• Title/Summary/Keyword: Memory Capacity

Search Result 498, Processing Time 0.024 seconds

A Hardware Implementation of Pyramidal KLT Feature Tracker (계층적 KLT 특징 추적기의 하드웨어 구현)

  • Kim, Hyun-Jin;Kim, Gyeong-Hwan
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.2
    • /
    • pp.57-64
    • /
    • 2009
  • This paper presents the hardware implementation of the pyramidal KLT(Kanade-Lucas-Tomasi) feature tracker. Because of its high computational complexity, it is not easy to implement a real-time KLT feature tracker using general-purpose processors. A hardware implementation of the pyramidal KLT feature tracker using FPGA(Field Programmable Gate Array) is described in this paper with emphasis on 1) adaptive adjustment of threshold in feature extraction under diverse lighting conditions, and 2) modification of the tracking algorithm to accomodate parallel processing and to overcome memory constraints such as capacity and bandwidth limitation. The effectiveness of the implementation was evaluated over ones produced by its software implementation. The throughput of the FPGA-based tracker was 30 frames/sec for video images with size of $720{\times}480$.

Phase Changes and Microstructural Properties of Ti Alloy Powders Produced by using Attrition Milling Method (어트리션 밀링법으로 제조된 티타늄합금의 상변화 및 미세조직특성)

  • Cha, Sung-Soo
    • Journal of Technologic Dentistry
    • /
    • v.23 no.1
    • /
    • pp.9-19
    • /
    • 2001
  • Microstructure and phase transformation of Ti-Ni-Cu alloy powders produced by using attrition milling method were studied. Mixed powders of Ti-(50-X)Ni-XCu ($X=0{\sim}20$ at%) in composition range were mechanically alloyed for maximum 20 hours by using SUS 1/4" ball in argon atmosphere. Ball to powder ratio was 50: 1 and impeller speed was 350rpm. Mechanically alloyed with attrition millimg method. powder was heat treated at the temperature up to $850^{\circ}C$ for 1 hour in the $10^{-6}$ torr vacuum. Ti-Ni-Cu alloy powders have been fabricated by attrition milling method. and then phase transformation behaviours and microstructual properties of the alloy powders were investigated to assist in improving the the high damping capacity of Ti-Ni-Cu shape memory alloy powders. The results obtained are as follows: 1. After heat treating of fully mechanically alloyed powder at $850^{\circ}C$ for 1hour. most of the B2 and B 19' phases was formed and $TiNi_3$ were coexisted. 2. The B 19' martensite were formed in Ti-Ni-Cu alloy powders whose Cu-content is less than 5a/o. where as the B19 martensite in those whose Cu-content is more than 10at%. 3. The powders of as-milled Ti-Ni-Cu alloys whose Cu-contents is less than 5at% are amorphous. whereas those of as-milled Ti-Ni-Cu alloys whose Cu-content is more than 10at% are crystalline. This means that Cu addition tends to suppress amorphization of Ti-Ni alloy powders.

  • PDF

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

Phase Unwrapping using Modified Goldstein Algorithm in Digital Holography (디지털 홀로그래피에서의 수정된 골드스타인 알고리즘을 이용한 위상펼침)

  • Yoon, Seon-Kyu;Cho, Hyung-Jun;Kim, Doo-Cheol;Yu, Young-Hun;Kim, Sung-Kyu
    • Korean Journal of Optics and Photonics
    • /
    • v.18 no.2
    • /
    • pp.122-129
    • /
    • 2007
  • Generally, many kinds of phase unwrapping algorithm are used to obtain three-dimensional features in digital holography. The Goldstein algorithm is ra epresentative method. which requires small memory capacity and short execution time fer an unwrapping process. However, the Goldstein algorithm has some problems when the dipole residue is located at the boundary. When the opposite residues are located at the boundary and the distance between the opposite residues is longer than the boundary, an incorrect branch cut occurs and results in incorrect calculation. We have modified the Goldstein algorithm to solve the incorrect calculation problem using boundary information. We found that the modified Goldstein algorithm could resolve the Goldstein algorithm's problem.

A Study on Implement of Smart Battery Management System using Embedded Processor (임베디드 프로세서를 이용한 스마트 배터리 관리 시스템 구현에 대한 연구)

  • Oh, Chang-Rok;Lee, Seong-Won
    • Journal of IKEEE
    • /
    • v.15 no.4
    • /
    • pp.345-353
    • /
    • 2011
  • Recently portable mobile devices such as smart-phones and notebooks have rapidly increasing demands. Those devices consume more power because they are expected to offer more complex functionality including multimedia features. For these reasons engineering efforts are changing to focus on maximizing energy efficiency within a limited battery capacity instead of increasing computational performance. In this paper, we propose a battery management system using event driven programming technique on a embedded processor. We also show that the proposed system satisfies SBS (Smart Battery Specification) v1.1. The proposed system maintains minimum code size and memory size comparing to those of RTOSs. The proposed system can be also easily incorporated in the conventional RTOSs as a form of firmware.

Performance Comparison of Virtualization Domain in User Level Virtualization (사용자 레벨 가상화에서 가상화 영역 성능 비교)

  • Jeong, Chan-Joo;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.11
    • /
    • pp.1741-1748
    • /
    • 2013
  • In this paper, we proposed new virtualization technology that is more convenient and stable in local computing environment, then found technique elements need to desktop virtualization which is based on clients in various virtualization technologies. After running excution of process explorer utility in user level virtualization and VMWare, we found memory capacity that is used 30.1MB in VMWare and 16.6MB in user level virtualization respectively to compare private bytes each of process. We found no significant difference of CPU utilization which is executed application program in local computing environment and user domain with user level virtualization. In this result, proposed virtualization technology is able to minimize performance degradation of local computing environment.

