Next Article in Journal
Learning to Utilize Multi-Scale Feature Information for Crisp Power Line Detection
Next Article in Special Issue
Ion-Induced Charge and Single-Event Burnout in Silicon Power UMOSFETs
Previous Article in Journal
Torque Ripple Suppression Strategy Based on Online Identification of Flux Linkage Harmonics
Previous Article in Special Issue
Single-Event Upset Characterization of a Shift Register in 16 nm FinFET Technology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis of the SEU Tolerance of an FPGA-Based Time-to-Digital Converter Using Emulation-Based Fault Injection

by
Roza Teklehaimanot Siecha
1,2,3,*,
Getachew Alemu
2,
Jeffrey Prinzie
3 and
Paul Leroux
3
1
Department of Electrical and Computer Engineering, Addis Ababa Science and Technology University, Addis Ababa P.O. Box 16417, Ethiopia
2
Department of Electrical and Computer Engineering, Addis Ababa Institute of Technology, Addis Ababa University, Addis Ababa P.O. Box 1178, Ethiopia
3
Department of Electrical Engineering, Faculty of Engineering Technology, Katholieke Universiteit Leuven, 3000 Leuven, Belgium
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(11), 2176; https://doi.org/10.3390/electronics14112176
Submission received: 2 April 2025 / Revised: 21 May 2025 / Accepted: 22 May 2025 / Published: 27 May 2025

Abstract

:
In application domains where severe environmental conditions are unavoidable, including high-energy physics and nuclear power plants, accurate and dependable time-to-digital converters (TDCs) are essential components. Single-event upsets (SEUs) associated with the configuration memory of field-programmable gate array (FPGA)-based implementations are becoming common sources of performance degradation even in terrestrial areas. Hence, the need to test and mitigate the effects of SEUs on FPGA-based TDCs is crucial to ensure that the design achieves reliable performance under critical conditions. The TMR SEM IP provides real-time fault injection, and dynamic SEU monitoring and correction in safety critical conditions without intervening with the functionality of the system, unlike traditional fault injection methods. This paper presents a scalable and fast fault emulation framework that tests the effects of SEUs on the configuration memory of a 5.7 ps-resolution TDC implemented on ZedBoard. The experimental results demonstrate that the standard deviation in mean bin width is 2.4964 ps for the golden TDC, but a 0.8% degradation in the deviation is observed when 3 million SEUs are injected, which corresponds to a 0.02 ps increment. Moreover, as the number of SEUs increases, the degradation in the RMS integral non-linearity (INL) of the TDC also increases, which shows 0.04 LSB (6.8%) and 0.05 LSB (8.8%) increments for 1 million and 3 million SEUs injected, respectively. The RMS differential non-linearity (DNL) of the faulty TDC with 3 million SEUs injected shows a 0.035 LSB (0.8%) increase compared to the golden TDC.

1. Introduction

The time difference between two events (start and stop events) is measured by time-to-digital converters (TDCs), which then translate the data into a digital output [1,2,3]. In fields where radiation impacts are inevitable, such as nuclear reactors [4], high-energy physics [5], and positron emission tomography (PET) [6,7], high-precision time-to-digital converters are greatly desired. The dependability and fault tolerance of the TDC are important considerations in the design process, in addition to the resolution, area, power consumption, and linearity, in these conditions.
Technological advancements in complementary metal oxide semiconductor (CMOS) devices led to reduced gate-oxide thickness and increased doping densities, which in turn increased the tolerance against total ionizing dose (TID) effects. However, scaling of device dimensions and increased operating speed led to amplified vulnerability to short-term radiation effects called single-event effects (SEEs) [8]. Smaller transistors have lower charge thresholds, which increase their sensitivity to SEEs. Moreover, scaling of CMOS devices and the trend of higher integration of smaller transistors in a single chip increases the number of vulnerable nodes. Hence, as technology scales, the effects of single-event upsets (SEUs) on devices become significant. The motivation of this paper is to assess the sensitivity of FPGA-based TDCs to SEUs and mitigate errors to ensure its reliability and safety in critical environments.
An SEE is caused when a high-energy particle strikes a CMOS device and generates an electrical charge in the device depending on the amount of energy the high-energy particle transfers [9]. SEEs are classified as nonrecoverable and permanent errors, also called hard errors, and transient or soft errors that may occur as changes in signal or bit flips in routing resources, logic modules, I/Os, or memories.
SRAM-based field-programmable gate arrays (FPGAs) have two layers, application and configuration layers. The application layer constitutes the memories, user logics, and input/output resources. The configuration memory and its associated ports and control unit make up the configuration layer. SRAM-based FPGAs are especially affected by soft errors such as single-bit upsets (SBUs) or multi-bit upsets (MBUs) in the configuration memory [9,10]. This is due to the fact that the FPGA’s configuration memory has a higher cross-section compared to the user logic. For example, Xilinx FPGAs have 27.7 Mb of configuration memory. The configuration memory specifies the circuitry of the design, and more than 90% of the bits determine the routing architecture, such as muxes, buffers, and programmable interconnect points (PIPs). The effect of errors in the configuration memory leads to permanent recoverable errors [11]. The effect can be a modification in the routing or a change in the Boolean expression of a look-up table (LUT), which in turn may alter the functionality of the design and lead to data corruption or fatal errors [12]. In addition, the consequences of SEUs may be open-net or wrong input selection of muxes, a wrong connection or disconnection between nets, an output net wrongly driven or left open, or wrong function inputs and outputs on LUTs or control bits.
There are various SEU mitigation strategies for the configuration memory of SRAM-based FPGAs. The most frequently used technique is to use hardware redundancy [13]. This method either duplicates (dual modular redundancy (DMR)) or triplicates (triple modular redundancy (TMR)) the components for fault tolerance. TMR has more than double the size and power overhead, even though it renders a device resilient to single-event disruptions of control and data processing blocks through a voting mechanism [14,15,16]. DMR [17,18] uses two redundant circuits and, as a result, has a lesser cost compared to TMR and uses less complicated logic for voting; however, it is only used for fault detection, while TMR is used for fault masking.
Even though TMR is capable of masking a fault, it cannot remove it from the configuration memory. Therefore, reconfiguration is necessary to correct faults. The authors in Refs. [19,20] used scrubbing to detect and repair faults. Scrubbing is a post-configuration write operation into the configuration memory intended to recover the initial state of the system. Scrubbing can be done internally, where the scrubber is inside the FPGA, or externally, where the scrubber is implemented outside the FPGA [21]. Internal scrubbing uses the internal configuration access port (ICAP) to access configuration memory; however, it is also susceptible to SEUs. External scrubbing needs an auxiliary radiation-hardened device to implement the scrubber, but it has high efficiency of SEU mitigation. The external scrubber uses JTAG or SelectMAP to access configuration memory. Moreover, a combination of redundancy and scrubbing are implemented to improve reliability [22,23]. Although scrubbing can avoid the accumulation of errors, it has higher complexity compared to reconfiguration. Reconfiguration is a post-configuration memory write operation that can be carried out by fully replacing the configuration memory or just part of it. Compared to the partial reconfiguration [24,25], full reconfiguration has more time and resource overhead. Partial reconfiguration can be further classified as static or dynamic. Static partial reconfiguration is performed while the FPGA is non-operational. On the contrary, dynamic partial reconfiguration is done while the FPGA is active and operational. Reconfiguration cannot detect faults by itself but has to be combined with error correction codes (ECCs) or redundancy techniques for fault detection and correction [26]. A comprehensive review of SEU mitigation techniques for configuration memory of FPGAs can be found in Ref. [26].
To test the fault tolerance of FPGA-based design, different approaches have been used. Fault injection is a commonly used technique to test which areas of a design are vulnerable to radiation-induced faults and investigate its tolerance against radiation effects.
Fault injection can be performed on hardware by exposing the device under test (DUT) to a radiation environment. Although it gives realistic results, it is expensive, needs a controlled environment, and has a high risk of permanent damage. Due to this, physical fault injection is limited for circuit characterization but not for early verification of a design [27]. Other ways of fault injection are based on software or simulation that allows verification in the early design stage, but it is time- and power-consuming. Alternatively, an emulation-based fault injection approach based on FPGA allows for robust fault injection, is less expensive, and requires less computing power while allowing for verification at early design stages. However, the FPGA-based emulation techniques presented in Refs. [28,29] interrupt the normal functioning of the DUT for fault injection, which may limit its application. Emulation-based fault injection using the Triple Modular Redundancy Soft Error Mitigation Intellectual Property (TMR SEM IP) provided by Xilinx is implemented in Ref. [10]. The TMR SEM IP uses partial dynamic reconfiguration to inject several faults into the configuration memory of FPGAs in real time and without interrupting application-layer system functionality. This method also provides real-time error classification and correction ability that mitigates the accumulation of SEUs, ensuring the long-term reliability, safety, and performance of the DUT. A survey of fault injection methods and their pros and cons is summarized in Ref. [30]. In this paper, we integrated the TMR SEM IP into 5.7 ps-resolution TDC [31] to evaluate its sensitivity to the accumulation of SEUs at an early design stage. A fast fault emulation framework and a discussion of the effects of SEUs on the functionality of the TDC is presented in the paper.
The rest of the paper is organized as follows: Section 2 discusses state-of-the-art fault injection methodologies, their pros and cons, and prior fault analysis methods for TDCs; Section 3 discusses the components that make up the fault emulation framework and the methodology followed for fault injection; Section 4 presents the experimental test setup, the resource and power overhead, the sensitivity of the TDC for SEUs, and a comparison with other works; and a summary of the findings and suggestions for next research are provided in Section 5.

