通知公告
访问统计

总访问量

今日访问

在线人数

下载排行

    一年内发表文章 | 两年内 | 三年内 | 全部 | 最近1个月下载排行 | 最近1年下载排行

    当前位置: 最近1年下载排行
    Please wait a minute...
    选择: 显示/隐藏图片
    1. Analysis of 3D NAND technologies and comparison between charge-trap-based and floating-gate-based flash devices
    刘世军 邹雪城
    中国邮电高校学报(英文版)    2017, 24 (3): 75-82.   DOI: 10.1016/S1005-8885(17)60214-0
    摘要1107)      PDF(pc) (1498KB)(2682)    收藏
    NAND flash chips have been innovated from two-dimension (2D) design which is based on planar NAND cells to three-dimension (3D) design which is based on vertical NAND cells. Two types of NAND flash technologies–charge-trap (CT) and floating-gate (FG) are presented in this paper to introduce NAND flash designs in detail. The physical characteristics of CT-based and FG-based 3D NAND flashes are analyzed. Moreover, the advantages and disadvantages of these two technologies in architecture, manufacture, interference and reliability are studied and compared.
    参考文献 | 相关文章 | 多维度评价
    2. Novel high-PSRR high-order curvature-compensated bandgap voltage reference
    周前能 闫凯 林金朝 庞宇 李国权 罗伟
    中国邮电高校学报(英文版)    2016, 23 (2): 66-72.  
    摘要2023)      PDF(pc) (452KB)(1528)    收藏

    This paper proposes a novel high-power supply rejection ratio (high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference (BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a conventional BGR in order to improve the temperature drift within wider temperature range, which include a piecewise-curvature- corrected current in high temperature range, a piecewise-curvature-corrected current in low temperature range and a proportional-to-absolute-temperature current. The high-PSRR characteristic of the proposed BGR is achieved by adopting the technique of pre-regulator. Simulation results shows that the temperature coefficient of the proposed BGR with pre-regulator is /°C from 55 °C to 125 °C with a 1.8 V power supply voltage. The proposed BGR with pre-regulator achieves PSRR of 123.51 dB, 123.52 dB, 88.5 dB and 50.23 dB at 1 Hz, 100 Hz, 100 kHz and 1 MHz respectively.

    参考文献 | 相关文章 | 多维度评价
    3. Web log classification framework with data augmentation based on GANs
    何明枢, 金磊, 王小娟, 李源
    中国邮电高校学报(英文版)    2020, 27 (5): 34-46.   DOI: 10.19682/j.cnki.1005-8885.2020.0020
    摘要613)      PDF(pc) (1352KB)(696)    收藏
    Attacks on web servers are part of the most serious threats in network security fields. Analyzing logs of web attacks is an effective approach for malicious behavior identification. Traditionally, machine learning models based on labeled data are popular identification methods. Some deep learning models are also recently introduced for analyzing logs based on web logs classification. However, it is limited to the amount of labeled data in model training. Web logs with labels which mark specific categories of data are difficult to obtain. Consequently, it is necessary to follow the problem about data generation with a focus on learning similar feature representations from the original data and improve the accuracy of classification model. In this paper, a novel framework is proposed, which differs in two important aspects: one is that long short-term memory (LSTM) is incorporated into generative adversarial networks (GANs) to generate the logs of web attack. The other is that a data augment model is proposed by adding logs of web attack generated by GANs to the original dataset and improved the performance of the classification model. The results experimentally demonstrate the effectiveness of the proposed method. It improved the classification accuracy from 89.04% to 95.04%.
    参考文献 | 相关文章 | 多维度评价
    4. Dynamic computation offloading in time-varying environment for ultra-dense networks: a stochastic game approach
    Xie Renchao, Liu Xu, Duan Xuefei, Tang Qinqin, Yu Fei Richard, Huang Tao
    中国邮电高校学报(英文版)    2021, 28 (2): 24-37.   DOI: 10.19682/j.cnki.1005-8885.2021.1003
    摘要432)      PDF(pc) (3234KB)(654)    收藏
    To meet the demands of large-scale user access with computation-intensive and delay-sensitive applications,
    combining ultra-dense networks (UDNs) and mobile edge computing (MEC)are considered as important solutions.
    In the MEC enabled UDNs, one of the most important issues is computation offloading. Although a number of work
    have been done toward this issue, the problem of dynamic computation offloading in time-varying environment,
    especially the dynamic computation offloading problem for multi-user, has not been fully considered. Therefore, in
    order to fill this gap, the dynamic computation offloading problem in time-varying environment for multi-user is
    considered in this paper. By considering the dynamic changes of channel state and users queue state, the dynamic
    computation offloading problem for multi-user is formulated as a stochastic game, which aims to optimize the delay
    and packet loss rate of users. To find the optimal solution of the formulated optimization problem, Nash
    Q-l earning
    (NQLN) algorithm is proposed which can be quickly converged to a Nash equilibrium solution. Finally, extensive
    simulation results are presented to demonstrate the superiority of NQLN algorithm. It is shown that NQLN algorithm
    has better optimization performance than the benchmark schemes.

