Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment

1. In Figure given below there are three cameras where the distance between the cameras is B, and all three cameras have the same focal length f. The disparity dL = x0 – xL, while the disparity dR = xR – x0. Show that |dL| = |dR|. You should prove this relationship holds mathematically by using the appropriate equations.

2. Consider two points A and B in a simple stereo system. Point A projects to Al on the left image, and Ar on the right image. Similarly there is a point B which projects to Bl and Br. Consider the order of these two points in each image on their epipolar lines. There are two possibilities; either they ordered on the epipolar lines in the same order; for ex they appear as Al, Bl and Ar Br, or they are in opposite order, such as Bl, Al and Ar,Br. Place the two 3d points A and B in two different locations in a simple stereo diagram which demonstrates these two possibilities. (Draw a different picture for each situation).

3. The equation of a simple stereo system is z = f T / d. In this problem assume that f T = 1 which means that z = 1 / d. Assume that the only source of error in a simple stereo system is the error in estimating the disparity, and that this error is exactly one pixel, and it does not change with the actual disparity value. So if the stereo system says the disparity is 5 pixels it is really between 4 and 6 pixels. Similarly, if the stereo system says the disparity is 10 pixels then it is really between 9 and 11 pixels. The error in estimating Z at a given disparity d due to this one pixel error in estimating the disparity is called ErrorZ. For a given value of disparity d, this error is estimated by the formula FirstErrorZ (d pixels) = || z(d – 1) – z(d + 1)||. Compute FirstErrorZ (5 pixels), FirstErrorZ (10 pixels), and the ratio of the two, which is FirstErrorZ (5 pixels) /FirstErrorZ (10 pixels).

Repeat this entire process but now assume that the error in calculating the disparity is ½ pixel, so that SecondErrorZ (d pixels) = || z(d – 1/2) – z(d + 1/2)||. Again compute SecondErrorZ (5 pixels), SecondErrorZ (10 pixels). Now compute the ratio of the two, which is SecondErrorZ (5 pixels) /SecondErrorZ (10 pixels). Looking at this ratio you should hypothesize a relationship between error in Z and error in disparity which holds as the error in disparity (1,1/2,..) approaches zero. In other words, given a small fixed error in computing the disparity, how does the resulting error in computing Z change if the d disparity is cut in half. Verify that your hypothesis is true by computing the derivative of Z with respect to disparity d in the case where z = 1/d, which represents the change in depth over the change in disparity (in the limit as the change in disparity goes to zero). The theory should agree with the practice.

4. There is a simple stereo system with one camera placed above the other camera in the y direction (not the x direction is as usual) by a distance of b. In such a case there is no rotation between the cameras, only a translation by a vector T = [0,b,0]. First compute the essential matrix E in this case. You are given a point p1 in camera co-ordinates in the first image as (x1,y1,f), and a matching point p2 in the second image where p2 is (x2,y2,f). prepare the equation of the epipolar line that contains the matching point p2 in camera co-ordinates in the second image. In this case you are given p1 and you have computed E, and you need to prepare the equation of the line that contains p2 (the free variables are x2,y2) using p1 and E as the fixed variables. Now repeat the entire process again for the case where T = [b,b,0] (a translation of 45 degrees to the right in the x,y plane), and finally where T = [0,0,b] (a translation straight ahead in the Z direction). For the particular case where p1 = (0, 1, f) what is the equation of the epipolar line for all three situations? And where p1 = (1, 1, f) what is the equation of the epipolar line in these three situations? Draw the epipolar lines for all three cases, you just need to show the basic shape of the epipolar lines.

1320_three cameras.jpg

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91948

Have any Question? 


Related Questions in Computer Engineering

In the second lab we use ftp to transfer some files we use

In the second lab, we use FTP to transfer some files. We use Wireshark to capture some packets. We show that FTP uses two separate connections: a control connection and a data-transfer connection. The data connection is ...

1 are idss similar to fi rewalls2 why are system intrusions

1. Are IDSs similar to fi rewalls? 2. Why are system intrusions dangerous? 3. Discuss the best approaches to implementing an effective IDS. 4. Can system intrusions be stopped? Support your response.

Discussionthe benefits of microsoft officebullidentify at

Discussion "The Benefits of Microsoft Office" • Identify at least two ways that a user can combine content from two or more Office applications. Explain the major benefits of doing so for each identified example. • Descr ...

Given an example of broadcast usage in the network and data

Given an example of broadcast usage in the network and data link layers. For each case, (1) name the protocol that utilizing the broadcast, (2) the reason why the broadcast rather that unicast is used, and (3) how the fa ...

1 in a very small as using ospf is it more efficient to use

1. In a very small AS using OSPF, is it more efficient to use only one single area (backbone) or several areas? 2. Why do you think we need only one RIP update message, but several OSPF update messages? 3. OSPF messages ...

You have been called upon to put together some reference

You have been called upon to put together some reference materials for other groups to follow, since up until now they have not created any formal architectural documents. Create a System Reference Guide for your employe ...

1 how can a security framework assist in the design and

1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administr ...

Design a security service that provides data integrity data

Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in a two-party communication system over an insecure channel. Give a rationale that data integ ...

Suppose one wishes to confirm that none of the files in the

Suppose one wishes to confirm that none of the files in the directory /usr/spool/lpd are worldreadable. a. What would the fourth field of the tripwire database contain? b. What would the second field of the RIACS databas ...

1 in sctp a packet is carrying two data chunks each

1. In SCTP, a packet is carrying two DATA chunks, each containing 22 bytes of user data. What is the size of each DATA chunk? What is the total size of the packet? 2. In SCTP, a SACK chunk reports the receipt of three ou ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro