Results 11 to 20 of about 37,857 (252)

Semantics and synthesis of signals in behavioral VHDL [PDF]

open access: green, 2003
Signals are a fundamental part of VHDL behavioral descriptions. There are many kinds of VHDL signals, each possesing complex and hence often misunderstood semantics. The result is that synthesis tools often inadequately address synthesis of signals.
L. Ramachandran   +3 more
openalex   +3 more sources

Energy detection UWB receiver design using a multi-resolution VHDL-AMS description [PDF]

open access: green, 2006
Ultra Wide Band (UWB) impulse radio systems are appealing for location-aware applications. There is a growing interest in the design of UWB transceivers with reduced complexity and power consumption. Non-coherent approaches for the design of the receiver
Marco Crepaldi   +2 more
openalex   +4 more sources

VHDL-AMS based genetic optimization of a fuzzy logic controller for automotive active suspension systems [PDF]

open access: green, 2005
This paper presents a new type of fuzzy logic controller (FLC) membership functions for automotive active suspension systems. The shapes of the membership functions are irregular and optimized using a genetic algorithm (GA).
L. Wang, Tom J. Kaźmierski
openalex   +2 more sources

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Behavioral simulation and synthesis of biological neuron systems using synthesizable VHDL [PDF]

open access: green, 2011
Neurons are complex biological entities which form the basis of nervous systems. Insight can be gained into neuron behavior through the use of computer models and as a result many such models have been developed. However, there exists a trade-off between
Julian A. Bailey   +3 more
openalex   +2 more sources

Supporting Air-Conditioning Controller Design Using Evolutionary Computation

open access: yesJournal of Advanced Mechanical Design, Systems, and Manufacturing, 2008
In recent years, as part of the remarkable development of electronic techniques, electronic control has been applied to various systems. Many sensors and actuators have been implemented into those systems, and energy efficiency and performance have been ...
Kazuyuki KOJIMA, Keiichi WATANUKI
doaj   +1 more source

Bresenham's Line and Circle Drawing Algorithm using FPGA [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2021
In Bresenham's line drawing algorithm, the points of an n-dimensional raster that have to be selected are determined forming a close approximation to a straight line existed between two points.
Areej Ali, Riyadh Mahmood
doaj   +1 more source

Synthesis of parallel adders from if-decision diagrams

open access: yesСистемный анализ и прикладная информатика, 2020
Addition is one of the timing critical operations in most of modern processing units. For decades, extensive research has been done devoted to designing higher speed and less complex adder architectures, and to developing advanced adder implementation ...
A. A. Prihozhy
doaj   +1 more source

Identification and Characterization of the Lipid Transport System in the Tarantula Grammostola rosea [PDF]

open access: yes, 2015
Lipids due to its hydrophobic nature are transported in the hemolymph mainly by lipoproteic fractions. In the present work we studied the lipoproteic fractions present in the hemolymph of the spider Grammostola rosea.
Cunningham, Monica Liliana   +3 more
core   +2 more sources

FPGA Design and Implementation of Data Covering Based on MD5 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
The protection of information leads to protection of individual privacy for everyone. This protection is performed using encryption. Many types of encryption may be utilized while the simplest one is the covering of information.
Thamir R. Saeed
doaj   +1 more source

Home - About - Disclaimer - Privacy