    参考文献 | 相关文章 | 多维度评价
    5. User abnormal behavior analysis based on neural network clustering
    Zheng Ruijuan, Chen Jing, Zhang Mingchuan, Zhu Junlong, Wu Qingtao
    中国邮电高校学报(英文版)    2016, 23 (3): 29-36.  
    摘要3528)      PDF(pc) (441KB)(615)    收藏
    It is the premise of accessing and controlling cloud environment to establish the mutual trust relationship between users and clouds. How to identify the credible degree of the user identity and behavior becomes the core problem? This paper proposes a user abnormal behavior analysis method based on neural network clustering to resolve the problems of over-fitting and flooding the feature information, which exists in the process of traditional clustering analysis and calculating similarity. Firstly, singular value decomposition (SVD) is applied to reduce dimension and de-noise for massive data, where Map-Reduce parallel processing is used to accelerate the computation speed, and neural network model is used for softening points. Secondly, information entropy is added to hidden layer of neural network model to calculate the weight of each attribute. Finally, weight factor is used to calculate the similarity to make the cluster more accuracy. For the problem of analyzing the mobile cloud user behaviors, the experimental results show that the scheme has higher detection speed and clustering accuracy than traditional schemes. The proposed method is more suitable for the mobile cloud environment.
    相关文章 | 多维度评价
    6. Black-box membership inference attacks based on shadow model
    Han Zhen, Zhou Wen'an, Han Xiaoxuan, Wu Jie
    中国邮电高校学报(英文)    2024, 31 (4): 1-16.   DOI: 10.19682/j.cnki.1005-8885.2024.1016
    摘要345)      PDF(pc) (3603KB)(167)    收藏
    Membership inference attacks on machine learning models have drawn significant attention. While current research primarily utilizes shadow modeling techniques, which require knowledge of the target model and training data, practical scenarios involve black-box access to the target model with no available information. Limited training data further complicate the implementation of these attacks. In this paper, we experimentally compare common data enhancement schemes and propose a data synthesis framework based on the variational autoencoder generative adversarial network (VAE-GAN) to extend the training data for shadow models. Meanwhile, this paper proposes a shadow model training algorithm based on adversarial training to improve the shadow model's ability to mimic the predicted behavior of the target model when the target model's information is unknown. By conducting attack experiments on different models under the black-box access setting, this paper verifies the effectiveness of the VAE-GAN-based data synthesis framework for improving the accuracy of membership inference attack. Furthermore, we verify that the shadow model, trained by using the adversarial training approach, effectively improves the degree of mimicking the predicted behavior of the target model. Compared with existing research methods, the method proposed in this paper achieves a 2% improvement in attack accuracy and delivers better attack performance.
    参考文献 | 相关文章 | 多维度评价
    7.

    Research on cross-chain and interoperability for blockchain system

    李鸣 邱鸿霖 徐泉清 宋文鹏 Liu Baixiang
    中国邮电高校学报(英文版)    2021, 28 (5): 1-17.   DOI: 10.19682/j.cnki.1005-8885.2021.0029
    摘要913)      PDF(pc) (3984KB)(477)    收藏

    At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘ value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains.


