Institution
NEC
Company•Tokyo, Japan•
About: NEC is a company organization based out in Tokyo, Japan. It is known for research contribution in the topics: Signal & Layer (electronics). The organization has 33269 authors who have published 57670 publications receiving 835952 citations. The organization is also known as: NEC Corporation & NEC Electronics Corporation.
Topics: Signal, Layer (electronics), Terminal (electronics), Transmission (telecommunications), Electrode
Papers published on a yearly basis
Papers
More filters
•
NEC1
TL;DR: In this article, a film capacitors in accordance with the present invention include a silicon electrode (22), a first electrode layer (24), a dielectric layer (26) consisting of an oxide ferroelectric substance such as BaTiO₃ and a third electrode layer(27) formed on top of it.
Abstract: This film capacitors in accordance with the present invention include a silicon electrode (22), a first electrode layer (24) consisting of either one of titanium, titanium silicide, titanium nitride, tantalum, molybdenum, tungsten, tantalum silicide, molybdenum silicide, tungsten silicide, alloys thereof and compounds thereby, formed on the silicon electrode, a second electrode layer (25) formed on it consisting of platinum, palladium or rhodium, a dielectric layer (26) formed on it consisting of an oxide ferroelectric substance such as BaTiO₃ and a third electrode layer (27) formed on top of it. As the first electrode layer, use may also be made of rhenium oxide, osmium oxide, rhodium oxide or iridium oxide.
144 citations
••
TL;DR: The proposed transceiver is based on the local-oscillator (LO) phase-shifting architecture, and it achieves quasi-continuous phase tuning with less than 0.2-dB radio frequency (RF) gain variation and 0.3°C phase error.
Abstract: This paper presents a 28-GHz CMOS four-element phased-array transceiver chip for the fifth-generation mobile network (5G) new radio (NR). The proposed transceiver is based on the local-oscillator (LO) phase-shifting architecture, and it achieves quasi-continuous phase tuning with less than 0.2-dB radio frequency (RF) gain variation and 0.3°C phase error. Accurate beam control with suppressed sidelobe level during beam steering could be supported by this work. At 28 GHz, a single-element transmitter-mode output ${{\mathrm {P}}_{\mathrm {1\,dB}}}$ of 15.7 dBm and a receiver-mode noise figure (NF) of 4.1 dB are achieved. The eight-element transceiver modules developed in this work are capable of scanning the beam from −50° to +50° with less than −9-dB sidelobe level. A saturated equivalent isotropic radiated power (EIRP) of 39.8 dBm is achieved at 0° scan. In a 5-m over-the-air measurement, the proposed module demonstrates the first 512 quadrature amplitude modulation (QAM) constellation in the 28-GHz band. A data stream of 6.4 Gb/s in 256-QAM could be supported within a beam angle of ±50°. The achieved maximum data rate is 15 Gb/s in 64-QAM. The proposed transceiver chip consumes 1.2 W/chip in transmitter mode and 0.59 W/chip in receiver mode.
144 citations
••
01 Feb 2019TL;DR: NODOZE generates alert dependency graphs that are two orders of magnitude smaller than those generated by traditional tools without sacrificing the vital information needed for the investigation, and decreases the volume of false alarms by 84%, saving analysts’ more than 90 hours of investigation time per week.
Abstract: Large enterprises are increasingly relying on threat detection softwares (e.g., Intrusion Detection Systems) to allow them to spot suspicious activities. These softwares generate alerts which must be investigated by cyber analysts to figure out if they are true attacks. Unfortunately, in practice, there are more alerts than cyber analysts can properly investigate. This leads to a “threat alert fatigue” or information overload problem where cyber analysts miss true attack alerts in the noise of false alarms. In this paper, we present NoDoze to combat this challenge using contextual and historical information of generated threat alert in an enterprise. NoDoze first generates a causal dependency graph of an alert event. Then, it assigns an anomaly score to each event in the dependency graph based on the frequency with which related events have happened before in the enterprise. NoDoze then propagates those scores along the edges of the graph using a novel network diffusion algorithm and generates a subgraph with an aggregate anomaly score which is used to triage alerts. Evaluation on our dataset of 364 threat alerts shows that NoDoze decreases the volume of false alarms by 86%, saving more than 90 hours of analysts’ time, which was required to investigate those false alarms. Furthermore, NoDoze generated dependency graphs of true alerts are 2 orders of magnitude smaller than those generated by traditional tools without sacrificing the vital information needed for the investigation. Our system has a low average runtime overhead and can be deployed with any threat detection software.
144 citations
••
01 Jan 2016TL;DR: This paper develops an availability model of a virtualized system using a two-level hierarchical approach in which fault trees are used in the upper level and homogeneous continuous time Markov chains are used to represent sub-models in lower level.
Abstract: Availability is one of the key requirements for modern networked system. Availability of a virtualized system can be modelled and analyzed using stochastic models. In our previous work, availability of a virtualized system was modeled using a hierarchical model to incorporate the detailed behavior of virtual machines (VMs)' failure and recovery with respect to the system behavior. In particular, a truncated continuous time Markov chain model was used for VM mode. In this paper, we propose to construct a stochastic reward nets (SRN) to model and analyze the availability of a virtualized system. Further, we study the effect on the availability when restrictions on the guard functions are relaxed. We use a virtualized data center (VDC) using three hosts with a multiple number of VMs on each hosting servers, and we incorporate (i) failure and recovery of hosting servers and VMs, (ii) VM high availability (HA) and (iii) VM live migration (LM). The VDCs with/without using VM HA and LM are compared in terms of capacity oriented availability (i.e., number of available VMs).
144 citations
••
TL;DR: It is demonstrated that a scheme of quantum teleportation where a receiver has multiple output ports and obtains the teleported state by merely selecting one of the N ports according to the outcome of the sender's measurement is possible by showing an explicit protocol where N pairs of maximally entangled qubits are employed.
Abstract: We consider a scheme of quantum teleportation where a receiver has multiple (N) output ports and obtains the teleported state by merely selecting one of the N ports according to the outcome of the sender's measurement. We demonstrate that such teleportation is possible by showing an explicit protocol where N pairs of maximally entangled qubits are employed. The optimal measurement performed by a sender is the square-root measurement, and a perfect teleportation fidelity is asymptotically achieved for a large N limit. Such asymptotic teleportation can be utilized as a universal programmable processor.
144 citations
Authors
Showing all 33297 results
Name | H-index | Papers | Citations |
---|---|---|---|
Pulickel M. Ajayan | 176 | 1223 | 136241 |
Xiaodong Wang | 135 | 1573 | 117552 |
S. Shankar Sastry | 122 | 858 | 86155 |
Sumio Iijima | 106 | 633 | 101834 |
Thomas W. Ebbesen | 99 | 305 | 70789 |
Kishor S. Trivedi | 95 | 698 | 36816 |
Sharad Malik | 95 | 615 | 37258 |
Shigeo Ohno | 91 | 303 | 28104 |
Adrian Perrig | 89 | 374 | 53367 |
Jan M. Rabaey | 81 | 525 | 36523 |
C. Lee Giles | 80 | 536 | 25636 |
Edward A. Lee | 78 | 462 | 34620 |
Otto Zhou | 74 | 322 | 18968 |
Katsumi Kaneko | 74 | 581 | 28619 |
Guido Groeseneken | 73 | 1074 | 26977 |