We give an extensive experimental comparison of four popular relative pose (epipolar geometry) estimation algorithms: the eight, seven, six and five point algorithms. We focus on the practically important case that on...
详细信息
ISBN:
(纸本)9789898111210
We give an extensive experimental comparison of four popular relative pose (epipolar geometry) estimation algorithms: the eight, seven, six and five point algorithms. We focus on the practically important case that only a single solution may be returned by automatically selecting one of the solution candidates, and investigate the choice of error measure for the selection. We show that the five point algorithm gives very good results with automatic selection. As sometimes the eight point algorithm is better, we propose a combination algorithm which selects from the solutions of both algorithms and thus combines their strengths. We further investigate the behavior in the presence of outliers by using adaptive RANSAC, and give practical recommendations for the choice of the RANSAC parameters. Finally, we verify the simulation results on real data.
作者:
Dai, PnegyuBrunel University
Chongqing University of Post and Telecommunication International College Chongqing China
vision-based solutions for target detection in autonomous driving are very much about the accuracy of detection. A correct or incorrect detection may cause or avoid a traffic accident. Therefore, in this paper, to fur...
详细信息
In order to improve the recognition accuracy and recognition speed of traffic signs, a recognition model based on convolutional neural network with high accuracy and fast speed is designed for traffic sign recognition...
详细信息
Scene classification is a popular and important question in computervision and has been developed in different areas. Applying computervision to artworks has become a popular topic in recent years. However, the trad...
详细信息
Visual object tracking is the process of tracking a given target using the initial bounding box as a guide. It has a variety of applications: driverless driving, robotic interface, and so forth. To provide a brief int...
详细信息
Feature tracking is an important task in computervision, especially for 3D reconstruction applications. Such procedures can be run in environments with a controlled sensor, e.g. a robot arm with camera. This yields t...
详细信息
ISBN:
(纸本)9789898111210
Feature tracking is an important task in computervision, especially for 3D reconstruction applications. Such procedures can be run in environments with a controlled sensor, e.g. a robot arm with camera. This yields the camera parameters as special knowledge that should be used during all steps of the application to improve the results. As a first step, KLT (Kanade-Lucas-Tomasi) tracking (and its variants) is an approach widely accepted and used to track image point features. So, it is straightforward to adapt KLT tracking in a way that camera parameters are used to improve the feature tracking results. The contribution of this work is an explicit formulation of the KLT tracking procedure incorporating known camera parameters. Since practical applications do not run without noise, the uncertainty of the camera parameters is regarded the procedure. Comparing practical experiments have been performed and the results are presented.
The key technique of sit-and-reach distance measurement in this study mainly consists of two stages: the first stage is the initial calibration of the test site, including camera calibration, identification and calibr...
详细信息
One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipl...
详细信息
ISBN:
(纸本)9781479918454
One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipline can be solved using graph models. The field graph theory started its journey from the problem of Konigsberg Bridges in 1735. This paper is a guide for the applied mathematician who would like to know more about network security, cryptography and cyber security based of graph theory. The paper gives a brief overview of the subject and the applications of graph theory in computer security, and provides pointers to key research and recent survey papers in the area.
This paper presents a design method of general modular digital target simulation system, and realizes the software based on this method. This method includes target vulnerability model import sub module and target vul...
详细信息
This paper is an illustrative approach for developing a visual interface for a gesture recognition system using color based blob detection. The software developed using the prescribed framework serves as a gesture int...
详细信息
ISBN:
(纸本)9783319120126;9783319120119
This paper is an illustrative approach for developing a visual interface for a gesture recognition system using color based blob detection. The software developed using the prescribed framework serves as a gesture interpretation system and is used to emulate the computer mouse with finger gestures. The objective is to develop an intuitive way to interact with computers and other digital devices and yet make it easy to use and cost effective at the same time. Although vision interfaces for gesture recognition have been researched and developed for some time, this approach has its own uniqueness and is more effective in many circumstances. The prescribed framework minimizes hardware requirements as it only requires a webcam other than the computer itself. The minimization of hardware requirements make it cost effective and easier to obtain. The predefined gestures are simple yet intuitive as these are inspired by certain every day gestures or movements that are used to interact with several tools and equipment in our daily life.
暂无评论