TeZ
3 years ago
commit
2dc8767a1e
17 changed files with 5857 additions and 0 deletions
-
134MIKROLAB_TEZ/Blob.pde
-
1031MIKROLAB_TEZ/MIKROLAB_TEZ.pde
-
BINMIKROLAB_TEZ/mikro-039379.png
-
11README.md
-
BINimages/LIFEFORMS-LOGO.png
-
BINlifeforms-stage-2022.pdf
-
3427max-patch/MIKROLAB.maxpat
-
233max-patch/MicroOSC.maxpat
-
32microtracker/Blob.pde
-
674microtracker/LICENSE
-
2microtracker/README.md
-
71microtracker/Scrollbars.pde
-
BINmicrotracker/Serif-48.vlw
-
BINmicrotracker/dot.png
-
240microtracker/microtracker.pde
-
BINmicrotracker/pacman.png
-
2microtracker/sketch.properties
@ -0,0 +1,134 @@ |
|||
/** |
|||
* Blob Class |
|||
* |
|||
* Based on this example by Daniel Shiffman: |
|||
* http://shiffman.net/2011/04/26/opencv-matching-faces-over-time/ |
|||
* |
|||
* @author: Jordi Tost (@jorditost) |
|||
* |
|||
* University of Applied Sciences Potsdam, 2014 |
|||
*/ |
|||
|
|||
import oscP5.*; |
|||
import netP5.*; |
|||
|
|||
private static NetAddress oscOutAddress; |
|||
private static OscMessage mMessage; |
|||
|
|||
|
|||
class Blob { |
|||
private final static int OSC_OUT_PERIOD = 100; |
|||
private final static int OSC_OUT_PORT = 8666; |
|||
private final static String OSC_OUT_HOST = "localhost"; |
|||
private final static String OSC_OUT_PATTERN = "/blobOSC/"; |
|||
|
|||
private PApplet parent; |
|||
|
|||
// Contour |
|||
public Contour contour; |
|||
|
|||
// Am I available to be matched? |
|||
public boolean available; |
|||
|
|||
// Should I be deleted? |
|||
public boolean delete; |
|||
|
|||
// How long should I live if I have disappeared? |
|||
private int initTimer = 5; //127; |
|||
public int timer; |
|||
//public int xID; |
|||
|
|||
// Unique ID for each blob |
|||
int id; |
|||
|
|||
|
|||
/////////////////////////////// |
|||
// Make me |
|||
Blob(PApplet parent, int id, Contour c) { |
|||
this.parent = parent; |
|||
this.id = id; |
|||
this.contour = new Contour(parent, c.pointMat); |
|||
|
|||
available = true; |
|||
delete = false; |
|||
|
|||
timer = initTimer; |
|||
oscOutAddress = new NetAddress(OSC_OUT_HOST, OSC_OUT_PORT); |
|||
mMessage = new OscMessage(OSC_OUT_PATTERN); |
|||
} |
|||
|
|||
|
|||
/////////////////////////////// |
|||
// Show me |
|||
void display() { |
|||
Rectangle r = contour.getBoundingBox(); |
|||
|
|||
float opacity = map(timer, 0, initTimer, 0, 127); |
|||
fill(0, 0, 255, opacity); |
|||
stroke(0, 0, 255); |
|||
rect(r.x, r.y, r.width, r.height); |
|||
fill(255, 2*opacity); |
|||
textSize(26); |
|||
text(""+id, r.x+10, r.y+30); |
|||
} |
|||
|
|||
|
|||
/////////////////////////////// |
|||
// Give me a new contour for this blob (shape, points, location, size) |
|||
// Oooh, it would be nice to lerp here! |
|||
void update(Contour newC) { |
|||
|
|||
contour = new Contour(parent, newC.pointMat); |
|||
|
|||
// Is there a way to update the contour's points without creating a new one? |
|||
/*ArrayList<PVector> newPoints = newC.getPoints(); |
|||
Point[] inputPoints = new Point[newPoints.size()]; |
|||
|
|||
for(int i = 0; i < newPoints.size(); i++){ |
|||
inputPoints[i] = new Point(newPoints.get(i).x, newPoints.get(i).y); |
|||
} |
|||
contour.loadPoints(inputPoints);*/ |
|||
|
|||
timer = initTimer; |
|||
} |
|||
|
|||
/////////////////////////////// |
|||
// Count me down, I am gone |
|||
void countDown() { |
|||
timer--; |
|||
} |
|||
|
|||
/////////////////////////////// |
|||
// I am deed, delete me |
|||
boolean dead() { |
|||
if (timer < 0) return true; |
|||
return false; |
|||
} |
|||
|
|||
/////////////////////////////// |
|||
public Rectangle getBoundingBox() { |
|||
return contour.getBoundingBox(); |
|||
} |
|||
|
|||
/////////////////////////////// |
|||
//send OSC Data |
|||
public void sendOsc() { |
|||
|
|||
Rectangle r = contour.getBoundingBox(); |
|||
double mx = r.getCenterX(); |
|||
float x = (float) mx; |
|||
double my = r.getCenterY(); |
|||
float y = (float) my; |
|||
|
|||
String mAddrPatt = OSC_OUT_PATTERN; |
|||
mMessage.clear(); |
|||
mMessage.setAddrPattern(mAddrPatt+"id"+"x"+"y"+"w"+"h"); |
|||
mMessage.add(id); |
|||
mMessage.add(x); |
|||
mMessage.add(y); |
|||
mMessage.add(r.width); |
|||