2. Related Work

The sensitivity of digital devices to SEEs is becoming a common issue as device size is scaling. As a result, testing and verifying the radiation hardness and sensitivity of FPGA-based designs is important at the early design stage. Fault injection was a strategy commonly used by researchers to achieve this. Fault injection can be done by directly exposing the DUT to a controlled radiation environment, by simulation using SystemC or hardware description languages (HDL) such as VHDL or Verilog, or by using fault emulation frameworks. Each method has its own advantages and drawbacks.
The authors in Refs. [32,33,34] used the physical fault injection methodology to characterize the DUT under a radiation environment. Although it gives realistic results, this approach is overly expensive and the risk of damage is high. Moreover, it is not suitable for early design stage verification.
A simulation-based fault injection strategy is reported in Refs. [35,36]. Simulation-based fault injection can be carried out on the register transfer level by modifying the hardware description of the system to include components for fault injection, as in Ref. [37], or at the netlist level by modifying post-synthesis and post-implementation netlist to simulate faults [38,39]. Although simulating faults gives the advantage of early-on verification of a design to SEUs, the execution time can be high for complex designs, and it needs high computing power to inject faults.
An alternative to simulation-based fault injection is to use FPGA-based fault emulation platforms. Fault emulation can be carried out by circuit instrumentation, where part of the DUT is substituted by its instrumented cells prototyped on FPGA. This way, faults can be injected externally and their effects can be observed. Autonomous instrumentation-based fault injection is reported in Refs. [40,41]. The authors in Ref. [40] claim that both SEU and single-event transient (SET) effects can be modeled by combining register-level and gate-level fault injection based on autonomous fault emulation. This approach is not only time efficient but also allows for early design-stage verification. However, the emulation framework requires modification of the hardware model of the DUT to support fault injection.
Another way of fault injection through emulation is to reconfigure the configuration memory bits. Some FPGA families, such as Xilinx and Virtex FPGAs, have a partial reconfiguration feature that allows for fault injection without the need to modify the hardware model of the DUT. This non-intrusive fault injection approach is used in Refs. [42,43,44] by altering the bitstream loaded to the FPGA. This methodology of fault injection is time-efficient and cheap, allows for early-on design verification, and does not require modification of the hardware description of the DUT. However, the fault injection targets all the configuration memory bits, even if they are not related to the functionality of the DUT. This is a bottleneck because it affects the execution time as the number of faults injected becomes large. Most FPGA-based fault emulation frameworks only allow fault injection to the configuration layer. However, in Ref. [45], the FREtZ framework is implemented with two Zedoard FPGAs, one for fault injection and the other as a target device, to inject faults both into the configuration bits and to user registers via the JTAG interface. However, the fault injection time takes 720 ms per fault, of which 35 ms is devoted to executing the benchmark.
For Xilinx FPGA families, the TMR SEM IP uses ICAP to inject faults into the configuration memory by partial dynamic reconfiguration and without the need to modify the hardware model of the DUT. The TMR SEM IP can classify configuration bits as essential and non-essential. Essential bits are the configuration memory bits that determine the functionality and routing of the DUT. Xilinx TMR SEM IP and essential bits technology for enhanced fault injection was used by the authors in Refs. [10,46] to test the sensitivity of RISC-V processors to soft errors. The fault injection campaign was performed on a Kintex UltraScale FPGA KCU105 evaluation board. However, the fault injection to the FPGA board was carried out from a host PC using Matlab script through a UART peripheral. As a result, the fault injection time was long. It took more than 20 h to inject 9604 faults. In this paper, we used a ZedBoard FPGA for the designed TDC, and we present a TMR SEM IP-based fault injection strategy that only targets the configuration memory bits that are essential to the DUT, which largely reduces the execution time for injecting faults. The ZedBoard has two arm cores that run at a clock frequency of 100 MHz. The TMR SEM IP can communicate with the Zynq processor through the AXI4 lite interface. Unlike the fault injection carried out through a Matlab script from a host PC in Ref. [10], our method is a fast fault injection method that is limited by the ICAP’s maximum clock frequency, which is 100 MHz. We injected 3 million faults in 30 s. The comparison among the different fault injection methodologies and their advantages and drawbacks are summarized in Table 1.
Although there are different architectures of TDCs based on FPGAs available in various literature, the tapped delay line (TDL) topology based on carry chains of FPGAs is commonly used for resolutions of less than 10 ps for high-energy physics and nuclear applications. Refs. [47,48,49] use TDL-based topology to obtain a resolution of 0.4 ps, 10.5 ps, and 20.97 ps, respectively. The resolution of the TDC highly depends on the topology and the technology of the FPGA that the TDC is implemented on. TDCs based on a matrix of counters that utilize the abundant routing resources available in FPGAs as delay components are implemented in Refs. [31,50], which report 7.4 ps and 5.7 ps resolutions, respectively. A review of recent advancements in FPGA-based TDC topologies and their performance is summarized in Ref. [51]. Although the resolution, precision, non-linearity, power, and resource consumption of these TDC topologies are targeted for enhancement, to the best of our knowledge, the sensitivity to SEUs in the configuration memory of the FPGA-based TDCs has not been analyzed. However, in Refs. [52,53], the effects of ionizing radiation on single-shot precision ASIC-based TDC is reported by performing physical fault injection in a controlled environment. In our work, we analyzed the SEU sensitivity of a 5.7 ps resolution TDC implemented on ZedBoard [31] by using a fault emulation framework that integrates a Xilinx TMR SEM IP controller to perform fault injections by partial reconfiguration of configuration memory bits.

