This will set you up on how to integrate cheap HC-SR04 ultrasonic sensor and arduino uno for Object detection and avoidance on a Pixhawk 2.4.8 and even the cube(Wiring for the telemetry will start from right i.e 5v will be be on right followed by TX & Rx). The arduino will communicate with the pixhawk and will override the Tx input to achieve av…
☆21May 14, 2021Updated 4 years ago
Alternatives and similar repositories for Object-Detection-Avoidance-PIXHAWK
Users that are interested in Object-Detection-Avoidance-PIXHAWK are comparing it to the libraries listed below
Sorting:
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- YouTube Assistant☆12May 15, 2023Updated 2 years ago
- PyQt5 ile veritabanı kullanılarak örnek proje☆12Jun 2, 2020Updated 5 years ago
- Simple Autopilt built using dronekit and MAVLink protocol☆10Nov 2, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- This repository implements a simple YOLO algorithm for detection of birds and other aerial obstacles for drones to avoid collision during…☆40Jan 11, 2023Updated 3 years ago
- Drone w/ camera gimbal controlled by Pixhawk and Raspberry Pi running OpenCV☆46Dec 22, 2020Updated 5 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- A collision avoidance controller to steer a robot away from obstacles☆10May 17, 2017Updated 8 years ago
- ☆12Feb 16, 2024Updated 2 years ago
- Cmpe 343 Course Repository☆15Jan 13, 2022Updated 4 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Nov 5, 2023Updated 2 years ago
- How to make a rocket catch a target?☆11Aug 6, 2017Updated 8 years ago
- Implements Kalman Filter based tracking for multiple circular objects☆10Jan 8, 2023Updated 3 years ago
- Trajectory tracking controllers for micro aerial vehicles☆10Mar 9, 2022Updated 3 years ago
- ☆11May 5, 2022Updated 3 years ago
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Feb 2, 2026Updated 3 weeks ago
- 💬 Forward OTP SMS's from my phone to my laptop as a desktop notification☆11Aug 26, 2022Updated 3 years ago
- This repository contains the prject carried out for the IFAC20 MATLAB Minidrone competition held during the IFAC Conference in Berlin. T…☆12Aug 11, 2022Updated 3 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- ☆14Aug 18, 2023Updated 2 years ago
- This app helps the farmers to convert from a food crop to a commercial crop by providing a full fledged cost and risk analysis.☆10Nov 4, 2018Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 2 years ago
- The algorithm makes a depth map from a stereo cam and uses this depth map to command a UAV to change velocities to avoid obstacles in an …☆13Apr 21, 2020Updated 5 years ago
- Frequency hopping spread spectrum analyzer and repeat attack program for use with a Nuand BladeRF☆10Apr 10, 2015Updated 10 years ago
- Bellingcat Hackathon - Digital Investigation Tool 2022☆12Sep 25, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆12Feb 13, 2023Updated 3 years ago
- Web application for companies to manage their vehicle fleets☆14Updated this week
- Source Code for 'IoT Machine Learning Applications in Telecom, Energy, and Agriculture' by Puneet Mathur☆13May 11, 2020Updated 5 years ago
- ☆11Dec 21, 2017Updated 8 years ago
- ☆16Apr 24, 2024Updated last year
- ☆12Jun 12, 2021Updated 4 years ago