METHOD FOR OPTIMIZING POLAR-RNNA QUANTIZER OF MLC-TYPE NAND FLASH MEMORY ON BASIS OF DEEP LEARNING

20230127404 · 2023-04-27

Assignee

Inventors

Cpc classification

International classification

Abstract

A method for optimizing a Polar-RNNA quantizer of MLC NAND flash based on deep learning comprises the following steps: Step S1: transforming an MLC flash detection task into a deep learning task, and obtaining three hard-decision read thresholds based on a neural network; Step S2: expanding six soft-decision read thresholds based on the three hard-decision read thresholds; Step S3: constructing an LLR mapping table, and obtaining new LLR information of MLC flash based on the LLR mapping table; Step S4: symmetrizing an MLC flash channel, and performing density evolution; and Step S5: optimizing the soft-decision read thresholds based on a genetic algorithm to obtain an optimal quantization interval. According to the invention, polar codes can be directly used for MLC flash channels without the arduous work of MLC flash channel modeling, so that the reliability of MLC flash is effectively improved.

Claims

1. A method for optimizing a Polar-RNNA quantizer of MLC NAND flash memory based on deep learning, comprising the following steps: Step S1: transforming an MLC flash detection task into a deep learning task, and obtaining three hard-decision read thresholds based on a neural network; Step S2: expanding six soft-decision read thresholds based on the three hard-decision read thresholds; Step S3: constructing an LLR mapping table, and obtaining LLR soft information of the MLC flash based on the LLR mapping table; Step S4: symmetrizing the MLC flash channel, and performing density evolution; and Step S5: optimizing the soft-decision read thresholds based on a genetic algorithm to obtain optimal quantization intervals.

2. The method for optimizing a Polar-RNNA quantizer of MLC NAND flash memory based on deep learning according to claim 1, wherein Step S1 specifically comprises: devoting a read-back voltage of a k.sup.th memory cell of the MLC flash by v.sub.k, inputting v={v.sub.1, v.sub.2, . . . , v.sub.L} to the neural network, and setting L as the number of neurons of an input layer, and outputting a soft estimation {tilde over (x)}={{tilde over (x)}.sub.1, {tilde over (x)}.sub.2, . . . , {tilde over (x)}.sub.L} of a tag x by the neural network; as for the MLC flash, expressing {11, 10, 00, 01} by a tag {0, 1, 2, 3}, so that a hard estimation {circumflex over (x)}.sub.k ∈{0, 1, 2, 3} of the k.sup.th memory cell x.sub.k ∈{0, 1, 2, 3} is obtained by acquiring integers {tilde over (x)}.sub.k most approximate to {tilde over (x)} output by the neural network; then, obtaining a corresponding memory cell symbol through a mapping {0, 1, 2, 3}.fwdarw.{11, 10, 00, 01}; setting a set of read thresholds {R.sub.1, R.sub.2, R.sub.3} for a read-back voltage {right arrow over (v)} of a given set of memory cells to obtain a hard estimation of the memory cell symbol, which is denoted by x; inputting {right arrow over (v)} to an RNN detector to obtain a hard estimation {circumflex over (x)} of a storage symbol based on a principle of proximity; setting, during a search process, N RNN output sequences with a length of L, and denoting an i.sup.th RNN output sequence as {circumflex over (x)}.sub.i, so that {circumflex over (X)}={{circumflex over (x)}.sub.1, {circumflex over (x)}.sub.2, . . . , {circumflex over (x)}.sub.N}, and X={x.sub.1, x.sub.2, . . . , x.sub.N}; wherein, a formula for calculating optimal thresholds {R*.sub.1, R*.sub.2, R*.sub.3} is: { R 1 * , R 2 * , R 3 * } = arg min { R 1 , R 2 , R 3 } d ( X ¯ , X ˆ ) ( 1 ) uniformly quantizing a search space into m interval boundaries {B.sub.0, B.sub.1, . . . , B.sub.m}, wherein B.sub.0=−∞<B.sub.1=V.sub.s.sub.11< . . . <B.sub.m-1=V.sub.s.sub.01<B.sub.m=∞; and searching out the optimal thresholds {R*.sub.1, R*.sub.2, R*.sub.3} from {B.sub.1, B.sub.2, . . . , B.sub.m-1} through an exhaustive search method to minimize a Hamming distance between two outputs.

