An Investigation on Inherent Robustness of Posit Data Representation

Archive ouverte : Communication dans un congrès

Alouani, Ihsen | Ben Khalifa, Anouar | Merchant, Farhad | Leupers, Rainer

Edité par HAL CCSD ; IEEE

International audience. As the dimensions and operating voltages of computer electronics shrink to cope with consumers' demand for higher performance and lower power consumption, circuit sensitivity to soft errors increases dramatically. Recently, a new data-type is proposed in the literature called posit data type. Posit arithmetic has absolute advantages such as higher numerical accuracy, speed, and simpler hardware design than IEEE 754-2008 technical standard-compliant arithmetic. In this paper, we propose a comparative robustness study between 32-bit posit and 32-bit IEEE 754-2008 compliant representations. At first, we propose a theoretical analysis for IEEE 754 compliant numbers and posit numbers for single bit flip and double bit flips. Then, we conduct exhaustive fault injection experiments that show a considerable inherent resilience in posit format compared to classical IEEE 754 compliant representation. To show a relevant use-case of fault-tolerant applications, we perform experiments on a set of machine-learning applications. In more than 95% of the exhaustive fault injection exploration, posit representation is less impacted by faults than the IEEE 754 compliant floating-point representation. Moreover, in 100% of the tested machine-learning applications, the accuracy of posit-implemented systems is higher than the classical floating-point-based ones.

Consulter en ligne

Suggestions

Du même auteur

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability | Tarchoun, Bilel

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adve...

Archive ouverte: Communication dans un congrès

Tarchoun, Bilel | 2021-09-28

International audience. While machine learning applications are getting mainstream owing to a demonstrated efficiency in solving complex problems, they suffer from inherent vulnerability to adversarial attacks. Adve...

Entropy-Based Ultra-Wide Band Radar Signals Segmentation for Multi Obstacle Detection | Mimouna, Amira

Entropy-Based Ultra-Wide Band Radar Signals Segmentation for Multi Obstacle...

Archive ouverte: Article de revue

Mimouna, Amira | 2021-03-15

International audience. The development of safe intelligent transportation systems (ITS) has driven extensive research to come up with efficient environment perception techniques with a variety of sensors. In short ...

Deep learning-based hard spatial attention for driver in-vehicle action monitoring | Jegham, Imen

Deep learning-based hard spatial attention for driver in-vehicle action mon...

Archive ouverte: Article de revue

Jegham, Imen | 2023-06

International audience. Distracted driving is one of the main causes of deaths and injuries in the world. Monitoring driver behaviors through Driver Action Recognition (DAR) contributes significantly to building saf...

Du même sujet

Essential math for data science : take control of your data with fundamental linear algebra, probability, and statistics / Thomas Nield | Nield, Thomas. Auteur

Essential math for data science : take control of your data with fundamenta...

Livre | Nield, Thomas. Auteur | 2022

To succeed in data science you need some math proficiency. But not just any math. This common-sense guide provides a clear, plain English survey of the math you'll need in data science, including probability, statistics, hypothesi...

Keyword Spotting System using Low-complexity Feature Extraction and Quantized LSTM | Hérissé, Kévin

Keyword Spotting System using Low-complexity Feature Extraction and Quantiz...

Archive ouverte: Communication dans un congrès

Hérissé, Kévin | 2021-11-28

International audience. Long Short-Term Memory (LSTM) neural networks offer state-of-the-art results to compute sequential data and address applications like keyword spotting. Mel Frequency Cepstral Coefficients (MF...

Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks | Islam, Shohidul

Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep...

Archive ouverte: Communication dans un congrès

Islam, Shohidul | 2021-11-01

International audience. Deep neural networks (DNNs) are shown to be vulnerable to adversarial attacks-- carefully crafted additive noise that undermines DNNs integrity. Previously proposed defenses against these att...

Improved Salp Swarm Optimization Algorithm: Application in Feature Weighting for Blind Modulation Identification | Ben Chaabane, Sarra

Improved Salp Swarm Optimization Algorithm: Application in Feature Weightin...

Archive ouverte: Article de revue

Ben Chaabane, Sarra | 2021-08

International audience. In modulation identification issues, like in any other classification problem, the performance of the classification task is significantly impacted by the feature characteristics. Feature wei...

[Review] Intelligent on-demand design of phononic metamaterials | Jin, Yabin

[Review] Intelligent on-demand design of phononic metamaterials

Archive ouverte: Article de revue

Jin, Yabin | 2022-01-25

International audience. With the growing interest in the field of artificial materials, more advanced and sophisticated functionalities are required from phononic crystals and acoustic metamaterials. This implies a ...

Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach | Alouani, Ihsen

Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine...

Archive ouverte: Communication dans un congrès

Alouani, Ihsen | 2022-08-31

International audience. Several systems and application domains are under-going disruptive transformations due to the recent breakthroughs in computing paradigms such us Machine Learning and commu-nication technolog...

Chargement des enrichissements...