摘要:
According to a method of erasing data in a non-volatile semiconductor memory device, block-round type overerase verify is performed. Specifically, overerase verify and write back are performed sequentially from a first address to a last address. That is, even when a write back pulse is applied after a certain address is selected and verify is performed, address increment from one address to another is performed, regardless of whether verify has been performed or not. Therefore, it is not that the same address is cumulatively rewritten, but write back to a memory cell corresponding to a defective address is sequentially and gradually performed. Accordingly, as write to a memory cell in an overerased state can evenly be performed, influence by off-leakage is suppressed, and a memory cell having threshold voltage distribution with less variation can be implemented.
摘要:
When a data write sequence is started, initially, write data is latched in a data latch circuit corresponding to one memory mat. Then, a program pulse is applied to the memory mat, and data read from a memory cell, which is a data write target bit in the memory mat, is performed. Thereafter, verify determination of the memory mat is performed. After a verify operation for the memory mat is completed, a program pulse is applied to another memory mat, and a verify operation for another memory mat is performed.
摘要:
According to a method of erasing data in a non-volatile semiconductor memory device, block-round type overerase verify is performed. Specifically, overerase verify and write back are performed sequentially from a first address to a last address. That is, even when a write back pulse is applied after a certain address is selected and verify is performed, address increment from one address to another is performed, regardless of whether verify has been performed or not. Therefore, it is not that the same address is cumulatively rewritten, but write back to a memory cell corresponding to a defective address is sequentially and gradually performed. Accordingly, as write to a memory cell in an overerased state can evenly be performed, influence by off-leakage is suppressed, and a memory cell having threshold voltage distribution with less variation can be implemented.
摘要:
According to a method of erasing data in a non-volatile semiconductor memory device, block-round type overerase verify is performed. Specifically, overerase verify and write back are performed sequentially from a first address to a last address. That is, even when a write back pulse is applied after a certain address is selected and verify is performed, address increment from one address to another is performed, regardless of whether verify has been performed or not. Therefore, it is not that the same address is cumulatively rewritten, but write back to a memory cell corresponding to a defective address is sequentially and gradually performed. Accordingly, as write to a memory cell in an overerased state can evenly be performed, influence by off-leakage is suppressed, and a memory cell having threshold voltage distribution with less variation can be implemented.
摘要:
When a data write sequence is started, initially, write data is latched in a data latch circuit corresponding to one memory mat. Then, a program pulse is applied to the memory mat, and data read from a memory cell, which is a data write target bit in the memory mat, is performed. Thereafter, verify determination of the memory mat is performed. After a verify operation for the memory mat is completed, a program pulse is applied to another memory mat, and a verify operation for another memory mat is performed.
摘要:
According to a method of erasing data in a non-volatile semiconductor memory device, block-round type overerase verify is performed. Specifically, overerase verify and write back are performed sequentially from a first address to a last address. That is, even when a write back pulse is applied after a certain address is selected and verify is performed, address increment from one address to another is performed, regardless of whether verify has been performed or not. Therefore, it is not that the same address is cumulatively rewritten, but write back to a memory cell corresponding to a defective address is sequentially and gradually performed. Accordingly, as write to a memory cell in an overerased state can evenly be performed, influence by off-leakage is suppressed, and a memory cell having threshold voltage distribution with less variation can be implemented.
摘要:
A conductive film includes a layer 1 formed by a conductive material 1 that includes a polymer material 1 containing any of (1) an amine and an epoxy resin (where the epoxy resin and the amine are mixed in a ratio of 1.0 or more in terms of the ratio of the number of active hydrogen atoms in the amine with respect to the number of functional groups in the epoxy resin), (2) a phenoxy resin and an epoxy resin, (3) a saturated hydrocarbon polymer having a hydroxyl group, and (4) a curable resin and an elastomer and conductive particles 1. The conductive film has excellent stability in an equilibrium potential environment in a negative electrode and low electric resistance per unit area in the thickness direction. A multilayer conductive film including the conductive film achieves excellent interlayer adhesion, and using them as a current collector enables the production of a battery satisfying both weight reduction and durability.
摘要:
A bearing assembly includes an IC tag with information to be reliably exchanged between the IC tag and an external reader/writer, and a rolling bearing including outer and inner races and rolling elements disposed between the outer and inner races. The IC tag communicates with the external reader/writer device without contacting the reader/writer device, is attached to a metal member of the rolling bearing, includes a tag antenna, and is configured so information can be exchanged between the tag antenna and a reader/writer antenna of the reader/writer device by forming a closed magnetic circuit between the tag antenna and the reader/writer antenna. The IC tag is received in a hole in a metal member surface. The tag antenna includes at least two protrusions facing the opening of the hole and arranged so magnetic fluxes leaving/entering the protrusions pass inside the edge defining the hole opening and extend outside the hole.
摘要:
A searchable encryption resistant to frequency analysis. A conversion rule management device generates a conversion rule table associating a search keyword with a conversion keyword group. Based on the conversion rule table, a data registration device generates registration data associating encrypted data with an encrypted keyword, and registers the registration data in a server device. An information processing device obtains from the conversion rule table a conversion keyword group associated with a specified search keyword, generates an encrypted keyword group, and requests a data search by specifying the encrypted keyword group. Using as a search key an encrypted keyword included in the encrypted keyword group, the server device searches for encrypted data associated with the search key, and returns searched encrypted data. The information processing device decrypts the searched encrypted data, and outputs as a search result search data obtained by decryption.
摘要:
When a switch is set to off, and a switch is set to on, the voltage of a SigOut terminal is stabilized with a reference voltage, and a bias voltage is applied to a capacitor. Changing the switch from on to off, with the bias voltage retained in the capacitor, a detection signal which is input via a SigIn terminal is amplified with the reference voltage as a reference, and an amplified signal is output from the SigOut terminal.