mMessage.add(r.height); |
|||
|
|||
OscP5.flush(mMessage, oscOutAddress); |
|||
} |
|||
} |
1031
MIKROLAB_TEZ/MIKROLAB_TEZ.pde
File diff suppressed because it is too large
View File
File diff suppressed because it is too large
View File
After Width: 1440 | Height: 900 | Size: 972 KiB |
@ -0,0 +1,11 @@ |
|||
====================== |
|||
|
|||
TeZ LIFE/FORMS WORKSHOP |
|||
|
|||
[ 2022 ] |
|||
|
|||
====================== |
|||
|
|||
![This is an image](/images/LIFEFORMS-LOGO.png) |
|||
|
|||
====================== |
After Width: 1456 | Height: 846 | Size: 227 KiB |
3427
max-patch/MIKROLAB.maxpat
File diff suppressed because it is too large
View File
File diff suppressed because it is too large
View File
@ -0,0 +1,233 @@ |
|||
{ |
|||
"patcher" : { |
|||
"fileversion" : 1, |
|||
"appversion" : { |
|||
"major" : 7, |
|||
"minor" : 3, |
|||
"revision" : 6, |
|||
"architecture" : "x86", |
|||
"modernui" : 1 |
|||
} |
|||
, |
|||
"rect" : [ 99.0, 198.0, 696.0, 416.0 ], |
|||
"bglocked" : 0, |
|||
"openinpresentation" : 0, |
|||
"default_fontsize" : 12.0, |
|||
"default_fontface" : 0, |
|||
"default_fontname" : "Arial", |
|||
"gridonopen" : 1, |
|||
"gridsize" : [ 15.0, 15.0 ], |
|||
"gridsnaponopen" : 1, |
|||
"objectsnaponopen" : 1, |
|||
"statusbarvisible" : 2, |
|||
"toolbarvisible" : 1, |
|||
"lefttoolbarpinned" : 0, |
|||
"toptoolbarpinned" : 0, |
|||
"righttoolbarpinned" : 0, |
|||
"bottomtoolbarpinned" : 0, |
|||
"toolbars_unpinned_last_save" : 0, |
|||
"tallnewobj" : 0, |
|||
"boxanimatetime" : 200, |
|||
"enablehscroll" : 1, |
|||
"enablevscroll" : 1, |
|||
"devicewidth" : 0.0, |
|||
"description" : "", |
|||
"digest" : "", |
|||
"tags" : "", |
|||
"style" : "", |
|||
"subpatcher_template" : "Default Max 7", |
|||
"boxes" : [ { |
|||
"box" : { |
|||
"id" : "obj-15", |
|||
"maxclass" : "number", |
|||
"numinlets" : 1, |
|||
"numoutlets" : 2, |
|||
"outlettype" : [ "", "bang" ], |
|||
"parameter_enable" : 0, |
|||
"patching_rect" : [ 311.0, 254.0, 50.0, 22.0 ], |
|||
"style" : "" |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"box" : { |
|||
"id" : "obj-14", |
|||
"maxclass" : "number", |
|||
"numinlets" : 1, |
|||
"numoutlets" : 2, |
|||
"outlettype" : [ "", "bang" ], |
|||
"parameter_enable" : 0, |
|||
"patching_rect" : [ 255.0, 254.0, 50.0, 22.0 ], |
|||
"style" : "" |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"box" : { |
|||
"format" : 6, |
|||
"id" : "obj-10", |
|||
"maxclass" : "flonum", |
|||
"numinlets" : 1, |
|||
"numoutlets" : 2, |
|||
"outlettype" : [ "", "bang" ], |
|||
"parameter_enable" : 0, |
|||
"patching_rect" : [ 166.0, 221.0, 50.0, 22.0 ], |
|||
"style" : "" |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"box" : { |
|||
"format" : 6, |
|||
"id" : "obj-9", |
|||
"maxclass" : "flonum", |
|||
"numinlets" : 1, |
|||
"numoutlets" : 2, |
|||
"outlettype" : [ "", "bang" ], |
|||
"parameter_enable" : 0, |
|||
"patching_rect" : [ 114.0, 221.0, 50.0, 22.0 ], |
|||
"style" : "" |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"box" : { |
|||
"id" : "obj-7", |
|||
"maxclass" : "number", |
|||
"numinlets" : 1, |
|||
"numoutlets" : 2, |
|||
"outlettype" : [ "", "bang" ], |
|||
"parameter_enable" : 0, |
|||
"patching_rect" : [ 44.0, 205.0, 50.0, 22.0 ], |
|||
"style" : "" |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"box" : { |
|||
"id" : "obj-5", |
|||
"maxclass" : "newobj", |
|||
"numinlets" : 1, |
|||
"numoutlets" : 5, |
|||
"outlettype" : [ "int", "float", "float", "int", "int" ], |
|||
"patching_rect" : [ 44.0, 141.0, 106.0, 22.0 ], |
|||
"style" : "", |
|||
"text" : "unpack 1 1. 1. 1 1" |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"box" : { |
|||
"id" : "obj-4", |
|||
"maxclass" : "newobj", |
|||
"numinlets" : 2, |
|||
"numoutlets" : 2, |
|||
"outlettype" : [ "", "" ], |
|||
"patching_rect" : [ 44.0, 89.0, 133.0, 22.0 ], |
|||
"style" : "", |
|||
"text" : "route /blobOSC/idxywh" |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"box" : { |
|||
"id" : "obj-3", |
|||
"maxclass" : "message", |
|||
"numinlets" : 2, |
|||
"numoutlets" : 1, |
|||
"outlettype" : [ "" ], |
|||
"patching_rect" : [ 201.0, 89.0, 290.0, 22.0 ], |
