scispace - formally typeset
Open Access

Οδηγός για το Raspberry Pi 3 Model B

Reads0
Chats0
TLDR
The present dissertation aims to inform the students about an innovative micro-controller; the Raspberry Pi 3 Model B, one of the most sophisticated pocket computer models, which is able to conduct more complex implementations than the rest of the available models, using more program languages.
Abstract
It is an accepted fact that, as the years go by, technology rapidly evolves. For this reason, it is absolutely necessary to constantly watch its evolution, to search for new ways for its progression, adjusting to the new conditions and demands. This effort can be mainly fulfilled by computers. Computers allow us to comprehend the development of technology, assisted by the growing development of the tool-programs that can be used. Another fundamental stepping stone for the technological evolution is the electrical machines which replace manual labor, since they are faster, more precise, and dependable. On a long term, using the electrical machines decreases the cost, whereas manual labor loses its prestige as the years go by. The present project extensively discusses the Raspberry Pi, one of the most sophisticated pocket computer models, which is able to conduct more complex implementations than the rest of the available models, using more program languages. More specifically, in the 1st chapter, we will make a small introduction about the Raspberry Pi, mentioning its definition and its history, referring to the date of the release of each model and some details about each one of them. We will, also, discuss the differentiations of each model and, this very chapter will make us understand what we can do with each one of the models. In the 2nd chapter, we will refer to the raspberry hardware. First of all, the pins of the Raspberry Pi will be introduced and analyzed. The attachments needed for the activation of the Raspberry Pi will be mentioned and the right steps for the installation of the NOOBS operating system to the SD Card will be studied. Moreover, the RASPBIAN operating system will be installed to the Raspberry Pi 3. Finally, the first steps that we need to make once the Raspberry Pi turns on will be mentioned. In the 3rd chapter we will talk about the SSH. We will closely take a look at the steps needed in order to install the RASPBIAN operating system to the SD Card. We will see what the SSH is, as well. In the 4th chapter, we will study the examples where the micro-controller is used, the attachments needed for each project, and we will analyze the circuits for each of the examples. We will be citing the circuit through the FRITZING and we will be discussing the code of each example so that the application can function. The examples will be of a gradual difficulty. The present dissertation aims to inform the students about an innovative micro-controller; the Raspberry Pi 3 Model B. The truth is that only few people are aware of this micro-controller. For this reason, our goal is to make the micro-controller more comprehensive to you.

read more

Citations
More filters
Journal ArticleDOI

Fog Computing for the Internet of Things: A Survey

TL;DR: The principles and literature characterizing FC are described, highlighting six IoT application domains that may benefit from the use of this paradigm, and an overview of existing FC software and hardware platforms for the IoT is provided.
Journal ArticleDOI

Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment

TL;DR: A new blokchain based secure framework for data management among IoD communication entities is proposed and analyzed that has ability to resist several potential attacks that are essential in IoT-enabled IoD environment and also provides less communication and computation overheads.
Journal ArticleDOI

LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

TL;DR: This paper presents a practical, lightweight deep learning DDoS detection system called Lucid, which exploits the properties of Convolutional Neural Networks (CNNs) to classify traffic flows as either malicious or benign, with a 40x reduction in processing time.
Posted Content

Nethammer: Inducing Rowhammer Faults through Network Requests

TL;DR: This paper presents Nethammer, a remote Rowhammer attack without a single attacker-controlled line of code on the targeted system, i.e., not even JavaScript, and invalidates threat models of Rowhammer defenses building upon the assumption of a local attacker.
Journal ArticleDOI

Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli

TL;DR: The results showed that active impersonating attacks can be prevented using complex scenes and an appropriate limit on the number of authentication attempts, and showed that the achievable authentication accuracy for implicit visual stimuli is comparable to that of using explicit visual stimuli.
References
More filters
Proceedings ArticleDOI

Exploring Human: eBike Interaction to Support Rider Autonomy

TL;DR: This work used inherent cycling body movement to playfully interface with the eBike's functionality and fuse the rider's body to Ava's, as a way of harmonising bodily interaction with theeBike in a continuous expression, offering playful bodily interactions while reducing interaction obstacles.
Proceedings ArticleDOI

Publish-Subscribe Communication in Building Management Systems over Named Data Networking

TL;DR: In this article, a distributed pub-sub communication framework for building management systems (BMS) over the Named Data Networking (NDN) architecture is presented, which employs a data synchronization mechanism to aggregate multiple data streams published by multiple sensing devices and achieve efficient notification of new data for the consumers.
Journal ArticleDOI

A Generic IoT Architecture for Ubiquitous Context-Aware Learning

TL;DR: A novel generic architecture for context-aware ubiquitous learning systems based on the Internet of Things (IoT) computing paradigm is presented, based on advanced message queuing protocol, constrained application protocol, message queue telemetry transport, and extensible messaging and presence protocol.
Proceedings ArticleDOI

BIIT: Standardization of Blockchain-based I 2 oT Systems in the I4 Era

TL;DR: This paper provides a blockchain-agnostic Blockchain I 2oT (BI2oT) architecture called BIIT that allows developing a broad range of BC applications fully integrating Internet of Things (IoT).
Proceedings ArticleDOI

Nethammer: Inducing Rowhammer Faults through Network Requests

TL;DR: In this article, a remote Rowhammer attack without a single attacker-controlled line of code on the targeted system, i.e., not even JavaScript, is presented, which works on commodity consumer-grade systems that either are protected with quality-of-service techniques like Intel CAT or use uncached memory, flush instructions, or non-temporal instructions while handling network requests.