scispace - formally typeset
Open Access

Οδηγός για το Raspberry Pi 3 Model B

Reads0
Chats0
TLDR
The present dissertation aims to inform the students about an innovative micro-controller; the Raspberry Pi 3 Model B, one of the most sophisticated pocket computer models, which is able to conduct more complex implementations than the rest of the available models, using more program languages.
Abstract
It is an accepted fact that, as the years go by, technology rapidly evolves. For this reason, it is absolutely necessary to constantly watch its evolution, to search for new ways for its progression, adjusting to the new conditions and demands. This effort can be mainly fulfilled by computers. Computers allow us to comprehend the development of technology, assisted by the growing development of the tool-programs that can be used. Another fundamental stepping stone for the technological evolution is the electrical machines which replace manual labor, since they are faster, more precise, and dependable. On a long term, using the electrical machines decreases the cost, whereas manual labor loses its prestige as the years go by. The present project extensively discusses the Raspberry Pi, one of the most sophisticated pocket computer models, which is able to conduct more complex implementations than the rest of the available models, using more program languages. More specifically, in the 1st chapter, we will make a small introduction about the Raspberry Pi, mentioning its definition and its history, referring to the date of the release of each model and some details about each one of them. We will, also, discuss the differentiations of each model and, this very chapter will make us understand what we can do with each one of the models. In the 2nd chapter, we will refer to the raspberry hardware. First of all, the pins of the Raspberry Pi will be introduced and analyzed. The attachments needed for the activation of the Raspberry Pi will be mentioned and the right steps for the installation of the NOOBS operating system to the SD Card will be studied. Moreover, the RASPBIAN operating system will be installed to the Raspberry Pi 3. Finally, the first steps that we need to make once the Raspberry Pi turns on will be mentioned. In the 3rd chapter we will talk about the SSH. We will closely take a look at the steps needed in order to install the RASPBIAN operating system to the SD Card. We will see what the SSH is, as well. In the 4th chapter, we will study the examples where the micro-controller is used, the attachments needed for each project, and we will analyze the circuits for each of the examples. We will be citing the circuit through the FRITZING and we will be discussing the code of each example so that the application can function. The examples will be of a gradual difficulty. The present dissertation aims to inform the students about an innovative micro-controller; the Raspberry Pi 3 Model B. The truth is that only few people are aware of this micro-controller. For this reason, our goal is to make the micro-controller more comprehensive to you.

read more

Citations
More filters
Proceedings ArticleDOI

Affordable patient record automation for small clinics: field testing the piClinic console

TL;DR: The piClinic Console is designed to automate key aspects of patient information management in small, limited-resource clinics so as to introduce automation into a clinic in a way that the clinic can sustain with little or no additional support.
Journal ArticleDOI

High-Level Modular Autopilot Solution for Fast Prototyping of Unmanned Aerial Systems

TL;DR: The presented tool provides a flexible and user-friendly high-level environment with enhanced computational capabilities, which drastically reduces the prototyping timespans of complex algorithms, while preventing incidents thanks to its redundant design with a human-in-the-loop pilot on the reliable PX4.
Proceedings ArticleDOI

A Proposal of Frequency Assigning Method for Bluetooth and WLAN Coexistence in 2.4GHz Band

TL;DR: This paper proposes a frequency assigning method for uniformed management of both Bluetooth and wireless LANs and shows the effectiveness of the proposed method with actual devices under the situation that the communication efficiency is degraded by a mixture of multiple wireless standards.
Journal ArticleDOI

Implementation of Autonomous Driving on RC-CAR with Raspberry PI and AI Server

Kitae Hwang, +2 more
- 20 Jan 2022 - 
TL;DR: An autonomous driving system development platform was developed using an inexpensive RC-Car, and a test system that can test various algorithms related to autonomous driving was introduced, solving various difficulties that could not be known by developing an autonomous driving algorithm using simulators.
Proceedings ArticleDOI

A Fault Injection Framework for Real-time Multicore Embedded Systems

TL;DR: A non-intrusive framework to inject faults in real-time multicore embedded systems without impairing the temporal characteristics of the critical tasks being executed, thus enabling a fine-grain simulation of the behavior of such systems under faulty conditions is presented.
References
More filters
Journal ArticleDOI

Fog Computing for the Internet of Things: A Survey

TL;DR: The principles and literature characterizing FC are described, highlighting six IoT application domains that may benefit from the use of this paradigm, and an overview of existing FC software and hardware platforms for the IoT is provided.
Journal ArticleDOI

Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment

TL;DR: A new blokchain based secure framework for data management among IoD communication entities is proposed and analyzed that has ability to resist several potential attacks that are essential in IoT-enabled IoD environment and also provides less communication and computation overheads.
Journal ArticleDOI

LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

TL;DR: This paper presents a practical, lightweight deep learning DDoS detection system called Lucid, which exploits the properties of Convolutional Neural Networks (CNNs) to classify traffic flows as either malicious or benign, with a 40x reduction in processing time.
Journal ArticleDOI

Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli

TL;DR: The results showed that active impersonating attacks can be prevented using complex scenes and an appropriate limit on the number of authentication attempts, and showed that the achievable authentication accuracy for implicit visual stimuli is comparable to that of using explicit visual stimuli.
Proceedings ArticleDOI

Boosting fine-grained activity sensing by embracing wireless multipath effects

TL;DR: By revealing the effect of static multipaths in sensing, this paper proposes a novel method to add man-made "virtual" multipath to significantly improve the sensing performance.