|||
"style" : "", |
|||
"text" : "/blobOSC/idxywh 12 33.5 398.5 25 25" |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"box" : { |
|||
"id" : "obj-1", |
|||
"maxclass" : "newobj", |
|||
"numinlets" : 1, |
|||
"numoutlets" : 1, |
|||
"outlettype" : [ "" ], |
|||
"patching_rect" : [ 44.0, 22.0, 99.0, 22.0 ], |
|||
"style" : "", |
|||
"text" : "udpreceive 8666" |
|||
} |
|||
|
|||
} |
|||
], |
|||
"lines" : [ { |
|||
"patchline" : { |
|||
"destination" : [ "obj-3", 1 ], |
|||
"midpoints" : [ 53.5, 66.0, 481.5, 66.0 ], |
|||
"order" : 0, |
|||
"source" : [ "obj-1", 0 ] |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"patchline" : { |
|||
"destination" : [ "obj-4", 0 ], |
|||
"order" : 1, |
|||
"source" : [ "obj-1", 0 ] |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"patchline" : { |
|||
"destination" : [ "obj-5", 0 ], |
|||
"source" : [ "obj-4", 0 ] |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"patchline" : { |
|||
"destination" : [ "obj-10", 0 ], |
|||
"midpoints" : [ 97.0, 191.5, 175.5, 191.5 ], |
|||
"source" : [ "obj-5", 2 ] |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"patchline" : { |
|||
"destination" : [ "obj-14", 0 ], |
|||
"midpoints" : [ 118.75, 208.0, 264.5, 208.0 ], |
|||
"source" : [ "obj-5", 3 ] |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"patchline" : { |
|||
"destination" : [ "obj-15", 0 ], |
|||
"midpoints" : [ 140.5, 208.0, 320.5, 208.0 ], |
|||
"source" : [ "obj-5", 4 ] |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"patchline" : { |
|||
"destination" : [ "obj-7", 0 ], |
|||
"source" : [ "obj-5", 0 ] |
|||
} |
|||
|
|||
} |
|||
, { |
|||
"patchline" : { |
|||
"destination" : [ "obj-9", 0 ], |
|||
"midpoints" : [ 75.25, 191.5, 123.5, 191.5 ], |
|||
"source" : [ "obj-5", 1 ] |
|||
} |
|||
|
|||
} |
|||
], |
|||
"dependency_cache" : [ ], |
|||
"autosave" : 0, |
|||
"bgfillcolor_type" : "gradient", |
|||
"bgfillcolor_color1" : [ 0.376471, 0.384314, 0.4, 1.0 ], |
|||
"bgfillcolor_color2" : [ 0.290196, 0.309804, 0.301961, 1.0 ], |
|||
"bgfillcolor_color" : [ 0.290196, 0.309804, 0.301961, 1.0 ], |
|||
"bgfillcolor_angle" : 270.0, |
|||
"bgfillcolor_proportion" : 0.39 |
|||
} |
|||
|
|||
} |
@ -0,0 +1,32 @@ |
|||
class Blob { |
|||
ArrayList<Integer> blobX = new ArrayList<Integer>(); // X coordinates |
|||
ArrayList<Integer> blobY = new ArrayList<Integer>(); // Y coordinates |
|||
ArrayList<Integer> blobS = new ArrayList<Integer>(); // # of sections |
|||
ArrayList<Integer> blobA = new ArrayList<Integer>(); // Area in pixels |
|||
boolean isPacMan = false; // Pacman flag |
|||
|
|||
Blob (int bX, int bY, int bS, int bA, boolean selected) // Constructor |
|||
{ |
|||
blobX.add(bX); |
|||
blobY.add(bY); |
|||
blobS.add(bS); |
|||
blobA.add(bA); |
|||
isPacMan = selected; |
|||
} |
|||
|
|||
void addXYSA(int X, int Y, int S, int A) // add coordinates |
|||
{ |
|||
blobX.add(X); |
|||
blobY.add(Y); |
|||
blobS.add(S); |
|||
blobA.add(A); |
|||
} |
|||
|
|||
void togglePacMan() { |
|||
if(isPacMan) { |
|||
isPacMan = false; |
|||
} else { |
|||
isPacMan = true; |
|||
} |
|||
} |
|||
} |
@ -0,0 +1,674 @@ |
|||
GNU GENERAL PUBLIC LICENSE |
|||
Version 3, 29 June 2007 |
|||
|
|||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> |
|||
Everyone is permitted to copy and distribute verbatim copies |
|||
of this license document, but changing it is not allowed. |
|||
|
|||
Preamble |
|||
|
|||
The GNU General Public License is a free, copyleft license for |
|||
software and other kinds of works. |
|||
|
|||
The licenses for most software and other practical works are designed |
|||
to take away your freedom to share and change the works. By contrast, |
|||
the GNU General Public License is intended to guarantee your freedom to |
|||
share and change all versions of a program--to make sure it remains free |
|||
software for all its users. We, the Free Software Foundation, use the |
|||
GNU General Public License for most of our software; it applies also to |
|||
any other work released this way by its authors. You can apply it to |
|||
your programs, too. |
|||
|
|||
When we speak of free software, we are referring to freedom, not |
