arya mazumdar
play

Arya Mazumdar Joint work with Alexander Barg , University of - PowerPoint PPT Presentation

Codes on Permutations: Rank Modulation Arya Mazumdar Joint work with Alexander Barg , University of Maryland- College Park Flash memory Array of Floating Gate Memory Cells. In abundant use for short-term storage and limited number of


  1. Codes on Permutations: Rank Modulation Arya Mazumdar Joint work with Alexander Barg , University of Maryland- College Park

  2. Flash memory • Array of Floating Gate Memory Cells. • In abundant use for short-term storage and limited number of writes. • Can they be used as caches? • What is the best model for the errors in Flash memory? • How to increase the longevity of the flash devices? A USB Flash Drive. The • What will be the architecture of a high- chip on the left is the flash performance error-resilient Flash controller? memory. The controller is on the right (Wikipedia).

  3. Reliability of data in Flash memory and rank modulation scheme Drift of charge from cells: Reliability of data stored. q q-1 . . . . . . 3 2 1 1 2 3 4 . . n Information is written in blocks of n cells with q charge levels in each cells.

  4. Memory Cells q q-1 . . . . . . 3 2 1 1 2 3 4 . . n • Conventional q-ary codes can be used for protection of data. • The error process is non-conventional!

  5. Error caused by drift of charge q q-1 . . . . . . 3 2 1 1 2 3 4 . . n • Due to charge leakage, after some time (aging of device) all cells will contain erroneous values. • Moreover the rate of leakage in different cells may vary. • Error correction schemes designed for q-ary writing will FAIL.

  6. Storing data in Flash memory 1 2 3 4 5 6 7 4 6 7 1 5 3 2 • Rank Modulation Scheme (ISIT’08 Jiang/Schwartz/ Bruck). • Store information as the relative values of the charge levels. • σ = (4, 7, 6, 1, 5, 2, 3) • Levels can take continuous values.

  7. Storing data in Flash memory 1 2 3 4 5 6 7 1 5 3 4 6 7 2

  8. Storing data in Flash memory 1 2 3 4 5 6 7 4 6 7 2 5 3 1

  9. Codes in permutations • S n = Group of permutations on n symbols • Vector representation:  = (  (1),  (2), …  (n),) • Identity: (1, 2, 3, … ,n) • Multiplication: Composition (1, 3, 2, 4)(2, 4, 1, 3)=(2, 1, 4, 3) • Inverse: (3, 4, 2, 1)(4, 3, 1, 2) = (1, 2, 3, 4) • Transposition: (1,3, 5, 4, 6, 2)  (1, 3, 5, 2, 6, 4)

  10. Codes in permutations

  11. Codes in permutations with Kendall metric

  12. Rank modulation codes

  13. Coding for the Kendall distance

  14. Coding for the Kendall distance

  15. Bounds on the size of codes

  16. Capacity of rank modulation Scheme

  17. To prove: basic arguments

  18. To prove: basics of permutation  2 1 6 4 3 7 5 9 8 x σ 0 1 0 1 2 0 2 0 1

  19. Direct attempt to find the volume of the sphere

  20. Direct attempt to find the volume of the sphere

  21. Direct attempt to find the volume of the sphere

  22. Isometric embeddings

  23. Isometric embeddings

  24. Codes that correct t-errors

  25. Existence of good codes: proof idea

  26. Existence of good codes: proof idea

  27. Existence of good codes: main tool

  28. Existence of good codes: final step

  29. Explicit constructions Permutation Polynomials: Polynomials that give bijective maps from a finite Construction from good codes of the field to itself. Hamming space: We find a distance Main Idea: Evaluations of permutation preserving Gray Map (and its polynomials of bounded degree forms a variations) for the space of inversion subset of Reed-Solomon code. vectors and the Hamming space of Problem 1: Identifying permutation comparable size. polynomials calls for extensive search. Consider special classes, such as, Remember we seek an additive error Linearized polynomials, Dickson correcting code in the space of polynomials, monomials. inversion vectors. Problem 2: Connecting Kendall Distance with Hamming distance is We obtain family of ‘good’ codes, difficult. We use certain accumulator- efficiently encodable and decodable , that corrects up to O(n 1+ ε ) number of type transformation that does the job for small distances. errors, for 0≤ε≤ 1.

  30. To summarize:

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend