Wireless Single Board Computing Devices
VerifiedAdded on 2023/03/30
|9
|2964
|180
AI Summary
This article discusses the concept of wireless single board computing devices and their applications in IoT systems and robotics. It explores the advantages of using SBCs like Raspberry Pi and the challenges they face. It also provides insights on protecting SBC systems from DoS and DDoS attacks and securely sending data to IoT cloud. Overall, it highlights the implications and benefits of control access in IoT and the importance of managing and controlling access to IoT cloud.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
TITLE: WIRELESS SINGLE BOARD COMPUTING DEVICES
Wireless Single Board Computing devices
Wireless Single Board Computing devices
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract
A single-board computer (SBC) is a single circuit board consisting of all complete computer
features with compromise memory, a microprocessor among other features. However, it will not
accept the extension of other functions like personal computers. They are mainly used in learning
purposes, research and also testing of some devices. Raspberry Pi is a common type and it is mostly
used in Internet of Things such as robotics because of their simplicity to handle and also favorable
environment which doesn't require much attentions due to the complexity. IoT cloud is a cloud
computing platform used by IoT devices to store and manage there data. The data generate by the
IoT devices is so big and therefore very secured environment for storage is necessary. IoT devices
collects data and send them to the cloud for processing by using of virtual physical sensors to
upload data to cloud basically so that they can access data remotely hence it will be difficult for
hackers to gain access on the data.1
IoT cloud is the technology that has brought so many implications both in the industry and also the
users. Such implications has both the positive and the negative impacts overall. The benefits of
control access in IoT are full integration of the systems, it is accessible from internet, can be used in
both automatic and manual control, and also it is very easy to track the records of the events taking
place. The main disadvantages are they are complex and costly especially in small scale businesses
or individual use, hackers can also hack such devices because the security issues as always
persisted, and also it is a matured type of the technology but the advancements are still going on.2
Introduction
Wi-Fi (wireless fidelity) networks which is powered by 802.11 delivers low-latency and high-speed
network with secure device authentications. This make this 802.11 Wi-Fi so efficient in general
performance, that is, faster downloads and also less power consumption. Raspberry Pi utilities this
advantage of network for it successful functioning. Wireless 802.11 takes place in transport layer in
the communication topology layers. SBC are very light but fully compact in size and also more
reliable in power efficiency. Its components are integrated in a single native board. These features
therefore will make them so productive in terms of quick time in markets and also interconnection
and configurations of multi-domains is available. The connections of the domains is much easier as
compared to the multi-based computers. Since it is only one single board integrated circuit then we
find all the necessary tools for connections in one place. It is also very useful in complex robotics
and processors applications. They are recognized as excellent micro-controllers alternatives because
of it features of well integration. Raspberry Pi is now the leading SBC because of its price and also
advancement. The market has really grown in past years because the consumers prefer them. People
use it for commercial purposes such as domain connections and also IoT systems because of its
management abilities of the large wireless sensors. It also connect large amount of data then send
them to the micro-cloud databases for more analysis. This sums up raspberry pi to be them most
preferred type of the single-board computer because of this more advanced features and its cost
hence very reliable and more productive to the customers.3
A single-board computer (SBC) is a single circuit board consisting of all complete computer
features with compromise memory, a microprocessor among other features. However, it will not
accept the extension of other functions like personal computers. They are mainly used in learning
purposes, research and also testing of some devices. Raspberry Pi is a common type and it is mostly
used in Internet of Things such as robotics because of their simplicity to handle and also favorable
environment which doesn't require much attentions due to the complexity. IoT cloud is a cloud
computing platform used by IoT devices to store and manage there data. The data generate by the
IoT devices is so big and therefore very secured environment for storage is necessary. IoT devices
collects data and send them to the cloud for processing by using of virtual physical sensors to
upload data to cloud basically so that they can access data remotely hence it will be difficult for
hackers to gain access on the data.1
IoT cloud is the technology that has brought so many implications both in the industry and also the
users. Such implications has both the positive and the negative impacts overall. The benefits of
control access in IoT are full integration of the systems, it is accessible from internet, can be used in
both automatic and manual control, and also it is very easy to track the records of the events taking
place. The main disadvantages are they are complex and costly especially in small scale businesses
or individual use, hackers can also hack such devices because the security issues as always
persisted, and also it is a matured type of the technology but the advancements are still going on.2
Introduction
Wi-Fi (wireless fidelity) networks which is powered by 802.11 delivers low-latency and high-speed
network with secure device authentications. This make this 802.11 Wi-Fi so efficient in general
performance, that is, faster downloads and also less power consumption. Raspberry Pi utilities this
advantage of network for it successful functioning. Wireless 802.11 takes place in transport layer in
the communication topology layers. SBC are very light but fully compact in size and also more
reliable in power efficiency. Its components are integrated in a single native board. These features
therefore will make them so productive in terms of quick time in markets and also interconnection
and configurations of multi-domains is available. The connections of the domains is much easier as
compared to the multi-based computers. Since it is only one single board integrated circuit then we
find all the necessary tools for connections in one place. It is also very useful in complex robotics
and processors applications. They are recognized as excellent micro-controllers alternatives because
of it features of well integration. Raspberry Pi is now the leading SBC because of its price and also
advancement. The market has really grown in past years because the consumers prefer them. People
use it for commercial purposes such as domain connections and also IoT systems because of its
management abilities of the large wireless sensors. It also connect large amount of data then send
them to the micro-cloud databases for more analysis. This sums up raspberry pi to be them most
preferred type of the single-board computer because of this more advanced features and its cost
hence very reliable and more productive to the customers.3
A single-board computer (SBC)
A single-board computer (SBC) is a single circuit board consisting of all complete computer
features with compromise memory, a microprocessor among other features. However, it will not
accept the extension of other functions like personal computers. They are mainly used in learning
purposes, research and also testing of some devices. Raspberry Pi is a common type and it is mostly
used in Internet of Things such as robotics because of their simplicity to handle and also favorable
environment which doesn't require much attentions due to the complexity.4
SBC are very light but fully compact in size and also more reliable in power efficiency. Its
components are integrated in a single native board. These features therefore will make them so
productive in terms of quick time in markets and also interconnection and configurations of multi-
domains is available. The connections of the domains is much easier as compared to the multi-based
computers. Since it is only one single board integrated circuit then we find all the necessary tools
for connections in one place. It is also very useful in complex robotics and processors applications.
They are recognized as excellent micro-controllers alternatives because of it features of well
integration.5
Raspberry Pi is now the leading SBC because of its price and also advancement. The market has
really grown in past years because the consumers prefer them. People use it for commercial
purposes such as domain connections and also IoT systems because of its management abilities of
the large wireless sensors. It also connect large amount of data then send them to the micro-cloud
databases for more analysis. This sums up raspberry pi to be them most preferred type of the single-
board computer because of this more advanced features and its cost hence very reliable and more
productive to the customers.6
Protection of SBC systems from DoS or DDoS attack
A DoS is a denial of service attack which happens where a victim computer is flooded with TCP
and UDP packets on the main server. During this attack, the systems seems to buffer because of the
overloading the servers by this heavy flow of the packets hence it will make the server to be
unavailable to the authorized users who should access the services. This process mainly leads to the
shot down of the computer machines and there networks but the attackers gain the privileges of the
using such networks and servers for there malicious intentions. DoS attack is a cybersecurity threats
which brings the companies and the organizations under serious damage if not cautions are taken.
There are various types of this attacks which the hackers uses to attack the victims. Buffer overflow
attacks which attacker overflow a network with unnecessary traffics to put users off the network,
ping of flood used to misconfigure network devices, teardrop attack which sends IP data packets to
the targeted network.7
A DDoS is a type of DoS attacked that is mainly used today by the malicious people to launch
attacks. When attackers uses this DDoS attack then it make it very difficult for the recovery to be
done. The attackers can manipulate a single computer in the network and therefore after
compromising it then they start launching an attack through that computer. There are various types
of this attacks which the hackers uses to attack the victims. Buffer overflow attacks which attacker
overflow a network with unnecessary traffics to put users off the network, ping of flood used to
misconfigure network devices, teardrop attack which sends IP data packets to the targeted network.8
A single-board computer (SBC) is a single circuit board consisting of all complete computer
features with compromise memory, a microprocessor among other features. However, it will not
accept the extension of other functions like personal computers. They are mainly used in learning
purposes, research and also testing of some devices. Raspberry Pi is a common type and it is mostly
used in Internet of Things such as robotics because of their simplicity to handle and also favorable
environment which doesn't require much attentions due to the complexity.4
SBC are very light but fully compact in size and also more reliable in power efficiency. Its
components are integrated in a single native board. These features therefore will make them so
productive in terms of quick time in markets and also interconnection and configurations of multi-
domains is available. The connections of the domains is much easier as compared to the multi-based
computers. Since it is only one single board integrated circuit then we find all the necessary tools
for connections in one place. It is also very useful in complex robotics and processors applications.