|||
price. Our General Public Licenses are designed to make sure that you |
|||
have the freedom to distribute copies of free software (and charge for |
|||
them if you wish), that you receive source code or can get it if you |
|||
want it, that you can change the software or use pieces of it in new |
|||
free programs, and that you know you can do these things. |
|||
|
|||
To protect your rights, we need to prevent others from denying you |
|||
these rights or asking you to surrender the rights. Therefore, you have |
|||
certain responsibilities if you distribute copies of the software, or if |
|||
you modify it: responsibilities to respect the freedom of others. |
|||
|
|||
For example, if you distribute copies of such a program, whether |
|||
gratis or for a fee, you must pass on to the recipients the same |
|||
freedoms that you received. You must make sure that they, too, receive |
|||
or can get the source code. And you must show them these terms so they |
|||
know their rights. |
|||
|
|||
Developers that use the GNU GPL protect your rights with two steps: |
|||
(1) assert copyright on the software, and (2) offer you this License |
|||
giving you legal permission to copy, distribute and/or modify it. |
|||
|
|||
For the developers' and authors' protection, the GPL clearly explains |
|||
that there is no warranty for this free software. For both users' and |
|||
authors' sake, the GPL requires that modified versions be marked as |
|||
changed, so that their problems will not be attributed erroneously to |
|||
authors of previous versions. |
|||
|
|||
Some devices are designed to deny users access to install or run |
|||
modified versions of the software inside them, although the manufacturer |
|||
can do so. This is fundamentally incompatible with the aim of |
|||
protecting users' freedom to change the software. The systematic |
|||
pattern of such abuse occurs in the area of products for individuals to |
|||
use, which is precisely where it is most unacceptable. Therefore, we |
|||
have designed this version of the GPL to prohibit the practice for those |
|||
products. If such problems arise substantially in other domains, we |
|||
stand ready to extend this provision to those domains in future versions |
|||
of the GPL, as needed to protect the freedom of users. |
|||
|
|||
Finally, every program is threatened constantly by software patents. |
|||
States should not allow patents to restrict development and use of |
|||
software on general-purpose computers, but in those that do, we wish to |
|||
avoid the special danger that patents applied to a free program could |
|||
make it effectively proprietary. To prevent this, the GPL assures that |
|||
patents cannot be used to render the program non-free. |
|||
|
|||
The precise terms and conditions for copying, distribution and |
|||
modification follow. |
|||
|
|||
TERMS AND CONDITIONS |
|||
|
|||
0. Definitions. |
|||
|
|||
"This License" refers to version 3 of the GNU General Public License. |
|||
|
|||
"Copyright" also means copyright-like laws that apply to other kinds of |
|||
works, such as semiconductor masks. |
|||
|
|||
"The Program" refers to any copyrightable work licensed under this |
|||
License. Each licensee is addressed as "you". "Licensees" and |
|||
"recipients" may be individuals or organizations. |
|||
|
|||
To "modify" a work means to copy from or adapt all or part of the work |
|||
in a fashion requiring copyright permission, other than the making of an |
|||
exact copy. The resulting work is called a "modified version" of the |
|||
earlier work or a work "based on" the earlier work. |
|||
|
|||
A "covered work" means either the unmodified Program or a work based |
|||
on the Program. |
|||
|
|||
To "propagate" a work means to do anything with it that, without |
|||
permission, would make you directly or secondarily liable for |
|||
infringement under applicable copyright law, except executing it on a |
|||
computer or modifying a private copy. Propagation includes copying, |
|||
distribution (with or without modification), making available to the |
|||
public, and in some countries other activities as well. |
