Using Pure Translation to Get Euclidean Reconstruction

来源 :北京理工大学学报(英文版) | 被引量 : 0次 | 上传用户:zhouxubo
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
A technique for getting Euclidean reconstruction from two images of the same scene taken by a single moving camera, which undergoes a pure translation, is presented. Euclidean reconstruction of the scene up to three scale factors can be obtained by using this special but still realistic motion when the skew factor of the camera is zero; otherwise Euclidean reconstruction of the depth up to one scale factor can be achieved. The only assumption is that the camera intrinsic parameters are constant. Using this special but still realistic motion to do the reconstruction has the advantage that no projective reconstruction is needed and the Euclidean reconstruction is computed directly from the point correspondences in the two images.
其他文献
Objective To observe the therapeutic effect of non-surgical treatment on diabetic Chinese with chronic periodontitis. Methods Moderate to advanced chronic perio
The Wide-Sense Stationary Uncorrelated Scattering (WSSUS) model has long been viewed as a basic channel model to describe the fading dispersive channel. But non
An experiment is conducted to investigate the effects of lubricant10#, which contains extreme pressure additives T304 and T305, on the rolling contact fatigue (
A new early-late synchronizer is proposed to improve tracking speed. The performance of the traditional early-late synchronizer is analyzed in detail, the resul
An algorithm of auto-searching weld line for welding mobile robot is presented.Auto-searching weld line is that the robot can automatically recognize a weld gro
目的 :考察乳痛宁颗粒剂中当归、川芎、香附子挥发油的最佳提取工艺和 β-环糊精最佳包合工艺。 方法 :用单因素分析考察最佳提取工艺 ,以收油率作为评价提取工艺的指标 ;用
The study of multipoint blank holder force(BHF) control is carried out for hydroforming a complicated shape motorcycle fuel tank. By finite element method (FEM)
Anomaly detection of privileged processes is one of the most important means to safeguard the host and system security. The key problem for improving detection
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols.A new approach-tunnel key node identification (TKNI) was pro
This paper presents a model-driven 3G service creation approach based on model driven architecture technology.The focus of the paper is the methodology of desig