In this paper we present minimal solutions for two-view relative motion estimation based on a homography formulation. By assuming a known vertical direction (e.g. from an IMU) and assuming a dominant ground plane we d...
详细信息
In this paper we present minimal solutions for two-view relative motion estimation based on a homography formulation. By assuming a known vertical direction (e.g. from an IMU) and assuming a dominant ground plane we demonstrate that rotation and translation estimation can be decoupled. This result allows us to reduce the number of point matches needed to compute a motion hypothesis. We then derive different algorithms based on this decoupling that allow an efficient estimation. We also demonstrate how these algorithms can be used efficiently to compute an optimal inlier set using exhaustive search or histogram voting instead of a traditional RANSAC step. Our methods are evaluated on synthetic data and on the KITTI data set, demonstrating that our methods are well suited for visual odometry in road driving scenarios.
We present the solid model edit distance(SMED),a powerful and flexible paradigm for exploiting shape similarities amongst CAD *** is designed to measure the magnitude of distortions between two CAD models in boundary ...
详细信息
We present the solid model edit distance(SMED),a powerful and flexible paradigm for exploiting shape similarities amongst CAD *** is designed to measure the magnitude of distortions between two CAD models in boundary representation(B-rep).We give the formal definition by analogy with graph edit distance,one of the most popular graph matching *** avoid the expensive computational cost potentially caused by exact computation,an approximate procedure based on the alignment of local structure sets is provided in *** order to verify the flexibility,we make intensive investigations on three typical applications in manufacturing industry,and describe how our method can be adapted to meet the various ***,a multilevel method is proposed to make further improvements of the presented algorithm on both effectiveness and efficiency,in which the models are hierarchically segmented into the configurations of *** results show that SMED serves as a reasonable measurement of shape similarity for CAD models,and the proposed approach provides remarkable performance on a real-world CAD model database.
In this paper, we cover the process of integrating Large-Scale Direct Simultaneous Localization and Mapping (LSD-SLAM) [1] algorithm into our existing AR stereo engine, developed for our modified "Augmented Reali...
详细信息
— Many works in collaborative robotics and human-robot interaction focuses on identifying and predicting human behaviour while considering the information about the robot itself as given. This can be the case when se...
详细信息
This article presents a state-of-the-art overview on shape, information and design retrieval systems in the context of CAD engineering. In contrast to existing surveys, we classify the different approaches from a CAD ...
详细信息
We introduce a novel regulariser based on the natural vector field operations gradient, divergence, curl and shear. For suitable choices of the weighting parameters contained in our model it generalises well-known fir...
详细信息
Large-scale numerical simulations of high-intensity focused ultrasound (HIFU), important for model-based treatment planning, generate large amounts of data. Typically, it is necessary to save hundreds of gigabytes dur...
详细信息
Large-scale numerical simulations of high-intensity focused ultrasound (HIFU), important for model-based treatment planning, generate large amounts of data. Typically, it is necessary to save hundreds of gigabytes during simulation. We propose a novel algorithm for time varying simulation data compression specialized for HIFU. Our approach is especially focused on the on-the-fly parallel data compression during simulations. Now, we are able to compress 3D pressure time series of linear and nonlinear simulations with very acceptable compression ratios and errors (over 80 % of the space can be saved with an acceptable error). The proposed compression will be helpful for significant reduction of resources, such as storage space, network bandwidth, CPU time, etc., enabling better treatment planning using fast volume data visualizations. The paper describes the proposed method, its experimental evaluation, and comparison to the state of the art.
Despite the existence of many well-designed augmented reality (AR) applications, most of these apps target specific hardware and platform, and few of them render virtual objects which are coherent with the real world....
详细信息
ISBN:
(纸本)9781538605288
Despite the existence of many well-designed augmented reality (AR) applications, most of these apps target specific hardware and platform, and few of them render virtual objects which are coherent with the real world. This paper presents an AR application with rendering effects that would increase the consistency between virtual and real world. The application adopts web-based technologies which enables it to run on different machines (mobile, PC) and platforms (windows, android, iOS) without modifications. The virtual objects are rendered with techniques such as cube mapping, and GLSL shaders to model various materials without the need for special setup or extra offline computations. Furthermore, the application uses natural feature tracking for image registration which makes it applicable for both indoor and outdoor scenarios. The results show that the application runs at real-time rates on PC browsers with significant improvement in the visual coherence of the final rendered scene, and at interactive rates on the mobile device.
Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN syste...
详细信息
ISBN:
(纸本)9781509055081
Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN systems could result in performance degrade, the compromise of message confidentiality and integrity, and denial of service. Thus, effective mechanisms to identify and fix this vulnerability are urgently needed. The objective of this research is to address these issues by identifying DTN system vulnerabilities and potential threats, and providing potential countermeasures. We first illustrate vulnerabilities of the epidemic based contact history propagation protocol and then identify the potential threats to system performance, availability, and integrity as well as countermeasures to prevent such threats existing in DTN networks. A secure contact protocol is developed for DTN network with epidemic based contact history propagation protocol and simulations are conducted to assess its effectiveness on attack detection.
The present article is focused on the improvement of the quality of engineering education of graduate students with a major in transport and mechanical engineering through the derivation of a numerical solution of the...
详细信息
暂无评论