SEUs Mitigation on Program Counter of the LEON3 Soft Processor
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 7
Abstract
Analyzing and evaluating the sensitivity of embedded systems to soft-errors have always been a challenge for aerospace or safety equipment designer. Different automated fault-injection methods have been developed for evaluating the sensitivity of integrated circuit. Also many techniques have been developed to get a fault tolerant architecture in order to mask and mitigate fault injection in a circuit. Fault injection mitigation and repair techniques are applied together on LEON3 processor in goal to study the reliability of a soft-core. The so-called NETlist Fault Injection (NETFI+) tool is a fault injection techniques used in this paper. The prediction of Single Event Upset (SEU) error-rates between radiation ground testing and FPGA implementation have been done with good and accurate result. But no functional simulations have been performed. A Triple Modular Redundancy (TMR) is used in this paper as a repair technique versus fault injection. This paper analyses the effectiveness of fault tolerant method on LEON3 soft-core running a benchmark. It starts by evaluating the behavior of LEON3’s program counter against Single Event Upset error-rate accuracy between the functional simulation and the FPGA emulation and an analysis of the LEON3 reliability in presence of fault tolerant technique. The objective is to offer, through the new version of NETFI+ with introducing a fault tolerant technique, the possibility to designers to evaluate the benefits of SEUs mitigation for the LEON3 processor on the program counter.
Authors and Affiliations
Afef KCHAOU, Wajih EL HADJ YOUSSEF, Rached TOURKI
Robust Image Watermarking using Fractional Sinc Transformation
The increased utilization of internet in sharing and dissemination of digital data makes it is very difficult to maintain copyright and ownership of data. Digital watermarking offers a method for authentication and copyr...
Method for Thermal Pain Level Prediction with Eye Motion using SVM
Method for thermal pain level prediction with eye motion using SVM is proposed. Through experiments, it is found that thermal pain level is much sensitive to the change rate of pupil size rather than pupil size itself. A...
Development of Purchasing Module for Agriculture E-Commerce using Dynamic System Development Model
Trading model has been changing since the vast implementation of Information and Communication Technology in every sector. This model is known as e-Commerce. Unlikely, there is still limited company which specifically tr...
Albanian Sign Language (AlbSL) Number Recognition from Both Hand’s Gestures Acquired by Kinect Sensors
Albanian Sign Language (AlbSL) is relatively new and until now there doesn’t exist a system that is able to recognize Albanian signs by using natural user interfaces (NUI). The aim of this paper is to present a real-time...
Stemmer Impact on Quranic Mobile Information Retrieval Performance
Stemming algorithms are employed in information retrieval (IR) to reduce verity variants of the same word with several endings to a standard stem. Stemmers can also help IR systems by unifying vocabulary, reducing term v...