Defect Reaction and Electrical Properties of Iron in N-Type Silicon

1995 ◽  
Vol 378 ◽  
Author(s):  
Hajime Kitagawa ◽  
Shuji Tanaka

AbstractSince the first report by our group in 1992, iron-related defects in n-type silicon has been found to exhibit unusual in-diffusion and annealing properties. We review in this paper the recent progress in understanding the electrical and diffusion properties of iron-related defects in n-type silicon. We have shown from DLTS and Hall effect that iron in n-type silicon is electrically ionized and introduce one donor level at Ec-0.41 eV (level C) and, at least, one acceptor level at Ec-0.21 eV (level B). The donor character of former level has been confirmed by a Poole-Frenkel effect. The concentrations of two centers introduced are in the order of 1013 cm−3 at maxima. In-diffusion behavior of levels B and C show that these levels are intermediate states in a consecutive reaction of iron-related complex formation. Low-temperature isothermal annealing experiments from the room temperature to 200°C suggest that iron-related donor is formed, in part, by the electrostatic attractive force between two point charges.

Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


2013 ◽  
Vol 10 (4) ◽  
pp. 654-657 ◽  
Author(s):  
Simonpietro Agnello ◽  
Marco Cannas ◽  
Giuseppe Iovino ◽  
Lavinia Vaccaro ◽  
Franco Mario Gelardi

2021 ◽  
pp. 117097
Author(s):  
Gang Wang ◽  
Ganggang Li ◽  
Xin Xing ◽  
Zhongshen Zhang ◽  
Zhengping Hao

1990 ◽  
Vol 68 (4) ◽  
pp. 1601-1605 ◽  
Author(s):  
S. Coffa ◽  
L. Calcagno ◽  
G. Ferla ◽  
S. U. Campisano

2013 ◽  
Vol 62 (2) ◽  
pp. 388-391 ◽  
Author(s):  
D. V. Golubenko ◽  
Yu. A. Karavanova ◽  
A. B. Yaroslavtsev

2011 ◽  
Vol 32 (10) ◽  
pp. 1681-1687 ◽  
Author(s):  
A. Saritha ◽  
K. Joseph ◽  
A. Boudenne ◽  
S. Thomas

Sign in / Sign up

Export Citation Format

Share Document