scispace - formally typeset
Open Access

Οδηγός για το Raspberry Pi 3 Model B

Reads0
Chats0
TLDR
The present dissertation aims to inform the students about an innovative micro-controller; the Raspberry Pi 3 Model B, one of the most sophisticated pocket computer models, which is able to conduct more complex implementations than the rest of the available models, using more program languages.
Abstract
It is an accepted fact that, as the years go by, technology rapidly evolves. For this reason, it is absolutely necessary to constantly watch its evolution, to search for new ways for its progression, adjusting to the new conditions and demands. This effort can be mainly fulfilled by computers. Computers allow us to comprehend the development of technology, assisted by the growing development of the tool-programs that can be used. Another fundamental stepping stone for the technological evolution is the electrical machines which replace manual labor, since they are faster, more precise, and dependable. On a long term, using the electrical machines decreases the cost, whereas manual labor loses its prestige as the years go by. The present project extensively discusses the Raspberry Pi, one of the most sophisticated pocket computer models, which is able to conduct more complex implementations than the rest of the available models, using more program languages. More specifically, in the 1st chapter, we will make a small introduction about the Raspberry Pi, mentioning its definition and its history, referring to the date of the release of each model and some details about each one of them. We will, also, discuss the differentiations of each model and, this very chapter will make us understand what we can do with each one of the models. In the 2nd chapter, we will refer to the raspberry hardware. First of all, the pins of the Raspberry Pi will be introduced and analyzed. The attachments needed for the activation of the Raspberry Pi will be mentioned and the right steps for the installation of the NOOBS operating system to the SD Card will be studied. Moreover, the RASPBIAN operating system will be installed to the Raspberry Pi 3. Finally, the first steps that we need to make once the Raspberry Pi turns on will be mentioned. In the 3rd chapter we will talk about the SSH. We will closely take a look at the steps needed in order to install the RASPBIAN operating system to the SD Card. We will see what the SSH is, as well. In the 4th chapter, we will study the examples where the micro-controller is used, the attachments needed for each project, and we will analyze the circuits for each of the examples. We will be citing the circuit through the FRITZING and we will be discussing the code of each example so that the application can function. The examples will be of a gradual difficulty. The present dissertation aims to inform the students about an innovative micro-controller; the Raspberry Pi 3 Model B. The truth is that only few people are aware of this micro-controller. For this reason, our goal is to make the micro-controller more comprehensive to you.

read more

Citations
More filters
Journal ArticleDOI

Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme

TL;DR: In this paper , a security scheme for AoI-enabled 5G smart warehouse through an access control mechanism, where the secure communication among the beacon nodes and the tracking nodes will take place by mutual device authentication and key agreement process.
Proceedings ArticleDOI

Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone

TL;DR: Li et al. as discussed by the authors proposed a new confidential deep learning (DL) inference system with ARM TrustZone to provide confidentiality and integrity of DL models and data in an untrusted edge device with limited memory.
Proceedings ArticleDOI

System for Remote Collaborative Embedded Development

TL;DR: This paper explores the challenges and devised solutions for embedded development which arose during the COVID-19 pandemic and implemented and tested two ideas, based on inte-grated circuit emulation using QEMU to emulate an ARM core and custom software to facilitate communication with the embedded system.
Proceedings ArticleDOI

On the Use of a Low-Cost Embedded System for Face Detection and Recognition

TL;DR: This paper explores the feasibility of using commercially available off-the-shelf components to implement a low-cost embedded system as the core of a facial detection and recognition system.
Proceedings ArticleDOI

Balance Control of a Bipedal Robot Utilizing Intuitive Pattern Generators with Extended Normalized Advantage Functions

TL;DR: This work presents the extension of Normalised Advantage Function (eNAF) algorithm to work with recurrent neural networks without sacrificing time-dependency between data in the same episode to balance a bipedal robot using minimal power consumption.
References
More filters
Journal ArticleDOI

Fog Computing for the Internet of Things: A Survey

TL;DR: The principles and literature characterizing FC are described, highlighting six IoT application domains that may benefit from the use of this paradigm, and an overview of existing FC software and hardware platforms for the IoT is provided.
Journal ArticleDOI

Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment

TL;DR: A new blokchain based secure framework for data management among IoD communication entities is proposed and analyzed that has ability to resist several potential attacks that are essential in IoT-enabled IoD environment and also provides less communication and computation overheads.
Journal ArticleDOI

LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

TL;DR: This paper presents a practical, lightweight deep learning DDoS detection system called Lucid, which exploits the properties of Convolutional Neural Networks (CNNs) to classify traffic flows as either malicious or benign, with a 40x reduction in processing time.
Journal ArticleDOI

Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli

TL;DR: The results showed that active impersonating attacks can be prevented using complex scenes and an appropriate limit on the number of authentication attempts, and showed that the achievable authentication accuracy for implicit visual stimuli is comparable to that of using explicit visual stimuli.
Proceedings ArticleDOI

Boosting fine-grained activity sensing by embracing wireless multipath effects

TL;DR: By revealing the effect of static multipaths in sensing, this paper proposes a novel method to add man-made "virtual" multipath to significantly improve the sensing performance.