    参考文献 | 相关文章 | 多维度评价
    8. Mining microblog user interests based on TextRank with TF-IDF factor
    屠守中 黄民烈
    中国邮电高校学报(英文版)    2016, 23 (5): 40-46.   DOI: 10.1016/S1005-8885(16)60056-0
    摘要3716)      PDF(pc) (1273KB)(1228)    收藏
    It is of great value and significance to model the interests of microblog user in terms of business and sociology. This paper presents a framework for mining and analyzing personal interests from microblog text with a new algorithm which integrates term frequency-inverse document frequency (TF-IDF) with TextRank. Firstly, we build a three-tier category system of user interest based on Wikipedia. In order to obtain the keywords of interest, we preprocess the posts, comments and reposts in different categories to select the keywords which appear both in the category system and microblogs. We then assign weight to each category and calculate the weight of keyword to get TF-IDF factors. Finally we score the ranking of each keyword by the TextRank algorithm with TF-IDF factors. Experiments on real Sina microblog data demonstrate that the precision of our approach significantly outperforms other existing methods.
    参考文献 | 相关文章 | 多维度评价
    9. Superjunction 4H-SiC trench-gate IGBT with an integrated clamping PN diode
    黄义 王学成 高升 刘斌 张红升 韩根全
    中国邮电高校学报(英文)    2024, 31 (2): 3-9.   DOI: 10.19682/j.cnki.1005-8885.2024.0001
    摘要328)      PDF(pc) (4079KB)(143)    收藏

    In this paper, a novel superjunction 4H-silicon carbide (4H-SiC) trench-gate insulated-gate bipolar transistor (IGBT) featuring an integrated clamping PN diode between the P-shield and emitter (TSD-IGBT) is designed and theoretically studied. The heavily doping superjunction layer contributes to a low specific on-resistance, excellent electric field distribution, and quasi-unipolar drift current. The anode of the clamping diode is in floating contact with the P-shield. In the on-state, the potential of the P-shield is raised to the turn-on voltage of the clamping diode, which prevents the hole extraction below the N-type carrier storage layer (NCSL). Additionally, during the turn-off transient, once the clamping diode is turned on, it also promotes an additional hole extraction path. Furthermore, the potential dropped at the semiconductor near the trench-gate oxide is effectively reduced in the off-state.

    参考文献 | 相关文章 | 多维度评价
    10.
    Dynamic event-triggered leader-follower consensus of nonlinear multi-agent systems under directed weighted topology
    吴岳, 陈向勇, 邱建龙, 胡顺伟, 赵峰
    中国邮电高校学报(英文版)    2023, 30 (6): 3-10.   DOI: 10.19682/j.cnki.1005-8885.2023.1019
    摘要932)      PDF(pc) (1536KB)(347)    收藏
    This paper studies the dynamic event-triggered leader-follower consensus of nonlinear multi-agent systems (MASs) under directed weighted graph containing a directed spanning tree, and also considers the effects of disturbances and leader of non-zero control inputs in the system. Firstly, a novel distributed control protocol is designed for uncertain disturbances and leader of non-zero control inputs in MASs. Secondly, a novel dynamic event-triggered control ( DETC) strategy is proposed, which eliminates the need for continuous communication between agents and reduces communication resources between agents. By introducing dynamic thresholds, the complexity of excluding Zeno behavior within the system is reduced. Finally, the effectiveness of the proposed theory is validated through numerical simulation.
    相关文章 | 多维度评价
    11.

