This document provides a line item list of specifications for a Dell server including the model number DL380G6, two Intel E5530 2.4GHz CPUs, 32GB of RAM, two 146GB SAS disks, four port gigabit Ethernet, a RAID controller, DVD-RW drive, four gigabit FC HBA, and two power supplies with a price of $295,300 and three year on-site warranty.
This document summarizes the log of a failed attempt to burn an ISO file to a DVD disc. It records information about the computer system, burning software version, connected DVD drive and disc, and burn attempt process. The burn was aborted by the user because the disc did not have enough free space to hold the entire ISO file contents, which was larger than the disc capacity.
This document provides an overview of the Unix/Linux command line for developers. It begins with a short history of Unix and its creators Ken Thompson and Dennis Ritchie. It then covers various Unix/Linux commands and tools such as cron, terminals, shells, navigation/listing files and directories, processes, job control, finding files, downloading files, and customizing the command line interface. It credits Wikimedia for the images used.
This document summarizes a burn attempt using Nero to write an image file to DVD media. The burn was started using Disc-at-Once mode on DVD media but was aborted by the user after the recorder preparation and setup were completed. The log provides details on the software and hardware configuration, the image file being written, and playbacks the activities up until the user aborted the burn process.
This document summarizes the hosting of the Blankon Linux development server. It describes:
1) The server configuration including dual core CPU, 2GB RAM, multiple hard drives for storage, and services like HTTP, rsync, and SSH.
2) Disk and network usage statistics showing sufficient resources but some CPU intensive cron jobs and limited international bandwidth.
3) Plans to upgrade including an AMD64 build, more RAM for VMs, and larger storage drives. The ideal configuration would better support builds, testing, and hosting more Blankon resources.
4) Contributors who help with hardware, bandwidth, storage, and system administration.
FlexPod is a converged infrastructure solution that combines Cisco UCS servers and fabric interconnects with NetApp storage systems. It supports the provisioning of block (iSCSI) and file (NFS) storage volumes for use with an OpenStack cloud deployment using NetApp drivers. The document provides steps for creating volume types, provisioning NFS and iSCSI volumes from a NetApp storage system, and attaching the volumes to OpenStack instances to be used as block devices or mounted filesystems.
The document discusses emulating Nintendo Entertainment System (NES) hardware using different programming languages like PHP, Go, Rust, and JavaScript. It provides code examples and links to NES emulator implementations in Go, PHP, and Rust. It also breaks down the emulation process into steps and mentions emulating the NES CPU and PPU.
This document provides a line item list of specifications for a Dell server including the model number DL380G6, two Intel E5530 2.4GHz CPUs, 32GB of RAM, two 146GB SAS disks, four port gigabit Ethernet, a RAID controller, DVD-RW drive, four gigabit FC HBA, and two power supplies with a price of $295,300 and three year on-site warranty.
This document summarizes the log of a failed attempt to burn an ISO file to a DVD disc. It records information about the computer system, burning software version, connected DVD drive and disc, and burn attempt process. The burn was aborted by the user because the disc did not have enough free space to hold the entire ISO file contents, which was larger than the disc capacity.
This document provides an overview of the Unix/Linux command line for developers. It begins with a short history of Unix and its creators Ken Thompson and Dennis Ritchie. It then covers various Unix/Linux commands and tools such as cron, terminals, shells, navigation/listing files and directories, processes, job control, finding files, downloading files, and customizing the command line interface. It credits Wikimedia for the images used.
This document summarizes a burn attempt using Nero to write an image file to DVD media. The burn was started using Disc-at-Once mode on DVD media but was aborted by the user after the recorder preparation and setup were completed. The log provides details on the software and hardware configuration, the image file being written, and playbacks the activities up until the user aborted the burn process.
This document summarizes the hosting of the Blankon Linux development server. It describes:
1) The server configuration including dual core CPU, 2GB RAM, multiple hard drives for storage, and services like HTTP, rsync, and SSH.
