Delta doping for deep-level analysis in semiconductor diodes

Author(s):  
Joachim Piprek ◽  
H. Kostial ◽  
Peter Krispin ◽  
C. H. Lange ◽  
Karl W. Boer
1992 ◽  
Vol 281 ◽  
Author(s):  
J. Piprek ◽  
P. Krispin ◽  
H. Kostial ◽  
K. W. BÖer

ABSTRACTThe occupation of deep-level defects in semiconductors is investigated by delta-doping such impurities at a specified distance from the metallurgical boundary within Schottky diodes. Capacitance-voltage characteristics are analyzed using ID device simulation software. These characteristics change significantly depending on the deep-level energy and the sheet position. This new approach to deep-level analysis is applied to Schottky diodes on MBE-grown n-GaAs with a planar titanium doped sheet. At moderate Ti concentrations the well-known Ti acceptor level near Ec-0.2 eV governs the electrical properties. In addition, two other types of Ti defects are found.


2011 ◽  
Vol 2 (2) ◽  
pp. 67-75 ◽  
Author(s):  
Ken Lozito

Business Intelligence (BI) has often been described as the tools and systems that play an essential role in the strategic planning process of a corporation. The application of BI is most commonly associated with the analysis of sales and stock trends, pricing and customer behavior to inform business decision-making. There is a growing trend in utilizing the tools and processes used in the analysis of data and applying them to security event management. Security Information and Event Management (SIEM) has emerged within the last 10 years providing a centralized source to enable both real-time and deep level analysis of historical event data to drive security standards and align IT resources in a more efficient manner.


Author(s):  
Ken Lozito

Business Intelligence (BI) has often been described as the tools and systems that play an essential role in the strategic planning process of a corporation. The application of BI is most commonly associated with the analysis of sales and stock trends, pricing and customer behavior to inform business decision-making. There is a growing trend in utilizing the tools and processes used in the analysis of data and applying them to security event management. Security Information and Event Management (SIEM) has emerged within the last 10 years providing a centralized source to enable both real-time and deep level analysis of historical event data to drive security standards and align IT resources in a more efficient manner.


1992 ◽  
Vol 33 (1-2) ◽  
pp. 63-66 ◽  
Author(s):  
E.C. Paloura ◽  
A. Ginoudi ◽  
G. Constandinidis ◽  
G. Kiriakidis
Keyword(s):  

1999 ◽  
Vol 86 (1) ◽  
pp. 217-223 ◽  
Author(s):  
Masafumi Yamaguchi ◽  
Aurangzeb Khan ◽  
Stephen J. Taylor ◽  
Koshi Ando ◽  
Tsutomu Yamaguchi ◽  
...  

1986 ◽  
Vol 33 (5) ◽  
pp. 693-697 ◽  
Author(s):  
M. Heuken ◽  
L. Loreck ◽  
K. Heime ◽  
K. Ploog ◽  
W. Schlapp ◽  
...  

1995 ◽  
Vol 78 (2) ◽  
pp. 1004-1007 ◽  
Author(s):  
M. M. Ben Salem ◽  
M. A. Zaidi ◽  
H. Maaref ◽  
J. C. Bourgoin
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document