    Performance study of vertical MSM solar-blind photodetectors based on β-Ga2O3 thin film

    陈海峰 车露洁 陆芹 王少青 刘祥泰 刘展航 关幼幼 赵旭 程航 韩晓聪 张旭辉
    中国邮电高校学报(英文)    2024, 31 (2): 17-27.   DOI: 10.19682/j.cnki.1005-8885.2024.0006
    摘要328)      PDF(pc) (4363KB)(135)    收藏



    In this work, β-Ga2O3 thin films were grown on SiO2 substrate by atomic layer deposition (ALD) and annealed in N2 atmosphere to enhance the crystallization quality of the thin films, which were verified from X-rays diffraction (XRD). Based on the grown β-Ga2O3 thin films, vertical metal-semiconductor-metal (MSM) interdigital photodetectors (PDs) were fabricated and investigated. The PDs have an ultralow dark current of 1.92 pA, ultra-high photo-to-dark current ratio (PDCR) of 1.7×106, and ultra-high detectivity of 4.25×1014 Jones at a bias voltage of 10 V under 254 nm deep ultraviolet (DUV). Compared with the horizontal MSM PDs under the same process, the PDCR and detectivity of the fabricated vertical PDs are increased by 1 000 times and 100 times, respectively. In addition, the vertical PDs possess a high responsivity of 34.24 A/W and an external quantμm efficiency of 1.67×104%, and also exhibit robustness and repeatability, which indicate excellent performance. Then the effects of electrode size and external irradiation conditions on the performance of the vertical PDs continued to be investigated.