3. Architecture and Methodology for Fault Injection Based on Emulation

3.1. Proposed Architecture

The emulation framework for fault injection includes a 5.7 ps resolution TDC implemented on ZedBoard, a TMR SEM IP for fault injection and correction, a universal asynchronous receiver and transmitter (UART) to enable communication between the FPGA and the user, JTAG for programming the FPGA, and a personal computer (PC) for data analysis, as depicted in Figure 1.
Both the TDC and the TMR SEM IP core are implemented on the programmable logic (PL) of the ZedBoard FPGA. The TMR SEM IP is programmed to communicate with the Zynq processing system via the AXI4-Lite slave interface.
The TMR SEM IP controller has six interfaces. The fault injection interface of the controller enables injection of faults targeting essential bits of the configuration memory in Xilinx FPGA designs. This can be completed externally from the monitor interface through UART or internally through the Advanced eXtensible Interface (AXI). The FRAME_ECC interface is a point-to-point connection between the SEM IP and the FRAME_ECC primitive that provides the soft error detection functionality to the configuration memory. The monitor interface is intended to ensure communication between the user and the SEM IP. The user can monitor the status of the IP or can inject errors into the configuration memory through the IP. The status of the TMR SEM IP is detected by the user by monitoring the status interface. This interface provides a decoded output of the status signals that enables the user to know what the IP is doing. The ICAP interface allows the IP to perform partial reconfiguration on the configuration memory.
The state of the TMR SEM IP can vary depending on what it is currently doing. In its observation state (SC 02), the IP continuously scans the configuration memory for errors. If the IP is doing nothing, then it is in its idle state (SC 00). The fault injection state (SC 10) is the state where the SEM IP is able to inject faults into the configuration memory. The IP can detect single- or multi-bit upsets depending on how it is configured and correct it when it is in its error correction state (SC 04). The other state is the reset state, where you can carry out a software reset on the SEM IP. All these states are encoded, and whenever the status of the IP is requested by the user, the state of the IP is reported through the monitor interface on any terminal, such as the TeraTerm or Vitis serial terminal. The states and interfaces of the IP can be referred to in detail in Refs. [54,55].

3.2. Fault Injection Methodology Using TMR SEM IP

Configuration memory bits store the logic and routing information of the design that will be loaded to the FPGA while programming it. The smallest units in configuration memory are called frames. Each frame constitutes a block of bits that configures part of the FPGA. Configuration bits can be classified as essential and non-essential. The essential bits are configuration RAM bits that define the circuitry and functioning of the TDC on the FPGA. If the essential bit is changed by radiation-induced effects, the TDC may not behave as intended. This will cause reliability issues. TMR SEM IP has the capability of classifying configuration memory bits as essential and non-essential.
A step-by-step flow of the design and implementation of the TDC on ZedBoard and how to classify the configuration bits using the TMR SEM IP is depicted in Figure 2. The first step is to successfully implement the DUT using HDL on Vivado. Once successful synthesis and implementation of the design are completed on Vivado, a bitstream file that contains information about the behavior of the design is generated, which later will be loaded to the FPGA to program it. Next, after integrating the TMR SEM IP controller with the TDC, a successful synthesis and implementation of the design is carried out. Afterwards, by setting the “enable essential bit generation constraint” property, writing of the bitstream is performed. This will generate an essential bit data (EBD) file that contains the list of essential and non-essential configuration bits of the TDC together with the bitstream file. The EBD file is used later for fault injection to the configuration memory using the TMR SEM IP. The EBD file is an ASCII file that contains multiple rows of 32-bit words. For 7 series FPGA families, each frame in the configuration memory contains 101 EBD lines. A 1 in the EBD line represents an essential bit, and a 0 means it is non-essential.
The address of each essential bit in the configuration memory must be known for fault injection and error correction. The addresses can be linear frame addresses, or they can be converted to physical addresses. Equations (1)–(3) below show how to calculate the linear frame address (LA), the word address (WD), and the bit address (BT), which correspond to a specific essential bit in an EBD file. The error injection command has the format depicted in Figure 3. It is a 40-bit command, where 17 bits are linear frame address bits (LA), 7 bits are the word address bits (WD) that identify which word address in the frame is an essential bit, and 5 bits indicate the bit position of the essential bit in a single word (BT).
L A = E B D   l i n e E B D   l i n e   m o d   101 101
W D = E B D   l i n e   m o d   101
B T = 31 c h a r a c t e r   p o s i t i o n
An example of a linear frame address calculation is presented for two essential bits in the EBD file on line 327,615. The EBD line has ASCII characters of 1100 0000 0000 0000 0000 0000 0000 0000. We want to calculate the linear frame addresses of the two essential bits on this line. LA and WD are calculated using Equations (1) and (2). WD is 327,615 mod 101, which is 72 (1001000), and LA is 3242 (1100101010). The BT for the essential bit at character position 0 is 31 (11111), and for the essential bit at character position 1 it is 30 (11110) according to Equation (3). Since we have two essential bits in this specific EBD line, we will have two error injection commands. Concatenating the 17 bits of LA with 7 bits of WD and 5 bits of BT, the hex values for error injection are
110010101010100100011111 = 0 X CAA91F
110010101010100100011110 = 0 X CAA91E
The general fault injection strategy uses the following flow. The FPGA is loaded with the bitstream file generated from Vivado. To check for successful initialization of the TMR SEM IP, we first grant the ICAP access to the configuration memory of the FPGA. For Xilinx 7 series FPGAs, default access to the configuration memory is given to the Zynq processor. Therefore, to obtain successful initialization and fault injection capability of the TMR SEM IP, a grant should be first given to the ICAP. The IP will be in its observation state, where it continuously scans the configuration memory for errors after initialization. To inject faults, the user must force the IP to go into its idle state and later into its injection state. In the injection state, the Zynq processor scans the EBD file line by line and bit by bit to convert each essential bit to an injection address using Equations (1)–(3) until the number of faults the user needs to inject is reached. The faults are injected while the TDC is running so that the effects of SEUs on the functionality of the TDC are analyzed. Afterwards, the behavior of the faulty TDC is compared to the golden TDC. The methodology followed is summarized in Figure 4.

4. Experimental Results and Discussion

A TDC implemented on the ZedBoard FPGA, shown in Figure 5, is the DUT. The DUT is designed and implemented on Vivado 2020.1 using Verilog. The TMR SEM IP is successfully integrated into the design without the need to modify the hardware model of the TDC. The feature of the TMR SEM IP is set to error injection mode. The communication of the controller is set to AXI mode to enable communication to the IP through the Zynq processor present in the ZedBoard. An XDC file, which enables generation of the EBD file during bitstream generation, is also included in Vivado.
The post synthesis and implementation resource utilization of the TDC with and without the TMR SEM IP is reported in Table 2. For the TDC with the TMR SEM IP, the percentage of utilized slices, slice LUTs, used as logic and memory is higher than the percentage of utilized slices, slice LUTs, used as logic and memory of the TDC without the SEU mitigation method, as the table shows. Soft error mitigation using the TMR SEM IP comes with a 26.85% increase in the slice registers used, an 11.7% increase in slice LUTs, a 33.67% increase in LUTs as memory, and a 14.23% increase in slices used for implementing the design. The huge penalty in resource utilization is in the block RAMs used, which is a 104% increase when a TMR SEM IP is integrated into the TDC. This is because extra memory resources are required for error detection and correction when the TMR SEM IP is integrated into the design. The sum of the total resource overhead is 191%, which proves the fact that the TMR method mitigates errors in a circuit with approximately 3× resource utilization. The report also shows that using the TMR SEM IP has an insignificant (0.16%) resource penalty on the LUTs as logic because there is no need to change the hardware model of the TDC for fault injection.
The FPGA is then programmed by the bitstream file in JTAG mode. We used Xilinx Vitis ISE to program the FPGA. Vitis ISE has a serial terminal that enables communication between the FPGA and a host personal computer (PC). Through the Vitis terminal, we monitored the initialization of the TMR SEM IP, its status, and its state changes. Moreover, the output of the TDC is monitored on the Vitis serial terminal.
We included the EBD file in Vitis so that the Zynq processor would complete a robust conversion from the EBD file to the error injection address when it encountered an essential configuration bit. The Zynq processor injects SEUs into corresponding injection addresses by writing to the monitor write FIFO of the TMR SEM IP. While injecting faults, the output of the TDC is sampled to evaluate its functionality in the presence of errors. The sampled output of the TDC was analyzed in Matlab to build its histogram.
Based on the power report generated by Vivado, the power consumption of the device without the TMR SEM IP and with the IP is reported in Table 3. As is shown in the table, the total on-chip power of the device, which is the sum of device static and dynamic power, showed a 5% increase when the TMR SEM IP was integrated into the design.