|||
|
|||
To "convey" a work means any kind of propagation that enables other |
|||
parties to make or receive copies. Mere interaction with a user through |
|||
a computer network, with no transfer of a copy, is not conveying. |
|||
|
|||
An interactive user interface displays "Appropriate Legal Notices" |
|||
to the extent that it includes a convenient and prominently visible |
|||
feature that (1) displays an appropriate copyright notice, and (2) |
|||
tells the user that there is no warranty for the work (except to the |
|||
extent that warranties are provided), that licensees may convey the |
|||
work under this License, and how to view a copy of this License. If |
|||
the interface presents a list of user commands or options, such as a |
|||
menu, a prominent item in the list meets this criterion. |
|||
|
|||
1. Source Code. |
|||
|
|||
The "source code" for a work means the preferred form of the work |
|||
for making modifications to it. "Object code" means any non-source |
|||
form of a work. |
|||
|
|||
A "Standard Interface" means an interface that either is an official |
|||
standard defined by a recognized standards body, or, in the case of |
|||
interfaces specified for a particular programming language, one that |
|||
is widely used among developers working in that language. |
|||
|
|||
The "System Libraries" of an executable work include anything, other |
|||
than the work as a whole, that (a) is included in the normal form of |
|||
packaging a Major Component, but which is not part of that Major |
|||
Component, and (b) serves only to enable use of the work with that |
|||
Major Component, or to implement a Standard Interface for which an |
|||
implementation is available to the public in source code form. A |
|||
"Major Component", in this context, means a major essential component |
|||
(kernel, window system, and so on) of the specific operating system |
|||
(if any) on which the executable work runs, or a compiler used to |
|||
produce the work, or an object code interpreter used to run it. |
|||
|
|||
The "Corresponding Source" for a work in object code form means all |
|||
the source code needed to generate, install, and (for an executable |
|||
work) run the object code and to modify the work, including scripts to |
|||
control those activities. However, it does not include the work's |
|||
System Libraries, or general-purpose tools or generally available free |
|||
programs which are used unmodified in performing those activities but |
|||
which are not part of the work. For example, Corresponding Source |
|||
includes interface definition files associated with source files for |
|||
the work, and the source code for shared libraries and dynamically |
|||
linked subprograms that the work is specifically designed to require, |
|||
such as by intimate data communication or control flow between those |
|||
subprograms and other parts of the work. |
|||
|
|||
The Corresponding Source need not include anything that users |
|||
can regenerate automatically from other parts of the Corresponding |
|||
Source. |
|||
|
|||
The Corresponding Source for a work in source code form is that |
|||
same work. |
|||
|
|||
2. Basic Permissions. |
|||
|
|||
All rights granted under this License are granted for the term of |
|||
copyright on the Program, and are irrevocable provided the stated |
|||
conditions are met. This License explicitly affirms your unlimited |
|||
permission to run the unmodified Program. The output from running a |
|||
covered work is covered by this License only if the output, given its |
|||
content, constitutes a covered work. This License acknowledges your |
|||
rights of fair use or other equivalent, as provided by copyright law. |
|||
|
|||
You may make, run and propagate covered works that you do not |
|||
convey, without conditions so long as your license otherwise remains |
|||
in force. You may convey covered works to others for the sole purpose |
|||
of having them make modifications exclusively for you, or provide you |
|||
with facilities for running those works, provided that you comply with |
|||
