busy poll (EE-KBP), which meets four requirements: (A) low latency in the order of microseconds for packet forwarding in a virtual server, (B) lower power consumption than existing solutions, (C) no need for application modification, and (D) no need for software redevelopment with each kernel security update. EE-KBP sets a polling thread in a Linux kernel that receives packets with low latency in polling mode while packets are arriving, and when no packets are arriving, it sleeps and lowers the CPU operating frequency. Evaluations indicate that EE-KBP achieves microsecond-order low-latency networking under most traffic conditions, and 1.4× to 3.1× higher throughput with lower power consumption than NAPI used in a Linux kernel.

  • A Satisfiability Algorithm for Deterministic Width-2 Branching Programs Open Access

    Tomu MAKITA  Atsuki NAGAO  Tatsuki OKADA  Kazuhisa SETO  Junichi TERUYAMA  

     
    PAPER-Algorithms and Data Structures

      Pubricized:
    2022/03/08
      Vol:
    E105-A No:9
      Page(s):
    1298-1308

    A branching program is a well-studied model of computation and a representation for Boolean functions. It is a directed acyclic graph with a unique root node, some accepting nodes, and some rejecting nodes. Except for the accepting and rejecting nodes, each node has a label with a variable and each outgoing edge of the node has a label with a 0/1 assignment of the variable. The satisfiability problem for branching programs is, given a branching program with n variables and m nodes, to determine if there exists some assignment that activates a consistent path from the root to an accepting node. The width of a branching program is the maximum number of nodes at any level. The satisfiability problem for width-2 branching programs is known to be NP-complete. In this paper, we present a satisfiability algorithm for width-2 branching programs with n variables and cn nodes, and show that its running time is poly(n)·2(1-µ(c))n, where µ(c)=1/2O(c log c). Our algorithm consists of two phases. First, we transform a given width-2 branching program to a set of some structured formulas that consist of AND and Exclusive-OR gates. Then, we check the satisfiability of these formulas by a greedy restriction method depending on the frequency of the occurrence of variables.

761-780hit(22683hit)