A Data Protection Scheme based on Hilbert Curve for Data Aggregation in Wireless Sensor Network (센서 네트워크에서 데이터 집계를 위한 힐버트 커브 기반 데이터 보호 기법)

  • Yoon, Min;Kim, Yong-Ki;Chang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1071-1075
    • /
    • 2010
  • Because a sensor node in wireless sensor networks(WSNs) has limited resources, such as battery capacity and memory, data aggregation techniques have been studied to manage the limited resources efficiently. Because sensor network uses wireless communication, a data can be disclosed by attacker. Thus, the study on data protection schemes for data aggregation is essential in WSNs. But the existing data aggregation methods require both a large number of computation and communication, in case of network construction and data aggregation processing. To solve the problem, we propose a data protection scheme based on Hilbert-curve for data aggregation. Our scheme can minimizes communications among neighboring sensor nodes by using tree-based routing. Moreover, it can protect the data from attacker by doing encryption through a Hilbert-curve technique based on a private seed, Finally, we show that our scheme outperforms the existing methods in terms of message transmission and average sensor node lifetime.

Design and Implementation of Multimedia Education System on Mobile Device (모바일 단말에서의 SMIL을 이용한 멀티미디어 교육 시스템 설계 및 구현)

  • Lim Young-Jin;Seo Jung-Hee;Park Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.581-584
    • /
    • 2006
  • Cellular phones have been popularized and some of them even have access to the Internet. But the utilization of mobile phones has not been for education but only focused on particular services due to the text-based low capacity. This thesis proposes a multimedia education system using cell phones with SMIL. We can decrease the size of the parser and refute the resources of CPU by designing SMIL tag only, which is needed for multimedia education. In addition, the macro method for producing information for lectures will make possible decreased transmission quantity of multimedia contents and increased transmission efficiency. This will lead to overcoming the matter of insufficient CPU and memory, which is common to most mobile phone terminals.

  • PDF

Thermal properties and mechanical properties of dielectric materials for thermal imprint lithography

  • Kwak, Jeon-Bok;Cho, Jae-Choon;Ra, Seung-Hyun
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.242-242
    • /
    • 2006
  • Increasingly complex tasks are performed by computers or cellular phone, requiring more and more memory capacity as well as faster and faster processing speeds. This leads to a constant need to develop more highly integrated circuit systems. Therefore, there have been numerous studies by many engineers investigating circuit patterning. In particular, PCB including module/package substrates such as FCB (Flip Chip Board) has been developed toward being low profile, low power and multi-functionalized due to the demands on miniaturization, increasing functional density of the boards and higher performances of the electric devices. Imprint lithography have received significant attention due to an alternative technology for photolithography on such devices. The imprint technique. is one of promising candidates, especially due to the fact that the expected resolution limits are far beyond the requirements of the PCB industry in the near future. For applying imprint lithography to FCB, it is very important to control thermal properties and mechanical properties of dielectric materials. These properties are very dependent on epoxy resin, curing agent, accelerator, filler and curing degree(%) of dielectric materials. In this work, the epoxy composites filled with silica fillers and cured with various accelerators having various curing degree(%) were prepared. The characterization of the thermal and mechanical properties wasperformed by thermal mechanical analysis (TMA), thermogravimetric analysis (TGA), differential scanning calorimetry (DSC), rheometer, an universal test machine (UTM).

  • PDF

The Effect of Activities of Daily Living(ADL) Training on the Visual Perception Capacity Performance Function of the Stroke (일상생활활동 훈련이 뇌졸중 환자의 시지각 기능에 미치는 효과)

  • Kim, Jiwon;Kim, Miyoung;Hwang, Bosun;Jang, Chel
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.2 no.1
    • /
    • pp.1-14
    • /
    • 2014
  • Purpose : The aim of this study was to investigate Activities of Daily Living(ADL) function recovery of repeated measurement of stroke who received ADL training. Method : Twenty stroke patients were treated by ADL program therapy from May to June. All of in twenty stroke patients, 10 stroke patients take part in Occupational Therapy and 10 stroke patients take part in ADL training for 30 min five times a week during four weeks in M- hospital occupational Therapy treatment room, local in Changwon and Geoje. We used two assessment on is Motor Free Visual Perception Test-Third Edition(MVPT-3) for visual perception the other is Modified Barthel Index(MBI) for ADL. Result : First, Visual Short Term Memory(VSTM) score was changed statistical significance OT intervention group than compare with ADL training group(p<.05). Second, Visaul Closure(VC) score was changed statistical significance OT intervention group than compare with ADL training group(p<.05). Third, Spatial Orientation(SO) score was changed statistical significance OT intervention group than compare with ADL training group(p<.05). The fourth Motor Free Visual Perception Test-Third Edition(MVPT-3) score was changed statistical significance OT intervention group than compare with ADL training group(p<.05). The fifth Modified Barthel Index(MBI total) score was changed statistical significance OT intervention group than compare with ADL training group(p<.05). Conclusion : Therefore, ADL training can be on method the visual perception of stroke patients.