    参考文献 | 相关文章 | 多维度评价
    12. Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli, Wang Mingming, Ye Qing, Qin Panke, Zhao Zongqu
    中国邮电高校学报(英文版)    2019, 26 (4): 70-79.   DOI: DOI: 10.19682/j.cnki.1005-8885.2019.1019
    摘要401)      PDF(pc) (460KB)(230)    收藏
    Lattice-based hierarchical identity-based broadcast encryption ( H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator (PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption (BTE) system, MP12 trapdoor function and ABB10b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10b trapdoor delegation algorithm to delegate user爷s private key, and the trapdoor matrices' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack (INDr-sID-CCA) security in the standard model based on learning with errors (LWE) hard assumption.
    参考文献 | 相关文章 | 多维度评价
    13.
    Linear-quadratic optimal control for time-varying descriptor systems via space decompositions
    吕鹏超, 黄俊杰, 刘波
    中国邮电高校学报(英文版)    2023, 30 (6): 38-48.   DOI: 10.19682/j.cnki.1005-8885.2023.1011
    摘要880)      PDF(pc) (1663KB)(185)    收藏
    This paper aims at solving the linear-quadratic optimal control problems ( LQOCP) for time-varying descriptor systems in a real Hilbert space. By using the Moore-Penrose inverse theory and space decomposition technique, the descriptor system can be rewritten as a new differential-algebraic equation (DAE), and then some novel sufficient conditions for the solvability of LQOCP are obtained. Especially, the methods proposed in this work are simpler and easier to verify and compute, and can solve LQOCP without the range inclusion condition. In addition, some numerical examples are shown to verify the results obtained.
    相关文章 | 多维度评价
    14. Meta-heuristic optimization inspired by proton-electron swarm
    刘永利 刘燊
    中国邮电高校学报(英文版)    2020, 27 (3): 42-52.   DOI: 10.19682/j.cnki.1005-8885.2020.0015
    摘要465)      PDF(pc) (4683KB)(488)    收藏
    While solving unimodal function problems, conventional meta-heuristic algorithms often suffer from low accuracy and slow convergence. Therefore, in this paper, a novel meta-heuristic optimization algorithm, named proton-electron swarm (PES), is proposed based on physical rules. This algorithm simulates the physical phenomena of like-charges repelling each other while opposite charges attracting in protons and electrons, and establishes a mathematical model to realize the optimization process. By balancing the global exploration and local exploitation ability, this algorithm achieves high accuracy and avoids falling into local optimum when solving target problem. In order to evaluate the effectiveness of this algorithm, 23 classical benchmark functions were selected for comparative experiments. Experimental results show that, compared with the contrast algorithms, the proposed algorithm cannot only obtain higher accuracy and convergence speed in solving unimodal function problems, but also maintain strong optimization ability in solving multimodal function problems.
    参考文献 | 相关文章 | 多维度评价
    15. SNR-adaptive deep joint source-channel coding scheme for imagesemantic transmission with convolutional block attention module
    Yang Yujia, Liu Yiming, Zhang Wenjia, Zhang Zhi
    中国邮电高校学报(英文版)    2024, 31 (1): 1-11.   DOI: 10.19682/j.cnki.1005-8885.2024.2001
    摘要889)      PDF(pc) (2443KB)(192)    收藏
    With the development of deep learning (DL), joint source-channel coding (JSCC) solutions for end-to-end transmission have gained a lot of attention. Adaptive deep JSCC schemes support dynamically adjusting the rate according to different channel conditions during transmission, enhancing robustness in dynamic wireless environment. However, most of the existing adaptive JSCC schemes only consider different channel conditions, ignoring the different feature importance in the image processing and transmission. The uniform compression of different features in the image may result in the compromise of critical image details, particularly in low signal-to-noise ratio (SNR) scenarios. To address the above issues, in this paper, a dual attention mechanism is introduced and an SNR-adaptive deep JSCC mechanism with a convolutional block attention module (CBAM) is proposed, in which matrix operations are applied to features in spatial and channel dimensions respectively. The proposedsolution concatenates the pooling feature with the SNR level and passes it sequentially through the channel attention network and spatial attention network to obtain the importance evaluation result. Experiments show that the proposed solution outperforms other baseline schemes in terms of peak SNR (PSNR) and structural similarity (SSIM), particularly in low SNR scenarios or when dealing with complex image content.
    参考文献 | 相关文章 | 多维度评价
    16.
    Node interdependent percolation of multiplex hypergraph with weak interdependence
    张俊杰, 刘彩霞, 刘树新, 臧韦菲, 李倩
    中国邮电高校学报(英文版)    2023, 30 (6): 49-59.   DOI: 10.19682/j.cnki.1005-8885.2023.1016
    摘要881)      PDF(pc) (3049KB)(193)    收藏
    In recent years, there has been considerable attention and research on the higher-order interactions that are prevalent in various real-world networks. Hypergraphs, especially in the study of complex systems, are proved effective in capturing these interactions. To better characterize the model in reality, this paper proposes a theoretical model of node interdependent percolation in multiplex hypergraphs, considering “ weak ” interdependence. The proposed model includes pairwise and higher-order interactions, where the removal of nodes triggers cascading failures. However, interdependent nodes connected to failed nodes experience partial loss of connections due to “ weak” interdependence, reflecting the self-sustaining capabilities of real-world systems. Percolation theory is applied to the analysis to investigate the properties of the percolation threshold and phase transition. Both analysis and simulation results show that as the strength of interdependence between nodes weakens, the network transitions from a discontinuous to a continuous phase, thereby increasing its robustness.
    相关文章 | 多维度评价
    17. Repair the faulty TSVs with the improved FNS-CAC codec
    Wei Chen, Cui Xiaole, Cui Xiaoxin, Feng Xu, Jin Yufeng
    中国邮电高校学报(英文版)    2021, 28 (2): 1-13.   DOI: 10.19682/j.cnki.1005-8885.2021.1001
    摘要411)      PDF(pc) (1420KB)(200)    收藏
    Through-silicon via (TSV) is a key enabling technology for the emerging 3-dimension (3D) integrated circuits
    (ICs). However, the crosstalk between the neighboring TSVs is one of the important sources of the soft faults. To
    suppress the crosstalk, the Fibonacci-numeral-system-based crosstalk avoidance code ( FNS-CAC) is an effective
    scheme. Meanwhile, the self-repair schemes are often used to deal with the hard faults, but the repaired results
    may change the mapping between signals to TSVs, thus may reduce the crosstalk suppression ability of FNS-CAC.
    A TSV self-repair technique with an improved FNS-CAC codec is proposed in this work. The codec is designed
    based on the improved Fibonacci numeral system (FNS) adders, which are adaptive to the health states of TSVs.
    The proposed self-repair technique is able to suppress the crosstalk and repair the faulty TSVs simultaneously. The
    simulation and analysis results show that the proposed scheme keeps the crosstalk suppression ability of the original
    FNS-CAC, and it has higher reparability than the local self-repair schemes, such as the signal-switching-based and
    the signal-shifting-based counterparts.