2) Disk and network usage statistics showing sufficient resources but some CPU intensive cron jobs and limited international bandwidth.
3) Plans to upgrade including an AMD64 build, more RAM for VMs, and larger storage drives. The ideal configuration would better support builds, testing, and hosting more Blankon resources.
4) Contributors who help with hardware, bandwidth, storage, and system administration.
FlexPod is a converged infrastructure solution that combines Cisco UCS servers and fabric interconnects with NetApp storage systems. It supports the provisioning of block (iSCSI) and file (NFS) storage volumes for use with an OpenStack cloud deployment using NetApp drivers. The document provides steps for creating volume types, provisioning NFS and iSCSI volumes from a NetApp storage system, and attaching the volumes to OpenStack instances to be used as block devices or mounted filesystems.
The document discusses emulating Nintendo Entertainment System (NES) hardware using different programming languages like PHP, Go, Rust, and JavaScript. It provides code examples and links to NES emulator implementations in Go, PHP, and Rust. It also breaks down the emulation process into steps and mentions emulating the NES CPU and PPU.
The document discusses various aspects of emulating Nintendo Entertainment System (NES) hardware using different programming languages like PHP, Rust, and Go. It provides technical specifications of the NES CPU and memory and examples of opcode implementations in languages like PHP and Rust. It also outlines a 3 step process for building a basic NES emulator and references several GitHub repositories and presentations on creating NES emulators with languages like PHP.
This document discusses Linux boot loaders. It describes how GRUB is installed as the boot loader and how its configuration file works. It also mentions that GRUB can boot from various filesystems and supports booting Linux installed in LVM partitions. The document briefly discusses chain loading Windows' boot loader and the Wubi installer for booting Linux installed in a file inside Windows. It also covers SYSLINUX and how it can be used as a boot loader from the MBR or a FAT partition.
This document provides specifications for 4 laptops between Rs. 30,000-32,000. All have Intel Core i3 processors between 1.7-2 GHz, 4GB RAM, 15.6 inch screens, 1TB hard drives, Windows 10 or 8.1 operating systems, weights around 2.3-2.5kg, and 1 year warranties. Screen resolutions are all 1366x768 for the 15.6 inch displays.
The document contains log entries from Nero burning software. It lists the software and hardware versions used, details about the burning process such as settings and tracks, and indicates that the burn was aborted by the user due to insufficient free space on the disc.
This document summarizes the settings and log of an aborted CD burning attempt in Nero. It provides details of the burning mode, ISO settings, drive information, and burning protocol before it was aborted by the user when choosing the image file to burn. The summary includes the writing mode, ISO level, and point at which the user aborted the burning process.
The document reports on progress connecting a router to a terminal through a USB-serial connection. It was successful in transferring text data but commands needed to be executable. The solution was to use a shell to pipe input and output between the terminal and router. An autorun script was also created to automatically load the USB-serial modules and start the shell on router boot for a manual-to-automatic process.
This document discusses the history and development of the PC-98 personal computer series in Japan. It provides details on the PC-98 series launch in 1982, its key specifications over time including early models with 8088 and V30 CPUs and expansion of memory and storage. It notes the PC-98 established the Japanese PC market and its proprietary BIOS and OS differentiated it from international PC standards. Finally, it comments on modern interest in retro computing and the PC-98 through communities and projects that preserve and explore its legacy.
This document summarizes the specifications of a Dell rackmount server. It includes an Intel Xeon E3-1220 quad-core 3.1 GHz processor, Intel 3420 chipset, 8GB of DDR3 ECC RAM, two 300GB 15K RPM SAS hard drives configured in a RAID array, integrated graphics, dual Gigabit Ethernet, various expansion slots, and a 345W power supply. The server has a 3-year warranty and is priced at 19,250,000 Indonesian Rupiah.
This document summarizes the results of an attempted CD/DVD burn using Nero burning software. The burn was aborted by the user after Nero determined there was not enough free space on the DVD-R disc to write the 6.688 MB of data. Nero provided details of the drive, software version, burn settings, and activities taken during the attempted burn process.
