u/discretedreamer

Dont even know the title of question

Note: we use fixed wing uav/drone

I am primarily preparing for a drone competition. In the competition, we need to perform docking maneuvers with other drones using a camera. For a successful docking, we must keep the target drone's size in the camera view greater than five percent and at a maximum distance of 50% from the center on both the horizontal and vertical axes for 4 seconds.

Currently, we control roll pitch and throttle with 3 separate PIDs. I want to switch to an MPC controller, but instead of manually finding the coefficients in the matrices through trial and error, is there a way to somehow transfer my PID coefficients to the MPC and just do fine-tuning?

My English isn't very good, I hope I've explained it well enough. I'll try to explain it more clearly in another post using translation tools like Gemini, etc.

reddit.com
u/discretedreamer — 14 hours ago
▲ 33 r/TOR

How to become completely anonymous

First of all, as a computer science student who has recently become interested in cybersecurity, I know that this is not possible. Actually, this post will be a series of questions.

Is Tor the best option?

Some websites can detect that you are using Tor; how is this possible?

Bridges: How do protocols like obfs4, used to prevent websites or governments from knowing that Tor is being used, work?

Correlation Attacks: If an attacker can monitor both your home internet and the traffic of the website you visit, can Tor really protect you?

Onion Services: What are the technical differences between .onion sites and standard sites?

is i2p better than tor?

reddit.com
u/discretedreamer — 2 days ago
▲ 11 r/TOR

How much anonymity does TOR provide?

How much anonymity does TOR provide?

Even when individuals or companies use the Tor network with their technology and pass through a proxy to conceal their presence on the Tor network, detecting that the traffic originated from the Tor network can sometimes be extremely difficult. So, what is the state of government technology? For example, in America, during the Snowden case, we learned that the NSA had tools on a scale that many cybersecurity experts hadn't even imagined. How much anonymity does the Tor network provide in theory, and how can we know if IP addresses and/or transmitted data are being logged? Theoretically, is the only way to catch the person using the Tor network if all three layers are controlled by the same person simultaneously?

reddit.com
u/discretedreamer — 6 days ago