Thought Controlled Drone using Embarcadero Technologies
News|24 August 2017
Embarcadero’s chief developer advocate, featured blogger and engineer Jim McKeeth has enabled a Parrot AR.Drone to respond to thought patterns. This is using the Emotiv EPOC wireless EEG headset to read cognitive thought patterns, which are transmitted wirelessly to the laptop and the Delphi powered application. It responds by sending the commands to the Parrot AR.Drone based on the thought patterns.
See the video here: https://www.youtube.com/watch?v=pjrYgd0dPS0
For a chat with a Grey Matter Embarcadero Specialist, please call 01364 6555123 or email embarcadero@greymatter.com
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Related News
Women in Tech Roundtable Report
Grey Matter and ESET co-hosted a Women in Tech Roundtable at Wembley in June. The aim was to understand the experience of women in tech and learn how we can improve equality. We discussed various topics from imposture syndrome, flexible...
Embarcadero RAD Studio 12.2 Now Available
Embarcadero Technologies announces the General Availability of RAD Studio 12.2, including Delphi 12.2 and C++Builder 12.2 RAD Studio 12.2 introduces support for AI-powered coding, a new Webstencils template library for web development, and new 64-bit Delphi compilers for large applications;...
School Closes Due to Ransomware Attack
It has been reported that Charles Darwin School in Kent has had to close its doors to students and staff while they sort out a severe cyber incident. The school suffered a ransomware attack and is working with the ICO...
Patch Alert Issued for Veeam
A critical patch alert has been issued for Veeam Backup & Replication software. The alert addresses a severe vulnerability, tracked as CVE-2024-40711, which allows unauthenticated remote code execution. This flaw could enable attackers to take full control of affected systems...