Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240800094-6.doi: 10.11896/jsjkx.240800094

• Information Security • Previous Articles     Next Articles

Circuit Module Reliability Calculation Method for Multi-target Tracking

JIN Jiaobo1, ZHU Tiantian1,2   

  1. 1 College of Computer Science and Technology,Zhejiang University of Technology,Hangzhou 310023,China
    2 Taizhou Research Institute of Zhejiang University of Technology,Taizhou,Zhejiang 318001,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:JIN Jiaobo,born in 1998,postgraduate,is a member of CCF(No.V0339G). His main research interests include cybersecurity and system security.
    ZHU Tiantian,born in 1992,Ph.D,is a member of CCF(No.E9851M). His main research interests include cybersecurity and system security.
  • Supported by:
    Young Scientists Fund of the National Natural Science Foundation of China(62002324) and Fundamental Research Funds for the Provincial Universities of Zhejiang(RF-A2023009).

Abstract: In the process of circuit reliability calculation,effectively tracking multiple target trajectories is one of the key measures for the targeted implementation of high-reliability circuit design. This paper selects the PTM method,which has been effectively validated in the accurate assessment of circuit reliability,as the modeling tool for multi-target tracking to ensure the precision of the calculations. The structure of the circuit and the computational principles of the PTM method are analyzed,and considering the faults in input signals,a hybrid encoding mechanism combining binary and decimal codes is proposed to implement the calculation strategy for multi-target trajectory tracking. This method can compute the reliability from the original input to any location within the circuit,and analyze the sensitive elements within the circuit during the calculation process,with the computational complexity being linearly related to the number of gates. Experimental results on benchmark circuits validate the effectiveness of the proposed method,and the sensitivity of the calculation results to various tracking targets is also analyzed and compared.

Key words: Hybrid encoding, Multi-target tracking, PTM method, Circuit reliability, Sensitivity

CLC Number: 

