Reliable Neuromorphic and Nociceptive Behavior in Dual-Stacked IGZO/ZrOX Resistive Random Access Memory for Transparent Memory Applications

  • Seo Young Jo
  • , Heeseong Jang
  • , Dhananjay Mishra
  • , Sungjun Kim
  • , Sung Hun Jin

Research output: Contribution to journalArticlepeer-review

Abstract

As data is processed by the von Neumann architecture grows, a bottleneck emerges due to the separation of memory and computation units. Neuromorphic computing, inspired by the human brain, offers a solution by integrating memory and computation in hardware. This study explores ITO/IGZO/ZrO2/Ti resistive random access memory (RRAM), based on a simple manufacturing process and high performance, demonstrating stable memory characteristics with an endurance of 103 cycles and data retention for 104 seconds. The RRAM operates based on oxygen vacancies, enabling linear potentiation, depression, spike-timing-dependent plasticity (STDP), and spike-number-dependent plasticity (SNDP), essential for adjusting synaptic weights in neuromorphic computing. The device successfully demonstrates the capability to mimic nociceptors by detecting pain through the control of threshold voltage, pulse width, and pulse number, enabling the replication of behaviors such as hyperalgesia and allodynia while processing harmful stimuli in a manner similar to human sensory neurons. These findings highlight the potential of transparent ITO/IGZO/ZrO2/ITO RRAM for see through applications in humanoid robots, artificial intelligence (AI) systems, and advanced computing technologies, enabling efficient, brain like processing.

Original languageEnglish
Article number2500103
JournalPhysica Status Solidi - Rapid Research Letters
Volume19
Issue number10
DOIs
StatePublished - Oct 2025

Keywords

  • indium gallium zinc oxide
  • neuromorphic
  • nociceptor
  • oxygen vacancy
  • resistive random access memory
  • ZrOx

Fingerprint

Dive into the research topics of 'Reliable Neuromorphic and Nociceptive Behavior in Dual-Stacked IGZO/ZrOX Resistive Random Access Memory for Transparent Memory Applications'. Together they form a unique fingerprint.

Cite this