4.1. Validating the Functionality of the TMR SEM IP

To check the error detection and correction functionality of the TMR SEM IP, we injected three errors: one random fault injection targeting a nonessential bit and two essential bits at linear frame addresses, as calculated in Section 3. The status report of the IP after injection is reported in Figure 6. As is illustrated in the figure, the TMR SEM IP was initialized successfully and went into its observation state (SC 02). The IP should be in the injection state (SC 10) to inject the errors. The IP detects these errors when it reaches its observation state again. While the IP was scanning the configuration memory, it detected two errors corresponding to the essential bits and ignored the error injected for the nonessential bit. It is reported that the IP was in its correction state (SC 04), and it detected and corrected both errors at the corresponding linear frame addresses. This saved time spent dwelling on correcting the non-essential bit errors in the configuration memory.

4.2. Performance of the TDC with SEUs

Of the 25,697,632 configuration memory bits accessible in the ZedBoard FPGA, our design contained 9,100,280 essential bits, or 35.41% of the total. The TDC’s histogram was extracted using a statistical coding density test. To obtain a more realistic result, more than 500,000 hits were taken. The histogram was used to extract the fault-free golden TDC’s transfer function.
The linearity of the TDC is represented as its differential non-linearity (DNL), or deviation of the bin width from the ideal bin width and integral non-linearity (INL), which is the deviation of the actual transfer function from the ideal. These performance metrics quantify the reliability and linearity of the measurement of the TDC under the presence of SEUs. The DNL and INL of the TDC were extracted from its transfer function. The bin width distribution of the 1024 bins was calculated from the histogram. We used Equation (4) to calculate the bin size (Binsizei) associated with each bin. K is the number of counts in bin i, and Tclk is the clock frequency of the counters, which was 5.831 ns, and N is the total sample size.
B i n s i z e i = K T c l k N
The histogram of the bin-width distribution is depicted in Figure 7. As is illustrated in the figure, the mean value (mean) of the bin size calculated using Equation (5) corresponds to the expected resolution, which was 5.7 ps. N is the total sample size, ni is the frequency of the ith Binsize. The standard deviation (std) of the Binsize from the mean value was calculated using Equation (6), and it was 2.4964 ps.
m e a n = i = 1 N n i B i n s i z e i N
s t d = i = 1 N n i ( B i n s i z e i m e a n ) 2 N 1
The TMR SEM IP’s features are only configured in error injection mode, with the error correction capability turned off to monitor the behavior of the TDC under the accumulation of SEUs. The errors are injected while the TDC is operating and its output is being captured. The Zynq processor completes a fault injection address calculation for corresponding essential bits, and faults are injected into the configuration memory via the ICAP. The histogram of the faulty TDC is collected, and the bin-width distribution is calculated from the histogram. From the histogram, the DNL and INL of the faulty TDC are analyzed and calculated in Matlab 2023 as described in detail in Ref. [31]. These TDC performance metrics are compared between the golden TDC and the faulty TDCs. Initially, 4000 random faults were injected into the configuration memory. The bin-width distribution of the golden TDC was compared with the bin-width distribution of the TDC with 4000 errors injected, as depicted in Figure 8. As illustrated in the figure, compared to the golden TDC, some ultra-wide bins that correspond to wrong connections between routing nets caused by SEUs showed up at the outer edges of the bin-width distribution of the faulty TDC, and the frequency of occurrences of ultra-small bins increased due to the needless open connections in the routing nets.
Then, we introduced 200,000 SEUs into the configuration memory, and the bin-width distributions were compared with the golden TDC, as depicted in Figure 9. Figure 10 also shows the comparison of the golden TDC’s bin-width distribution with 3 million injected errors. The findings indicate that SEUs raise the likelihood of ultra-small and ultra-wide bin occurrences, but they had no discernible effect on the TDC’s functionality.
Table 4 shows an overview of the golden TDC’s and faulty TDC’s performance. The SEUs injected into the configuration memory had no effect on the mean bin size of the TDC, as the table illustrates. For fault-free TDC, the standard deviation from the mean bin size was 2.4964 ps, and injecting 3 million errors resulted in a 0.8% increase in the standard deviation. This corresponds to a 0.02 ps increment in standard deviation from the mean. In addition to the standard deviation from the mean bin width, the root mean square (RMS) INL and DNL of the faulty TDC were compared with the golden TDC. Both INL and DNL are expressed in least significant bits (LSB), where 1 LSB corresponds to the resolution of the TDC, which was 5.7 ps. In comparison to the fault-free TDC, the INL of the defective TDC with 4000 SEUs exhibited a 2.06% increase. For 1 million and 3 million SEUs injected, the INL rose by 6.8% and 8.8%, respectively. Compared to the INL, the DNL was less affected by the introduction of the SEUs. The largest percentage of degradation in DNL was observed when 3 million errors were injected, and it was a 0.8% increase compared to that of the fault-free TDC. INL is the integration of DNL, which measures the cumulative effect of all errors in a single measurement, while DNL measures the difference between consecutive steps. This makes the accumulation of SEUs affect the INL more compared to the DNL. Although the percentage degradation in standard deviation in mean bin width (0.8%) is not huge by accumulation of the SEUs, the 8.8% degradation in INL when 3 million errors are injected is significant in the performance of the TDC in safety-critical systems. Therefore, by enabling the error correction feature of the TMR SEM IP, these errors can be detected and corrected to enhance the reliability of the TDC.

4.3. Performance Comparison with Other Works

The performance of prior FPGA-based TDC implementations and their comparison with this work is reported in Table 5. In Ref. [56], a 15 ps (rms)-resolution TDC based on carry chains of FPGA is implemented. The implementation has a calibration that results in an INL of 0.8 LSB and a DNL of 1 LSB. Similarly, Refs. [47,57] both use carry chains as delay elements; however, a wave union technique is integrated that leads to enhanced resolutions of 0.4 ps and 1.23–2.53 ps, respectively. The authors in Ref. [50] use routing paths as delay elements to achieve a 7.4 ps resolution and an INL and DNL of 1.57 and 0.74 LSB, respectively. In Ref. [58], a wave union technique that uses the routing paths of FPGAs as delay components is implemented, and a 0.36 ps resolution is achieved, with an rms INL of 1.04 LSB and an rms DNL of 0.6 LSB. In Ref. [59], DSPs are used as delay elements, and a 4.2 ps resolution is achieved; however, the INL is large, at 31.54 LSB. As can be seen from the table, none of these FPGA-based TDCs were tested for the TDC sensitivity to accumulation of SEUs in the configuration memory. Our work used routing path delays as delay components, and a 5.7 ps resolution was achieved. In addition, a TMR SEM IP core was integrated into the design to enable fault injection into the configuration memory to analyze the sensitivity of the TDC. The results demonstrate that injection of 3 million errors resulted in an 8.8% degradation in INL and a 0.8% degradation in DNL.
The authors in Refs. [53,60,61,62] design and test ASIC-based TDCs for their tolerance to TID by exposing the TDC to a radiation environment. The comparison between the performance and fault test methodologies of ASIC-based TDCs and our work is summarized in Table 6.

