System for 3d reconstruction

Assignment Help Basic Computer Science
Reference no: EM133218669

System for 3D reconstruction.

Develop an interface to read and display two images with the following functionalities:

1. Use the 8 known points, given in 3Dpts.txt, to calibrate each camera/image (we have two). You will need to click on the corresponding image points and create 2D files.

Save the projection matrices in two files, call them M1 and M2.

2. Option A: Matching only

When the user clicks on a pixel in the left image, call it p1, your program should draw the corresponding epipolar line and a + sign on the exact location of the corresponding pixel in the right image, p2.

3. Option B: Matching and 3D reconstruction

When the user clicks on a pixel in the left image, call it p1, your program should draw the corresponding epipolar line and a + sign on the exact location of the corresponding pixel in the right image, p2.

In addition, the 3D coordinates (X, Y, Z) of that point should be calculated and printed. Note that the reconstruction process should involve M1, M2, p1 and p2 

Reference no: EM133218669

Questions Cloud

Apply compression stockings : Read the scenario below, answer the questions, and apply the CARE principles to the scenario.
Assign a set of shards to degrassetyson that changes : DeGrasseTyson (and the spacecraft was connected to it), assign a set of shards to DeGrasseTyson that changes the first fetched shard by the spacecraft
Personality in person-centered psychotherapy : According to Carl Rogers, unconditional positive regard involves basic acceptance and support of a person, regardless of what the person says or does.
Number of key elements : The concept of a just culture has a number of key elements. Choose the two elements that you feel are the most difficult to achieve and provide one strategy for
System for 3d reconstruction : When the user clicks on a pixel in the left image, call it p1, your program should draw the corresponding epipolar line and a + sign on the exact location
Define indepedence as it relates to internal audit function : Define indepedence as it relates to the internal audit function? To maintain independence, where should the Director of Internal Audit report? Pleased explain
Why is poem a political poem : The objective of this task is for to analyze and interpret the poem "Let me alone with my things" (Links to an external site.), by Angelamaría Dávila, and from
Describing strengths from the strengths assessment : Create your own mission statement describing yourself using your 5 strengths from the Strengths assessment. After describing yourself, link yourself to your car
What factors inhibited the early war : What factors inhibited the early war against acquired immunodeficiency syndrome (AIDS)? Do you believe the AIDS outbreak could have been stopped

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Behavior arises from fundamental psychology

We learned that the pattern of behavior arises from fundamental psychology and in particular, our capacity for habitual behavior

  Key components of a risk management plan

Identify the 4 key components of a risk management plan (in project mang.) & explain them?

  How many pages are needed to store the entire job

How many pages are needed to store the entire job?

  What is the impact on price

What is the impact on price, quantity and total revenue when supply decreases by the same amount along an elastic demand curve?

  Explaining use of information technologies to act ethically

When it comes to use of information technologies, it is frequently difficult to find out how to act ethically. Consider some of your own use of information technologies.

  Prove that regular languages are not closed under subset

Prove that regular languages are not closed under subset. (if L is regular and L'?L, we cannot conclude L' is regular).

  What strengths and weaknesses did microsoft

Question 1: What strengths and weaknesses did Microsoft have when it entered the video game market in 2001?

  Explicit strategies for technology development

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity

  Operation security

ISOL 631-University of the Cumberlands- What business factor(s) do YOU think should be considered when building an organizational IT security policy framework?

  How to express a natural full outer join b

Make sure that the result relation does not contain two copies of the attributes name and address, and that the solution is correct even if some tuples in a and b have null values for attributes name or address.

  Design secure systems with a given level of security

Question 1: (T or F) Since we don't have a set cybersecurity theory, we can't design secure systems with a given level of Security

  Web authoring tools and other software

Web authoring tools and other software

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd