IP Resources

Sort by

Synopsys Suggests

Securing the Mobile IoT - Industry Report

Synopsys & Truphone answer crucial concerns around security, simplicity & reliable connectivity to help you create a truly scalable solution for secure mobile IoT deployments around the world.

Say Welcome to the Machine - Low-Power Machine Learning for Smart IoT ...

This white paper presents a programmable processor and an associated software library for the efficient implementation of low/mid-end machine learning inference.

Which DDR SDRAM Memory to Use and When

Memory performance is a critical component for achieving the desired system performance in a wide range of applications from cloud computing and artificial intelligence (AI) to automotive and mobile.

Efficient Low-Cost Implementation of NB-IoT for Smart Applications

This white paper highlights the key challenges of NB-IoT modem design. It proposes a hardware/software architecture concept based on a single small CPU/DSP processor for executing a NB-IoT software...

Softening Hardware: Using Application-Specific Processors to Optimize Modern ...

Learn about the ASIP design process, including the needed architectural considerations. Find out how ASIP Designer overcomes the obstacles that often plague ASIP development, reducing the effort ...

Digital Signal Processing for Frequency-Modulated Continuous Wave RADARs

RADAR is an established technology, but interest has been stimulated recently by demands of driver assistance systems and emerging self-driving cars for applications including proximity warning, ...

USB 3.2: The Latest USB Type-C Challenge for SoC Designers

This white paper outlines applications that benefit from USB 3.2ā€™s increased bandwidth, describes the latest USB 3.2 specification for USB Type-Cā„¢, and explains how the latest specification affects...

Safety and Security from the Inside - a SoC's Perspective

This paper discusses the considerations for safety and security from the inside of the SoC, going over the role of the IP, subsystems, and overall design.

Right-sizing your Cryptographic Processing Solution

This white paper presents implementation options for cryptographic security algorithms, as well as a method to right-size your cryptographic processing solution by benchmarking and comparing ...

IP for Centralized ADAS Domain Controllers

This white paper describes the new ADAS SoC architecture which has transitioned from decentralized ECUs to centralized multi-domain controllers and explains the implementation of domain controllers...