3. The method for optimizing a Polar-RNNA quantizer of MLC NAND flash memory based on deep learning according to claim 1, wherein Step 2 specifically comprises: obtaining the overlapping areas of two adjacent Gaussian distribution functions based on the MLC flash decoding curve; sensing the overlapping areas with preset high quantization precision and sensing other areas with preset low quantization precision, that is, setting a difference between adjacent read thresholds of the overlapping area to be less than a difference between adjacent read thresholds of non-overlapping areas, so that a width W exits between each threshold obtained by extension and an adjacent optimal threshold; and obtaining six extended read thresholds according to formula (2): { B 2 i - 1 * = R i * - W 2 i - 1 B 2 i * = R i * + W 2 i ( 2 ) Wherein, i=1, 2, 3, R*.sub.i ∈(B*.sub.2i-1, B*.sub.2i).

4. The method for optimizing a Polar-RNNA quantizer of MLC NAND flash memory based on deep learning according to claim 1, wherein Step S3 specifically comprises: determining seven corresponding quantization intervals according to the six extended read thresholds, wherein each memory cell of MLC flash stores two bits and has four voltage states correspondingly, a left bit is called a most significant bit and is denoted by MSB, and a right bit is called a least significant bits and is denoted by LSB; and constructing the LLR mapping table, and obtaining an LLR corresponding to each bit C of a storage symbol based on the LLR mapping table.

5. The method for optimizing a Polar-RNNA quantizer of MLC NAND flash memory based on deep learning according to claim 1, wherein Step S4 specifically comprises: defining f.sub.0({circumflex over (L)}) and f.sub.1({circumflex over (L)}) as probability density functions of LLRs, corresponding to c=0 and c=1 in the memory cells respectively; and reversing all LLR symbols of c=0, wherein a probability density of the LLRs after channel symmetrization is:
f.sub.s({circumflex over (L)})=½(f.sub.0(−{circumflex over (L)})+f.sub.1({circumflex over (L)}))  (3) defining a.sub.N.sup.(i) as a probability density function of the LLR of an i.sup.th sub-channel; then, calculating a.sub.N.sup.(i) of each sub-channel according to formulas a.sub.2N.sup.(2i-1)=a.sub.N.sup.(i) ⊙ a.sub.N.sup.(i), a.sub.2N.sup.(2i)=a.sub.N.sup.(i)*a.sub.N.sup.(i), a.sub.1.sup.(1)=f.sub.s ({circumflex over (L)}); calculating a code error probability of each sub-channel after a.sub.N.sup.(i) of each sub-channel is obtained; and P e ( i ) = lim ε .fwdarw. + 0 ( - - ε a N ( i ) d x + 1 2 - ε + ε a N ( i ) dx ) ( 4 ) adding K minimum P.sub.e.sup.(i) through a discretized density evolution method to obtain a block error rate formula P B = .Math. i A P e ( i ) of SC decoding, wherein A is an information bit set.

6. The method for optimizing a Polar-RNNA quantizer of MLC NAND flash memory based on deep learning according to claim 1, wherein Step S5 specifically comprises: obtaining an optimal set {W*.sub.1, W*.sub.2, . . . , W*.sub.6} through the genetic algorithm, wherein an objective function is P.sub.B; and { W 1 * , W 2 * , .Math. , W 6 * } = arg min { W 1 , W 2 , .Math. W 6 } P B ( 5 ) obtaining six optimal soft-decision read thresholds {B*.sub.1, B*.sub.2, . . . , B*.sub.6} according to the optimal set {W*.sub.1, W*.sub.2, . . . , W*.sub.6}, so that seven optimal quantization intervals for a Polar-code MLC flash channel are obtained.

Description

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

[0037] FIG. 1 is a flow diagram of a method according to the invention;

[0038] FIG. 2 is an architecture diagram of the RNN detector in one embodiment of the invention;

[0039] FIG. 3 is a schematic diagram of six soft-read thresholds designed according to three hard-decision read thresholds in one embodiment of the invention.

DETAILED DESCRIPTION OF THE INVENTION

[0040] The invention will be further expounded below in conjunction with the accompanying drawings and embodiments.

