Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Raspberry Pi (Computer) 123
- Programming 63
- Python (Computer program language) 57
- Computer input-output equipment 49
- Hardware and Maker 45
- Linux 31
- Microcomputers 26
- Computer programming 25
- Internet of things 25
- Development 19
- Application software 18
- Operating systems (Computers) 18
- Arduino (Programmable controller) 17
- Design and construction 13
- Artificial intelligence 12
- Pocket computers 12
- Programming languages (Electronic computers) 12
- Python 12
- Computer networks 11
- Java (Computer program language) 11
- Robots 11
- Engineering & Applied Sciences 10
- Microcontrollers 10
- Computer Hardware 9
- Computer hardware 9
- Computer science 9
- Electrónica 9
- Embedded computer systems 9
- Security measures 9
- Computer Science 8
-
361Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- Acknowledgments -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Deploying Ubuntu Server -- Setting up our lab -- Determining your server's role -- Obtaining Ubuntu Server -- Deciding between 32-bit and 64-bit installations -- Creating a bootable Ubuntu Server flash drive (Windows) -- Creating a bootable Ubuntu Server flash drive (Linux) -- Creating a bootable Ubuntu Server flash drive (Mac) -- Planning the partition layout -- Installing Ubuntu Server -- Installing Ubuntu Server (Raspberry Pi) -- Summary -- Chapter 2: Managing Users -- Understanding when to use root -- Creating and removing users -- Understanding the /etc/passwd and /etc/shadow files -- Distributing default configuration files with /etc/skel -- Switching between users -- Managing groups -- Managing passwords and password policies -- Configuring administrator access with sudo -- Setting permissions on files and directories -- Summary -- Chapter 3: Managing Storage Volumes -- Viewing disk usage -- Adding additional storage volumes -- Partitioning and formatting volumes -- Mounting and unmounting storage volumes -- Understanding the /etc/fstab file -- Managing swap -- Utilizing LVM volumes -- Using symbolic and hard links -- Summary -- Chapter 4: Connecting to Networks -- Setting the hostname -- Managing network interfaces -- Assigning static IP addresses -- Understanding Linux name resolution -- Understanding Network Manager -- Getting started with OpenSSH -- Getting started with SSH key management -- Simplifying SSH connections with a ~/.ssh/config file -- Summary -- Chapter 5: Managing Software Packages -- Understanding Linux package management -- Installing and removing software -- Searching for packages -- Managing software repositories -- Keeping your server up to date…”
Libro electrónico -
362Publicado 2017Tabla de Contenidos: “…Identifying the Players -- Smart(er) VBA Document Deployment -- Email and Saved Passwords -- Keyloggers and Cookies -- Bringing It All Together -- Summary -- Exercises -- Chapter 6: Criminal Intelligence -- Payload Delivery Part VI: Deploying with HTA -- Malware Detection -- Privilege Escalation in Microsoft Windows -- Escalating Privileges with Local Exploits -- Exploiting Automated OS Installations -- Exploiting the Task Scheduler -- Exploiting Vulnerable Services -- Hijacking DLLs -- Mining the Windows Registry -- Command and Control Part VI: The Creeper Box -- Creeper Box Specification -- Introducing the Raspberry Pi and Its Components -- GPIO -- Choosing an OS -- Configuring Full-Disk Encryption -- A Word on Stealth -- Configuring Out-of-Band Command and Control Using 3G/4G -- Creating a Transparent Bridge -- Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers -- The Attack -- Spoofing Caller ID and SMS Messages -- Summary -- Exercises -- Chapter 7: War Games -- Background and Mission Briefing -- Payload Delivery Part VII: USB Shotgun Attack -- USB Media -- A Little Social Engineering -- Command and Control Part VII: Advanced Autonomous Data Exfiltration -- What We Mean When We Talk About "Autonomy" -- Means of Egress -- The Attack -- Constructing a Payload to Attack a Classified Network -- Stealthy 3G/4G Software Install -- Attacking the Target and Deploying the Payload -- Efficient "Burst-Rate" Data Exfiltration -- Summary -- Exercises -- Chapter 8: Hack Journalists -- Briefing -- Advanced Concepts in Social Engineering -- Cold Reading -- C2 Part VIII: Experimental Concepts in Command and Control -- Scenario 1: C2 Server Guided Agent Management -- Scenario 2: Semi-Autonomous C2 Agent Management -- Payload Delivery Part VIII: Miscellaneous Rich Web Content -- Java Web Start -- Adobe AIR -- A Word on HTML5 -- The Attack…”
Libro electrónico -
363Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Getting Started with the BBC Micro:bit -- Chapter 1: Introduction to the BBC Micro:bit -- Technical requirements -- The history of the Micro:bit -- The specifications of Micro:bit V1 and Micro:bit V2 -- Powering up the Micro:bit -- The out-of-box experience -- Breakout boards -- Fritzing to create circuit diagrams -- Summary -- Further reading -- Chapter 2: Setting Up the Micro:bit and Using Code Editors -- Technical requirements -- BBC Micro:bit versus Raspberry Pi -- The Python programming language -- Python implementations and distributions -- Introduction to MicroPython -- MicroPython code editors -- Online code editors -- Using REPL -- Using offline IDEs for MicroPython -- The Thonny Python IDE -- The Mu editor -- Working with other editors and smartphone apps -- Manually upgrading the firmware -- Restoring the out-of-the-box experience program -- Summary -- Further readings -- Chapter 3: Basics of Python -- Technical requirements -- Getting started with Python programming -- Variables -- Code comments -- Arithmetic, string, and logical operations -- Data type conversion -- Handling user input -- Conditional statements -- Loops -- Computing prime numbers, factorials, and Fibonacci series -- Summary -- Further reading -- Chapter 4: Advanced Python -- Technical requirements -- Lists, tuples, and dictionaries -- Functions -- Recursion -- Indirect recursion -- Object-oriented programming with Python -- Exploring the random module -- Getting help for built-in modules -- Retrieving system properties with code -- Summary -- Further reading -- Part 2: Programming Hardware with MicroPython -- Chapter 5: Built-in LED Matrix Display and Push Buttons -- Technical requirements -- Built-in programmable 5x5 LED matrix…”
Libro electrónico -
364Publicado 2021Tabla de Contenidos: “…Saving scraped data to a CSV file -- Chapter 4 Libraries, Packages, and Modules -- Understanding the Python Standard Library -- Using the dir() function -- Using the help() function -- Exploring built-in functions -- Exploring Python Packages -- Importing Python Modules -- Making Your Own Modules -- Book 4 Using Artificial Intelligence -- Chapter 1 Exploring Artificial Intelligence -- AI Is a Collection of Techniques -- Neural networks -- Machine learning -- TensorFlow - A framework for deep learning -- Current Limitations of AI -- Chapter 2 Building a Neural Network -- Understanding Neural Networks -- Layers of neurons -- Weights and biases -- The activation function -- Loss function -- Building a Simple Neural Network in Python -- The neural-net Python code -- Using TensorFlow for the same neural network -- Installing the TensorFlow Python library -- Building a Python Neural Network in TensorFlow -- Loading your data -- Defining your neural-network model and layers -- Compiling your model -- Fitting and training your model -- Evaluating the model -- Breaking down the code -- Checking the results -- Changing to a three-layer neural network in TensorFlow and Keras -- Chapter 3 Doing Machine Learning -- Learning by Looking for Solutions in All the Wrong Places -- Creating a Machine-Learning Network for Detecting Clothes Types -- Setting up the software environment -- Getting the data from the Fashion-MNIST dataset -- Training the network -- Testing our network -- Breaking down the code -- Results of the training and evaluation -- Testing a single test image -- Testing on external pictures -- The results, round 1 -- The CNN model code -- The results, round 2 -- Visualizing with MatPlotLib -- Learning More Machine Learning -- Chapter 4 Exploring AI -- Limitations of the Raspberry Pi and AI -- Adding Hardware AI to the Raspberry Pi -- AI in the Cloud…”
Libro electrónico -
365Publicado 2018Tabla de Contenidos: “…-- Subsumption architecture -- Software setup -- Laptop preparation -- Installing Python -- Installing ROS on the laptop -- Setup of Raspberry Pi 3 -- VNC -- Setting up catkin workspaces -- Hardware -- Beginning at the beginning - knolling -- Assembling the tracks -- Mounting the tracks -- Arm base assembly (turntable) -- Arm assembly -- Wiring -- Summary -- Questions -- Further reading -- Chapter 3: A Concept for a Practical Robot Design Process -- A systems engineering-based approach to robotics -- Our task - cleaning up the playroom -- Use cases -- The problem - part 1 -- Who - the robot -- What - pick up toys and put them in the toy box -- What - pick up and put away in the toy box the items that were not previously in the room -- When - after the grandchildren have visited and they have left, continue to pick up toys until there are none left…”
Libro electrónico -
366Publicado 2016“…You will also discover how to crack wireless networks with speed, perform man-in-the-middle and DOS attacks, and use Raspberry Pi ..…”
Libro electrónico -
367Publicado 2017“…About This Book Learn to build promising IoT projects with Android Things Make the most out of hardware peripherals using standard Android APIs Build enticing projects on IoT, home automation, and robotics by leveraging Raspberry Pi 3 and Intel Edison Who This Book Is For This book is for Android enthusiasts, hobbyists, IoT experts, and Android developers who want to gain a deeper knowledge of Android Things. …”
Libro electrónico -
368Publicado 2019Tabla de Contenidos: “…SENSORES CON PICO BOARD Y RASPBERRY PI -- 4. LEGO MINDSTORMS -- ANEXO I. VISUAL BLOCK CREATIVE COMPUTING TEST (VBCCT). …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull)Acceso restringido con credenciales UPSA
Libro electrónico -
369Publicado 2017Tabla de Contenidos: “…. -- Chapter 11: Kali in Your Pocket -NetHunters and Raspberries -- Introduction -- Installing Kali on Raspberry Pi -- Getting ready -- How to do it... -- Installing NetHunter -- Getting ready -- How to do it... -- Superman typing - HID attacks -- How to do it... -- Can I charge my phone? …”
Libro electrónico -
370Publicado 2018Tabla de Contenidos: “…C4) -- BeagleBoard-xM -- BeagleBone -- BeagleBone Black -- Gumstix -- Additional specifications -- Raspberry Pi -- Specifications -- Setting up the BeagleBone Black -- Flash Memory and File Systems -- BeagleBone Black Memory Configuration -- Preparing the Board -- Caveat -- The Boot Process -- Differences Between Version 7.4 and Version 8.7 -- The Root File System Image -- Boot to the NFS File System -- What Can Go Wrong? …”
Libro electrónico -
