Explore chapters and articles related to this topic
Smart Musical Instruments
Published in Michael Filimowicz, Foundations in Sound Design for Embedded Media, 2019
To exchange information between Bela and the laptop connected over a wi-fi local network, we use OSC messages over the User Datagram Protocol. This can be done using the netsend and netreceive Pd objects. Internet connectivity can be obtained by configuring the Bela Linux system and the router connected to the 4G dongle. To illustrate the interaction between a smart musical instrument and the cloud, we will start by downloading two audio samples stored on our server that will be used later. To do so, send the OSC message /download_files 1 from the laptop running the accompanying Pd patch. When this message is received by the prototype, two. wav audio files of a kick and snare drums will be automatically downloaded from a public folder on the www.iomut.eu server hosting them. Specifically, the files are downloaded thanks to a bash script using the Linux command wget, which is called from the Pd patch running on the prototype.
Bridges to GIS software
Published in Robin Lovelace, Jakub Nowosad, Jannes Muenchow, Geocomputation with R, 2019
Robin Lovelace, Jakub Nowosad, Jannes Muenchow
Another advantage of dedicated GISs is that they provide access to hundreds of ‘geoalgorithms’ (computational recipes to solve geographic problems — see Chapter 10). Many of these are unavailable from the R command line, except via ‘GIS bridges’, the topic of (and motivation for) this chapter.6 A command-line interface is a means of interacting with computer programs in which the user issues commands via successive lines of text (command lines). bash in Linux and PowerShell in Windows are common examples. CLIs can be augmented with IDEs such as RStudio for R, which provides code auto-completion and other features to improve the user experience.
Security Challenges and Solutions in IoT Networks for the Smart Cities
Published in Mohammad Ayoub Khan, Internet of Things, 2022
The dataset used for the experimental evaluation consisted of 3000 benign and malware executables. Examples of benign applications included MiBench [97] and SPEC2006 [98], Linux system programs, browsers, text editors, and word processors. Examples of malware executables were collected from popular websites such as virustotal.com and classified on virushare.com and included Linux ELFs, python scripts, perl scripts, and bash scripts. The malware files were categorized into Backdoor (452 executables), Rootkits (350 executables), Viruses (650 executables), and Trojans (1169 executables).
Design optimization of the porous baffle in a disinfection contact tank for high efficiency
Published in Urban Water Journal, 2022
Nazhmiddin Nasyrlayev, Ender Demirel
Open source CFD toolbox OpenFOAM, which will be referred as function hereafter (Jareteg 2004), was integrated with Dakota (Trucano et al. 2006) software and Python script that calculates E and F values for the automatic optimization of the porosity. Dakota is an optimization toolkit that permits the interaction of simulation codes with the optimization algorithms. Dakota employs OpenFOAM as a function that successively performs simulations, generates an output and feeds back to Dakota. Bash scripting feature of the Linux operating system is adopted to create an appropriate communication environment between OpenFOAM, Dakota and Python platforms. Dakota initializes the porosity of the baffle and seeks the optimized porosity in the range of zero and one using the optimization algorithm described in the subsequent part of the study. Dakota is an open-source object-oriented optimization package developed by Sandia National Laboratories, which includes myriad of algorithms for the optimization with gradient and gradient-free methods, parameter estimation and uncertainty quantification among others (Trucano et al. 2006; Benchikh Le Hocine, Poncet, and Fellouah 2021; Hoang Quan, Lam, and Long 2020; Do et al. 2016).
Individualized summative assessments as used during COVID-19
Published in International Journal of Mathematical Education in Science and Technology, 2022
The key feature of our system is to completely decouple the generation of questions, the delivery to students, and marking, and feedback (see Figure 1). By decoupling, we allow flexibility for an instructor to deliver the assessment that they deem appropriate for their students (within the proviso that it be an online assessment) using tools that they are familiar with. Within this overarching approach, in different assessments, we have used Microsoft Office, MATLAB, Bash scripts in a Linux environment, and the programming language Julia at the various stages. Such an approach was essential during COVID-19 teaching semesters in 2020 when there was insufficient time to train in a new language or software approach. The best tool for a job is the one that you can use most effectively.
Denial of service attack detection through machine learning for the IoT
Published in Journal of Information and Telecommunication, 2020
Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli
%usr: Percentage time spent by CPU executing application related task%sys: Percentage time spent by CPU executing kernel level task%iowait: Percentage time spent by CPU executing disk I/O requests%soft: Percentage time spent by CPU servicing software interrupts%idle: Percentage time spent by CPU not executing any tasks and no pending I/O requests. A high idle % indicates the CPU is least utilized and a low idle % indicates high CPU utilization.Process CPU (pCPU): Measured using bash script fetching the CPU utilization associated with broker process ID using top Linux commandBandwidth: Total bandwidth consumed during the attack (kbytes)Memory: Percentage Memory consumed during the attack