5. Conclusions

In this paper, we presented a fast fault emulation framework to investigate the sensitivity of a TDC implemented based on the routing path delays of the FPGA to SEUs injected into configuration memory. A Xilinx TMR SEM IP controller was used to inject faults into the configuration memory of the implemented TDC. The results show that the mean bin width of the TDC was not affected by the SEUs; however, there was a 0.8% degradation in the standard deviation of the bin-width distribution when 3 million errors were introduced and an 8.8% degradation in the INL compared to the performance of the fault-free TDC. As the number of SEUs increased, the degradation in INL of the TDC also increased. The accumulation of SEUs largely affected the INL of the TDC as it measured the cumulative effect of the SEUs on the transfer function of the TDC. On the contrary, the DNL of the TDC was less affected as the number of SEUs injected increased. Although these changes were observed, the intended functionality of the TDC was not altered. However, the accumulation of errors due to SEUs may alter the intended operation of the TDC or cause fatal errors if not continuously monitored and corrected. Hence, for Xilinx 7 series FPGAs, integrating the TMR SEM IP controller, soft errors, and their effects can be monitored and mitigated to ensure reliable operation of the TDC in harsh environments.
In conclusion, using the TMR SEM IP controller for the fault emulation framework enables us to carry out a time-efficient hardware fault injection instead of the time- and power-consuming simulation-based fault injection strategy. The hardware model of the TDC is not changed for fault injection, unlike most traditional fault injection strategies. In the future, validating the results of this emulation framework using physical fault injection is recommended to obtain more realistic results, although it is expensive. Moreover, the sensitivity of different FPGA-based TDC topologies can be tested to see if the effects of SEUs on the performances of TDCs are dependent on their architecture.