This document provides instructions for setting up a simple VPN connection between two servers using OpenVPN. It includes steps to install OpenVPN, enable IP forwarding, create the VPN tunnels between the servers with ifconfig settings, and add routing entries to allow communication between the private networks on each server over the VPN.
Central Iowa Linux Users Group October Meeting: Centos 8Andrew Denner
This document summarizes a presentation about CentOS 8 and alternatives to Docker like Podman and Buildah. It discusses what CentOS is, key changes in CentOS 8 like using DNF and Python 3.6 by default. It also covers how long support lasts for CentOS 6, 7, and 8. Alternatives to Docker like Podman and Buildah are presented as being more secure since they don't require running a daemon process as root. Demo videos are linked showing how to install Podman and pull a Docker image. Risks of upgrading from CentOS 7 to 8 are discussed.
This document provides a network diagram of a lab perimeter. It shows a Debian host connected to both a host only network at 172.16.50.0/24 and a NAT/VMware network at 172.16.49.0/24. A virtual machine called SW-virtual is connected to the NAT/VMware network and has an IP of 172.16.49.100.
The log file records system information for a game startup on February 10, 2018. It notes the CPU, DirectX version, memory details, and that the game was unable to mount a required device during startup.
This document provides instructions for setting up and running a uClinux system on an ARM Cortex-M3 based LPC1788 board. It describes downloading files from a TFTP server using U-Boot, compiling the uClinux kernel and BusyBox tools, and booting the system from an SD card using U-Boot. The uClinux files are extracted and compiled after configuring the kernel and BusyBox. The resulting uImage file is copied to the SD card to boot the Linux system.
This document describes how to set up MongoDB replication across multiple servers. It involves installing MongoDB on each server, starting the primary and secondary servers and configuring replication. The primary server replicates data to the secondaries. If the primary fails, one of the secondaries will be elected as the new primary. The document provides commands to initialize and check the replica set configuration and status.
Frames per second (FPS) refers to the rate at which consecutive images called frames are captured by a video camera or displayed in a video player. Higher FPS is needed for fast moving objects or those close to the camera. Resolution refers to the level of detail visible in an image, with higher resolutions showing more detail. Video formats like H.264 offer better compression than MJPEG but require more processing power. The document then provides tables comparing Synology NVR devices and their specifications like supported camera numbers, maximum storage space, and total frame rates.
This document provides an overview of Linux, including:
- A brief history noting its origins from Unix and development by Linus Torvalds and others as an open source alternative.
- An introduction mentioning that Linux is cheap, has a huge community, is open source, and is used in most servers and supercomputers.
- Descriptions of Linux partitions, file systems, and permission structures.
- Explanations of common Linux commands like Bash shell scripting.
We'll be going through the process of designing a kernel using assembly and then moving to a high-level-language such as C. This Knolx will go through the real and protected-mode in which OS boots up and helps us understand what changes between the two modes and how we can handle the transition. This will help us understand the representation of code in memory as well.
This document discusses operating system abstractions for managing GPUs as compute devices. It references papers on managing GPU resources in the operating system and using a mediator between GPU clients and devices to enable first-class GPU resource management. The document contains code snippets for reading from and writing to files.
Openstack & why cloud for enterprise pptAsmaa Ibrahim
The document discusses cloud computing and OpenStack. It defines cloud computing as computing based on the internet where applications can be accessed through the internet rather than being downloaded. It lists benefits of moving to the cloud like flexibility, disaster recovery, automatic updates, and reduced capital expenditures. It also discusses enterprise fears around cloud like losing control over IT systems and data security and privacy issues. The document then introduces OpenStack as an open source cloud computing project and notes that it is gaining rapid adoption in both startups and large enterprises.
The document discusses various aspects of emulating Nintendo Entertainment System (NES) hardware using different programming languages like PHP, Rust, and Go. It provides technical specifications of the NES CPU and memory and examples of opcode implementations in languages like PHP and Rust. It also outlines a 3 step process for building a basic NES emulator and references several GitHub repositories and presentations on creating NES emulators with languages like PHP.
This document discusses Linux boot loaders. It describes how GRUB is installed as the boot loader and how its configuration file works. It also mentions that GRUB can boot from various filesystems and supports booting Linux installed in LVM partitions. The document briefly discusses chain loading Windows' boot loader and the Wubi installer for booting Linux installed in a file inside Windows. It also covers SYSLINUX and how it can be used as a boot loader from the MBR or a FAT partition.
This document provides specifications for 4 laptops between Rs. 30,000-32,000. All have Intel Core i3 processors between 1.7-2 GHz, 4GB RAM, 15.6 inch screens, 1TB hard drives, Windows 10 or 8.1 operating systems, weights around 2.3-2.5kg, and 1 year warranties. Screen resolutions are all 1366x768 for the 15.6 inch displays.
The document contains log entries from Nero burning software. It lists the software and hardware versions used, details about the burning process such as settings and tracks, and indicates that the burn was aborted by the user due to insufficient free space on the disc.
This document summarizes the settings and log of an aborted CD burning attempt in Nero. It provides details of the burning mode, ISO settings, drive information, and burning protocol before it was aborted by the user when choosing the image file to burn. The summary includes the writing mode, ISO level, and point at which the user aborted the burning process.
The document reports on progress connecting a router to a terminal through a USB-serial connection. It was successful in transferring text data but commands needed to be executable. The solution was to use a shell to pipe input and output between the terminal and router. An autorun script was also created to automatically load the USB-serial modules and start the shell on router boot for a manual-to-automatic process.
This document discusses the history and development of the PC-98 personal computer series in Japan. It provides details on the PC-98 series launch in 1982, its key specifications over time including early models with 8088 and V30 CPUs and expansion of memory and storage. It notes the PC-98 established the Japanese PC market and its proprietary BIOS and OS differentiated it from international PC standards. Finally, it comments on modern interest in retro computing and the PC-98 through communities and projects that preserve and explore its legacy.
This document summarizes the specifications of a Dell rackmount server. It includes an Intel Xeon E3-1220 quad-core 3.1 GHz processor, Intel 3420 chipset, 8GB of DDR3 ECC RAM, two 300GB 15K RPM SAS hard drives configured in a RAID array, integrated graphics, dual Gigabit Ethernet, various expansion slots, and a 345W power supply. The server has a 3-year warranty and is priced at 19,250,000 Indonesian Rupiah.
This document summarizes the results of an attempted CD/DVD burn using Nero burning software. The burn was aborted by the user after Nero determined there was not enough free space on the DVD-R disc to write the 6.688 MB of data. Nero provided details of the drive, software version, burn settings, and activities taken during the attempted burn process.
This document provides instructions for setting up a simple VPN connection between two servers using OpenVPN. It includes steps to install OpenVPN, enable IP forwarding, create the VPN tunnels between the servers with ifconfig settings, and add routing entries to allow communication between the private networks on each server over the VPN.
Central Iowa Linux Users Group October Meeting: Centos 8Andrew Denner
This document summarizes a presentation about CentOS 8 and alternatives to Docker like Podman and Buildah. It discusses what CentOS is, key changes in CentOS 8 like using DNF and Python 3.6 by default. It also covers how long support lasts for CentOS 6, 7, and 8. Alternatives to Docker like Podman and Buildah are presented as being more secure since they don't require running a daemon process as root. Demo videos are linked showing how to install Podman and pull a Docker image. Risks of upgrading from CentOS 7 to 8 are discussed.
This document provides a network diagram of a lab perimeter. It shows a Debian host connected to both a host only network at 172.16.50.0/24 and a NAT/VMware network at 172.16.49.0/24. A virtual machine called SW-virtual is connected to the NAT/VMware network and has an IP of 172.16.49.100.
The log file records system information for a game startup on February 10, 2018. It notes the CPU, DirectX version, memory details, and that the game was unable to mount a required device during startup.
This document provides instructions for setting up and running a uClinux system on an ARM Cortex-M3 based LPC1788 board. It describes downloading files from a TFTP server using U-Boot, compiling the uClinux kernel and BusyBox tools, and booting the system from an SD card using U-Boot. The uClinux files are extracted and compiled after configuring the kernel and BusyBox. The resulting uImage file is copied to the SD card to boot the Linux system.
This document describes how to set up MongoDB replication across multiple servers. It involves installing MongoDB on each server, starting the primary and secondary servers and configuring replication. The primary server replicates data to the secondaries. If the primary fails, one of the secondaries will be elected as the new primary. The document provides commands to initialize and check the replica set configuration and status.
Frames per second (FPS) refers to the rate at which consecutive images called frames are captured by a video camera or displayed in a video player. Higher FPS is needed for fast moving objects or those close to the camera. Resolution refers to the level of detail visible in an image, with higher resolutions showing more detail. Video formats like H.264 offer better compression than MJPEG but require more processing power. The document then provides tables comparing Synology NVR devices and their specifications like supported camera numbers, maximum storage space, and total frame rates.
This document provides an overview of Linux, including:
- A brief history noting its origins from Unix and development by Linus Torvalds and others as an open source alternative.
- An introduction mentioning that Linux is cheap, has a huge community, is open source, and is used in most servers and supercomputers.
- Descriptions of Linux partitions, file systems, and permission structures.
- Explanations of common Linux commands like Bash shell scripting.
We'll be going through the process of designing a kernel using assembly and then moving to a high-level-language such as C. This Knolx will go through the real and protected-mode in which OS boots up and helps us understand what changes between the two modes and how we can handle the transition. This will help us understand the representation of code in memory as well.
This document discusses operating system abstractions for managing GPUs as compute devices. It references papers on managing GPU resources in the operating system and using a mediator between GPU clients and devices to enable first-class GPU resource management. The document contains code snippets for reading from and writing to files.
Openstack & why cloud for enterprise pptAsmaa Ibrahim
The document discusses cloud computing and OpenStack. It defines cloud computing as computing based on the internet where applications can be accessed through the internet rather than being downloaded. It lists benefits of moving to the cloud like flexibility, disaster recovery, automatic updates, and reduced capital expenditures. It also discusses enterprise fears around cloud like losing control over IT systems and data security and privacy issues. The document then introduces OpenStack as an open source cloud computing project and notes that it is gaining rapid adoption in both startups and large enterprises.
The document provides an introduction to the Internet of Things (IoT). It defines IoT as connecting physical objects via sensors to the internet, allowing data exchange without human interaction. Key enablers of IoT include cheap sensors, bandwidth, processing power, smartphones, and wireless coverage. Common applications areas are agriculture, smart homes, cities, manufacturing, and healthcare. The document outlines an IoT technology roadmap and lists resources for IoT products, services, companies and labs.
This document provides instructions for installing Sahara, an OpenStack data processing service, on a Red Hat OpenStack Platform (RDO) environment. It outlines steps to install RDO, configure repositories, install Packstack to deploy OpenStack, configure the OpenStack dashboard, install and configure the Sahara package, create the Sahara database, start the Sahara API service, and install the Sahara dashboard.
The document discusses various concepts related to cloud security including confidentiality, integrity, authenticity, availability, threats, vulnerabilities, risk, security controls, security policies, threat agents, and common cloud security threats such as traffic eavesdropping, malicious intermediary, denial of service, insufficient authorization, and virtualization attacks. It provides definitions and examples for each term.
The document discusses the different types of web hosting options including managed hosting, dedicated hosting, public cloud hosting, shared hosting, private cloud hosting, colocation hosting, and cloud hosting. Each type of hosting has a brief definition with the RackSpace copyright at the bottom of each section.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.