Archives

  • 2018-07
  • 2018-10
  • 2018-11
  • 2019-04
  • 2019-05
  • 2019-06
  • 2019-07
  • 2019-08
  • 2019-09
  • 2019-10
  • 2019-11
  • 2019-12
  • 2020-01
  • 2020-02
  • 2020-03
  • 2020-04
  • 2020-05
  • 2020-06
  • 2020-07
  • 2020-08
  • 2020-09
  • 2020-10
  • 2020-11
  • 2020-12
  • 2021-01
  • 2021-02
  • 2021-03
  • 2021-04
  • 2021-05
  • 2021-06
  • 2021-07
  • 2021-08
  • 2021-09
  • 2021-10
  • 2021-11
  • 2021-12
  • 2022-01
  • 2022-02
  • 2022-03
  • 2022-04
  • 2022-05
  • 2022-06
  • 2022-07
  • 2022-08
  • 2022-09
  • 2022-10
  • 2022-11
  • 2022-12
  • 2023-01
  • 2023-02
  • 2023-03
  • 2023-04
  • 2023-05
  • 2023-06
  • 2023-07
  • 2023-08
  • 2023-09
  • 2023-10
  • 2023-11
  • 2023-12
  • 2024-01
  • 2024-02
  • 2024-03
  • 2024-04
  • Error rates are obtained by simulation with the addition

    2020-08-03

    Error rates are obtained by simulation with the addition of the susceptibility evaluation elements of Fig. 4. Area results are obtained by synthesis, without the susceptibility evaluation elements. Preliminary error rates shall be acquired for a reference description with no mitigation. The evaluation process is carried out by comparing the error rates and respective area for different tolerant implementations based on the reference description.
    Susceptibility evaluation of the JPEG-LS descriptions A spreadsheet was used to guide the addressing of the event distribution along the different signals declared in the VHDL code, which were classified as: array, FIFO, line-buffer, combinatorial and sequential signals. The classification was used for the evaluation of the susceptibility related to each group of injection points. Even though there are many layers in combinatorial logic necessary to implement the Quinacrine hydrochloride hydrate australia algorithm, only the signals declared in the application description were exploited as target for SET injection. This is a limiting factor for the injection model accuracy (See discussion in Section 4.2). One-hot encoding was applied to the finite-state machine (FSM) and, in case of an illegal state (When Others), the process was forced to a default condition with a general reinitialization of variables. The data acquisition point for the detection of errors, caused by event injection, was placed at the Golomb/Run encoder output, as shown in the block diagram of Fig. 1. The Simplified JPEG-LS description of Ref. [19] was evaluated with a random test image, Rand 1 in Fig. 5, to increase and scatter the number of contexts. In the present study, the addition of the encoder to the JPEG-LS standard Reference description exposed the low compression rates associated with the Rand 1 image model. Therefore, in order to avoid FIFO 1 overflow, a smoother (strongly correlated) test image, Rand 2 in Fig. 5, was employed. The differences between the Simplified description [19] and the JPEG-LS standard Reference description, used in the present work, are listed in Table 1.
    Synthesis results for the reference and the tolerant JPEG-LS descriptions Synthesis evaluation was performed using the Synplify Pro E-2010.09A-1 tool. The results for the Reference description, in Table 7, indicated the Axcelerator\'s RAM size limitations, which would without a doubt impair the mitigation strategy. Table 7 includes the respective power estimate for the AX1000 (at a 50 MHz clock and a 3.3 V I/O voltage), whose consumption is higher than the ProASIC3′s one. The results for the Tolerant description are presented in Table 8. In comparison with Table 7, the rise in the number of logic cells was 27% for the ProASIC and 43% for the Axcelerator. The reason is that only the registers were protected by TMR and a significant part of the operations were implemented in combinatorial logic. Because of AX1000′s RAM limitation, the respective line-buffer was kept unprotected. Thus, the erate estimate in the first line of Table 5 rose significantly to 45%.