  • TN402
[1]REIS R,WIRTH G,CAO Y. Circuit design for reliability [M]. CRC Press,2015.
[2]RUBINSTEIN R Y,KROESE D P. Simulation and the Monte Carlo Method(Third Edition)[M].Wiley,2016.
[3]CHOUDHURY M R,MOHANRAM K. Reliability analysis of logic circuits[C]//Proceedings of the IEEE Transactions on Computer-Aided Design of Integrated Circuitsand Systems.2009.
[4]ROHANIPOOR M R,GHAVAMI B,RAJI M. Improving Com-binational Circuit Reliability against Multiple Event Transients via a Partition and Restructuring Approach [J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2020,39(5):1059-1072.
[5]GE H,ASGARPOOR S. Parallel Monte Carlo simulation for reliability and cost evaluation of equipment and systems [J]. Electric Power Systems Research,2011,81(2):347-356.
[6]WANG Z,ZHANG G,LIU P,et al. Accurate Reliability Boun-dary Evaluation of Approximate Arithmetic Circuit [J]. IEEE Transactions on Very Large Scale Integration(VLSI) Systems,2022,30(10):1507-1518.
[7]XIAO J,JIANG J H,ZHU X G. A circuit reliability evaluation method based on iterative PTM model[J]. Chinses Journal of Computers,2014,37(7):1508-1520.
[8]OUYANG C T,JIANG J H,YUAN Y. Reliability Estimation Method of Sequential Circuits Based on Probability Transfer Matrix [J]. Acta Electronica Sinica,2013,41(1):171-181.
[9]ZANDEVAKILI H,MAHANI A,SANEEI M. An accurate and fast reliability analysis method for combinational circuits [J]. COMPEL-The International Journal for Computation and Mathe-matics in Electrical and Electronic Engineering,2015,34(3):979-995.
[10]WANG T,JIANG J,WANG Z. Reliability estimation of ap-proximate circuits based on probabilistic gate model[C]//Poceedings of the Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing(PRDC).2019 .
[11]REJIMON T,LINGASUBRAMANIAN K,BHANJA S. Probabilistic error modeling for nano-domain logic circuits [J]. IEEE Transactions on Very Large Scale Integration(VLSI) Systems,2009,17(1):55-65.
[12]HAN J,CHEN H,LIANG J,et al. A stochastic computational approach for accurate and efficient reliability evaluation [J]. IEEE Transactions on Computers,2014,63(6):1336-1350.
[13]XIAO J,LOU J,JIANG J. A fast and effective sensitivity calculation method for circuit input vectors [J]. IEEE Transactions on Reliability,2019,68(3):938-953.
[14]IBRAHIM W. Identifying the Worst Reliability Input Vectors and the Associated Critical Logic Gates [J]. IEEE Transactions on Computers,2016,65(6):1748-1860.
[15]XIAO J,SHI Z,YANG X,et al. BM-RCGL:Benchmarking Approach for Localization of Reliability-Critical Gates in Combinational Logic Blocks [J]. IEEE Transactions on Computers,2022,71(5):1063-1076.
[1] YIN Shiyu, ZHU Youwen, ZHANG Yue. Utility-optimized Local Differential Privacy Joint Distribution Estimation Mechanisms [J]. Computer Science, 2023, 50(10): 315-326.
[2] SHEN Xiang-pei, DING Yan-rui. Multi-detector Fusion-based Depth Correlation Filtering Video Multi-target Tracking Algorithm [J]. Computer Science, 2022, 49(8): 184-190.
[3] ZHANG Tian-rui, WEI Ming-qi, GAO Xiu-xiu. Prediction Model of Bubble Dissolution Time in Selective Laser Sintering Based on IPSO-WRF [J]. Computer Science, 2021, 48(11A): 638-643.
[4] GONG Xuan, LE Zi-chun, WNAG Hui, WU Yu-kun. Survey of Data Association Technology in Multi-target Tracking [J]. Computer Science, 2020, 47(10): 136-144.
[5] HU Hai-gen, ZHOU Li-li, ZHOU Qian-wei, CHEN Sheng-yong, ZHANG Jun-kang. Multi-target Tracking of Cancer Cells under Phase Contrast Microscopic Images Based
on Convolutional Neural Network
[J]. Computer Science, 2019, 46(5): 279-285.
[6] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction [J]. Computer Science, 2018, 45(4): 89-93.
[7] YANG Yue-ping, WANG Jian and XUE Ming-fu. Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value [J]. Computer Science, 2017, 44(9): 156-161.
[8] DAI Jia-zhu and HUA Liang. Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks [J]. Computer Science, 2016, 43(3): 137-144.
[9] CHEN Jin-guang, QIN Xiao-shan and MA Li-li. Fast GM-PHD Filter for Multi-target Tracking [J]. Computer Science, 2016, 43(3): 317-321.
[10] LUO Min-xia and CHENG Ze. Robustness of Interval-valued Triple I Algorithms [J]. Computer Science, 2016, 43(10): 277-281.
[11] ZHANG Xue-ming, HUANG Zhi-qiu and SUN Yi. Research on Privacy Access Control Based on RBAC [J]. Computer Science, 2016, 43(1): 166-171.
[12] JIANG Yu-fang and DENG Zuo-xiang. Comparison of Circuit Reliability Calculation Methods Based on PTM Model and BN Model [J]. Computer Science, 2015, 42(Z6): 115-117.
[13] ZHENG Jin,LV Peng-peng and GUO Shao-ming. Node Sensitivity-based Autonomous Decision-making Target Tracking Algorithm [J]. Computer Science, 2014, 41(6): 54-58.
[14] XING Lu,LIANG Hua-guo,YAN Lu-ming,ZHANG Li-na and YU Tian-song. Aging Path Reduction Algorithm for Type of Logic Gates [J]. Computer Science, 2014, 41(5): 24-26.
[15] ZHAI Jun-hai,HA Ming-guang,SHAO Qing-yan and WANG Xi-zhao. Architecture Selection for Single-hidden Layer Feed-forward Neural Networks Based on Sensitivity of Node [J]. Computer Science, 2014, 41(2): 153-156.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!