371por Parasram, Shiva V. N.Tabla de Contenidos: “…-- The need for blue and purple teams -- Digital forensics methodologies and frameworks -- DFIR frameworks -- Comparison of digital forensics operating systems -- Digital evidence and forensics toolkit Linux -- Computer Aided INvestigative Environment (CAINE) -- CSI Linux -- Kali Linux -- The need for multiple forensics tools in digital investigations -- Commercial forensics tools -- Anti-forensics - threats to digital forensics -- Summary -- Chapter 3: Installing Kali Linux -- Technical requirements -- Downloading Kali Linux -- Downloading the required tools and images -- Downloading the Kali Linux Everything torrent -- Installing Kali Linux on portable storage media for live DFIR -- Installing Kali as a standalone operating system -- Installing Kali in VirtualBox -- Preparing the Kali Linux VM -- Installing Kali Linux on the virtual machine -- Installing and configuring Kali Linux as a virtual machine or as a standalone OS -- Summary -- Chapter 4: Additional Kali Installations and Post-Installation Tasks -- Installing a pre-configured version of Kali Linux in VirtualBox -- Installing Kali Linux on Raspberry Pi4 -- Updating Kali -- Enabling the root user account in Kali -- Adding the Kali Linux forensics metapackage -- Summary -- Chapter 5: Installing WINE in Kali Linux -- What WINE is and the advantages of using it in Kali Linux -- Installing WINE…”
Publicado 2023
Libro electrónico -
372Publicado 2022Tabla de Contenidos: “…3.2.4 Rehabilitation Robot for Gait Training -- 3.3 Solutions and Methods for the Rehabilitation Process -- 3.3.1 Gait Analysis -- 3.3.2 Methods Based on Deep Learning -- 3.3.3 Use of Convolutional Neural Networks -- 3.4 Proposed System -- 3.4.1 Detection of Motion and Rehabilitation Mechanism -- 3.4.2 Data Collection Using Wearable Sensors -- 3.4.3 Raspberry Pi -- 3.4.4 Pre-Processing of the Data -- 3.5 Analysis of the Data -- 3.5.1 Feature Extraction -- 3.5.2 Machine Learning Approach -- 3.5.3 Remote Rehabilitation Mode -- 3.6 Results and Discussion -- 3.7 Conclusion -- References -- 4 Smart Sensors for Activity Recognition -- 4.1 Introduction -- 4.2 Wearable Biosensors for Activity Recognition -- 4.3 Smartphones for Activity Recognition -- 4.3.1 Early Analysis Activity Recognition -- 4.3.2 Similar Approaches Activity Recognition -- 4.3.3 Multi-Sensor Approaches Activity Recognition -- 4.3.4 Fitness Systems in Activity Recognition -- 4.3.5 Human-Computer Interaction Processes in Activity Recognition -- 4.3.6 Healthcare Monitoring in Activity Recognition -- 4.4 Machine Learning Techniques -- 4.4.1 Decision Trees Algorithms for Activity Reorganization -- 4.4.2 Adaptive Boost Algorithms for Activity Reorganization -- 4.4.3 Random Forest Algorithms for Activity Reorganization -- 4.4.4 Support Vector Machine (SVM) Algorithms for Activity Reorganization -- 4.5 Other Applications -- 4.6 Limitations -- 4.6.1 Policy Implications and Recommendations -- 4.7 Discussion -- 4.8 Conclusion -- References -- 5 Use of Assistive Techniques for the Visually Impaired People -- 5.1 Introduction -- 5.2 Rehabilitation Procedure -- 5.3 Development of Applications for Visually Impaired -- 5.4 Academic Research and Development for Assisting Visually Impaired -- 5.5 Conclusion -- References -- 6 IoT-Assisted Smart Device for Blind People -- 6.1 Introduction…”
Libro electrónico -
373Publicado 2023Tabla de Contenidos: “…3.4 Electronic Design Automation (EDA) -- 3.4.1 System-Level Design -- 3.4.2 Logic Synthesis and Physical Design -- 3.4.3 Test, Diagnosis, and Validation -- 3.5 Verification -- 3.6 Challenges -- 3.7 Conclusion -- References -- Chapter 4 IoT-Based Smart Home Security Alert System for Continuous Supervision -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Results and Discussions -- 4.3.1 Raspberry Pi-3 B+Module -- 4.3.2 Pi Camera -- 4.3.3 Relay -- 4.3.4 Power Source -- 4.3.5 Sensors -- 4.3.5.1 IR & -- Ultrasonic Sensor -- 4.3.5.2 Gas Sensor -- 4.3.5.3 Fire Sensor -- 4.3.5.4 GSM Module -- 4.3.5.5 Buzzer -- 4.3.5.6 Cloud -- 4.3.5.7 Mobile -- 4.4 Conclusions -- References -- Chapter 5 