[0041] Referring to FIG. 1, the invention provides a method for optimizing a Polar-RNNA quantizer of MLC NAND flash based on deep learning, comprising the following steps:

[0042] Step S1: a read-back voltage of a k.sup.th memory cell of MLC flash is expressed by v.sub.k, v={v.sub.1, v.sub.2, . . . , v.sub.L} is input to a neural network, L is set as the number of neurons of an input layer, and the neural network outputs a soft estimation {tilde over (x)}={{tilde over (x)}.sub.1, {tilde over (x)}.sub.2, . . . , {tilde over (x)}.sub.L} of a tag x (storage symbol);

[0043] As for the MLC flash, a tag {0, 1, 2, 3} is used to express {11, 10, 00, 01}, so that a hard estimation {circumflex over (x)}.sub.k ∈{0, 1, 2, 3} of a k.sup.th memory cell x.sub.k ∈{0, 1, 2, 3} is obtained by acquiring integers {tilde over (x)}.sub.k most approximate to {tilde over (x)} output by the neural network; then, a corresponding memory cell symbol is obtained according to a mapping {0, 1, 2, 3}.fwdarw.{11, 10, 00, 01}, wherein FIG. 2 is an architecture diagram of an RNN detector, and Table 1 illustrates parameter selection of an RNN network;

TABLE-US-00001 TABLE 1 Number of training 3 × 10.sup.6 samples (symbols) Mini-batch size 100 Loss function MSE Initializer Xavier uniform Optimizer Adam

[0044] A set of read thresholds {R.sub.1, R.sub.2, R.sub.3} is set for a read-back voltage of {right arrow over (v)} a given set of memory cells to obtain a hard estimation of a memory cell symbol, which is denoted by x; {right arrow over (v)} is input to an RNN detector to obtain a hard estimation {circumflex over (x)} of the storage symbol based on the principle of proximity;

[0045] N RNN output sequences with a length L are set during the search process, and the i.sup.th output sequence is denoted by {circumflex over (x)}.sub.i, so that {circumflex over (X)}={{circumflex over (x)}.sub.1, {circumflex over (x)}.sub.2, . . . , {circumflex over (x)}.sub.N}, and X={x.sub.1, x.sub.2, . . . , x.sub.N};

[0046] Wherein, a formula for calculating optimal thresholds {R*.sub.1, R*.sub.2, R*.sub.3} is:

[00006] { R 1 * , R 2 * , R 3 * } = arg min { R 1 , R 2 , R 3 } d ( X ¯ , X ˆ ) ( 1 )

[0047] A search space is uniformly quantized into m interval boundaries {B.sub.0, B.sub.1, . . . , B.sub.m}, wherein B.sub.0=−∞<B.sub.1=V.sub.s.sub.11< . . . <B.sub.m-1=V.sub.s.sub.01<B.sub.m=∞;

[0048] Optimal thresholds {R*.sub.1, R*.sub.2, R*.sub.3} are searched out from {B.sub.1, B.sub.2, . . . , B.sub.m-1} through an exhaustive search method to minimize a Hamming distance between two outputs.

[0049] Step 2: six soft-decision read thresholds are obtained by extension based on the three hard-decision read thresholds.

[0050] In this embodiment, as shown in FIG. 3, an overlapping area of two adjacent Gaussian distribution functions is obtained according to an MLC flash decoding curve;

[0051] The overlapping area is sensed with preset high quantization precision and other areas are sensed with preset low quantization precision, that is, a difference between adjacent read thresholds of the overlapping area is less than a difference between adjacent read thresholds of non-overlapping areas, so that a width W exits between each extended threshold and an adjacent optimal threshold; and six extended read thresholds are obtained according to formula (2):

[00007] { B 2 i - 1 * = R i * - W 2 i - 1 B 2 i * = R i * + W 2 i ( 2 )

[0052] Wherein, i=1, 2, 3, R*.sub.i ∈(B*.sub.2i-1, B*.sub.2i).

[0053] Step S3: an LLR mapping table is constructed, and LLR soft information of the MLC flash is obtained based on the LLR mapping table;

[0054] Seven corresponding quantization intervals are determined according to the six extended read thresholds, wherein each memory cell of MLC flash stores two bits and has four voltage stages correspondingly, a left bit is called a most significant bit (MSB), and a right bit is called a least significant bits (LSB); and

[0055] The LLR mapping table is constructed, and an LLR ({circumflex over (L)}.sub.MSB and {circumflex over (L)}.sub.LSB) corresponding to each bit C of the storage symbol is obtained based on the LLR mapping table.