the terms of this License in conveying all material for which you do |
|||
not control copyright. Those thus making or running the covered works |
|||
for you must do so exclusively on your behalf, under your direction |
|||
and control, on terms that prohibit them from making any copies of |
|||
your copyrighted material outside their relationship with you. |
|||
|
|||
Conveying under any other circumstances is permitted solely under |
|||
the conditions stated below. Sublicensing is not allowed; section 10 |
|||
makes it unnecessary. |
|||
|
|||
3. Protecting Users' Legal Rights From Anti-Circumvention Law. |
|||
|
|||
No covered work shall be deemed part of an effective technological |
|||
measure under any applicable law fulfilling obligations under article |
|||
11 of the WIPO copyright treaty adopted on 20 December 1996, or |
|||
similar laws prohibiting or restricting circumvention of such |
|||
measures. |
|||
|
|||
When you convey a covered work, you waive any legal power to forbid |
|||
circumvention of technological measures to the extent such circumvention |
|||
is effected by exercising rights under this License with respect to |
|||
the covered work, and you disclaim any intention to limit operation or |
|||
modification of the work as a means of enforcing, against the work's |
|||
users, your or third parties' legal rights to forbid circumvention of |
|||
technological measures. |
|||
|
|||
4. Conveying Verbatim Copies. |
|||
|
|||
You may convey verbatim copies of the Program's source code as you |
|||
receive it, in any medium, provided that you conspicuously and |
|||
appropriately publish on each copy an appropriate copyright notice; |
|||
keep intact all notices stating that this License and any |
|||
non-permissive terms added in accord with section 7 apply to the code; |
|||
keep intact all notices of the absence of any warranty; and give all |
|||
recipients a copy of this License along with the Program. |
|||
|
|||
You may charge any price or no price for each copy that you convey, |
|||
and you may offer support or warranty protection for a fee. |
|||
|
|||
5. Conveying Modified Source Versions. |
|||
|
|||
You may convey a work based on the Program, or the modifications to |
|||
produce it from the Program, in the form of source code under the |
|||
terms of section 4, provided that you also meet all of these conditions: |
|||
|
|||
a) The work must carry prominent notices stating that you modified |
|||
it, and giving a relevant date. |
|||
|
|||
b) The work must carry prominent notices stating that it is |
|||
released under this License and any conditions added under section |
|||
7. This requirement modifies the requirement in section 4 to |
|||
"keep intact all notices". |
|||
|
|||
c) You must license the entire work, as a whole, under this |
|||
License to anyone who comes into possession of a copy. This |
|||
License will therefore apply, along with any applicable section 7 |
|||
additional terms, to the whole of the work, and all its parts, |
|||
regardless of how they are packaged. This License gives no |
|||
permission to license the work in any other way, but it does not |
|||
invalidate such permission if you have separately received it. |
|||
|
|||
d) If the work has interactive user interfaces, each must display |
|||
Appropriate Legal Notices; however, if the Program has interactive |
|||
interfaces that do not display Appropriate Legal Notices, your |
|||
work need not make them do so. |
|||
|
|||
A compilation of a covered work with other separate and independent |
|||
works, which are not by their nature extensions of the covered work, |
|||
and which are not combined with it such as to form a larger program, |
|||
in or on a volume of a storage or distribution medium, is called an |
|||
"aggregate" if the compilation and its resulting copyright are not |
|||
used to limit the access or legal rights of the compilation's users |
|||
beyond what the individual works permit. Inclusion of a covered work |
|||
in an aggregate does not cause this License to apply to the other |
|||
parts of the aggregate. |
|||
|
|||
6. Conveying Non-Source Forms. |
