Contexts in source publication

Context 1
... the end of simulation, the design was fully validated and the performance detail is printed in console in a review report which is presented in Fig. 3. ...
Context 2
... the proposed methodology presented no problems to completely verify the AES encryption module reaching all objectives defined in the verification plan. Second, the elapse time of simulation was 112.54 seconds (Shown in Fig. 3) and it did not saturate the RAM of the computer which validates this unit-level verification to be employed in any system-level verification. Finally, the modular structure developed a direct interaction with the DUV only in the lower layer which means that it is reusable with any other AES encryption module design or with another bus ...

Similar publications

Article
Full-text available
This work presents a new model for obtaining the cheapest design for a rectangular isolated footing, taking into account that the column is located in any part of the footing. The methodology is developed by integration to obtain the moments, bending shear and punching shear according to the American Concrete Institute ACI 318-14. This document pre...
Conference Paper
Full-text available
The planning process of intralogistics systems is characterised by a complex set of interdependencies of various conditions and specifications to be fulfilled. Within the planning process a huge source of existing knowledge in the form of various 3D-CAD machinery designs or information found within PDM-systems is only used sparingly. The newly deve...
Article
Full-text available
The field of soft robotics is continuing to grow as more researchers see the potential for robots that can safely interact in unmodeled, unstructured, and uncertain environments. However, in order for the design, integration, and control of soft robotic actuators to develop into a full engineering methodology, a set of metrics and standards need to...
Preprint
Full-text available
This work presents a new model to obtain the minimum cost design for a rectangular isolated footing, taking into account that the column is located in any part of the footing. The methodology is developed by integration to obtain the moments, bending shear and punching shear according to the American Concrete Institute ACI 318-14. This document pre...
Article
Full-text available
Off-site prefabrication is becoming widespread in the construction industry owing to quality, safety, and schedule benefits, but logistical costs are still among the largest barriers to adopting it. This study focuses on stacking plans, which encapsulate information on logistical processes, for prefabricated interior wall panels to identify logisti...

Citations

... Functional coverage The functional coverage analysis review of the DUV is presented in Fig. 5. First, the Code Coverage goals and Functional Coverage goals defined in the verification plan were achieved, and there were no errors encountered. This is correct considering that the DUV had been previously verified by the designer with a directed test verification, by two different SystemVerilog-Based verification tests in [8] and [9], and it is an IP core allocated on the OpenCores online repository. ...
... Second, the performance held by the verification process presented higher metrics of code coverage in comparison with [8] and [9], which is summarized in TABLE IX. Both works in [8] and [9] are SystemVerilog-Based Functional verification tests and analyze the same DUV. ...
... Second, the performance held by the verification process presented higher metrics of code coverage in comparison with [8] and [9], which is summarized in TABLE IX. Both works in [8] and [9] are SystemVerilog-Based Functional verification tests and analyze the same DUV. Besides, in contrast of the work in [8] which presented no results of functional coverage, the present work as well as the work in [9] reach 100% in all coverpoints and assertions as shown previously. ...