Explore projects
-
Energy-Driven Computing / ICLIB Reactive Intermittent Computing
BSD 3-Clause "New" or "Revised" LicenseLibrary, build system and examples for ManagedState, a memory manager that uses paged memory to improve the efficiency of state retention in reactive intermittent computing.
Updated -
Extended TI radio boostpack libraries to include support for the EXP430FR5994 (MSP430FR5994) LaunchPad development kit Also supported are EXP430F5529LP (MSP430F5529) and EXP430G2 (MSP430G2xx). It also has some support for the MSP430F5438.
Updated -
SUFST / SUFST-Firmware
GNU General Public License v3.0 onlyUpdated -
Updated
-
sts1u16 / thumbulator
MIT LicenseUpdated -
The feedback system enables subjects to train their balance, strength their body and have fun.
Updated -
jml1g18 / pivtools
GNU General Public License v3.0 or laterMATLAB based 2D and stereo PIV processing, accelerated with C-MEX extensions
Updated -
mwh1g17 / Recommending-and-modelling-optimal-security-practices-for-smart-grid-connected-IoT-devices
GNU General Public License v3.0 or laterIoT devices present many exciting applications for both industrial and consumer use. However, increased dependence on these devices opens up new consequences and attack vectors that an adversary can use to attack a target. This is of particular importance in the case of IoT devices connected to smart grid infrastructure as cyber-attacks could be used to disrupt critical national infrastructure. Currently, many IoT devices are very susceptible to cyber-attack due to insufficient or poorly implemented security practices. This project aims to produce and model a collection of policies and protocols that are suitable for mitigating the threats that a smart grid connected IoT device may face. I wish to focus on the following goals within this project: - Investigating and conducting a risk assessment on the main vulnerabilities and threats faced by IoT devices within this scenario. - Recommend security policies that can mitigate these threats, justifying these policies taking into account secondary factors including the cost to implement and any loss to productivity these policies might incur. - Model these policies using Scyther, a formal method based protocol verification tool. The scope of this project will be investigating and modelling the best policies and procedures for IoT devices in the smart grid/energy sector.
Updated -
-
This is my game for the LaFortuna. use the rotary encoder to move the Mars Rover out of the way of the incoming space rocks.
Updated -
This code shows the implementation of an SVM, trains it using the images provided below, and then uses it to identify nuts/bolts/screws in a sample image.
Updated -
Updated
-
Updated
-
-
Updated
-
D4-Furlough / D4-Server
MIT LicenseUpdated -
-
-
Updated
-
alu1g19 / lafortuna-lcd
MIT LicenseUpdated