    参考文献 | 相关文章 | 多维度评价
    18. Bidirectional position attention lightweight network for massive MIMO CSI feedback 
    李军 王昱凯 张志晨 何波 郑文静 林霏
    中国邮电高校学报(英文)    2024, 31 (5): 1-11.   DOI: 10.19682/j.cnki.1005-8885.2024.0018
    摘要188)      PDF(pc) (1411KB)(93)    PDF(mobile) (1411KB)(18)    收藏

    In frequency division duplex ( FDD) massive multiple-input multiple-output ( MIMO) systems, a bidirectional positional attention network ( BPANet) was proposed to address the high computational complexity and low accuracy of existing deep learning-based channel state information ( CSI) feedback methods. Specifically, a bidirectional position attention module ( BPAM) was designed in the BPANet to improve the network performance. The BPAM captures the distribution characteristics of the CSI matrix by integrating channel and spatial dimension information, thereby enhancing the feature representation of the CSI matrix. Furthermore, channel attention is decomposed into two one-dimensional (1D) feature encoding processes effectively reducing computational costs. Simulation results demonstrate that, compared with the existing representative method complex input lightweight neural network ( CLNet), BPANet reduces computational complexity by an average of 19. 4% and improves accuracy by an average of 7. 1% . Additionally, it performs better in terms of running time delay and cosine similarity.


    参考文献 | 相关文章 | 多维度评价
    19. Adv Paxos:making classical Paxos more efficient
    Li Bin, Jiang Jianguo, Yuan Kaiguo
    中国邮电高校学报(英文版)    2019, 26 (5): 33-40.   DOI: 10.19682/j.cnki.1005-8885.2019.0020
    摘要640)      PDF(pc) (467KB)(354)    收藏
    Paxos is a well-known distributed algorithm that provides strong consistency. However, the original Paxos has several shortcomings, including those of slow elections, redundant communications and excessive traffic of the coordinator node. In order to tackle the above dificiencies,the design of advanced edition of Paxos(Adv Paxos) was proposed, which is a new distributed consensus algorithm that is derived from Basic Paxos. This paper analyzes the behavior of each character of the original algotithm during each of its phases. By optimizing the behavior of the proposer and acceptor, a series of behavioral optimization measures was proposed, which included distance related waiting mechanisms, optimization of the number of proposals, self-learning and a reduction in broadcast communications. Through theoretical analysis and experimentation, it is demonstrated that the new algorithm has a lower probability of livelock without a reduction in reliability, faster agreement reaching speeds, lower communication costs among server clusters and higher percentage of successful proposals.
    参考文献 | 相关文章 | 多维度评价
    20. Trench gate GaN IGBT with controlled hole injection efficiency
    黄义 李玥玥 高升 王琦 Liu Bin 韩根全
    中国邮电高校学报(英文)    2024, 31 (2): 10-16.   DOI: 10.19682/j.cnki.1005-8885.2024.0012
    摘要317)      PDF(pc) (2095KB)(112)    收藏

    In this paper, a novel trench gate gallium nitride insulated gate bipolar transistor (GaN IGBT), in which the collector is divided into multiple regions to control the hole injection efficiency, is designed and theoretically studied. The incorporation of a P+/P- multi-region alternating structure in the collector region mitigates hole injection within the collector region. When the device is in forward conduction, the conductivity modulation effect results in a reduced storage of carriers in the drift region. As a result, the number of carriers requiring extraction during device turn-off is minimized, leading to faster turn-off speed. The results illustrate that the GaN IGBT with controlled hole injection efficiency (CEH GaN IGBT) exhibits markedly enhanced performance compared to conventional GaN IGBT, showing a remarkable 42.2% reduction in turn-off time and a notable 28.5% decrease in turn-off loss.

    参考文献 | 相关文章 | 多维度评价