They are recognized as excellent micro-controllers alternatives because of it features of well
integration.5
Raspberry Pi is now the leading SBC because of its price and also advancement. The market has
really grown in past years because the consumers prefer them. People use it for commercial
purposes such as domain connections and also IoT systems because of its management abilities of
the large wireless sensors. It also connect large amount of data then send them to the micro-cloud
databases for more analysis. This sums up raspberry pi to be them most preferred type of the single-
board computer because of this more advanced features and its cost hence very reliable and more
productive to the customers.6
Protection of SBC systems from DoS or DDoS attack
A DoS is a denial of service attack which happens where a victim computer is flooded with TCP
and UDP packets on the main server. During this attack, the systems seems to buffer because of the
overloading the servers by this heavy flow of the packets hence it will make the server to be
unavailable to the authorized users who should access the services. This process mainly leads to the
shot down of the computer machines and there networks but the attackers gain the privileges of the
using such networks and servers for there malicious intentions. DoS attack is a cybersecurity threats
which brings the companies and the organizations under serious damage if not cautions are taken.
There are various types of this attacks which the hackers uses to attack the victims. Buffer overflow
attacks which attacker overflow a network with unnecessary traffics to put users off the network,
ping of flood used to misconfigure network devices, teardrop attack which sends IP data packets to
the targeted network.7
A DDoS is a type of DoS attacked that is mainly used today by the malicious people to launch
attacks. When attackers uses this DDoS attack then it make it very difficult for the recovery to be
done. The attackers can manipulate a single computer in the network and therefore after
compromising it then they start launching an attack through that computer. There are various types
of this attacks which the hackers uses to attack the victims. Buffer overflow attacks which attacker
overflow a network with unnecessary traffics to put users off the network, ping of flood used to
misconfigure network devices, teardrop attack which sends IP data packets to the targeted network.8
1) Network Monitoring
Network Monitoring is one of the steps that that can be taken to closely monitor the network traffic
which in turns it will give you an overview of the signs of any attack. This method will allow you to
take actions immediately you see unusual traffic flowing in the network and hence it will help from
being taken offline by such flooding of the network traffic. Software can be used in this monitoring
because the attackers are nowadays very clever where they send small packets to test if you can
notice them before sending the full packets now. By closely monitoring your network then you
reduce such attacks by detecting and be able to prevent such attacks before they launch.9
2) Test Run DoS Attacks
Test run DoS attacks is also the best way of preventing this attacks because normally you can't
prevent all of the DoS attacks which has come to your network. Therefore, by test running will give
you the hidden packets which might have been on the network but it wasn't recognized by
monitoring such packets. This will save the cost of real attack because by just testing wouldn't cost
you like the process after attacks. It is always recommended to any network specialist to use this
daily to just ensure and have benefit of doubts.12
3) Post-Attack Response
Post-Attack Response is a plan created after the real attack as taken root in the systems. Quick plan
needs to be developed and quickly implemented to before huge damage is done into the systems.
This involves the IT or networking experts teams where each person is assigned specific role in-
case the attacks happens so that this division of labor will help to quickly respond to such attacks
and also be able to recover quickly from such attacks. This plan needs to be flexible and well
understood by members so that each of them will know it's area of specialization.11
Network Monitoring is one of the steps that that can be taken to closely monitor the network traffic
which in turns it will give you an overview of the signs of any attack. This method will allow you to
take actions immediately you see unusual traffic flowing in the network and hence it will help from
being taken offline by such flooding of the network traffic. Software can be used in this monitoring
because the attackers are nowadays very clever where they send small packets to test if you can
notice them before sending the full packets now. By closely monitoring your network then you
reduce such attacks by detecting and be able to prevent such attacks before they launch.9
2) Test Run DoS Attacks
Test run DoS attacks is also the best way of preventing this attacks because normally you can't
prevent all of the DoS attacks which has come to your network. Therefore, by test running will give
you the hidden packets which might have been on the network but it wasn't recognized by
monitoring such packets. This will save the cost of real attack because by just testing wouldn't cost
you like the process after attacks. It is always recommended to any network specialist to use this
daily to just ensure and have benefit of doubts.12
3) Post-Attack Response
Post-Attack Response is a plan created after the real attack as taken root in the systems. Quick plan
needs to be developed and quickly implemented to before huge damage is done into the systems.
