Sökning: "Verilog HDL"
Visar resultat 1 - 5 av 9 uppsatser innehållade orden Verilog HDL.
1. A Digital Design Flow - From Concept to RTL Description, Using Mathworks and Cadence's Tools
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : This report presents our digital design flow for creating high speed very large scale integration circuits using a fifth generation disruptive beamforming control and data processing circuit as example. The flow consists of different stages. LÄS MER
2. Design space exploration using HLS in relation to code structuring
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : High Level Synthesis (HLS) is a methodology to translate a model developed in a high abstraction layer, e.g. C/C++/SystemC, that describes the algorithm into a Register-Transfer level (RTL) description like Verilog or VHDL. LÄS MER
3. Evaluation of high-level synthesis tools for generation of Verilog code from MATLAB based environments
Uppsats för yrkesexamina på avancerad nivå, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : FPGAs are of interest in the signal processing domain as they provide the opportunity to run algorithms at very high speed. One possible use case is to sort incoming data in a measurement system, using e.g. a histogram method. LÄS MER
4. Case study on Universal Verification Methodology(UVM) SystemC testbench for RTL verification
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : This Master’s thesis aims to conduct a case study on using Universal Verification Methodology (UVM) in SystemC for Register-Transfer Level (RTL) verification. Verification of ASICs is very important nowadays especially in terms of production costs, time to market and the sustainability of products. LÄS MER
5. Characterization of FPGA-based Arbiter Physical Unclonable Functions
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The security of service, confidential data, and intellectual property are threatened by physical attacks, which usually include reading and tampering the data. In many cases, attackers can have access to the tools and equipment that can be used to read the memory or corrupt it, either by invasive or non-invasive means. LÄS MER