Author Contributions

Conceptualization R.T.S.; methodology, R.T.S.; software, R.T.S.; validation, R.T.S., J.P. and P.L.; formal analysis, R.T.S.; investigation, R.T.S.; resources, R.T.S. and J.P.; writing—original draft preparation, R.T.S.; writing—review and editing, R.T.S. and P.L.; supervision, G.A., J.P. and P.L.; project administration, G.A., J.P. and P.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Home-Grown Ph.D. Program (HGPP) funded by the Ethiopian Ministry of Education.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Roberts, G.W.; Ali-Bakhshian, M. A Brief Introduction to Time-to-Digital and Digital-to-Time Converters. IEEE Trans. Circuits Syst. II Express Briefs 2010, 57, 153–157. [Google Scholar] [CrossRef]
  2. Lai, J.; Luo, Y.; Shao, Q.; Bao, L.; Liu, X. A High-Resolution TDC Implemented in a 90nm Process FPGA. In Proceedings of the 2013 IEEE 10th International Conference on ASIC, Shenzhen, China, 28–31 October 2013; pp. 2–4. [Google Scholar] [CrossRef]
  3. Van Bockel, B.; Leroux, P.; Prinzie, J. Tradeoffs in Time-to-Digital Converter Architectures for Harsh Radiation Environments. IEEE Trans. Instrum. Meas. 2021, 70, 1–10. [Google Scholar] [CrossRef]
  4. Cheng, Z.; Zheng, X.; Deen, M.J.; Peng, H. Recent Developments and Design Challenges of High-Performance Ring Oscillator CMOS Time-to-Digital Converters. IEEE Trans. Electron. Devices 2016, 63, 235–251. [Google Scholar] [CrossRef]
  5. Akiba, K.; Ronning, P.; Van Beuzekom, M.; Van Beveren, V.; Borghi, S.; Boterenbrood, H.; Buytaert, J.; Collins, P.; Dosil Suárez, A.; Dumps, R.; et al. The Timepix Telescope for High Performance Particle Tracking. Nucl. Instrum. Methods Phys. Res. Sect. A Accel. Spectrometers Detect. Assoc. Equip. 2013, 723, 47–54. [Google Scholar] [CrossRef]
  6. Lecoq, P. Pushing the Limits in Time-of-Flight PET Imaging. IEEE Trans. Radiat. Plasma Med. Sci. 2017, 1, 473–485. [Google Scholar] [CrossRef]
  7. Nolet, F.; Lemaire, W.; Dubois, F.; Roy, N.; Carrier, S.; Samson, A.; Charlebois, S.A.; Fontaine, R.; Pratte, J.F. A 256 Pixelated SPAD Readout ASIC with In-Pixel TDC and Embedded Digital Signal Processing for Uniformity and Skew Correction. Nucl. Instrum. Methods Phys. Res. Sect. A Accel. Spectrometers Detect. Assoc. Equip. 2020, 949, 162891. [Google Scholar] [CrossRef]
  8. Dodd, P.E.; Massengill, L.W. Basic Mechanisms and Modeling of Single-Event Upset in Digital Microelectronics. IEEE Trans. Nucl. Sci. 2003, 50, 583–602. [Google Scholar] [CrossRef]
  9. Nidhin, T.S.; Bhattacharyya, A.; Behera, R.P.; Jayanthi, T.; Velusamy, K. Understanding Radiation Effects in SRAM-Based Field Programmable Gate Arrays for Implementing Instrumentation and Control Systems of Nuclear Power Plants. Nucl. Eng. Technol. 2017, 49, 1589–1599. [Google Scholar] [CrossRef]
  10. Aranda, L.A.; Sánchez-macián, A.; Maestro, J.A.; Member, S. ACME: A Tool to Improve Configuration Memory Fault Injection in SRAM-Based FPGAs. IEEE Access 2019, 7, 128153–128161. [Google Scholar] [CrossRef]
  11. Asadi, G.; Tahoori, M.B. Soft Error Rate Estimation and Mitigation for SRAM-Based FPGAs. In Proceedings of the 2005 ACM/SIGDA 13th International Symposium on Field-Programmable Gate Arrays, Monterey, CA, USA, 20–22 February 2005; pp. 149–160. [Google Scholar] [CrossRef]
  12. Ruano, Ó.; Garc, F.; Aranda, L.A.; Rodriguez, L.; Maestro, J.A.; Alfonso, S. Techniques and Methodology, A Tutorial. 2021. Available online: https://www.mdpi.com/1424-8220/21/4/1392 (accessed on 1 April 2025).
  13. Pereira, V.C.; de Santiago Júnior, V.A.; Manea, S. SEU Mitigation for SRAM FPGAs: A Comparison via Probabilistic Model Checking. In Workshop de Testes e Tolerância A Falhas (WTF), 18; Sociedade Brasileira de Computa ção: Porto Alegre, Brazil, 2007; ISSN 2595-2684. [Google Scholar]
  14. Carmichael, C.; Fuller, E.; Blain, P.; Caffrey, M. SEU Mitigation Techniques for Virtex FPGAs in Space Applications. Architecture 1999, 1–11. Available online: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=fb201cea8d302762290c71b7071829f646c9c29c (accessed on 4 May 2025).
  15. Wang, X. Partitioning Triple Modular Redundancy for Single Event Upset Mitigation in FPGA. In Proceedings of the 2010 International Conference on E-Product E-Service and E-Entertainment, Henan, China, 7–9 November 2010; pp. 1–4. [Google Scholar] [CrossRef]
  16. Kubica, M.; Czerwinski, R. Performance Testing of the Triple Modular Redundancy Mitigation Circuit Test Environment Implementation in Field Programmable Gate Array Structures. Appl. Sci. 2024, 14, 8604. [Google Scholar] [CrossRef]
  17. Zheng, M.; Wang, Z.; Li, L. DAO: Dual Module Redundancy with AND/OR Logic Voter for FPGA Hardening. In Proceedings of the 2015 First International Conference on Reliability Systems Engineering (ICRSE), Beijing, China, 21–23 October 2015; pp. 1–5. [Google Scholar] [CrossRef]
  18. Matsuo, I.B.M.; Zhao, L.; Lee, W.J. A Dual Modular Redundancy Scheme for CPU-FPGA Platform-Based Systems. IEEE Trans. Ind. Appl. 2018, 54, 5621–5629. [Google Scholar] [CrossRef]
  19. Vlagkoulis, V.; Sari, A.; Antonopoulos, G.; Psarakis, M.; Tavoularis, A.; Furano, G.; Boatella-Polo, C.; Poivey, C.; Ferlet-Cavrois, V.; Kastriotou, M.; et al. Configuration Memory Scrubbing of SRAM-Based FPGAs Using a Mixed 2-D Coding Technique. IEEE Trans. Nucl. Sci. 2022, 69, 871–882. [Google Scholar] [CrossRef]
  20. Vlagkoulis, V.; Sari, A.; Proko, J.; Zografakis, D.; Psarakis, M.; Tavoularis, A.; Furano, G.; Boatella-Polo, C.; Poivey, C.; Ferlet-Cavrois, V.; et al. Configuration Memory Scrubbing of the Xilinx Zynq-7000 FPGA Using a Mixed 2-D Coding Technique. In Proceedings of the 2019 19th European Conference on Radiation and Its Effects on Components and Systems (RADECS), Montpellier, France, 16–20 September 2019; pp. 31–34. [Google Scholar] [CrossRef]
  21. Berg, M.; Poivey, C.; Petrick, D.; Espinosa, D.; Lesea, A.; LaBel, K.; Friendlich, M.; Kim, H.; Phan, A. Effectiveness of Internal vs. External Sed Scrubbing Mitigation Strategies in a Xilinx FPGA: Design, Test, and Analysis. In Proceedings of the 2007 9th European Conference on Radiation and Its Effects on Components and Systems, Deauville, France, 10–14 September 2007; pp. 1–8. [Google Scholar] [CrossRef]
  22. Tonfat, J.; Lima Kastensmidt, F.; Rech, P.; Reis, R.; Quinn, H.M. Analyzing the Effectiveness of a Frame-Level Redundancy Scrubbing Technique for SRAM-Based FPGAs. IEEE Trans. Nucl. Sci. 2015, 62, 3080–3087. [Google Scholar] [CrossRef]
  23. Giordano, R.; Perrella, S.; Izzo, V.; Milluzzo, G.; Aloisio, A. Redundant-Configuration Scrubbing of SRAM-Based FPGAs. IEEE Trans. Nucl. Sci. 2017, 64, 2497–2504. [Google Scholar] [CrossRef]
  24. Vavouras, M.; Bouganis, C.S. Area-Driven Partial Reconfiguration for SEU Mitigation on SRAM-Based FPGAS. In Proceedings of the 2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, Mexico, 30 November–2 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
  25. Panek, R.; Lojda, J.; Podivinsky, J.; Kotasek, Z. Partial Dynamic Reconfiguration in an FPGA-Based Fault-Tolerant System: Simulation-Based Evaluation. In Proceedings of the 2018 IEEE East-West Design & Test Symposium (EWDTS), Kazan, Russia, 14–17 September 2018; pp. 1–6. [Google Scholar] [CrossRef]
  26. Nidhin, T.S.; Bhattacharyya, A.; Behera, R.P.; Jayanthi, T. A Review on SEU Mitigation Techniques for FPGA Configuration Memory. IETE Tech. Rev. 2017, 35, 4602. [Google Scholar] [CrossRef]
  27. Ferlini, F.; Viel, F.; Seman, L.O.; Pettenghi, H.; Bezerra, E.A.; Reis, V.; Leithardt, Q. A Methodology for Accelerating FPGA Fault Injection Campaign Using ICAP. Electronics 2023, 12, 807. [Google Scholar] [CrossRef]
  28. De Oliveira, Á.B.; Tambara, L.A.; Benevenuti, F.; Benites, L.A.C.; Added, N.; Aguiar, V.A.P.; Medina, N.H.; Silveira, M.A.G.; Kastensmidt, F.L. Evaluating Soft Core RISC-V Processor in SRAM-Based FPGA Under Radiation Effects. IEEE Trans. Nucl. Sci. 2020, 67, 1503–1510. [Google Scholar] [CrossRef]