This involves the IT or networking experts teams where each person is assigned specific role in-
case the attacks happens so that this division of labor will help to quickly respond to such attacks
and also be able to recover quickly from such attacks. This plan needs to be flexible and well
understood by members so that each of them will know it's area of specialization.11
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
How to send the Data securely to IoT Cloud
IoT cloud is a cloud computing platform used by IoT devices to store and manage there data. The
data generate by the IoT devices is so big and therefore very secured environment for storage is
necessary. IoT devices collects data and send them to the cloud for processing by using of virtual
physical sensors to upload data to cloud basically so that they can access data remotely hence it will
be difficult for hackers to gain access on the data.13
Methods of data sending
1) Know your Data
This is the most important aspect of the data storage. Before you move any data to the cloud, first
you must understand you data as this will help you organize the data properly before storing them.
Data storage also need plan and by knowing it better then it will be easy to store and moreover
when referring in future. Organization of data also will make space utilization and also data are
categorized in a certain manner which will be very easy in case you ask someone else to retrieve the
data. Therefore, data understanding is the most important in IoT cloud.10
2) Have a defined and enforced data life cycle policy
Data is the most important components in business. IoT devices should be able to define clearly the
data and where it should be stored in the clouds. They should also understand who should access the
data and how they should access. Life cycle data policies should be enforced to govern the data
flow in the cloud database so that the confusions and errors to be eliminated or minimized. There
should be clear rules which should define how to store the data and also how specific people or
customers are authorized to access them.14
3) Know your cloud options
Understanding cloud options is very important aspect also before storing data. There are several
options such as private, public and hybrid. IoT devices should clearly understand which option to
use according to the demand of the users. Private cloud will only give and option of the individual
or organization to pull data from the cloud only for there intended used. Public cloud is sharing of
the common pool of data by many people. Hybrid cloud is also another options which shares both
the features of the private and public cloud. Organizations my decide to store some data in public
cloud and also store others in private cloud such as applications hence they utilize all of them.20
4) Data control
Data should be well controlled by IoT devices to avoid compromizations. Data should be encrypted
before sending to the cloud this is for just in case it will be exposed to external links. Test should be
applied also to see if the data you want to store is secured or should be scanned before storing it in
the clouds. Data also should have well strategist plan of backing up which is the core of any data
just in case anything will happen.16
IoT cloud is a cloud computing platform used by IoT devices to store and manage there data. The
data generate by the IoT devices is so big and therefore very secured environment for storage is
necessary. IoT devices collects data and send them to the cloud for processing by using of virtual
physical sensors to upload data to cloud basically so that they can access data remotely hence it will
be difficult for hackers to gain access on the data.13
Methods of data sending
1) Know your Data
This is the most important aspect of the data storage. Before you move any data to the cloud, first
you must understand you data as this will help you organize the data properly before storing them.
