Essays about: "Verilog"
Showing result 11 - 15 of 48 essays containing the word Verilog.
-
11. Implementation of a Deep Learning Inference Accelerator on the FPGA.
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Today, Artificial Intelligence is one of the most important technologies, ubiquitous in our daily lives. Deep Neural Networks (DNN's) have come up as state of art for various machine intelligence applications such as object detection, image classification, face recognition and performs myriad of activities with exceptional prediction accuracy. READ MORE
-
12. Customized Processor Design for 5G Data Link Layer Processing
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This thesis aims to explore the workflow related to designing an application specific instruction-set processor (ASIP). An ASIP is a processor similar to a hardware accelerator (HAC) in terms of performance and efficiency, but containing elements of general purpose processors (GPPs) when it comes to programmability and flexibility. READ MORE
-
13. Evaluation of high-level synthesis tools for generation of Verilog code from MATLAB based environments
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : FPGAs are of interest in the signal processing domain as they provide the opportunity to run algorithms at very high speed. One possible use case is to sort incoming data in a measurement system, using e.g. a histogram method. READ MORE
-
14. Case study on Universal Verification Methodology(UVM) SystemC testbench for RTL verification
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This Master’s thesis aims to conduct a case study on using Universal Verification Methodology (UVM) in SystemC for Register-Transfer Level (RTL) verification. Verification of ASICs is very important nowadays especially in terms of production costs, time to market and the sustainability of products. READ MORE
-
15. Characterization of FPGA-based Arbiter Physical Unclonable Functions
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The security of service, confidential data, and intellectual property are threatened by physical attacks, which usually include reading and tampering the data. In many cases, attackers can have access to the tools and equipment that can be used to read the memory or corrupt it, either by invasive or non-invasive means. READ MORE