摘要:
The techniques and mechanisms described herein are directed to a system for stylizing video, such as interactively transforming video to a cartoon-like style. Briefly stated, the techniques include determining a set of volumetric objects within a video, each volumetric object being a segment. Mean shift video segmentation may be used for this step. With that segmentation information, the technique further includes indicating on a limited number of keyframes of the video how segments should be merged into a semantic region. Finally, a contiguous volume is created by interpolating between keyframes by a mean shift constrained interpolation technique to propagate the semantic regions between keyframes.
摘要:
Caricature exaggeration systems, engines, and methods create a drawing of a facial image, compare relationships among facial features in the drawing to corresponding relationships in facial images and corresponding caricatures in a database, and automatically exaggerate at least one relationship among facial features in the drawing based on the facial images and the corresponding caricatures in the database.
摘要:
Described herein is a technique for creating a 3D face model using images obtained from an inexpensive camera associated with a general-purpose computer. Two still images of the user are captured, and two video sequences. The user is asked to identify five facial features, which are used to calculate a mask and to perform fitting operations. Based on a comparison of the still images, deformation vectors are applied to a neutral face model to create the 3D model. The video sequences are used to create a texture map. The process of creating the texture map references the previously obtained 3D model to determine poses of the sequential video images.
摘要:
A strategy is described for alerting a user when an Internet domain becomes active. The strategy includes receiving a domain change request and logging this request in a domain table. The domain change request can instruct a registrar to create a new domain, or modify an existing domain (such as by transferring or re-delegating an existing domain). Monitoring logic is configured to use the domain table to perform periodic checks to determine whether the domain has become active. If the domain has become active, notification logic is configured to send a recipient a message which alerts the recipient to the activation of the Internet domain. The notification logic can send this message using electronic mail or some other communication mechanism.
摘要:
A network system installed within a residence provides digital media and simulates a user environment. State devices located throughout a residence generate state data indicative of operation. A state device may be a digital media adapter to allow a non-IP enabled device to receive and play digital media. A server communicates with the state devices to deliver digital media content and to receive state data. The server includes simulation applications that generate a simulated model of the home environment and predict likely events. The server conveys commands to the state devices to take actions to improve the environment for users.
摘要:
A real-time approximately 360 degree image correction system and a method for alleviating distortion and perception problems in images captured by omni-directional cameras. In general, the real-time panoramic image correction method generates a warp table from pixel coordinates of a panoramic image and applies the warp table to the panoramic image to create a corrected panoramic image. The corrections are performed using a parametric class of warping functions that include Spatially Varying Uniform (SVU) scaling functions. The SVU scaling functions and scaling factors are used to perform vertical scaling and horizontal scaling on the panoramic image pixel coordinates. A horizontal distortion correction is performed using the SVU scaling functions at at least two different scaling factors. This processing generates a warp table that can be applied to the panoramic image to yield the corrected panoramic image. In one embodiment the warp table is concatenated with a stitching table used to create the panoramic image.
摘要:
Described herein is a technique for creating a 3D face model using images obtained from an inexpensive camera associated with a general-purpose computer. Two still images of the user are captured, and two video sequences. The user is asked to identify five facial features, which are used to calculate a mask and to perform fitting operations. Based on a comparison of the still images, deformation vectors are applied to a neutral face model to create the 3D model. The video sequences are used to create a texture map. The process of creating the texture map references the previously obtained 3D model to determine poses of the sequential video images.
摘要:
A method and apparatus for surgical correction of malformations of digits of a foot. Part of the joint is removed to expose bone ends. The bone ends are spaced apart from each other at a distance greater than would be suitable for knitting of said bone ends to each other with bone tissue. Holes are bored in each of the bone ends. An implant, including shafts and a central spacer, is inserted into each of the holes in the bones. This implant consists entirely of absorbable material. The implant is left permanently in place to be completely absorbed as it is replaced by fibrous scar tissue. This tissue forms an effective joint replacement.
摘要:
A method of effecting contraception in human females comprises administering an ovulation-inhibiting amount of melatonin. Optionally, the melatonin is administered in combination with a progestogen and/or an estrogen. The administration of melatonin also provides a method of preventing breast cancer in women.
摘要:
Systems and method are provided for securing physical-location transfers that include receiving object information associated with a particular physical location; receiving user information associated with a user that owns the physical location; generating a protected object associated with the physical location, wherein the protected object is generated based on the object information and the user information; generating a user key associated with the physical location, wherein generating the user key is based on the object information and the user information; storing the user key and a physical-location identifier associated with the physical location in a database; receiving a transfer request associated with the physical location, the transfer request including the user key; transmitting an authorization request for the transfer associated with the physical location; and receiving one of an authorization for the transfer associated with the physical location and a cancellation for the transfer associated with the physical location.