RRAM-BASED NEURO-INSPIRED COMPUTING FOR UNSUPERVISED TEMPORAL - - PowerPoint PPT Presentation

rram based neuro inspired computing for unsupervised
SMART_READER_LITE
LIVE PREVIEW

RRAM-BASED NEURO-INSPIRED COMPUTING FOR UNSUPERVISED TEMPORAL - - PowerPoint PPT Presentation

RRAM-BASED NEURO-INSPIRED COMPUTING FOR UNSUPERVISED TEMPORAL PREDICTIONS R. DEGRAEVE, D. RODOPOULOS, A. FANTINI, D. GARBIN, D. LINTEN, P. RAGHAVAN STRICTLY CONFIDENTIAL OUTLINE & PURPOSE Purpose Show a learning algorithm that exploits the


slide-1
SLIDE 1

STRICTLY CONFIDENTIAL

RRAM-BASED NEURO-INSPIRED COMPUTING FOR UNSUPERVISED TEMPORAL PREDICTIONS

  • R. DEGRAEVE, D. RODOPOULOS, A. FANTINI, D. GARBIN, D. LINTEN, P. RAGHAVAN
slide-2
SLIDE 2

STRICTLY CONFIDENTIAL

OUTLINE & PURPOSE

Resistive RAM properties Algorithm Discussion and analysis Conclusions

2

Purpose Show a learning algorithm that exploits the physical properties of RRAM as true imitation of synaptic connections

slide-3
SLIDE 3

STRICTLY CONFIDENTIAL

O-VACANCY RRAM = TUNABLE CONDUCTIVE FILAMENT

Broad distribution at both low and high resistive state Stochastic behavior after program, after read and as a function of time Extremely unsuited as a stable ‘weight’ element

3

BUT STOCHASTIC BEHAVIOR MAKES IT AN UNRELIABLE STORAGE ELEMENT

BE TE BE TE

slide-4
SLIDE 4

STRICTLY CONFIDENTIAL

TRUE RRAM PROPERTY = STABLE MEAN BEHAVIOR

Switch from high to low resistance = abrupt due to positive feedback effect Repeated stimuli result in stable mean filament growth BUT = read-out remains wide distribution & stochastic

4

PHYSICS = STABLE NUMBER OF VACANCIES IN FILAMENT CONSTRICTION

BE TE

slide-5
SLIDE 5

STRICTLY CONFIDENTIAL

WHAT ALGORITHM TAKES BEST ADVANTAGE OF RRAM PROPERTIES?

STEP 1: open the new frame to all contexts

5

CONTINUOUS LEARNING OF TEMPORAL DATA

00000100...000 One-hot encoded Frame Wi

00000100...000 00000100...000 00000100...000

Duplication for 3 contexts = (WW)i

Step (i)

T emporal data =frames/time unit One-hot encoded frames T emporal context from history Store sequence and context as a 2-dimensional pattern in a RRAM array Algorithm example

slide-6
SLIDE 6

STRICTLY CONFIDENTIAL

STEP 2: CHECK PREVIOUSLY SEEN SEQUENCE STEPS

Read possible existing connections between new state and previous state Parallel reading Simply checking whether current > threshold

6

RRAM ARRAY IN READ MODE @ LOW VOLTAGE

RRAM array

Vsel=VG,CC Vsel=VG,CC Vsel=VG,CC 01000000...000 01000000...000 01000000...000 Vread. 00000000...000 00000000...000 00000100...000 (WW)i-1  (WW)i

Step (ii) read mode

Vsel=select voltage VG,CC =gate V for given current compliance

slide-7
SLIDE 7

STRICTLY CONFIDENTIAL

STEP 3: FIND EXISTING CONNECTIONS

Existing connection is detected in same context Existing connection is detected in a different context No connection exists yet

7

AIM= EACH CONNECTION IS PROGRAMMED ONLY ONCE

slide-8
SLIDE 8

STRICTLY CONFIDENTIAL

STEP 4 : PROGRAMMING SEQUENCE AS RRAM CONNECTION

New input is restricted to the selected column Programming step

Either makes a new connection between previous and new state Either confirms an existing connection and strengthens it

Current is limited by driving transistor

8

PROGRAM VOLTAGE AND PULSE LENGTH ARE ALWAYS THE SAME

Vprogram = 1.5V for t=100ns

slide-9
SLIDE 9

STRICTLY CONFIDENTIAL

STEP 5: SHIFT OPERATION

Each step in the time sequence adds 1 connection or strengthens an existing one Time sequence is casted into the RRAM array as a 2D pattern

9

SYSTEM IS READY FOR NEXT INPUT

Sequence of abstract data= A-F-R-S-D-E-A-X-B  2D- pattern of connections

slide-10
SLIDE 10

STRICTLY CONFIDENTIAL

PREDICTING DATA =READING STEP

Predicting next data frame Read all possible connections starting from the context-sensitive last known frame = union of predictions Current levels has statistical meaning identifying most likely prediction

10

DATA CAN BE PREDICTED BY READING WITH ALL COLUMNS SELECTED

RRAM array

Vsel=VG,CC Vread. 00000000...000 00000000...000 00000100...000 (WW)i-1

 (PP)i collapse to (P)i  = union of predictions

READ output current

000000100000100000000000010010000000

slide-11
SLIDE 11

STRICTLY CONFIDENTIAL

FLOW CHART ALGORITHM

See my poster stand for details and discussion

11

FOR CONTINUOUS UNSUPERVISED LEARNING

(W)i Read mode Vread*(WW)i-1 is applied to input VG,CC*(WW)i is applied to selector lines V=0 is applied to output lines Replication of (W)i to (WW)i

ii+1

Locally stored 1-bit (WW)i-1 Program mode Vprogram*(WW)i-1 is applied to input VG,CC*(WW)i is applied to selector lines V=0 is applied to output lines (WW)i is reduced to 1 ON bit content Winning column ?  Iread > Ithreshold Random choice from selection

yes no

Expand (W)i-1 new (WW)i-1 Read (output) Vread*(WW)i-1 is applied to input VG,CC*(WW)i is applied to selector lines V=0 is applied to output lines Winning column ?  Iread > Ithreshold

yes no

slide-12
SLIDE 12

STRICTLY CONFIDENTIAL

HARDWARE PROOF ON RRAMTEST CHIP

Technology with capped 5 nm HfO or TaO layer and TiN electrode Crossbar test structures Simple example of algorithm and measured corresponding conductance

12

SIMPLE VERSION OF ALGORITHM DEMONSTRATES FEASIBILITY

slide-13
SLIDE 13

STRICTLY CONFIDENTIAL

SIMULATED CONTROL EXAMPLES SHOW OPERATION

Periodic function is translated as loop of connections Two periodic functions = 2 loops with weaker interconnects Noisy function adds several unwanted connections

13

slide-14
SLIDE 14

STRICTLY CONFIDENTIAL

SUPPRESSION OF INFREQUENT CONNECTIONS BY READ DISTURB

Over-programming avoided by using read disturb mechanism as forget mechanism Vread = -0.5 V  causes a small (non-abrupt) reset to high resistive state

14

SOLUTION FOR COPING WITH NOISE IN DATA

Read during predict weakens connections Only the trained connection is confirmed again

slide-15
SLIDE 15

STRICTLY CONFIDENTIAL

HIERARCHICAL STRUCTURE FOR MORE COMPLEX BEHAVIOR

At each decision point in level 1, we address level 2 both read and program Level 1 = organization of states in temporal groups Level 2 = organization of temporal groups in larger groups

15

TIME SEQUENCES ARE DIVIDED OVER SHORT AND LONGER TERM STRUCTURE

slide-16
SLIDE 16

STRICTLY CONFIDENTIAL

CONTROL ILLUSTRATES OPERATION AND EFFECTIVENESS

Symmetric saw tooth has each point in two contexts

Indistinguishable with connection strength Hierarchical approach is effective

16

slide-17
SLIDE 17

STRICTLY CONFIDENTIAL

SUMMARY & CONCLUSIONS

Find a way to exploit filamentary RRAM properties in a learning algorithm Our answer

Continuous unsupervised learning Temporal data Hardware implementable Filamentary RRAM used as stochastic memory technology Read and program are at constant voltage and time Read disturb as forget mechanism

Sequence of data is stored as a structured 2D network of hardwired connections with statistical properties

17