An Overview of Depth Cameras and Range Scanners Based on Time-Of-Flight Technologies
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Bottleneck Discovery and Overlay Management in Network Coded Peer-To-Peer Systems
Bottleneck Discovery and Overlay Management in Network Coded Peer-to-Peer Systems ∗ Mahdi Jafarisiavoshani Christina Fragouli EPFL EPFL Switzerland Switzerland mahdi.jafari@epfl.ch christina.fragouli@epfl.ch Suhas Diggavi Christos Gkantsidis EPFL Microsoft Research Switzerland United Kingdom suhas.diggavi@epfl.ch [email protected] ABSTRACT 1. INTRODUCTION The performance of peer-to-peer (P2P) networks depends critically Peer-to-peer (P2P) networks have proved a very successful dis- on the good connectivity of the overlay topology. In this paper we tributed architecture for content distribution. The design philoso- study P2P networks for content distribution (such as Avalanche) phy of such systems is to delegate the distribution task to the par- that use randomized network coding techniques. The basic idea of ticipating nodes (peers) themselves, rather than concentrating it to such systems is that peers randomly combine and exchange linear a low number of servers with limited resources. Therefore, such a combinations of the source packets. A header appended to each P2P non-hierarchical approach is inherently scalable, since it ex- packet specifies the linear combination that the packet carries. In ploits the computing power and bandwidth of all the participants. this paper we show that the linear combinations a node receives Having addressed the problem of ensuring sufficient network re- from its neighbors reveal structural information about the network. sources, P2P systems still face the challenge of how to efficiently We propose algorithms to utilize this observation for topology man- utilize these resources while maintaining a decentralized operation. agement to avoid bottlenecks and clustering in network-coded P2P Central to this is the challenging management problem of connect- systems. -
Developer Condemns City's Attitude Aican Appeal on Hold Avalanche
Developer condemns city's attitude TERRACE -- Although city under way this spring, law when owners of lots adja- ment." said. council says it favours develop- The problem, he explained, cent to the sewer line and road However, alderman Danny ment, it's not willing to put its was sanitary sewer lines within developed their properties. Sheridan maintained, that is not Pointing out the development money where its mouth is, says the sub-division had to be hook- Council, however, refused the case. could still proceed if Shapitka a local developer. ed up to an existing city lines. both requests. The issue, he said, was paid the road and sewer connec- And that, adds Stan The nearest was :at Mountain • "It just seems the city isn't whether the city had subsidized tion costs, Sheridan said other Shapitka, has prompted him to Vista Drive, approximately too interested in lending any developers in the past -- "I'm developers had done so in the drop plans for what would have 850ft. fr0m-the:sou[hwest cur: type of assistance whatsoever," pretty sure it hasn't" -- and past. That included the city been the city's largest residential her of the development proper- Shapitka said, adding council whether it was going to do so in itself when it had developed sub-division project in many ty. appeared to want the estimated this case. "Council didn't seem properties it owned on the Birch years. Shapitka said he asked the ci- $500,000 increased tax base the willing to do that." Ave. bench and deJong Cres- In August of last year ty to build that line and to pave sub-division :would bring but While conceding Shapitka cent. -
Survey of Verification and Validation Techniques for Small Satellite Software Development
Survey of Verification and Validation Techniques for Small Satellite Software Development Stephen A. Jacklin NASA Ames Research Center Presented at the 2015 Space Tech Expo Conference May 19-21, Long Beach, CA Summary The purpose of this paper is to provide an overview of the current trends and practices in small-satellite software verification and validation. This document is not intended to promote a specific software assurance method. Rather, it seeks to present an unbiased survey of software assurance methods used to verify and validate small satellite software and to make mention of the benefits and value of each approach. These methods include simulation and testing, verification and validation with model-based design, formal methods, and fault-tolerant software design with run-time monitoring. Although the literature reveals that simulation and testing has by far the longest legacy, model-based design methods are proving to be useful for software verification and validation. Some work in formal methods, though not widely used for any satellites, may offer new ways to improve small satellite software verification and validation. These methods need to be further advanced to deal with the state explosion problem and to make them more usable by small-satellite software engineers to be regularly applied to software verification. Last, it is explained how run-time monitoring, combined with fault-tolerant software design methods, provides an important means to detect and correct software errors that escape the verification process or those errors that are produced after launch through the effects of ionizing radiation. Introduction While the space industry has developed very good methods for verifying and validating software for large communication satellites over the last 50 years, such methods are also very expensive and require large development budgets. -
