Error Protection Techniques Sample Clauses

Error Protection Techniques. As it has been already mentioned, a set of different error protection techniques is implemented on the DRM to provide fault-tolerant features. These techniques can be classified in two general types: those techniques oriented to mitigate or restrict the effect of potential errors and those ones which enable it to detect and correct them. Regarding the first type, two techniques are considered: Mitigation technique #1: Xilinx Isolation Design Flow Xilinx Isolation Design Flow (IDF) is a design technique defined by the FPGA manufacturer Xilinx [4], which allows for fault-containment at a FPGA module level. It makes use of the standard Xilinx design tools and requires attention to the design layout by respecting strict set of rules. The objective of this technique is to isolate the impact of single failures to a specific module reducing drastically their effect on the system. IDF consists of first partitioning the design in different hierarchical modules and afterwards add the design layout and routing constraints so that each partition is restricted to a closed area of the device, isolated from the rest of the design by a fence of unused logic resources. Mitigation technique #2: WatchDog timer for Microblaze processor As it has been mentioned in the previous chapter, a watchdog timer peripheral has been included in the DRM in order to restart the processor if it crashes. Additionally, three protection mechanisms are proposed to detect and correct errors: Detection and Correction technique #1: memory scrubbing or configuration management The focus of this technique is the prevention of SEU accumulation in the FPGA configuration memory. Since our goal is to design and develop a self-managed FPGA and having into account that the Virtex- 5QV FPGA has an extremely low upset rate in configuration bits of 5 events per year (see reference [5]), an internal memory scrubber scheme will be implemented. Configuration memory scrubbing consists in re-writing the FPGA configuration memory while the design is actively running. This is different from a full device reconfiguration, which implies deleting the configuration memory before reloading the full bit stream. Configuration memory scrubbing is based on active partial reconfiguration of the desired configuration frames. Since the internal configuration management solution makes use of the internal ICAP port, and since the design does include an embedded processor core accessing the ICAP port to control the reconfiguratio...
AutoNDA by SimpleDocs

Related to Error Protection Techniques

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • Whistleblower Protections The Party shall not discriminate or retaliate against one of its employees or agents for disclosing information concerning a violation of law, fraud, waste, abuse of authority or acts threatening health or safety, including but not limited to allegations concerning the False Claims Act. Further, the Party shall not require such employees or agents to forego monetary awards as a result of such disclosures, nor should they be required to report misconduct to the Party or its agents prior to reporting to any governmental entity and/or the public.

  • ENVIRONMENT, SAFETY AND HEALTH PROTECTION (a) Seller shall perform this Agreement in a manner that ensures adequate protection for workers, the public, and the environment, and shall be accountable for actions of itself and its lower-tier subcontractors, agents and employees. Seller shall exercise a degree of care commensurate with the work and the associated hazards. Seller shall ensure that management of environment, safety and health (ES&H) functions and activities is an integral and visible part of Seller’s work planning and execution process. In the event that Xxxxxx fails to comply with this Agreement, Company may, without prejudice to any other legal or contractual rights, issue an order stopping all or any part of the work; thereafter a start order for resumption of work may be issued at Company’s discretion. Seller shall make no claim for an extension of time or for compensation or damages by reason of or in connection with such work stoppage. In addition, Company may require, in writing, that Seller remove from the work any employee the Company deems unsafe, incompetent, careless, or otherwise objectionable.

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • TEACHER PROTECTION Section A: Working Conditions Paragraph 1: The Board agrees to str ive continually to provide working condi- tions which meet federal, state and local laws and regulations.

  • Trafficking Victims Protection Act of 2000 Subrecipient hereby acknowledges and agrees that it must comply with the requirements of the government-wide award term which implements Section 106(g) of the Trafficking Victims Protection Act (TVPA) of 2000, as amended (22 U.S.C. 7104). The award term is located at 2 C.F.R. Part 175.15, the full text of which is incorporated here by reference.

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.

Time is Money Join Law Insider Premium to draft better contracts faster.