• Title/Summary/Keyword: 브이엠이

Search Result 9, Processing Time 0.021 seconds

The Implementation of High speed Memory module Interface in the Military Single Board Computer (군용Single Board Computer에서의 고속메모리모듈 I/F구현)

  • Lee, Teuc-Soo;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.521-527
    • /
    • 2011
  • POWER PC series are common to the Central Processing Unit for Military Single Board Computer. Among them, G4 group, which contains the 74xx series supported by Freescale manufacturer is mainly used in the Military applications. We focus on the Interface between memory and controller. PCB stacking method, component routing, impedance matching and harsh environment for Military spec are the main constraints for implementation. Also, we developed memory as a module for the consideration of Military environments. The overall type of SBC should be designed by the form of 6U VME or 3U VME. Therefore this study suggests the electrically optimum Interface matching, Artwork technology based on the signal cross over and PCB stacking method on the harsh environment.

An Image-to-Image Translation GAN Model for Dental Prothesis Design (치아 보철물 디자인을 위한 이미지 대 이미지 변환 GAN 모델)

  • Tae-Min Kim;Jae-Gon Kim
    • Journal of Information Technology Services
    • /
    • v.22 no.5
    • /
    • pp.87-98
    • /
    • 2023
  • Traditionally, tooth restoration has been carried out by replicating teeth using plaster-based materials. However, recent technological advances have simplified the production process through the introduction of computer-aided design(CAD) systems. Nevertheless, dental restoration varies among individuals, and the skill level of dental technicians significantly influences the accuracy of the manufacturing process. To address this challenge, this paper proposes an approach to designing personalized tooth restorations using Generative Adversarial Network(GAN), a widely adopted technique in computer vision. The primary objective of this model is to create customized dental prosthesis for each patient by utilizing 3D data of the specific teeth to be treated and their corresponding opposite tooth. To achieve this, the 3D dental data is converted into a depth map format and used as input data for the GAN model. The proposed model leverages the network architecture of Pixel2Style2Pixel, which has demonstrated superior performance compared to existing models for image conversion and dental prosthesis generation. Furthermore, this approach holds promising potential for future advancements in dental and implant production.

A Wireless Temperature Control System based on FPGA (FPGA기반의 무선 온도 제어 시스템)

  • Park, Jeong-Wook;Ko, Joo-Young;Park, Jong-Hun;Hong, Mun-Ho;Lee, Yeung-Hak;Shim, Jae-Chang
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.920-930
    • /
    • 2012
  • In this paper, we designed and built a wired temperature controller system which is based on ASIC for a wireless temperature controller system based on FPGA. FPGA devices and wireless controller systems are growing quickly especially for industrial systems for sensing temperature and humidity. FPGA can set up a desired system and a CPU, and directly set up or change a peripheral device based on an IP quickly for an affordable price. This wireless system is easy to install in the field where there are lots of changes and the system is complex. It also has advantages for maintenance. In this study, we are using a 32 bit RISC CPU based on MicroBlaze, with a touch interface, peripheral device, and porting the embedded Linux. Also, we added wireless communication using ZigBee. With this system we provide remote monitoring and control through the web by adding a web server. Compared to the original system, we say not only a performance improvement, but also more efficient development and cheaper costs. In this study, we focused especially on building a better development environment and a more effective user interface.

Comparative Analysis of the Virtual Machine and Containers Methods through the Web Server Configuration (웹 서버 구성을 통한 가상머신과 컨테이너 방식 비교 분석)

  • Bae, Yu-Mi;Jung, Sung-Jae;Soh, Woo-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2670-2677
    • /
    • 2014
  • The technique of virtual machine construction using hypervisor such as Xen and KVM is mainly used for implementation of cloud computing infrastructure. This technique is efficient in allocating and managing resources compared to the existing operation methods. However it requires high resource usage when constructing virtual machines and results in wasting of resources when not using the allocated resources. Docker is a technique based on the container method to resolve such a problem. This paper shows the container method such as Docker is efficient as a web construction technique by comparing virtual machine method to container method. It is shown to be especially useful when storing data into DB or storage devices in such environments of web server or program development. In the upcoming cloud computing environment the container method such as Docker is expected to improve the resource efficiency and the convenience of management.

An Image Processing Mechanism for Disease Detection in Tomato Leaf (토마토 잎사귀 질병 감지를 위한 이미지 처리 메커니즘)

  • Park, Jeong-Hyeon;Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.959-968
    • /
    • 2019
  • In the agricultural industry, wireless sensor network technology has being applied by utilizing various sensors and embedded systems. In particular, a lot of researches are being conducted to diagnose diseases of crops early by using sensor network. There are some difficulties on traditional research how to diagnose crop diseases is not practical for agriculture. This paper proposes the algorithm which enables to investigate and analyze the crop leaf image taken by image camera and detect the infected area within the image. We applied the enhanced k-means clustering method to the images captured at horticulture facility and categorized the areas in the image. Then we used the edge detection and edge tracking scheme to decide whether the extracted areas are located in inside of leaf or not. The performance was evaluated using the images capturing tomato leaves. The results of performance evaluation shows that the proposed algorithm outperforms the traditional algorithms in terms of classification capability.

Design and Implementation of Integrated Production System for Large Aviation Parts (데이터 중심 통합생산시스템 설계 및 구현: 대형항공부품가공 사례)

  • Bae, Sungmoon;Bae, Hyojin;Hong, Kum Suk;Park, Chulsoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.208-219
    • /
    • 2021
  • In the era of the 4th industrial revolution driven by the convergence of ICT(information and communication technology) and manufacturing, research on smart factories is being actively conducted. In particular, the manufacturing industry prefers smart factories that autonomously connect and analyze data. For the efficient implementation of smart factories, it is essential to have an integrated production system that vertically integrates separately operated production equipment and heterogeneous S/W systems such as ERP, MES. In addition, it is necessary to double-verify production data by using automatic data collection technology so that the production process can be traced transparently. In this study, we want to show a case of data-centered integration of a large aircraft parts processing factory that requires high precision, takes a long time, and has the characteristics of processing large raw materials. For this, the components of the data-oriented integrated production system were identified and the connection structure between them was explained. And we would like to share the experience gained through the design and implementation case. The integrated production system proposed in this study integrates internal components based on data, which is expected to serve as a basis for SMEs to develop into an advanced stage, and traces materials with RFID technology.

Proposal of an Internet Service Providing Information for Consumers to Find the Best Way to Purchase Bottled Water (생수 구매자를 위한 최적의 정보제공 인터넷 서비스 제안)

  • Minyoung Kim;Junho Ryu;Bomin Kim;Hyeonjin Jeong;Jongwook Jang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.851-859
    • /
    • 2023
  • This paper proposes a web service that provides consumers with necessary information to make rational purchases of bottled water. The web service or dedicated mobile application introduced in this paper offers brand-specific manufacturer information and bottled water brand information produced by manufacturers. In addition, detailed information about the manufacturer such as location, environmental quality grade of the Ministry of Environment, and brand/capacity-specific prices are provided to consumers who use the proposed service in this paper. By utilizing the proposed service in this paper, users can receive guidance on how to make rational purchases of the bottled water they need, enabling them to consume economically and healthily.

An Effective Face Authentication Method for Resource - Constrained Devices (제한된 자원을 갖는 장치에서 효과적인 얼굴 인증 방법)

  • Lee Kyunghee;Byun Hyeran
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1233-1245
    • /
    • 2004
  • Though biometrics to authenticate a person is a good tool in terms of security and convenience, typical authentication algorithms using biometrics may not be executed on resource-constrained devices such as smart cards. Thus, to execute biometric processing on resource-constrained devices, it is desirable to develop lightweight authentication algorithm that requires only small amount of memory and computation. Also, among biological features, face is one of the most acceptable biometrics, because humans use it in their visual interactions and acquiring face images is non-intrusive. We present a new face authentication algorithm in this paper. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM) with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. The experimental results on various databases show that our face authentication algorithm with SVM whose input vectors consist of discriminating features extracted by GA has much better performance than the algorithm without feature selection process by GA has, in terms of accuracy and memory requirement. Experiment also shows that the number of the feature ttl be selected is controllable by a system parameter.