|||
|
|||
You may convey a covered work in object code form under the terms |
|||
of sections 4 and 5, provided that you also convey the |
|||
machine-readable Corresponding Source under the terms of this License, |
|||
in one of these ways: |
|||
|
|||
a) Convey the object code in, or embodied in, a physical product |
|||
(including a physical distribution medium), accompanied by the |
|||
Corresponding Source fixed on a durable physical medium |
|||
customarily used for software interchange. |
|||
|
|||
b) Convey the object code in, or embodied in, a physical product |
|||
(including a physical distribution medium), accompanied by a |
|||
written offer, valid for at least three years and valid for as |
|||
long as you offer spare parts or customer support for that product |
|||
model, to give anyone who possesses the object code either (1) a |
|||
copy of the Corresponding Source for all the software in the |
|||
product that is covered by this License, on a durable physical |
|||
medium customarily used for software interchange, for a price no |
|||
more than your reasonable cost of physically performing this |
|||
conveying of source, or (2) access to copy the |
|||
Corresponding Source from a network server at no charge. |
|||
|
|||
c) Convey individual copies of the object code with a copy of the |
|||
written offer to provide the Corresponding Source. This |
|||
alternative is allowed only occasionally and noncommercially, and |
|||
only if you received the object code with such an offer, in accord |
|||
with subsection 6b. |
|||
|
|||
d) Convey the object code by offering access from a designated |
|||
place (gratis or for a charge), and offer equivalent access to the |
|||
Corresponding Source in the same way through the same place at no |
|||
further charge. You need not require recipients to copy the |
|||
Corresponding Source along with the object code. If the place to |
|||
copy the object code is a network server, the Corresponding Source |
|||
may be on a different server (operated by you or a third party) |
|||
that supports equivalent copying facilities, provided you maintain |
|||
clear directions next to the object code saying where to find the |
|||
Corresponding Source. Regardless of what server hosts the |
|||
Corresponding Source, you remain obligated to ensure that it is |
|||
available for as long as needed to satisfy these requirements. |
|||
|
|||
e) Convey the object code using peer-to-peer transmission, provided |
|||
you inform other peers where the object code and Corresponding |
|||
Source of the work are being offered to the general public at no |
|||
charge under subsection 6d. |
|||
|
|||
A separable portion of the object code, whose source code is excluded |
|||
from the Corresponding Source as a System Library, need not be |
|||
included in conveying the object code work. |
|||
|
|||
A "User Product" is either (1) a "consumer product", which means any |
|||
tangible personal property which is normally used for personal, family, |
|||
or household purposes, or (2) anything designed or sold for incorporation |
|||
into a dwelling. In determining whether a product is a consumer product, |
|||
doubtful cases shall be resolved in favor of coverage. For a particular |
|||
product received by a particular user, "normally used" refers to a |
|||
typical or common use of that class of product, regardless of the status |
|||
of the particular user or of the way in which the particular user |
|||
actually uses, or expects or is expected to use, the product. A product |
|||
is a consumer product regardless of whether the product has substantial |
|||
commercial, industrial or non-consumer uses, unless such uses represent |
|||
the only significant mode of use of the product. |
|||
|
|||
"Installation Information" for a User Product means any methods, |
|||
procedures, authorization keys, or other information required to install |
|||
and execute modified versions of a covered work in that User Product from |
|||
a modified version of its Corresponding Source. The information must |
|||
suffice to ensure that the continued functioning of the modified object |
