Soft-error hierarchical evaluation algorithm of fault vulnerabilities based on sensitive attributes of single event effect

Xiang Gao, Guochang Zhou, Xiaoling Lai, Ting Ju, Qi Zhu, Yangming Guo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

To mitigate the soft-error effects for designing digital signal processing systems, a hierarchical evaluation algorithm is proposed in this paper, which is used to estimate the latent fault vulnerabilities based on the analysis of soft-error sensitive attributes. In this algorithm, the evaluated scales of sensitive attributes are devised for soft-error vulnerability factors of function modules. And then the vulnerable evaluation model of hierarchical intervals is conceived to calculate the confidence of function modules based on the gray system. Finally, the simulation results prove this model effective so as to guide soft-error protection design of digital signal processing systems.

Original languageEnglish
Title of host publication2015 IEEE 12th International Conference on Electronic Measurement and Instruments, ICEMI 2015
EditorsCui Jianping, Wu Juan
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages212-217
Number of pages6
ISBN (Electronic)9781479976195
DOIs
StatePublished - 16 Jun 2016
Event12th IEEE International Conference on Electronic Measurement and Instruments, ICEMI 2015 - Qingdao, China
Duration: 16 Jul 201518 Jul 2015

Publication series

Name2015 IEEE 12th International Conference on Electronic Measurement and Instruments, ICEMI 2015
Volume1

Conference

Conference12th IEEE International Conference on Electronic Measurement and Instruments, ICEMI 2015
Country/TerritoryChina
CityQingdao
Period16/07/1518/07/15

Keywords

  • Fault vulnerabilities
  • Sensitive attributes
  • Single event effect
  • Soft error

Fingerprint

Dive into the research topics of 'Soft-error hierarchical evaluation algorithm of fault vulnerabilities based on sensitive attributes of single event effect'. Together they form a unique fingerprint.

Cite this