- Semiconductor materials and devices
- Advanced Data Storage Technologies
- Advancements in Semiconductor Devices and Circuit Design
- Copper Interconnects and Reliability
- Integrated Circuits and Semiconductor Failure Analysis
- Advanced Memory and Neural Computing
- Semiconductor Quantum Structures and Devices
- 3D IC and TSV technologies
- Distributed systems and fault tolerance
- Microwave Engineering and Waveguides
- Metal and Thin Film Mechanics
- Semiconductor materials and interfaces
- Ferroelectric and Negative Capacitance Devices
- Logic, programming, and type systems
- Semiconductor Lasers and Optical Devices
- Radio Frequency Integrated Circuit Design
- Network Traffic and Congestion Control
- Silicon Carbide Semiconductor Technologies
- Photonic and Optical Devices
- Cooperative Communication and Network Coding
- Advancements in Photolithography Techniques
- Copper-based nanomaterials and applications
- Software Testing and Debugging Techniques
- Plasma Diagnostics and Applications
- Low-power high-performance VLSI design
Chinese Academy of Sciences
2014-2024
Wuhan Institute of Physics and Mathematics
2024
Institute of Semiconductors
2019-2024
University of Chinese Academy of Sciences
2007-2024
National University of Defense Technology
2022-2024
Central China Normal University
2024
Shanghai Huali Microelectronics (China)
2017-2023
State Key Laboratory on Integrated Optoelectronics
2023
Beijing University of Technology
2022
Institute of Information Engineering
2016-2022
Calculating the thermal rate constants of elementary combustion reactions is great importance in theoretical chemistry. Machine learning has become a powerful, data-driven method for predicting nowadays. Recently, molecular similarity combined with topological indices were proposed to represent hydrogen abstraction alkane [
A new read scheme is proposed to suppress disturbance in unselected strings of three-dimensional (3D) vertical channel flash memories. This decreases the potential difference between select word-line (WL) and adjacent WL by more than 20% disturb due hot carrier injection selected suppressed effectively about 95%. Meanwhile, boosted during operation has been preserved improve soft programming 85% non-adjacent memory cells, owing reduced electric field across tunnel oxide. Compared with...
This article presents a highly linear Doherty power amplifier (DPA) based on phase mismatch. When output mismatch (OPM) is introduced, i.e., the shift of impedance transformer deviates from 90°, power-combining network (PCN) will exhibit certain amplitude-to-phase (AM–PM) characteristic. input (IPM) main and auxiliary branches are not phase-aligned, AM–PM PCN can be further finely tuned. By choosing proper OPM IPM, overall DPA compensated by that while maintaining reasonable back-off...
The impact of temperature on array Vth distribution was investigated in 3D NAND flash. Cell distributions were obtained under different program and read splits. After the page is programmed high temperature, it found that tail exhibits a larger shift than low tail, during at temperatures (85°C -25°C). On contrary, shows cross read, after temperature. coefficient (Tco) cell to variations, which can be categorized into two types. For type 1, Tco correlated with selected due polysilicon...
In this study, the wafer warpage resulting from common source line tungsten (CSL W) is investigated in 3D NAND flash memory. It found that related to annealing conditions after CSL W deposition, and it reduces exponentially with increasing temperature or linearly time. This result shows effect of on greater than Consequently, spike a low thermal budget proposed achieve desired reduction as long adequate. work provides an effective approach solve problem memory manufacturing.
A new program scheme using an "erase-like" waveform for precharge operation is proposed disturbance optimization in 3-D vertical channel flash memories. With the scheme, effect of operation, which followed by on initial unselected enhanced charging additional holes from p-type well. Consequently, boosting efficiency and potential string are promoted, leading to a significant suppressed disturbance, V <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...
The disturbance mechanism of dummy cell during memory cycling has been investigated in 3D NAND flash. Edge (DMY) threshold voltage increasing was observed program and erase cycling, which leads to a reduced string current read failure. According experiment TCAD analysis, two mechanisms were identified contribute the disturbance: one is tunneling electrons from adjacent gate trapping layer condition, also 2D NAND; other lateral charge spreading edge DMY, new observation for junction-less with...
We present a broadband enhanced single photon source device of Gaussian-shaped GaAs microlens (ML) arrays coupled with gold bottom mirror hybrid structure. The extrapolated light extraction efficiency (60.6 ± 1.5)% at maximum (for collection numerical aperture = 0.45 and based on the an actually measured raw detection ∼0.775%) broad spectral band 890–960 nm were obtained. ML-Au structure embedded epitaxial quantum dots exhibits high single-photon purity (96.6 0.7)% [g(2)(0) 0.034 0.003]...
As an emerging space propulsion technology, atmosphere-breathing electric (ABEP) system can operate for a long time in ultra-low earth orbit (ULEO) without carrying propellant from ground. However, the erosion of intake wall caused by oxygen-contained atmosphere ULEO will alter characteristics to some degree, which influences performance significantly. To analyze influence on performance, direct simulation Monte Carlo (DSMC) method is used simulate gas flow chamber under mixed inflow...
Consider the standard first-passage percolation on ${\Z}^d$, $d\geq 2$. Denote by $\phi_{0,n}$ face--face time in $[0,n]^d$. It is well known that \[ \lim_{n\rightarrow \infty} {\phi_{0,n}\over n}=\mu(F) \qquad \mbox{a.s. and } L_1, \] where $F$ common distribution each edge. In this paper we show upper lower tails of are quite different when $\mu(F)>0$. More precisely, can for small $\varepsilon>0$, there exist constants $\alpha(\varepsilon, F)$ $\beta (\varepsilon, such...
Abstract SOHO (small office/home office) routers provide services for end devices to connect the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist these routers, especially web server modules, greatly endangering users. To discover vulnerabilities, fuzzing modules of is most popular solution. However, its effectiveness limited due lack input specification, routers’ internal running states, and testing environment recovery mechanisms....
Abstract Network function virtualization provides programmable in-network middlewares by leveraging technologies and commodity hardware has gained popularity among all mainstream network device manufacturers. Yet it is challenging to apply coverage-guided fuzzing, one of the state-of-the-art vulnerability discovery approaches, those virtualized devices, due inevitable integrity protection adopted devices. In this paper, we propose a fuzzing framework NDFuzz for devices with novel bypassing...
In this paper, we report on our experiment with the deployment of a virtual machine, Netquest, which evaluates protocols written in declarative language, over iMote devices. Netquest offers new programming model for sensor networks high level abstraction. Protocols and applications can be simple rule-based allows concise application centric programming. The Virtual Machine is implemented top an embedded DBMS, SQLite, carries most computation. Our experiments small network devices demonstrate...