Data storage also need plan and by knowing it better then it will be easy to store and moreover
when referring in future. Organization of data also will make space utilization and also data are
categorized in a certain manner which will be very easy in case you ask someone else to retrieve the
data. Therefore, data understanding is the most important in IoT cloud.10
2) Have a defined and enforced data life cycle policy
Data is the most important components in business. IoT devices should be able to define clearly the
data and where it should be stored in the clouds. They should also understand who should access the
data and how they should access. Life cycle data policies should be enforced to govern the data
flow in the cloud database so that the confusions and errors to be eliminated or minimized. There
should be clear rules which should define how to store the data and also how specific people or
customers are authorized to access them.14
3) Know your cloud options
Understanding cloud options is very important aspect also before storing data. There are several
options such as private, public and hybrid. IoT devices should clearly understand which option to
use according to the demand of the users. Private cloud will only give and option of the individual
or organization to pull data from the cloud only for there intended used. Public cloud is sharing of
the common pool of data by many people. Hybrid cloud is also another options which shares both
the features of the private and public cloud. Organizations my decide to store some data in public
cloud and also store others in private cloud such as applications hence they utilize all of them.20
4) Data control
Data should be well controlled by IoT devices to avoid compromizations. Data should be encrypted
before sending to the cloud this is for just in case it will be exposed to external links. Test should be
applied also to see if the data you want to store is secured or should be scanned before storing it in
the clouds. Data also should have well strategist plan of backing up which is the core of any data
just in case anything will happen.16
IoT cloud manage control access
IoT is artificial intelligent computing devices used to carry out daily activities by humans. Such
devices can communicated by the internet using programmed code that are executed when some
actions are detected by such devices. Network is the most important factor for such process to take
place. In this scenario, IoT cloud should be fully managed and control for there efficiencies and to
be more productive. These devices should be control from a certain sources because without the
control then there is no production part of it. The benefits of control access in IoT are full
integration of the systems, it is accessible from internet, can be used in both automatic and manual
control, and also it is very easy to track the records of the events taking place.19
Implications of IoT cloud
IoT cloud is the technology that has brought so many implications both in the industry and also the
users. Such implications has both the positive and the negative impacts overall. The benefits of
control access in IoT are full integration of the systems, it is accessible from internet, can be used in
both automatic and manual control, and also it is very easy to track the records of the events taking
place. The main disadvantages are they are complex and costly especially in small scale businesses
or individual use, hackers can also hack such devices because the security issues as always
persisted, and also it is a matured type of the technology but the advancements are still going on.18
Wireless Challenges
Wi-Fi (wireless fidelity) networks which is powered by 802.11 delivers low-latency and high-speed
network with secure device authentications. This make this 802.11 Wi-Fi so efficient in general
performance, that is, faster downloads and also less power consumption. Raspberry Pi utilities this
advantage of network for it successful functioning. Wireless 802.11 takes place in transport layer in
the communication topology layers. Other wireless technologies such as Bluetooth, Z-wave and
ZigBee are available but as compared with the wireless 802.11 it is much better than them in terms
of efficiencies in speed and securities. This wireless 802.11 needs to be deployed and also be used
by both companies and also individuals. The reason why we use internet in IoT devices and any
other daily life activities is to utilize our resources and also time as the main resource factor. By use
of this wireless 802.11 will make work easier and also efficiencies are assured.15
IoT is artificial intelligent computing devices used to carry out daily activities by humans. Such
devices can communicated by the internet using programmed code that are executed when some
actions are detected by such devices. Network is the most important factor for such process to take
place. In this scenario, IoT cloud should be fully managed and control for there efficiencies and to
be more productive. These devices should be control from a certain sources because without the
control then there is no production part of it. The benefits of control access in IoT are full
integration of the systems, it is accessible from internet, can be used in both automatic and manual
control, and also it is very easy to track the records of the events taking place.19
Implications of IoT cloud
IoT cloud is the technology that has brought so many implications both in the industry and also the
users. Such implications has both the positive and the negative impacts overall. The benefits of
control access in IoT are full integration of the systems, it is accessible from internet, can be used in
both automatic and manual control, and also it is very easy to track the records of the events taking
place. The main disadvantages are they are complex and costly especially in small scale businesses
or individual use, hackers can also hack such devices because the security issues as always
persisted, and also it is a matured type of the technology but the advancements are still going on.18
Wireless Challenges
Wi-Fi (wireless fidelity) networks which is powered by 802.11 delivers low-latency and high-speed
network with secure device authentications. This make this 802.11 Wi-Fi so efficient in general
performance, that is, faster downloads and also less power consumption. Raspberry Pi utilities this
advantage of network for it successful functioning. Wireless 802.11 takes place in transport layer in
the communication topology layers. Other wireless technologies such as Bluetooth, Z-wave and
ZigBee are available but as compared with the wireless 802.11 it is much better than them in terms
of efficiencies in speed and securities. This wireless 802.11 needs to be deployed and also be used
by both companies and also individuals. The reason why we use internet in IoT devices and any
other daily life activities is to utilize our resources and also time as the main resource factor. By use
of this wireless 802.11 will make work easier and also efficiencies are assured.15
Conclusion
IoT cloud is the technology that has brought so many implications both in the industry and also the
users. Such implications has both the positive and the negative impacts overall. The benefits of
control access in IoT are full integration of the systems, it is accessible from internet, can be used in
both automatic and manual control, and also it is very easy to track the records of the events taking
place. The main disadvantages are they are complex and costly especially in small scale businesses
or individual use, hackers can also hack such devices because the security issues as always
persisted, and also it is a matured type of the technology but the advancements are still going on.17
IoT cloud is the technology that has brought so many implications both in the industry and also the
users. Such implications has both the positive and the negative impacts overall. The benefits of
control access in IoT are full integration of the systems, it is accessible from internet, can be used in
both automatic and manual control, and also it is very easy to track the records of the events taking
place. The main disadvantages are they are complex and costly especially in small scale businesses
or individual use, hackers can also hack such devices because the security issues as always
persisted, and also it is a matured type of the technology but the advancements are still going on.17
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Reference
Hansen, D. L., et al. "Correlation of Single-Board Computer Ground-Test Data and On-Orbit Upset
Rates From the Gaia Mission." IEEE Transactions on Nuclear Science 66.1 (2019): 270-275.
Qureshi, Basit, and Anis Koubâa. "On Energy Efficiency and Performance Evaluation of Single
Board Computer Based Clusters: A Hadoop Case Study." Electronics 8.2 (2019): 182.
Taşyaran, Fatih, et al. "One Table to Count Them All: Parallel Frequency Estimation on Single-
Board Computers." arXiv preprint arXiv:1903.00729 (2019).
George, Suja Susan, et al. "Signal Integrity and Power Integrity Challenges in Embedded
Computing Boards." 2018 15th International Conference on ElectroMagnetic Interference &
Compatibility (INCEMIC). IEEE, 2019.
Morabito, Roberto. "Lightweight Virtualization in Edge Computing for Internet of Things." (2019).
Qureshi, Basit, et al. "A Commodity SBC-Edge Cluster for Smart Cities." arXiv preprint
arXiv:1902.06661 (2019).
Morabito, Roberto, et al. "Reprint of: LEGIoT: A Lightweight Edge Gateway for the Internet of
Things." Future Generation Computer Systems 92 (2019): 1157-1171.
Giorgi, Roberto, Farnam Khalili, and Marco Procaccini. "Energy efficiency exploration on the zynq
ultrascale+." 2018 30th International Conference on Microelectronics (ICM). IEEE, 2019.
Qureshi, Basit, and Anis Koubaa. "On Energy Efficiency and Performance Evaluation of SBC based
Clusters: A Hadoop case study." arXiv preprint arXiv:1903.06648 (2019).
Jahn, Uwe, Carsten Wolff, and Peter Schulz. "Concepts of a Modular System Architecture for
Distributed Robotic Systems." Computers 8.1 (2019): 25.
Suc, V., et al. "BRINGING OLD TELESCOPES TO A NEW ROBOTIC LIFE." RevMexAA (Serie
de Conferencias) 51 (2019): 39-43.
Celesti, Antonio, et al. "A study on container virtualization for guarantee quality of service in
Cloud-of-Things." Future Generation Computer Systems (2019).
Suárez-Albela, Manuel, et al. "Clock frequency impact on the performance of high-security
cryptographic cipher suites for energy-efficient resource-constrained IoT devices." Sensors 19.1
(2019): 15.
Kim, Yu-Seop, Hye-Jeong Song, and Jong-Dae Kim. "Low-cost Miniaturization of Gel Document
System Using Blue LED." Sensors and Materials 31.2 (2019): 377-385.
Hussain, Tassadaq, et al. "Flexible Data Acquisition System for Aerodynamics Applications." 2019
2nd International Conference on Computing, Mathematics and Engineering Technologies
(iCoMET). IEEE, 2019.
Hansen, D. L., et al. "Correlation of Single-Board Computer Ground-Test Data and On-Orbit Upset
Rates From the Gaia Mission." IEEE Transactions on Nuclear Science 66.1 (2019): 270-275.
Qureshi, Basit, and Anis Koubâa. "On Energy Efficiency and Performance Evaluation of Single
Board Computer Based Clusters: A Hadoop Case Study." Electronics 8.2 (2019): 182.
Taşyaran, Fatih, et al. "One Table to Count Them All: Parallel Frequency Estimation on Single-
Board Computers." arXiv preprint arXiv:1903.00729 (2019).
George, Suja Susan, et al. "Signal Integrity and Power Integrity Challenges in Embedded
Computing Boards." 2018 15th International Conference on ElectroMagnetic Interference &
Compatibility (INCEMIC). IEEE, 2019.
Morabito, Roberto. "Lightweight Virtualization in Edge Computing for Internet of Things." (2019).
Qureshi, Basit, et al. "A Commodity SBC-Edge Cluster for Smart Cities." arXiv preprint
arXiv:1902.06661 (2019).
Morabito, Roberto, et al. "Reprint of: LEGIoT: A Lightweight Edge Gateway for the Internet of
Things." Future Generation Computer Systems 92 (2019): 1157-1171.
Giorgi, Roberto, Farnam Khalili, and Marco Procaccini. "Energy efficiency exploration on the zynq
ultrascale+." 2018 30th International Conference on Microelectronics (ICM). IEEE, 2019.
Qureshi, Basit, and Anis Koubaa. "On Energy Efficiency and Performance Evaluation of SBC based
Clusters: A Hadoop case study." arXiv preprint arXiv:1903.06648 (2019).
Jahn, Uwe, Carsten Wolff, and Peter Schulz. "Concepts of a Modular System Architecture for
Distributed Robotic Systems." Computers 8.1 (2019): 25.
Suc, V., et al. "BRINGING OLD TELESCOPES TO A NEW ROBOTIC LIFE." RevMexAA (Serie
de Conferencias) 51 (2019): 39-43.
Celesti, Antonio, et al. "A study on container virtualization for guarantee quality of service in
Cloud-of-Things." Future Generation Computer Systems (2019).
Suárez-Albela, Manuel, et al. "Clock frequency impact on the performance of high-security
cryptographic cipher suites for energy-efficient resource-constrained IoT devices." Sensors 19.1
(2019): 15.
Kim, Yu-Seop, Hye-Jeong Song, and Jong-Dae Kim. "Low-cost Miniaturization of Gel Document
System Using Blue LED." Sensors and Materials 31.2 (2019): 377-385.
Hussain, Tassadaq, et al. "Flexible Data Acquisition System for Aerodynamics Applications." 2019
2nd International Conference on Computing, Mathematics and Engineering Technologies
(iCoMET). IEEE, 2019.
Lintermann, Andreas, Dirk Pleiter, and Wolfgang Schröder. "Performance of ODROID-MC1 for
scientific flow problems." Future Generation Computer Systems 95 (2019): 149-162.
Kukreja, Navjot, et al. "Training on the Edge: The why and the how." arXiv preprint
arXiv:1903.03051 (2019).
Molloy, Derek. Exploring BeagleBone: tools and techniques for building with embedded Linux.
Wiley, 2019.
Nikouei, Seyed Yahya, et al. "Kerman: A hybrid lightweight tracking algorithm to enable smart
surveillance as an edge service." 2019 16th IEEE Annual Consumer Communications &
Networking Conference (CCNC). IEEE, 2019.
Giorgi, Roberto, Marco Procaccini, and Farnam Khalili. "AXIOM: A scalable, efficient and
reconfigurable embedded platform." Design, Automation and Test in Europe, the european event for
electronic system design and test (DATE) (2019).
scientific flow problems." Future Generation Computer Systems 95 (2019): 149-162.
Kukreja, Navjot, et al. "Training on the Edge: The why and the how." arXiv preprint
arXiv:1903.03051 (2019).
Molloy, Derek. Exploring BeagleBone: tools and techniques for building with embedded Linux.
Wiley, 2019.
Nikouei, Seyed Yahya, et al. "Kerman: A hybrid lightweight tracking algorithm to enable smart
surveillance as an edge service." 2019 16th IEEE Annual Consumer Communications &
Networking Conference (CCNC). IEEE, 2019.
Giorgi, Roberto, Marco Procaccini, and Farnam Khalili. "AXIOM: A scalable, efficient and
reconfigurable embedded platform." Design, Automation and Test in Europe, the european event for
electronic system design and test (DATE) (2019).
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.