Two dimensional RC/Subarray Constrained Codes: Bounded Weight and Almost Balanced Weight

In this work, we study two types of constraints on two-dimensional binary arrays. In particular, given p, ǫ > 0 , we study • The p -bounded constraint: a binary vector of size m is said to be p -bounded if its weight is at most pm , • The ǫ -balanced constraint: a binary vector of size m is said to be ǫ -balanced if its weight is within . Such constraints are crucial in several data storage systems, those regard the information data as two-dimensional (2D) instead of one-dimensional (1D), such as the crossbar resistive memory arrays and the holographic data storage. In this work, efficient encoding/decoding algorithms are presented for binary arrays so that the weight constraint (either p -bounded constraint or ǫ -balanced constraint) is enforced over every row and every column, regarded as 2D row-column (RC) constrained codes; or over every subarray, regarded as 2D subarray constrained codes. While low-complexity designs have been proposed in the literature, mostly focusing on 2D RC constrained codes where p = 1 / 2 and ǫ = 0 , this work provides efficient coding methods that work for both 2D RC constrained codes and 2D subarray constrained codes, and more importantly, the methods are applicable for arbitrary values of p and ǫ . Furthermore, for certain values of p and ǫ , we show that, for sufficiently large array size, there exists linear-time encoding/decoding algorithm that incurs at most one redundant bit. we show that for sufficiently large n , there exist efficient encoders/decoders for B RC ( n ; p ) , Bal RC ( n ; ǫ ) , B S ( n, m ; p ) and Bal S ( n, m ; ǫ ) , that incur at most one redundant bit.

[1]  Kees A. Schouhamer Immink,et al.  Using One Redundant Bit to Construct Two-Dimensional Almost-Balanced Codes , 2022, 2022 IEEE International Symposium on Information Theory (ISIT).

[2]  Yeow Meng Chee,et al.  Efficient Design of Capacity-Approaching Two-Dimensional Weight-Constrained Codes , 2021, 2021 IEEE International Symposium on Information Theory (ISIT).

[3]  Kui Cai,et al.  Two-Dimensional Weight-Constrained Codes for Crossbar Resistive Memory Arrays , 2021, IEEE Communications Letters.

[4]  Eitan Yaakobi,et al.  Multiple Criss-Cross Deletion-Correcting Codes , 2021, 2021 IEEE International Symposium on Information Theory (ISIT).

[5]  Guanghui Song,et al.  Deep Learning Based Detection for Mitigating Sneak Path Interference in Resistive Memory Arrays , 2020, 2020 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia).

[6]  Tuan Thanh Nguyen,et al.  Binary Subblock Energy-Constrained Codes: Knuth’s Balancing and Sequence Replacement Techniques , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).

[7]  K. Cai,et al.  Performance Limit and Coding Schemes for Resistive Random-Access Memory Channels , 2020, IEEE Transactions on Communications.

[8]  Eitan Yaakobi,et al.  Criss-Cross Deletion Correcting Codes , 2020, 2020 International Symposium on Information Theory and Its Applications (ISITA).

[9]  Han Mao Kiah,et al.  Capacity-Approaching Constrained Codes With Error Correction for DNA-Based Data Storage , 2020, IEEE Transactions on Information Theory.

[10]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[11]  Eitan Yaakobi,et al.  Information-Theoretic Sneak-Path Mitigation in Memristor Crossbar Arrays , 2016, IEEE Transactions on Information Theory.

[12]  Shahar Kvatinsky,et al.  Memory Processing Unit for in-memory processing , 2016, 2016 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH).

[13]  Uri C. Weiser,et al.  Memristor-Based Material Implication (IMPLY) Logic: Design Principles and Methodologies , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[14]  Ron M. Roth,et al.  Low Complexity Two-Dimensional Weight-Constrained Codes , 2011, IEEE Transactions on Information Theory.

[15]  Ron M. Roth,et al.  Asymptotic enumeration of binary matrices with bounded row and column weights , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[16]  An Chen,et al.  Accessibility of nano-crossbar arrays of resistive switching devices , 2011, 2011 11th IEEE International Conference on Nanotechnology.

[17]  Adriaan J. de Lind van Wijngaarden,et al.  Construction of Maximum Run-Length Limited Codes Using Sequence Replacement Techniques , 2010, IEEE Journal on Selected Areas in Communications.

[18]  Jos H. Weber,et al.  Very Efficient Balanced Codes , 2010, IEEE Journal on Selected Areas in Communications.

[19]  P. Vontobel,et al.  Writing to and reading from a nano-scale crossbar memory based on memristors , 2009, Nanotechnology.

[20]  Samiha Mourad,et al.  Digital logic implementation in memristor-based crossbars , 2009, 2009 International Conference on Communications, Circuits and Systems.

[21]  Ron M. Roth,et al.  Two-dimensional weight-constrained codes through enumeration bounds , 2000, IEEE Trans. Inf. Theory.

[22]  Bella Bose,et al.  Design of some new Balanced Codes , 1993, Proceedings. IEEE International Symposium on Information Theory.

[23]  D. Psaltis,et al.  Control of volume holograms , 1992 .

[24]  M A Neifeld,et al.  Optical memory disks in optical information processing. , 1990, Applied optics.

[25]  W. Hager,et al.  and s , 2019, Shallow Water Hydraulics.

[26]  Schouhamer Immink,et al.  Codes for mass data storage systems , 2004 .

[27]  T. Etzion,et al.  Efficient code constructions for certain two-dimensional constraints , 1997, Proceedings of IEEE International Symposium on Information Theory.

[28]  Paul H. Siegel,et al.  Conservative arrays: multidimensional modulation codes for holographic recording , 1996, IEEE Trans. Inf. Theory.

[29]  Noga Alon,et al.  Balancing sets of vectors , 1988, IEEE Trans. Inf. Theory.

[30]  Donald E. Knuth,et al.  Efficient balanced codes , 1986, IEEE Trans. Inf. Theory.

[31]  Thomas M. Cover,et al.  Enumerative source encoding , 1973, IEEE Trans. Inf. Theory.