TABLE-US-00002 TABLE 2 Quantization intervals {circumflex over (L)}.sub.MSB {circumflex over (L)}.sub.LSB [B.sub.0*, B.sub.1*) −5 −1 [B.sub.1*, B.sub.2*) −3 0 [B.sub.2*, B.sub.3*) −1 1 [B.sub.3*, B.sub.4*) 0 3 [B.sub.4*, B.sub.5*) 1 1 [B.sub.5*, B.sub.6*) 3 0 [B.sub.6*, B.sub.7*) 5 −1

[0056] Step S4: the precondition of density evolution of polar codes is channel symmetrization, so the MLC flash channel is symmetrized, f.sub.0({circumflex over (L)}) and f.sub.1({circumflex over (L)}) are defined as probability density functions of LLRs, wherein f.sub.0({circumflex over (L)}) and f.sub.1({circumflex over (L)}) respectively correspond to c=0 and c=1 in the memory cells; and all LLR symbols of c=0 are reversed, wherein the probability density of LLR after channel symmetrization is:


f.sub.s({circumflex over (L)})=½(f.sub.0(−{circumflex over (L)})+f.sub.1({circumflex over (L)}))  (3)

[0057] a.sub.N.sup.(i) is defined as a probability density function of the LLR of an i.sup.th sub-channel;

[0058] Then, a.sub.N.sup.(i) of each sub-channel is calculated according to formulas a.sub.2N.sup.(2i-1)=a.sub.N.sup.(i) ⊙ a.sub.N.sup.(i), a.sub.2N.sup.(2i)=a.sub.N.sup.(i)*a.sub.N.sup.(i), a.sub.1.sup.(1)=f.sub.s ({circumflex over (L)}); a code error probability of each sub-channel is calculated after a.sub.N.sup.(i) of each sub-channel is obtained; and

[00008] P e ( i ) = lim ε .fwdarw. + 0 ( - - ε a N ( i ) d x + 1 2 - ε + ε a N ( i ) dx ) ( 4 )

[0059] K minimum P.sub.e.sup.(i) are added through a discretized density evolution method to obtain a block error rate formula

[00009] P B = .Math. i A P e ( i )

of SC coding, wherein A is an information bit set (K elements).

[0060] Step S5: an optimal set {W*.sub.1, W*.sub.2, . . . , W*.sub.6} is obtained through a genetic algorithm, wherein an objective function is P.sub.B

[00010] { W 1 * , W 2 * , .Math. , W 6 * } = arg min { W 1 , W 2 , .Math. W 6 } P B ( 5 )

[0061] Six optimal soft-decision read thresholds {B*.sub.1, B*.sub.2, . . . , B*.sub.6} are obtained according to the optimal set {W*.sub.1, W*.sub.2, . . . , W*.sub.6}, that is, seven optimal quantization intervals for a Polar-code MLC channel are obtained.

[0062] Those skilled in the art would appreciate that the embodiments of the application can be provided as a method, a system or a computer program product. So, the application may be implemented in the form of a completely hardware embodiment, a completely software embodiment, or an embodiment combining software and hardware. In addition, the application may be in the form of a computer program product to be implemented on one or more computer-available storage media (including, but not limited to, a disk memory, a CD-ROM, an optical memory, and the like) comprising computer-available program codes.

[0063] The application is described with reference to the flow diagram and/or block diagram of the method, device (system) and computer program product provided by the embodiments of the application. It should be understood that each process and/or block in the flow diagram and/or block diagram and the combinations of processes and/or blocks in the flow diagram and/or block diagram can be implemented by computer program instructions. These computer program instructions can be configured in a general-purpose computer, a special-purpose computer, an embedded processor, or a processor of other programmable data processing terminals to create a machine, so that the instructions can be executed by the computer or the processor of other programmable data processing terminals to create a device for realizing specific functions in one or more processes in the flow diagram and/or in one or more blocks in the block diagram.

[0064] These computer program instructions may also be stored in a computer-readable memory that can guide the computer or other program data processing terminals to work in a specific manner, so that the instructions stored in the computer-readable memory can create a product including an instruction device, and the instruction device implements specific functions in one or more processes of the flow diagram and/or one or more blocks in the block diagram.

[0065] These compute r program instructions may also be loaded on a computer or other programmable data processing terminal devices, so that the computer or other programmable terminal devices can perform a series of operation steps to carry out processing realized by the computer, and the instructions are executed on the computer or other programmable terminal devices to realize specific functions in one or more processes in the flow diagram and/or one or more block diagrams in the block diagram.

[0066] The above embodiments are merely preferred ones of the invention, and are not used to limit the invention in any form. Any skilled in the art can obtain other equivalent embodiments by changing or modifying the technical contents disclosed above. Any simple amendments and equivalent transformations and modifications made to the above embodiments according to the technical essence of the invention without departing from the contents of the technical solutions of the invention still fall within the protection scope of the technical solutions of the invention.