4 resultados para Tracking and trailing.
em Digital Peer Publishing
Resumo:
In recent years, depth cameras have been widely utilized in camera tracking for augmented and mixed reality. Many of the studies focus on the methods that generate the reference model simultaneously with the tracking and allow operation in unprepared environments. However, methods that rely on predefined CAD models have their advantages. In such methods, the measurement errors are not accumulated to the model, they are tolerant to inaccurate initialization, and the tracking is always performed directly in reference model's coordinate system. In this paper, we present a method for tracking a depth camera with existing CAD models and the Iterative Closest Point (ICP) algorithm. In our approach, we render the CAD model using the latest pose estimate and construct a point cloud from the corresponding depth map. We construct another point cloud from currently captured depth frame, and find the incremental change in the camera pose by aligning the point clouds. We utilize a GPGPU-based implementation of the ICP which efficiently uses all the depth data in the process. The method runs in real-time, it is robust for outliers, and it does not require any preprocessing of the CAD models. We evaluated the approach using the Kinect depth sensor, and compared the results to a 2D edge-based method, to a depth-based SLAM method, and to the ground truth. The results show that the approach is more stable compared to the edge-based method and it suffers less from drift compared to the depth-based SLAM.
Resumo:
Die Radio Frequenz Identifikation (RFID) gilt als wichtigste technologische Neuerung in der Informationslogistik. Wird RFID in der produzierenden Industrie hauptsächlich zur Betriebsdaten-erfassung und im Handel zur Wareneingangs-/ Warenausgangskontrolle verwendet, so können ins-besondere in der Pharmazeutischen Industrie die Vorteile der Technologie voll ausgereizt werden. Die wohl wichtigste Anwendung ist die lückenlose Rückverfolgung entlang der Lieferkette, wie sie in den USA bereits in einigen Staaten für alle pharmazeutischen Produkte vorgeschrieben und auch in Deutschland für bestimmte Produkte erforderlich ist. Zudem können die RFID Transponder auf der Produktver-packung als fälschungssicheres Merkmal eingesetzt werden. Bei temperatursensiblen Produkten können Transponder mit zusätzlicher Sensorik zur Überwachung der Kühlkette dienen. Gleichzeitig kann der Transponder auch als Diebstahlsicherung im innerbetrieblichen Bereich sowie auch im Handel dienen und ermöglicht dabei eine höhere Sicherheit als die bisher eingesetzten 1-Bit Transponder. Die Trans-pondertechnologie kann außerdem den Barcode ganz oder teilweise ersetzen und so einen großen Beitrag zur Prozessautomatisierung leisten.
Resumo:
Methods for optical motion capture often require timeconsuming manual processing before the data can be used for subsequent tasks such as retargeting or character animation. These processing steps restrict the applicability of motion capturing especially for dynamic VR-environments with real time requirements. To solve these problems, we present two additional, fast and automatic processing stages based on our motion capture pipeline presented in [HSK05]. A normalization step aligns the recorded coordinate systems with the skeleton structure to yield a common and intuitive data basis across different recording sessions. A second step computes a parameterization based on automatically extracted main movement axes to generate a compact motion description. Our method does not restrict the placement of marker bodies nor the recording setup, and only requires a short calibration phase.
Resumo:
This article provides a holistic legal analysis of the use of cookies in Online Behavioural Advertising. The current EU legislative framework is outlined in detail, and the legal obligations are examined. Consent and the debates surrounding its implementation form a large portion of the analysis. The article outlines the current difficulties associated with the reliance on this requirement as a condition for the placing and accessing of cookies. Alternatives to this approach are explored, and the implementation of solutions based on the application of the Privacy by Design and Privacy by Default concepts are presented. This discussion involves an analysis of the use of code and, therefore, product architecture to ensure adequate protections.