The presented system is a smart control and monitoring system for filling bottles using SCADA. The fast advancement in technology is making whole industrial procedures automated. By the automation in ...the system it becomes easy to fill various bottles within less time period as manual process is very much time consuming and can be inaccurate upto a level. But after the development of an automated system, the system becomes more accurate and takes lesser time for bottle filling. Filling of various type of liquid in bottles is done by mostly in companies such as water, food companies, paramedical, and chemical industries. Manual process for filling the bottles results in the wastage of the liquid products. Thus an automated bottle filling system is required for improving the speed of operation, cost of production and to system reliability. In this paper automation is introduced in the system by using a software ‘WonderwareInTouch SCADA’ in the ‘Raspberry Pi 3 module’.
Fall detection systems are designed to provide rapid response and assistance in the event of a fall. This article focuses on the design and implementation of the alert system for a fall detector. The ...system uses sensors to detect falling and quickly sends an alert to a designated caregiver or emergency services. The alert system is designed to be reliable, efficient and user-friendly, providing peace of mind for elderly or disabled individuals who are at high risk of falls. The application can manage hundreds of different sensor types and provides a user-friendly interface for configuring and managing the fall detection system, including setting up alert recipients, defining emergency protocols, individuals, and sensors and monitoring the status of the system.
This paper presents a novel, cost-effective multisensory system designed for animal monitoring in research settings. The system aims to objectively assess animal welfare and discomfort during ...experiments, addressing the need for affordable monitoring solutions in research laboratories. Developed and validated in compliance with European regulations on animal experimentation and in accordance with the requirements of the Animal Research Centre at the University of Alcala´ in Madrid.The system integrates Raspberry Pi 4 Model B and Arduino Uno boards with various sensors, including temperature, humidity, ammonia, airborne particles, and an RGB camera. A user-friendly web interface allows remote monitoring and management of the system. This innovation promises to improve the efficiency and feasibility of animal research, enabling more precise and ethical experimentation while advancing scientific knowledge and animal welfare.
Selecting a right scheduling strategy for the specific embedded application has a significant impact on system’s performance. To adapt to the requirements of a particular embedded application, the ...embedded operating system can be customized manually or automatically. In this paper, the standard process for customizing the CPU scheduling policy in an open source Linux operating system (OS) has been discussed. The paper also focuses on the design & development of the CPU scheduling customization framework for ARM based Raspberry Pi 3, tagged as SchedCust, that allows the CPU scheduler to be configured to execute a particular scheduling policy. The SchedCust framework helps the users to automatically develop the scheduling policy specific custom operating system (OS) for the selected processor. The experimental results have been computed for FIFO and RR scheduling policy, with respect to four distinct parameters. The data collected from user testing showed that the manual process of developing a custom OS takes more time and efforts when compared to the automated process.
In the dynamic realm of technology, various container technologies offer efficient deployment and resource utilization in edge devices. However, limited research has explored how various container ...technologies perform in specific domains. In response, this paper addresses this gap by evaluating container technologies like RunC, LXC, Containerd, Docker, Podman, and Singularity in OpenCV-based computer vision applications on ARM-based edge devices. Results show comparable performance between containerized and non-containerized applications. Containerd excels in memory reading, with both Containerd and LXC efficient in wired image reception, while Singularity and Containerd lead in wireless image reception. Despite Docker's slower memory reading, its consistently faster processing time positions it as a competitive option. Overall, Docker demonstrates superior efficiency for computer vision applications on ARM-based edge devices. These insights contribute to bridge the existing gap in integrating containers into IoT and ARM-based edge computing scenarios.
Eben Upton: Raspberry Pi Severance, Charles
Computer (Long Beach, Calif.),
10/2013, Letnik:
46, Številka:
10
Journal Article
Recenzirano
Odprti dostop
Eben Upton describes why and how he formed the Raspberry Pi Foundation. The first Web extra at http://youtu.be/JVU5QBg5l6g is an audio recording of Charles Severance's Computing Conversations column, ...in which he discusses his interview with Eben Upton about the formation of the Raspberry Pi Foundation. The second Web extra at http://youtu.be/P5KEiuTT_E8 is a video segment of Charles Severance's interview with Eben Upton about the design of the Raspberry Pi and the forming of the Raspberry Pi Foundation.
In recent years, IoT platforms have become increasingly used due to their untapped potential. This paper aims to create an IoT system to monitor temperature and humidity in an enclosure The Raspberry ...Pi 4 SBC (Single-Board Computer) development board and ThingSpeak cloud platform will be used to make this system. Data from the DHT11 humidity and temperature sensor will be collected by the Raspberry PI 4 SBC development board, which will transmit it via the WiFi connection to the IoT ThingSpeak platform cloud for further analysis. The IoT ThingSpeak platform provides data storage, processing and visualization services.
Bu çalışmada
yeni bir kaotik sistem ile mikrobilgisayar tabanlı olarak el üstü damar
görüntülerinin şifrelenerek, güvenli bir şekilde veri tabanında saklanması ve
kullanılması amaçlanmıştır. Çalışma ...kapsamında öncelikle kızılötesi kamera
yardımıyla kişilerden alınan el üstü damar görüntüleri ön işleme ile
iyileştirilmiştir. Daha sonra ön işlemeden geçirilmiş damar görüntüleri
mikrobilgisayar ortamında şifrelenmiştir. Şifreleme işlemi için yeni tasarlanan
ve analizleri gerçekleştirilen kaotik sistem ile üretilen rasgele sayılar
kullanılmıştır. Şifreleme işlemi öncesi elde edilen rasgele sayılar,
uluslararası alanda en çok kabul gören NIST-800-22 ve ENT testlerine tabi
tutularak, tüm testlerden başarılı sonuçlar alınmıştır. Kaos tabanlı şifreleme
sonucunda elde edilen görüntülerin histogram, korelasyon, entropi, NPCR ve UACI
gibi literatürde sıklıkla kullanılan güvenlik analizleri ile başarımları
ölçülmüştür. Gerçekleştirilen çalışma ile kimlik tanıma sistemlerinde de
kullanılabilen el üstü damar görüntülerinin mobil olarak güvenli bir şekilde
kullanılabileceği gösterilmiştir.