• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Mao Haiyu, Shu Jiwu. 3D Memristor Array Based Neural Network Processing in Memory Architecture[J]. Journal of Computer Research and Development, 2019, 56(6): 1149-1160. DOI: 10.7544/issn1000-1239.2019.20190099
Citation: Mao Haiyu, Shu Jiwu. 3D Memristor Array Based Neural Network Processing in Memory Architecture[J]. Journal of Computer Research and Development, 2019, 56(6): 1149-1160. DOI: 10.7544/issn1000-1239.2019.20190099

3D Memristor Array Based Neural Network Processing in Memory Architecture

Funds: This work was supported by the National Key Research and Development Program of China (2018YFB1003301) and the National Natural Science Foundation of China (61832011).
More Information
  • Published Date: May 31, 2019
  • Nowadays, due to the rapid development of artificial intelligence, the memristor-based processing in memory (PIM) architecture for neural network (NN) attracts a lot of researchers’ interests since it performs much better than traditional von Neumann architecture. Equipped with the peripheral circuit to support function units, memristor arrays can process a forward propagation with higher parallelism and much less data movement than that in CPU and GPU. However, the hardware of the memristor-based PIM suffers from the large area overhead of peripheral circuit outside the memristor array and non-trivial under-utilization of function units. This paper proposes a 3D memristor array based PIM architecture for NNs (FMC) by gathering the peripheral circuit of function units into a function pool for sharing among memristor arrays that pile up on the pool. We also propose a data mapping scheme for the 3D memristor array based PIM architecture to further increase the utilization of function units and reduce the data transmission among different cubes. The software-hardware co-design for the 3D memristor array based PIM not only makes the most of function units but also shortens the wire interconnections for better high-performance and energy-efficient data transmission. Experiments show that when training a single neural network, our proposed FMC can achieve up to 43.33 times utilization of the function units and can achieve up to 58.51 times utilization of the function units when training multiple neural networks. At the same time, compared with the 2D-PIM which has the same amount of compute array and storage array, FMC only occupies 42.89% area of 2D-PIM. What’s more, FMC has 1.5 times speedup and 1.7 times energy saving compared with 2D-PIM.
  • Related Articles

    [1]Su Ning, Guo Junxia, Li Zheng, Zhao Ruilian. EFSM Amorphous Slicing Based Test Case Generation[J]. Journal of Computer Research and Development, 2017, 54(3): 669-680. DOI: 10.7544/issn1000-1239.2017.20151053
    [2]You Feng, Zhao Ruilian, Lü Shanshan. Output Domain Based Automatic Test Case Generation[J]. Journal of Computer Research and Development, 2016, 53(3): 541-549. DOI: 10.7544/issn1000-1239.2016.20148045
    [3]Liu Tieqiao, Kuang Jishun, Cai Shuo, You Zhiqiang. A New Method of Embedding Test Patterns into Test-per-Clock Bit Stream[J]. Journal of Computer Research and Development, 2014, 51(9): 2022-2029. DOI: 10.7544/issn1000-1239.2014.20130179
    [4]Chen Donghuo, Liu Quan. Generation of Test Cases Based on Symbolic Execution and LTL Formula Rewriting[J]. Journal of Computer Research and Development, 2013, 50(12): 2661-2675.
    [5]He Yanxiang, Chen Yong, Wu Wei, Xu Chao, and Wu Libing. Automatically Generating Error-Traceable Test Cases Based on Compiler[J]. Journal of Computer Research and Development, 2012, 49(9): 1843-1851.
    [6]Yan Jun, Guo Tao, Ruan Hui, Xuan Jifeng. JUTA: An Automated Unit Testing Framework for Java[J]. Journal of Computer Research and Development, 2010, 47(10): 1840-1848.
    [7]Zhang Min, Feng Dengguo, and Chen Chi. A Security Function Test Suite Generation Method Based on Security Policy Model[J]. Journal of Computer Research and Development, 2009, 46(10): 1686-1692.
    [8]Tao Qiuming, Zhao Chen, Wang Yongji. An Automated Method of Test Program Generation for Compiler Optimizations Based on Process Graph[J]. Journal of Computer Research and Development, 2009, 46(9): 1567-1577.
    [9]Chen Jinfu, Lu Yansheng, and Xie Xiaodong. A Fault Injection Model of Component Security Testing[J]. Journal of Computer Research and Development, 2009, 46(7): 1127-1135.
    [10]Yuan Jiesong, Wang Linzhang, Li Xuandong, and Zheng Guoliang. UMLTGF: A Tool for Generating Test Cases from UML Activity Diagrams Based on Grey-Box Method[J]. Journal of Computer Research and Development, 2006, 43(1): 46-53.

Catalog

    Article views (1573) PDF downloads (760) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return