Structured Light Based 3D Scanning for Specular Surface by the Combination of Gray Code and Phase Shifting
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XLI-B3, 2016 XXIII ISPRS Congress, 12–19 July 2016, Prague, Czech Republic STRUCTURED LIGHT BASED 3D SCANNING FOR SPECULAR SURFACE BY THE COMBINATION OF GRAY CODE AND PHASE SHIFTING Yujia Zhanga, Alper Yilmaza,∗ a Dept. of Civil, Environmental and Geodetic Engineering, The Ohio State University 2036 Neil Avenue, Columbus, OH 43210 USA - (zhang.2669, yilmaz.15)@osu.edu Commission III, WG III/1 KEY WORDS: Structured Light, 3D Scanning, Specular Surface, Maximum Min-SW Gray Code, Phase Shifting ABSTRACT: Surface reconstruction using coded structured light is considered one of the most reliable techniques for high-quality 3D scanning. With a calibrated projector-camera stereo system, a light pattern is projected onto the scene and imaged by the camera. Correspondences between projected and recovered patterns are computed in the decoding process, which is used to generate 3D point cloud of the surface. However, the indirect illumination effects on the surface, such as subsurface scattering and interreflections, will raise the difficulties in reconstruction. In this paper, we apply maximum min-SW gray code to reduce the indirect illumination effects of the specular surface. We also analysis the errors when comparing the maximum min-SW gray code and the conventional gray code, which justifies that the maximum min-SW gray code has significant superiority to reduce the indirect illumination effects. To achieve sub-pixel accuracy, we project high frequency sinusoidal patterns onto the scene simultaneously. But for specular surface, the high frequency patterns are susceptible to decoding errors. Incorrect decoding of high frequency patterns will result in a loss of depth resolution. -
The Fourth Paradigm
ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive -
Real-Time Depth Imaging
TU Berlin, Fakultät IV, Computer Graphics Real-time depth imaging vorgelegt von Diplom-Mediensystemwissenschaftler Uwe Hahne aus Kirchheim unter Teck, Deutschland Von der Fakultät IV - Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften — Dr.-Ing. — genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr.-Ing. Olaf Hellwich Berichter: Prof. Dr.-Ing. Marc Alexa Berichter: Prof. Dr. Andreas Kolb Tag der wissenschaftlichen Aussprache: 3. Mai 2012 Berlin 2012 D83 For my family. Abstract This thesis depicts approaches toward real-time depth sensing. While humans are very good at estimating distances and hence are able to smoothly control vehicles and their own movements, machines often lack the ability to sense their environ- ment in a manner comparable to humans. This discrepancy prevents the automa- tion of certain job steps. We assume that further enhancement of depth sensing technologies might change this fact. We examine to what extend time-of-flight (ToF) cameras are able to provide reliable depth images in real-time. We discuss current issues with existing real-time imaging methods and technologies in detail and present several approaches to enhance real-time depth imaging. We focus on ToF imaging and the utilization of ToF cameras based on the photonic mixer de- vice (PMD) principle. These cameras provide per pixel distance information in real-time. However, the measurement contains several error sources. We present approaches to indicate measurement errors and to determine the reliability of the data from these sensors. If the reliability is known, combining the data with other sensors will become possible. We describe such a combination of ToF and stereo cameras that enables new interactive applications in the field of computer graph- ics. -
The Methbot Operation
The Methbot Operation December 20, 2016 1 The Methbot Operation White Ops has exposed the largest and most profitable ad fraud operation to strike digital advertising to date. THE METHBOT OPERATION 2 Russian cybercriminals are siphoning At this point the Methbot operation has millions of advertising dollars per day become so embedded in the layers of away from U.S. media companies and the the advertising ecosystem, the only way biggest U.S. brand name advertisers in to shut it down is to make the details the single most profitable bot operation public to help affected parties take discovered to date. Dubbed “Methbot” action. Therefore, White Ops is releasing because of references to “meth” in its results from our research with that code, this operation produces massive objective in mind. volumes of fraudulent video advertising impressions by commandeering critical parts of Internet infrastructure and Information available for targeting the premium video advertising download space. Using an army of automated web • IP addresses known to belong to browsers run from fraudulently acquired Methbot for advertisers and their IP addresses, the Methbot operation agencies and platforms to block. is “watching” as many as 300 million This is the fastest way to shut down the video ads per day on falsified websites operation’s ability to monetize. designed to look like premium publisher inventory. More than 6,000 premium • Falsified domain list and full URL domains were targeted and spoofed, list to show the magnitude of impact enabling the operation to attract millions this operation had on the publishing in real advertising dollars. -