  29. Braga, G.; Benevenuti, F.; Gonçalves, M.M.; Hernandez, H.G.M.; Hübner, M.; Brandalero, M.; Kastensmidt, F.; Azambuja, J.R. Evaluating Softcore GPU in SRAM-Based FPGA under Radiation-Induced Effects. Microelectron. Reliab. 2021, 126, 114348. [Google Scholar] [CrossRef]
  30. Eslami, M.; Ghavami, B.; Raji, M.; Mahani, A. A Survey on Fault Injection Methods of Digital Integrated Circuits. Integration 2020, 71, 154–163. [Google Scholar] [CrossRef]
  31. Siecha, R.T.; Alemu, G.; Prinzie, J.; Leroux, P. 5.7 Ps Resolution Time-to-Digital Converter Implementation Using Routing Path Delays. Electronics 2023, 12, 3478. [Google Scholar] [CrossRef]
  32. Makowski, D. The Impact of Radiation on Electronic Devices with the Special Consideration of Neutron and Gamma Radiation Monitoring. Tech. Univ. Lodz 2006, 151. Available online: https://www.researchgate.net/publication/241771919_The_Impact_on_Electronic_Devices_with_the_Special_Consideration_of_Neutron_and_Gamma_Radiation_Monitoring (accessed on 21 May 2025).
  33. Bocquillon, A.; Foucard, G.; Miller, F.; Buard, N.; Leveugle, R.; Daniel, C.; Rakers, S.; Carriere, T.; Pouget, V.; Velazco, R. Highlights of Laser Testing Capabilities Regarding the Understanding of SEE in SRAM Based FPGAs. In Proceedings of the 2007 9th European Conference on Radiation and Its Effects on Components and Systems, Deauville, France, 10–14 September 2007; pp. 1–6. [Google Scholar] [CrossRef]
  34. Lesea, A.; Drimer, S.; Fabula, J.J.; Carmichael, C.; Alfke, P. The Rosetta Experiment: Atmospheric Soft Error Rate Testing in Differing Technology FPGAs. IEEE Trans. Device Mater. Reliab. 2005, 5, 317–328. [Google Scholar] [CrossRef]
  35. Allspaw, J. Fault Injection in Production. Commun. ACM 2012, 55, 48–52. [Google Scholar] [CrossRef]
  36. Da Silva, A.; Sánchez, S. LEON3 ViP: A Virtual Platform with Fault Injection Capabilities. In Proceedings of the 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), Rome, Italy, 26–28 September 2007; pp. 813–816. [Google Scholar] [CrossRef]
  37. Khatri, A.R.; Hayek, A.; Josef, B. RASP-FIT: A Fast and Automatic Fault Injection Tool for Code-Modification of FPGA Designs. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 30–40. [Google Scholar] [CrossRef]
  38. Monopoli, M.; Member, G.S.; Biondi, M. RADSAFiE: A Netlist-Level Fault Injection User Interface Application for FPGA-Based Digital Systems. IEEE Access 2025, 13, 28809–28823. [Google Scholar] [CrossRef]
  39. Fibich, C.; Rössler, P.; Tauner, S.; Taucher, H.; Matschnig, M. A Netlist-Level Fault-Injection Tool for FPGAs. Elektrotech. Inftech. 2015, 132, 274–281. [Google Scholar] [CrossRef]
  40. Entrena, L.; García-Valderas, M.; Fernández-Cardenal, R.; Lindoso, A.; Portela, M.G.; López-Ongil, C. Soft Error Sensitivity Evaluation of Microprocessors by Multilevel Emulation-Based Fault Injection. IEEE Trans. Comput. 2012, 61, 313–322. [Google Scholar] [CrossRef]
  41. Ĺopez-Ongil, C.; García-Valderas, M.; Portela-García, M.; Entrena, L. Autonomous Fault Emulation: A New FPGA-Based Acceleration System for Hardness Evaluation. IEEE Trans. Nucl. Sci. 2007, 54, 252–261. [Google Scholar] [CrossRef]
  42. Alderighi, M.; Casini, F.; D’Angelo, S.; Pastore, S.; Sechi, G.R.; Weigand, R. Evaluation of Single Event Upset Mitigation Schemes for SRAM Based FPGAs Using the FLIPPER Fault Injection Platform. In Proceedings of the 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), Rome, Italy, 26–28 September 2007; pp. 105–113. [Google Scholar] [CrossRef]
  43. Alderighi, M.; Casini, F.; D’Angelo, S.; Mancini, M.; Codinachs, D.M.; Pastore, S.; Poivey, C.; Sechi, G.R.; Weigand, G.S.R. Experimental Validation of Fault Injection Analyses by the FLIPPER Tool. In Proceedings of the 2009 European Conference on Radiation and Its Effects on Components and Systems, Brugge, Belgium, 14–18 September 2009; 57, pp. 544–548. [Google Scholar] [CrossRef]
  44. Fpgas, S.; Thurlow, C.; Rowberry, H.; Wirthlin, M. TURTLE: A Low-Cost Fault Injection Platform For. In Proceedings of the 2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, Mexico, 9–11 December 2019; pp. 1–8. Available online: https://ieeexplore.ieee.org/document/8994782 (accessed on 5 May 2025).
  45. Smit, T.T.; Forlin, B.E.; Chen, K.; Souvatzoglou, I.; Psarakis, M.; Ottavi, M. An Enhanced Fault Injection Framework For. In Proceedings of the 2024 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Didcot, UK, 8–10 October 2024; pp. 1–6. [Google Scholar] [CrossRef]
  46. Aranda, L.A.; Ruano, O.; Garcia-Herrero, F.; Maestro, J.A. ACME-2: Improving the Extraction of Essential Bits in Xilinx SRAM-Based FPGAs. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 1577–1581. [Google Scholar] [CrossRef]
  47. Wang, Y.; Xie, W.; Chen, H.; Day-Uei Li, D. High-Resolution Time-to-Digital Converters (TDCs) with a Bidirectional Encoder. Meas. J. Int. Meas. Confed. 2023, 206, 112258. [Google Scholar] [CrossRef]
  48. Chen, H.; Zhang, Y.; Li, D.D. A Low Nonlinearity, Missing-Code Free Time-to-Digital Converter Based on 28-Nm FPGAs With Embedded Bin-Width Calibrations. IEEE Trans. Instrum. Meas. 2017, 66, 1912–1921. [Google Scholar] [CrossRef]
  49. Wang, Y.; Xie, W.; Chen, H.; Li, D.D. Configurable Gray Code Oscillator Time-to- Digital Converters Implemented in 16nm. Available online: https://ieeexplore.ieee.org/document/9776629 (accessed on 13 May 2025).
  50. Zhang, M.; Wang, H.; Liu, Y. A 7.4 Ps FPGA-Based TDC with a 1024-Unit Measurement Matrix. Sensors 2017, 17, 865. [Google Scholar] [CrossRef] [PubMed]
  51. Xia, H.; Yu, X.; Zhang, J.; Cao, G. A Review of Advancements and Trends in Time-to-Digital Converters Based on FPGA. IEEE Trans. Instrum. Meas. 2024, 73, 1–25. [Google Scholar] [CrossRef]
  52. van Bockel, B.; Prinzie, J.; Leroux, P. Design of a 4 Ps Radiation Hardened TDC with an Improved Interpolation Technique. Proc. Sci. 2019, 370, 6. [Google Scholar] [CrossRef]
  53. Van Bockel, B.; Prinzie, J.; Leroux, P. Radiation Assessment of a 15.6ps Single-Shot Time-to-Digital Converter in Terms of TID. Electronics 2019, 8, 558. [Google Scholar] [CrossRef]
  54. Garza-Reyes, J.A. Table of Contents Table of Contents ی ﺮ ﺘ ﮐ د ﻪ ﺒ ﺣ ﺎ ﺼ ﻣ ز ﺎ ﯿ ﭘ ﺎ ﺗ ﺮ ﯿ ﺳ ز ا. Eur. Univ. Inst. 2012, 2–5. Available online: https://docs.amd.com/r/en-US/pg036_sem/Integration-of-the-SEM-IP-Core (accessed on 20 May 2025).
  55. Guide, P. MicroBlaze Triple Modular Redundancy. 2022, pp. 1–101. Available online: https://docs.amd.com/r/en-US/pg268-tmr/Triple-Modular-Redundancy-TMR-v1.0-LogiCORE-IP-Product-Guide-PG268 (accessed on 20 May 2025).
  56. Wang, Y.; Liu, C. A Nonlinearity Minimization-Oriented Resource-Saving Time-to-Digital Converter Implemented in a 28 Nm Xilinx FPGA. IEEE Trans. Nucl. Sci. 2015, 62, 2003–2009. [Google Scholar] [CrossRef]
  57. Xie, W.; Chen, H.; Li, D.D.U. Efficient Time-to-Digital Converters in 20 Nm FPGAs with Wave Union Methods. IEEE Trans. Ind. Electron. 2022, 69, 1021–1031. [Google Scholar] [CrossRef]
  58. Siecha, R.T.; Alemu, G.; Prinzie, J.; Leroux, P. High-Performance Wave Union Time-to-Digital Converter Implementation Based on Routing Path Delays of FPGA. Electronics 2024, 13, 2359. [Google Scholar] [CrossRef]
  59. Kwiatkowski, P. Employing FPGA DSP Blocks for Time-to-Digital Conversion. Metrol. Meas. Syst. 2019, 26, 631–643. [Google Scholar] [CrossRef]
  60. Cao, Y.; De Cock, W.; Steyaert, M.; Leroux, P. 1-1-1 MASH ΔΣ Time-to-Digital Converters with 6 Ps Resolution and Third-Order Noise-Shaping. IEEE J. Solid-State Circuits 2012, 47, 2093–2106. [Google Scholar] [CrossRef]
  61. Karadamoglou, K.; Paschalidis, N.P.; Sarris, E.; Stamatopoulos, N.; Kottaras, G.; Paschalidis, V. An 11-Bit High-Resolution and Adjustable-Range CMOS Time-to-Digital Converter for Space Science Instruments. IEEE J. Solid-State Circuits 2004, 39, 214–222. [Google Scholar] [CrossRef]
  62. Christiansen, J. High Performance Time to Digital Converter. Cern/Epmic. 2004. Available online: https://cds.cern.ch/record/1067476/files/cer-002723234 (accessed on 13 May 2025).