A Detailed Roadmap from Conventional-MOSFET to Nanowire-MOSFET -- 5.1 Introduction -- 5.2 Scaling Challenges Beyond 100nm Node -- 5.3 Alternate Concepts in MOFSETs -- 5.4 Thin-Body Field-Effect Transistors -- 5.4.1 Single-Gate Ultrathin-Body Field-Effect Transistor -- 5.4.2 Multiple-Gate Ultrathin-Body Field-Effect Transistor -- 5.5 Fin-FET Devices -- 5.6 GAA Nanowire-MOSFETS -- 5.7 Conclusion -- References -- Chapter 6 Gate All Around MOSFETs-A Futuristic Approach -- 6.1 Introduction -- 6.1.1 Semiconductor Technology: History -- 6.2 Importance of Scaling in CMOS Technology -- 6.2.1 Scaling Rules -- 6.2.2 The End of Planar Scaling -- 6.2.3 Enhance Power Efficiency -- 6.2.4 Scaling Challenges -- 6.2.4.1 Poly Silicon Depletion Effect -- 6.2.4.2 Quantum Effect -- 6.2.4.3 Gate Tunneling -- 6.2.5 Horizontal Scaling Challenges -- 6.2.5.1 Threshold Voltage Roll-Off -- 6.2.5.2 Drain Induce Barrier Lowering (DIBL) -- 6.2.5.3 Trap Charge Carrier -- 6.2.5.4 Mobility Degradation -- 6.3 Remedies of Scaling Challenges -- 6.3.1 By Channel Engineering (Horizontal) -- 6.3.1.1 Shallow S/D Junction -- 6.3.1.2 Multi-Material Gate -- 6.3.2 By Gate Engineering (Vertical)…”
Libro electrónico -
374Publicado 2024Tabla de Contenidos: “…8.2.2 Introduction to Arduino, Raspberry Pi, and Their Components -- 8.2.3 Recognizing the Input/Output -- 8.3 Open Service Platforms for IoT Cloud Computing -- 8.4 Resource Management Techniques for Cloud‐Based IoT Environments -- 8.5 Data Management for IoT -- 8.6 ThingSpeak for IoT -- References -- Chapter 9 The Internet of Things for Healthcare -- 9.1 IoT as a Key in the Digital Healthcare System -- 9.2 How IoT Helps in Healthcare Processes -- 9.3 Applications of IoT Technology in Healthcare -- 9.3.1 Remote Patient Monitoring -- 9.3.2 Smart Healthcare Systems -- 9.3.3 Telemedicine -- 9.3.4 Drug Development -- 9.3.5 Medical Robots -- 9.4 Healthcare IoT Challenges, Security Issues, and Risks -- 9.5 Wireless Body Area Network (WBAN) -- 9.6 WBAN Architecture -- 9.7 What Makes Wearables So Sexy? …”
Libro electrónico -
375por Ebner, JürgenTabla de Contenidos: “…3.3.4 Installation abschließen und neu starten -- 3.4 Dual-Boot - Kali Linux und Windows -- 3.5 Installation auf einem vollständig verschlüsselten Dateisystem -- 3.5.1 Einführung in LVM -- 3.5.2 Einführung in LUKS -- 3.5.3 Konfigurieren verschlüsselter Partitionen -- 3.6 Kali Linux auf Windows Subsystem for Linux -- 3.6.1 Win-KeX -- 3.7 Kali Linux auf einem Raspberry Pi -- 3.8 Systemeinstellungen und Updates -- 3.8.1 Repositories -- 3.8.2 NVIDIA-Treiber für Kali Linux installieren -- 3.8.3 Terminal als Short-Cut (Tastenkombination) -- 3.9 Fehlerbehebung bei der Installation -- 3.9.1 Einsatz der Installer-Shell zur Fehlerbehebung -- 3.10 Zusammenfassung -- Kapitel 4: Erste Schritte mit Kali -- 4.1 Konfiguration von Kali Linux -- 4.1.1 Netzwerkeinstellungen -- 4.1.2 Verwalten von Benutzern und Gruppen -- 4.1.3 Services konfigurieren -- 4.2 Managing Services -- 4.3 Hacking-Labor einrichten -- 4.3.1 Kali Linux - Test Lab Environment -- 4.4 Sichern und Überwachen mit Kali Linux -- 4.4.1 Sicherheitsrichtlinien definieren -- 4.4.2 Mögliche Sicherheitsmaßnahmen -- 4.4.3 Netzwerkservices absichern -- 4.4.4 Firewall- oder Paketfilterung -- 4.5 Weitere Tools installieren -- 4.5.1 Meta-Packages mit kali-tweaks installieren -- 4.5.2 Terminator statt Terminal -- 4.5.3 OpenVAS zur Schwachstellenanalyse -- 4.5.4 SSLstrip2 -- 4.5.5 Dns2proxy -- 4.6 Kali Linux ausschalten -- 4.7 Zusammenfassung -- Teil II: Einführung in Penetration Testing -- Kapitel 5: Einführung in Security Assessments -- 5.1 Kali Linux in einem Assessment -- 5.2 Arten von Assessments -- 5.2.1 Schwachstellenanalyse -- 5.2.2 Compliance-Test -- 5.2.3 Traditioneller Penetrationstest -- 5.2.4 Applikations-Assessment -- 5.3 Normierung der Assessments -- 5.4 Arten von Attacken -- 5.4.1 Denial of Services (DoS) -- 5.4.2 Speicherbeschädigungen -- 5.4.3 Schwachstellen von Webseiten…”