Combined Close Range Photogrammetry and Terrestrial Laser Scanning for Ship Hull Modelling
geosciences Article Combined Close Range Photogrammetry and Terrestrial Laser Scanning for Ship Hull Modelling Pawel Burdziakowski and Pawel Tysiac * Faculty of Civil and Environmental Engineering, Gdansk University of Technology, 80-233 Gda´nsk,Poland; [email protected] * Correspondence: [email protected] Received: 8 April 2019; Accepted: 23 May 2019; Published: 26 May 2019 Abstract: The paper addresses the fields of combined close-range photogrammetry and terrestrial laser scanning in the light of ship modelling. The authors pointed out precision and measurement accuracy due to their possible complex application for ship hulls inventories. Due to prescribed vitality of every ship structure, it is crucial to prepare documentation to support the vessel processes. The presented methods are directed, combined photogrammetric techniques in ship hull inventory due to submarines. The class of photogrammetry techniques based on high quality photos are supposed to be relevant techniques of the inventories’ purpose. An innovative approach combines these methods with Terrestrial Laser Scanning. The process stages of data acquisition, post-processing, and result analysis are presented and discussed due to market requirements. Advantages and disadvantages of the applied methods are presented. Keywords: terrestrial laser scanning; LiDAR; photogrammetry; surveying engineering; geomatics engineering 1. Introduction The present-day market requirements address application development in the cases of inventories and reverse engineering. Attention is paid to autonomous, fast, and accurate measurements covering a broad goal domain, e.g., the human body studies [1,2], coastal monitoring [3–5], or civil engineering [6–8]. The measurements involving a single technique only may lead to unacceptable results in terms of complex services in variable conditions (e.g., various weather conditions). -
The Failure of Mandated Disclosure
BEN-SHAHAR_FINAL.DOC (DO NOT DELETE) 2/3/2011 11:53 AM ARTICLE THE FAILURE OF MANDATED DISCLOSURE † †† OMRI BEN-SHAHAR & CARL E. SCHNEIDER This Article explores the spectacular prevalence, and failure, of the single most common technique for protecting personal autonomy in modern society: mandated disclosure. The Article has four Parts: (1) a comprehensive sum- mary of the recurring use of mandated disclosures, in many forms and circums- tances, in the areas of consumer and borrower protection, patient informed con- sent, contract formation, and constitutional rights; (2) a survey of the empirical literature documenting the failure of the mandated disclosure regime in informing people and in improving their decisions; (3) an account of the multitude of reasons mandated disclosures fail, focusing on the political dy- namics underlying the enactments of these mandates, the incentives of disclosers to carry them out, and, most importantly, on the ability of disclosees to use them; and (4) an argument that mandated disclosure not only fails to achieve its stated goal but also leads to unintended consequences that often harm the very people it intends to serve. INTRODUCTION ......................................................................................649 A. The Argument ................................................................. 649 B. The Method ..................................................................... 651 C. The Style ......................................................................... 652 I. THE DISCLOSURE EMPIRE: THE PERVASIVENESS OF MANDATED DISCLOSURE ...................................................................................652 † Frank & Bernice J. Greenberg Professor of Law, University of Chicago. †† Chauncey Stillman Professor of Law & Professor of Internal Medicine, Universi- ty of Michigan. Helpful comments were provided by workshop participants at The University of Pennsylvania, Georgetown University, The University of Michigan, Tel- Aviv University, and the Federal Reserve Banks of Chicago and Cleveland. -
ABSTRACT LI, XINHAO. Development of Novel Machine Learning