Figure 1. Architecture of hardware fault injection and correction.
Figure 1. Architecture of hardware fault injection and correction.
Electronics 14 02176 g001
Figure 2. Steps of EBD file generation on Vivado.
Figure 2. Steps of EBD file generation on Vivado.
Electronics 14 02176 g002
Figure 3. Error injection command based on the linear frame address.
Figure 3. Error injection command based on the linear frame address.
Electronics 14 02176 g003
Figure 4. Injection address calculation and fault injection flow using the TMR SEM IP controller.
Figure 4. Injection address calculation and fault injection flow using the TMR SEM IP controller.
Electronics 14 02176 g004
Figure 5. Zynq evaluation and development board (ZedBoard) of the FPGA.
Figure 5. Zynq evaluation and development board (ZedBoard) of the FPGA.
Electronics 14 02176 g005
Figure 6. Fault injection strategy targeting Xilinx essential bits.
Figure 6. Fault injection strategy targeting Xilinx essential bits.
Electronics 14 02176 g006
Figure 7. Bin-width distribution of the golden fault-free TDC.
Figure 7. Bin-width distribution of the golden fault-free TDC.
Electronics 14 02176 g007
Figure 8. Comparison of bin-width distribution of the golden TDC vs. The TDC with 4000 SEUs.
Figure 8. Comparison of bin-width distribution of the golden TDC vs. The TDC with 4000 SEUs.
Electronics 14 02176 g008
Figure 9. Comparison of bin-width distribution of the golden TDC and the faulty TDC with 200,000 SEUs.
Figure 9. Comparison of bin-width distribution of the golden TDC and the faulty TDC with 200,000 SEUs.
Electronics 14 02176 g009
Figure 10. Comparison of bin-width distribution of the golden TDC and the faulty TDC with 3 million SEUs.
Figure 10. Comparison of bin-width distribution of the golden TDC and the faulty TDC with 3 million SEUs.
Electronics 14 02176 g010
Table 1. Comparison of fault injection methodologies.
Table 1. Comparison of fault injection methodologies.
Work/
Year
MethodTechnologyDUTSEU
Mitigation Strategy
ProsConsDamage#Injected FaultsTime/FaultLayer
[33]/(2007)Laser test220 nmXilinx XCV1000 FPGATMR + continuous scrubbingRealistic resultsExpensive Permanent516 upsets of 6,127,744 configuration bits-Configuration layer
[34]/(2005)Laser test90 nmV4LX25 NoneRealistic resultsExpensive Permanent1.9 gigabits =Configuration layer
[38]/
(2025)
Netlist-level fault injection based on Verilog20 nmKintexUltrascaleXQRKU060None Early design-stage verificationTime-consuming for complex designsNone 140 Mb25 ns Application layer
[39]/(2015)Netlist-level fault injection based on Verilog HDL65 nmVirtex VNone Early design-stage verificationTime-consuming for complex designsNone _15 nsApplication layer
[37]/(2018)RTL-level fault injection based on Verilog--None Early design-stage verificationTime-consuming for complex designsNone 34,18238.2 msApplication layer
[40]/(2012)Autonomous instrumentational emulation-based fault injection (RTL+GTL)45 nmXilinx XC6VLX240T FPGANone Early design-stage verificationIntrusive None 164,720,820 0.3 msApplication layer
[41]/(2007)Autonomous instrumentational emulation-based fault injection 28 nmXilinx Virtex-2000ETMREarly design-stage verificationIntrusiveNone 1,000,0001 µs Application layer
[42]/(2007)Fault emulation based on partial reconfiguration28 nmXilinx XQ2VR6000 XTMREarly design-stage verificationTargets all configuration memory bitsNone3,300,00018 ms Configuration layer
[44]/(2019)Fault emulation based on partial reconfiguration28 nmArtix-7XC7A200T-1SBG484C_Non-intrusiveExhaustive testing >170 million 10 msConfiguration layer
[27]/(2023)Fault emulation based on partial reconfiguration65 nmXilinx Virtex 5 XC5VLX110TTMRTargets only essential bits to the DUTLimited to Xilinx FPGAsNone 5425 0.2 sConfiguration layer
[45]/(2024)Fault emulation28 nmXC7Z030-1SBG485I ZYNQ-7000NoneNon-intrusiveTakes more time None 2752685 msConfiguration + application layer
[10]/(2019)Fault emulation based on partial reconfiguration20 nmKintex UltraScale FPGA KCU105 evaluation board-Non-intrusive
Targets only essential bits to the DUT
Limited to Xilinx FPGAsNone 960412 sConfiguration layer
This workFault emulation based on partial reconfiguration28 nmXC7Z030-1SBG485I ZYNQ-7000TMR + scrubbingNon-intrusive
Targets only essential bits to the DUT
Limited to Xilinx FPGAsNone3,000,000 10 nsConfiguration layer
Table 2. Resource utilization report of the TDC without and with the TMR SEM IP.
Table 2. Resource utilization report of the TDC without and with the TMR SEM IP.
ResourcesTDC Without TMR SEM IPTDC with TMR SEM IPResource Overhead (%)
TotalUtilizedUtilized (%)UtilizedUtilized (%)
Slice registers106,40041,17538.7052,23249.0926.85
Slice LUTs53,20025,81948.5328,85754.2411.77
LUTs as logic53,20016,87531.7216,90231.770.16
LUTs as memory17,400894451.4011,95568.7133.67
Slices13,30011,04183.0212,61294.8314.23
Block RAM14032.523.2166.547.50104.62
MMCME2-ADV43753750
Table 3. Power consumption of the TDC with and without the TMR SEM IP.
Table 3. Power consumption of the TDC with and without the TMR SEM IP.
TDC Without TMR SEM IPTDC with TMR SEM IPPower Overhead (%)
Static power (W)0.1710.1815.85
Dynamic power (W)2.3432.4635.12
Total on-chip power (W)2.5142.6445.17
Table 4. Performance comparison of the golden TDC and the faulty TDCs.
Table 4. Performance comparison of the golden TDC and the faulty TDCs.
Golden TDC4K SEUs200K SEUs1M SEUs3M SEUs
Mean Binsize (ps)5.695.695.695.695.69
std (ps)2.49642.49622.48612.50272.5163
INL (LSB) (RMS)0.55710.56860.55920.59510.606
DNL (LSB)(RMS)0.43830.43820.43650.43940.4418
Table 5. Comparison of the performance of recent FPGA-based TDC topologies.
Table 5. Comparison of the performance of recent FPGA-based TDC topologies.
Work/
Year
Technology (nm)TopologyDelay ElementsLSB [ps]INL [LSB]DNL [LSB]SEU Analysis and Mitigation
[47]/(2023)16TDL + wave unionCarry chains0.46.4251.56None
[58]/(2024)28Counter matrix + wave unionRouting paths0.361.04 (rms)0.60 (rms)None
[50]/(2017)40Counter matrixRouting paths7.41.570.74None
[57]/(2022)20TDL + wave unionCarry chains1.23–2.535.971.75None
[59]/(2019)28DSP delay linesDSPs4.231.5420None
[56]/(2015)28TDL + calibrationCarry chains15 (rms)0.81None
This work28Counter matrixRouting paths5.70.606 (rms)
(with 3 million SEUs injected)
0.4118 (rms)
(with 3 million SEUs injected)
Yes
Table 6. Comparison with a prior radiation test for different topologies of TDCs.
Table 6. Comparison with a prior radiation test for different topologies of TDCs.
Work/YearTechnologyTopologyFault Injection MethodRadiation Test TypeResolution (ps)INL [LSB]
(rms)
DNL [LSB] (rms)
[60]/(2012)130 nm ASICDelta–sigmaPhysicalTID10.5--
[61]/(2004)800 nm ASICPulse shrinkingPhysicalTID500.45-
[62]/(2004)250 nm ASICDLLPhysicalTID242.10.21
[53]/(2019)65 nm ASICRing oscillatorPhysicalTID15.60.340.22
This work28 nm FPGACounter matrixFault emulationSEU5.70.6060.4118
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Siecha, R.T.; Alemu, G.; Prinzie, J.; Leroux, P. Analysis of the SEU Tolerance of an FPGA-Based Time-to-Digital Converter Using Emulation-Based Fault Injection. Electronics 2025, 14, 2176. https://doi.org/10.3390/electronics14112176

AMA Style

Siecha RT, Alemu G, Prinzie J, Leroux P. Analysis of the SEU Tolerance of an FPGA-Based Time-to-Digital Converter Using Emulation-Based Fault Injection. Electronics. 2025; 14(11):2176. https://doi.org/10.3390/electronics14112176

Chicago/Turabian Style

Siecha, Roza Teklehaimanot, Getachew Alemu, Jeffrey Prinzie, and Paul Leroux. 2025. "Analysis of the SEU Tolerance of an FPGA-Based Time-to-Digital Converter Using Emulation-Based Fault Injection" Electronics 14, no. 11: 2176. https://doi.org/10.3390/electronics14112176

APA Style

Siecha, R. T., Alemu, G., Prinzie, J., & Leroux, P. (2025). Analysis of the SEU Tolerance of an FPGA-Based Time-to-Digital Converter Using Emulation-Based Fault Injection. Electronics, 14(11), 2176. https://doi.org/10.3390/electronics14112176

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop