Dự án "Aerial Autonomy Stack" mã nguồn mở mới ra mắt! Kết hợp mô phỏng PX4/ArduPilot SITL với thị giác máy tính tăng tốc CUDA/TensorRT cho Jetson. Toàn bộ trong Docker, giao diện ROS2, hoạt động trên Windows 11 (WSL/GPU passthrough). Hoan nghênh đóng góp, phản hồi và đồng quản lý Win11!
#AerialAutonomy #OpenSource #ROS2 #PX4 #ArduPilot #Jetson #Robotics #TựHành #MãNguồnMở #Robot
https://www.reddit.com/r/opensource/comments/1nyr0t5/aerial_autonomy_stack/
Моделирование группы БПЛА в симуляционной среде (PX4 ROS 2 Gazebo)
Проект для управления группой беспилотных летательных аппаратов, реализованный с использованием ROS 2 и PX4 Autopilot. Основная цель — автоматизация управления несколькими дронами в симуляционных условиях. Для моделирования используется симулятор Gazebo. Система поддерживает централизованное управление через ROS topics, обработку высокоуровневых команд в формате JSON.
Design, build, and simulate complex robots using the Robot Operating SystemKey Features Become proficient in ROS programming using C++ with this comprehensive guide Build complex robot applications using the ROS Noetic Ninjemys release to interface robot manipulators with mobile robots Learn to interact with aerial robots using ROSBook Description The Robot Operating System (ROS) is a software framework used...
ニューヨーク上空をPS4コントローラで操縦!PX4連携可能な箱庭ドローンシミュレータの実力
https://qiita.com/kanetugu2018/items/11f9c90aa2711eba5f7f?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items
A good showing for the #UAV #UAS Drone Hacking workshop at the #px4 #px4devsummit #PX4Autopilot
Tenacious groups working their way through concepts and exercises in hacking ground control, UAV, and Comms.
We bring a simple 'table top' #UAS.
1. #UAV : A #BeagleBone Blue attached to a quad frame running either #ArduPilot or #PX4. We exploit network services and misconfigured firmware update
2. #GCS : Android phone and gamepad joystick controller running #QGroundControl. We exploit vulnerable apps on the phone.
3. COMMS: WiFi via the BB-Blue access point. We crack the #WiFi password and sniff #MAVLink off the air
The subtext is to demonstrate vulns in each of these subsystems and how you can use those to pivot from one to another.
Our audiences have varied from vendor sales and mgmt at Xponential to more technically mixed folks at BlackHat. Gonna be challenged to make it interesting for the technical audience at #PX4. But many UAS software engineers haven't really been exposed to how cybersecurity folks think and test, so I hope they find that fun.
The "Hack Our Drone" roadshow 2023 continues.
We will be in New Orleans in October for the #PX4 Summit