Publicado 2023
Libro electrónico -
376Publicado 2023Tabla de Contenidos: “…Getting Podman -- C.1 Installing Podman -- C.1.1 macOS -- C.1.2 Windows -- C.1.3 Arch Linux and Manjaro Linux -- C.1.4 CentOS -- C.1.5 Debian -- C.1.6 Fedora -- C.1.7 Fedora-CoreOS, Fedora Silverblue -- C.1.8 Gentoo -- C.1.9 OpenEmbedded -- C.1.10 openSUSE -- C.1.11 openSUSE Kubic -- C.1.12 Raspberry Pi OS arm64 -- C.1.13 Red Hat Enterprise Linux -- C.1.14 Ubuntu -- C.2 Building from source code -- C.3 Podman Desktop -- Summary -- Appendix D. …”
Libro electrónico -
377Publicado 2023Tabla de Contenidos: “…5.6 Disadvantages of AI in Agriculture -- 5.7 Conclusion -- References -- Chapter 6 The Potential of Artificial Intelligence in the Healthcare System -- 6.1 Introduction -- 6.2 Machine Learning -- 6.3 Neural Networks -- 6.4 Expert Systems -- 6.5 Robots -- 6.6 Fuzzy Logic -- 6.7 Natural Language Processing -- 6.8 Sensor Network Technology in Artificial Intelligence -- 6.9 Sensory Devices in Healthcare -- 6.9.1 Wearable Devices -- 6.9.2 Implantable Devices -- 6.10 Neural Interface for Sensors -- 6.10.1 Intrusion Devices in Artificial Intelligence -- 6.11 Artificial Intelligence in Healthcare -- 6.11.1 Role of Artificial Intelligence in Medicine -- 6.11.2 Role of Artificial Intelligence in Surgery -- 6.11.3 Role of Artificial Intelligence in Rehabilitation -- 6.12 Why Artificial Intelligence in Healthcare -- 6.13 Advancements of Artificial Intelligence in Healthcare -- 6.14 Future Challenges -- 6.15 Discussion -- 6.16 Conclusion -- References -- Chapter 7 Improvement of Computer Vision-Based Elephant Intrusion Detection System (EIDS) with Deep Learning Models -- 7.1 Introduction -- 7.2 Elephant Intrusion Detection System (EIDS) -- 7.2.1 Existing Approaches -- 7.2.2 Challenges -- 7.3 Theoretical Framework -- 7.3.1 Deep Learning Models for EIDS -- 7.3.1.1 Fast RCNN -- 7.3.1.2 Faster RCNN -- 7.3.1.3 Single-Shot Multibox Detector (SSD) -- 7.3.1.4 You Only Look Once (YOLO) -- 7.3.2 Hardware Specifications -- 7.3.2.1 Raspberry-Pi 3 Model B -- 7.3.2.2 Night Vision OV5647 Camera Module -- 7.3.2.3 PIR Sensor -- 7.3.2.4 GSM Module -- 7.3.3 Proposed Work -- 7.4 Experimental Results -- 7.4.1 Dataset Preparation -- 7.4.2 Performance Analysis of DL Algorithms -- 7.5 Conclusion -- References -- Chapter 8 A Study of WSN Privacy Through AI Technique -- 8.1 Introduction -- 8.2 Review of Literature -- 8.3 ML in WSNs -- 8.3.1 Supervised Learning…”
Libro electrónico -
378Publicado 2016“…Gain a fundamental understanding of the Internet of Things-the IoT Build two working IoT prototypes using off the shelf components Learn to set up, configure, and program an ESP8266 IoT computer using the Arduino IDE Understand how to build an IoT web server Practice creating complex IoT devices using the Grove "no-soldering" prototyping system Learn to use the IOT messaging protocol (MQTT) with the Raspberry Pi and the Adafruit.io platforms Dr. John C. …”
-
379Publicado 2020“…Provides a high-level overview of digital twins and their underutilization in the field of asset management and maintenance Proposes a streamline process to create digital twins for a wide variety of applications using MATLAB® Simscape" Deploys developed digital twins on Amazon Web Services Includes MATLAB and Simulink codes available for free download on MATLAB central Covers popular prototyping hardwares, such as Arduino and Raspberry Pi…”
Libro electrónico -
380por Weigend, Michael“…Über den Autor: Michael Weigend ist Informatiklehrer und hat bereits mehrere Bücher zum Raspberry Pi und zu Python geschrieben…”
Publicado 2015
Libro electrónico