ABSTRACT LI, XINHAO. Development of Novel Machine Learning Approaches and Exploration of Their Applications in Cheminformatics. (Under the direction of Dr. Christopher Gorman). Cheminformatics is the scientific field that develops and applies a combination of mathematics, informatics, machine learning, and other computational technologies to solve chemical problems. It aims at helping chemists in investigating and understanding complex chemical biological systems and guide the experimental design and decision making. With the rapid growing of chemical data (e.g., high-throughput screening, metabolomics, etc.), machine learning has become an important tool for exploring chemical space and mining chemical information. In this dissertation, we present five studies on developing novel machine learning approaches and exploring their applications in cheminformatics. One of the primary tasks of cheminformatics is to predict the physical, chemical, and biological properties of a given compound. Quantitative Structure Activity Relationship (QSAR) modeling relies on machine learning techniques to establish quantified links between molecular structures and their experimental properties/activities. In chapter 2, we developed a dual-layer hierarchical modeling method to fully integrate regression and classification QSAR models for assessing rat acute oral systemic toxicity, with respect to regulatory classifications of concern. The first layer of independent regression, binary and multiclass models (base models) were solely built using computed chemical descriptors/fingerprints. Then, a second layer of models (hierarchical models) were built by stacking all the cross-validated out-of-fold predictions from the base models. All models were validated using an external test set and we found that the hierarchical models did outperform the base models for all the three endpoints. -
Range Imagingimaging
RangeRange ImagingImaging E-mail: [email protected] http://web.yonsei.ac.kr/hgjung Range Imaging [1] E-mail: [email protected] http://web.yonsei.ac.kr/hgjung Range Imaging [1] E-mail: [email protected] http://web.yonsei.ac.kr/hgjung TOF Camera [2] Matricial TOF cameras estimate the scene geometry in a single shot by a matrix of NR×NC TOF sensors. Each one independently but simultaneously measuring the distance of a scene point in front of them. E-mail: [email protected] http://web.yonsei.ac.kr/hgjung TOF Camera [2] Technical challenges because of the light speed. Distance measurements of nominal distance resolution of 1mm need a clock capable to measure 5ps time steps. 1) Continuous wave (CW) intensity modulation-based 2) Optical shutter (OS)-based 3) Single photon avalanche diodes (SPAD)-based This device is able to detect low intensity signals (down to the single photon) and to signal the arrival times of the photons with a jitter of a few tens of picoseconds. http://en.wikipedia.org/wiki/Single- photon_avalanche_diode E-mail: [email protected] http://web.yonsei.ac.kr/hgjung TOF Camera [2] CW Modulation-based Commercial products: -MESA Imaging - PMD Technologies - Optrima SoftKinetic - Canesta (acquired by Microsoft in 2010) Research institutions -CSEM - Fondazione Bruno Kessler E-mail: [email protected] http://web.yonsei.ac.kr/hgjung TOF Camera [2] CW Modulation-based E-mail: [email protected] http://web.yonsei.ac.kr/hgjung TOF Camera [3] OS-based - ZCam of 3DV Systems (acquired by Microsoft in 2009) E-mail: [email protected] http://web.yonsei.ac.kr/hgjung TOF Camera [3] OS-based The 3D information can now be extracted from the reflected deformed “wall” by deploying a fast image shutter in front of the CCD chip and blocking the incoming lights. -
An Avalanche Is Coming Higher Education and the Revolution Ahead
AN AVALANCHE IS COMING HIGHER EDUCATION AND THE REVOLUTION AHEAD ESSAY Michael Barber Katelyn Donnelly Saad Rizvi Foreword by Lawrence Summers, President Emeritus, Harvard University March 2013 © IPPR 2013 Institute for Public Policy Research AN AVALANCHE IS COMING Higher education and the revolution ahead Michael Barber, Katelyn Donnelly, Saad Rizvi March 2013 ‘It’s tragic because, by my reading, should we fail to radically change our approach to education, the same cohort we’re attempting to “protect” could find that their entire future is scuttled by our timidity.’ David Puttnam Speech at Massachusetts Institute of Technology, June 2012 i ABOUT THE AUTHORS Sir Michael Barber is the chief education advisor at Pearson, leading Pearson’s worldwide programme of research into education policy and the impact of its products and services on learner outcomes. He chairs the Pearson Affordable Learning Fund, which aims to extend educational opportunity for the children of low-income families in the developing world. Michael also advises governments and development agencies on education strategy, effective governance and delivery. Prior to Pearson, he was head of McKinsey’s global education practice. He previously served the UK government as head of the Prime Minister’s Delivery Unit (2001–05) and as chief adviser to the secretary of state for education on school standards (1997–2001). Micheal is a visiting professor at the Higher School of Economics in Moscow and author of numerous books including Instruction to Deliver: Fighting to Improve Britain’s Public Services (2007) which was described by the Financial Times as ‘one of the best books about British government for many years’.