Asymmetric LOCO Codes: Constrained Codes for Flash Memories

2019-09-01
Hareedy, Ahmed
Calderbank, Robert
© 2019 IEEE.In data storage and data transmission, certain patterns are more likely to be subject to error when written (transmitted) onto the media. In magnetic recording systems with binary data and bipolar non-return-to-zero signaling, patterns that have insufficient separation between consecutive transitions exacerbate inter-symbol interference. Constrained codes are used to eliminate such error-prone patterns. A recent example is a new family of capacity-achieving constrained codes, named lexicographically-ordered constrained codes (LOCO codes). LOCO codes are symmetric, that is, the set of forbidden patterns is closed under taking pattern complements. LOCO codes are suboptimal in terms of rate when used in Flash devices where block erasure is employed since the complement of an error-prone pattern is not detrimental in these devices. This paper introduces asymmetric LOCO codes (A-LOCO codes), which are lexicographically-ordered constrained codes that forbid only those patterns that are detrimental for Flash performance. A-LOCO codes are also capacity-achieving, and at finite-lengths, they offer higher rates than the available state-of-the-art constrained codes designed for the same goal. The mapping-demapping between the index and the codeword in A-LOCO codes allows low-complexity encoding and decoding algorithms that are simpler than their LOCO counterparts.
57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019

Suggestions

Power Spectra of Constrained Codes with Level-Based Signaling: Overcoming Finite-Length Challenges
Centers, Jessica; Tan, Xinyu; Hareedy, Ahmed; Calderbank, Robert (2021-08-01)
In various practical systems, certain data patterns are prone to errors if written or transmitted. In magnetic recording and communication over transmission lines, data patterns causing consecutive transitions that are not sufficiently separated are prone to errors. In Flash memory with two levels per cell, data patterns causing high-low-high charge levels on adjacent cells are prone to errors. Constrained codes are used to eliminate error-prone patterns, and they can also achieve other goals. Recently, we ...
Dual sided high frequency measurement of microelectronic packages
Christ, Sean R.; Durgun, Ahmet Cemal; Aygun, Kemal; Hill, Michael J. (2020-10-01)
© 2020 IEEE.Traditionally, validation of simulation data of microelectronic packages has been done by high frequency measurement of coplanar transmission line structures. Although this metrology has matured over the years, it is not directly applicable to product packages since they also include vertical interconnects. To address this issue, we developed a dual-sided measurement metrology, by utilizing a special fixture design and employing short-open-load-reciprocal calibration to maintain measurement stab...
Smart water chain: Immutable, distributed and decentralized water transaction ledgers
Satilmisoglu, Talat Kemal; Keskin, Huzur (2023-01-01)
Blockchain is a transactional data storage system where data can be stored reliably without the need for a central database or trusted authority. The data can be anything like financial transactions, supply chain processes or medical records. It is similar to a classical database but uses a decentralized ledger and allowing each participant in the network to have their own copy of the ledger and be able to see all transactions. Data stored in the distributed ledger can only be read or written, not deleted o...
Uncertainty in a nested relational database model
Yazıcı, Adnan; Buckles, BP; Petry, FE (1999-07-01)
Some database models have already been developed to deal with complex values but they have constrains that data stored is precise and queries are crisp. However, as many researchers have pointed out, there is a need to present, manipulate, and query complex and uncertain data of various non-traditional database applications such as oceanography, multimedia, meteorology, office automation systems, engineering designs, expert database systems and geographic information systems. In this paper, we present a log...
BIG DATA FOR INDUSTRY 4.0: A CONCEPTUAL FRAMEWORK
Gökalp, Mert Onuralp; Kayabay, Kerem; Eren, Pekin Erhan; Koçyiğit, Altan (2016-12-17)
Exponential growth in data volume originating from Internet of Things sources and information services drives the industry to develop new models and distributed tools to handle big data. In order to achieve strategic advantages, effective use of these tools and integrating results to their business processes are critical for enterprises. While there is an abundance of tools available in the market, they are underutilized by organizations due to their complexities. Deployment and usage of big data analysis t...
Citation Formats
A. Hareedy and R. Calderbank, “Asymmetric LOCO Codes: Constrained Codes for Flash Memories,” presented at the 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019, Illinois, Amerika Birleşik Devletleri, 2019, Accessed: 00, 2022. [Online]. Available: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85077789792&origin=inward.