Visible to the public Biblio

Filters: Keyword is Tin  [Clear All Filters]
2023-07-28
Abu-Khadrah, Ahmed.  2022.  An Efficient Fuzzy Logic Modelling of TiN Coating Thickness. 2022 International Conference on Business Analytics for Technology and Security (ICBATS). :1—5.
In this paper, fuzzy logic was implemented as a proposed approach for modelling of Thickness as an output response of thin film layer in Titanium Nitrite (TiN). The layer was deposited using Physical Vapor Deposition (PVD) process that uses a sputtering technique to coat insert cutting tools with TiN. Central cubic design (CCD) was used for designing the optimal points of the experiment. In order to develop the fuzzy rules, the experimental data that collected by PVD was used. Triangular membership functions (Trimf) were used to develop the fuzzy prediction model. Residual error (e) and prediction accuracy (A) were used for validating the result of the proposed fuzzy model. The result of the developed fuzzy model with triangular membership function revealed that the average residual error of 0.2 is low and acceptable. Furthermore, the model obtained high prediction accuracy with 90.04%. The result revealed that the rule-based model of fuzzy logic could be an efficient approach to predict coatings layer thickness in the TiN.
2022-02-04
Kruv, A., McMitchell, S. R. C., Clima, S., Okudur, O. O., Ronchi, N., Van den bosch, G., Gonzalez, M., De Wolf, I., Houdt, J.Van.  2021.  Impact of mechanical strain on wakeup of HfO2 ferroelectric memory. 2021 IEEE International Reliability Physics Symposium (IRPS). :1–6.
This work investigates the impact of mechanical strain on wake-up behavior of planar HfO2 ferroelectric capacitor-based memory. External in-plane strain was applied using a four-point bending tool and strain impact on remanent polarization and coercive voltage of the ferroelectric was monitored. It was established that compressive strain is beneficial for 2Pr improvement, while tensile strain leads to its degradation, with a sensitivity of -8.4 ± 0.5 % per 0.1 % of strain. Strain-induced polarization rotation is considered to be the most likely mechanism affecting 2Pr At the same time, no strain impact on Vcwas observed in the investigated strain range. The results seen here can be utilized to undertake stress engineering of ferroelectric memory in order to improve its performance.
2021-08-03
Yang, Jianguo, Lei, Dengyun, Chen, Deyang, Li, Jing, Jiang, Haijun, Ding, Qingting, Luo, Qing, Xue, Xiaoyong, Lv, Hangbing, Zeng, Xiaoyang et al..  2020.  A Machine-Learning-Resistant 3D PUF with 8-layer Stacking Vertical RRAM and 0.014% Bit Error Rate Using In-Cell Stabilization Scheme for IoT Security Applications. 2020 IEEE International Electron Devices Meeting (IEDM). :28.6.1–28.6.4.
In this work, we propose and demonstrate a multi-layer 3-dimensional (3D) vertical RRAM (VRRAM) PUF with in-cell stabilization scheme to improve both cost efficiency and reliability. An 8-layer VRRAM array was manufactured with excellent uniformity and good endurance of \textbackslashtextgreater107. Apart from the variation in RRAM resistance, enhanced randomness is obtained thanks to the parasitic IR drop and abundant sneak current paths in 3D VRRAM. To deal with the common issue of unstable bits in PUF output, in-cell stabilization is proposed by first employing asymmetric biasing to detect the unstable bits and then exploiting reprogramming to expand the deviation to stabilize the output. The bit error rate is reduced by \textbackslashtextgreater7X (68X) for 3(5) times reprogramming. The proposed PUF features excellent resistance against machine learning attack and passes both National Institute of Standards and Technology (NIST) 800-22 and NIST 800-90B test suites.
2015-05-01
Mirmohseni, M., Papadimitratos, P..  2014.  Scaling laws for secrecy capacity in cooperative wireless networks. INFOCOM, 2014 Proceedings IEEE. :1527-1535.

We investigate large wireless networks subject to security constraints. In contrast to point-to-point, interference-limited communications considered in prior works, we propose active cooperative relaying based schemes. We consider a network with nl legitimate nodes and ne eavesdroppers, and path loss exponent α ≥ 2. As long as ne2(log(ne))γ = o(nl) holds for some positive γ, we show one can obtain unbounded secure aggregate rate. This means zero-cost secure communication, given a fixed total power constraint for the entire network. We achieve this result with (i) the source using Wyner randomized encoder and a serial (multi-stage) block Markov scheme, to cooperate with the relays, and (ii) the relays acting as a virtual multi-antenna to apply beamforming against the eavesdroppers. Our simpler parallel (two-stage) relaying scheme can achieve the same unbounded secure aggregate rate when neα/2 + 1 (log(ne))γ+δ(α/2+1) = o(nl) holds, for some positive γ, δ.

2015-04-30
Hemalatha, A., Venkatesh, R..  2014.  Redundancy management in heterogeneous wireless sensor networks. Communications and Signal Processing (ICCSP), 2014 International Conference on. :1849-1853.

A Wireless sensor network is a special type of Ad Hoc network, composed of a large number of sensor nodes spread over a wide geographical area. Each sensor node has the wireless communication capability and sufficient intelligence for making signal processing and dissemination of data from the collecting center .In this paper deals about redundancy management for improving network efficiency and query reliability in heterogeneous wireless sensor networks. The proposed scheme deals about finding a reliable path by using redundancy management algorithm and detection of unreliable nodes by discarding the path. The redundancy management algorithm finds the reliable path based on redundancy level, average distance between a source node and destination node and analyzes the redundancy level as the path and source redundancy. For finding the path from source CH to processing center we propose intrusion tolerance in the presence of unreliable nodes. Finally we applied our analyzed result to redundancy management algorithm to find the reliable path in which the network efficiency and Query success probability will be improved.