|||
code is in no case prevented or interfered with solely because |
|||
modification has been made. |
|||
|
|||
If you convey an object code work under this section in, or with, or |
|||
specifically for use in, a User Product, and the conveying occurs as |
|||
part of a transaction in which the right of possession and use of the |
|||
User Product is transferred to the recipient in perpetuity or for a |
|||
fixed term (regardless of how the transaction is characterized), the |
|||
Corresponding Source conveyed under this section must be accompanied |
|||
by the Installation Information. But this requirement does not apply |
|||
if neither you nor any third party retains the ability to install |
|||
modified object code on the User Product (for example, the work has |
|||
been installed in ROM). |
|||
|
|||
The requirement to provide Installation Information does not include a |
|||
requirement to continue to provide support service, warranty, or updates |
|||
for a work that has been modified or installed by the recipient, or for |
|||
the User Product in which it has been modified or installed. Access to a |
|||
network may be denied when the modification itself materially and |
|||
adversely affects the operation of the network or violates the rules and |
|||
protocols for communication across the network. |
|||
|
|||
Corresponding Source conveyed, and Installation Information provided, |
|||
in accord with this section must be in a format that is publicly |
|||
documented (and with an implementation available to the public in |
|||
source code form), and must require no special password or key for |
|||
unpacking, reading or copying. |
|||
|
|||
7. Additional Terms. |
|||
|
|||
"Additional permissions" are terms that supplement the terms of this |
|||
License by making exceptions from one or more of its conditions. |
|||
Additional permissions that are applicable to the entire Program shall |
|||
be treated as though they were included in this License, to the extent |
|||
that they are valid under applicable law. If additional permissions |
|||
apply only to part of the Program, that part may be used separately |
|||
under those permissions, but the entire Program remains governed by |
|||
this License without regard to the additional permissions. |
|||
|
|||
When you convey a copy of a covered work, you may at your option |
|||
remove any additional permissions from that copy, or from any part of |
|||
it. (Additional permissions may be written to require their own |
|||
removal in certain cases when you modify the work.) You may place |
|||
additional permissions on material, added by you to a covered work, |
|||
for which you have or can give appropriate copyright permission. |
|||
|
|||
Notwithstanding any other provision of this License, for material you |
|||
add to a covered work, you may (if authorized by the copyright holders of |
|||
that material) supplement the terms of this License with terms: |
|||
|
|||
a) Disclaiming warranty or limiting liability differently from the |
|||
terms of sections 15 and 16 of this License; or |
|||
|
|||
b) Requiring preservation of specified reasonable legal notices or |
|||
author attributions in that material or in the Appropriate Legal |
|||
Notices displayed by works containing it; or |
|||
|
|||
c) Prohibiting misrepresentation of the origin of that material, or |
|||
requiring that modified versions of such material be marked in |
|||
reasonable ways as different from the original version; or |
|||
|
|||
d) Limiting the use for publicity purposes of names of licensors or |
|||
authors of the material; or |
|||
|
|||
e) Declining to grant rights under trademark law for use of some |
|||
trade names, trademarks, or service marks; or |
|||
|
|||
f) Requiring indemnification of licensors and authors of that |
|||
material by anyone who conveys the material (or modified versions of |
|||
it) with contractual assumptions of liability to the recipient, for |
|||
any liability that these contractual assumptions directly impose on |
|||
those licensors and authors. |
|||
|
|||
All other non-permissive additional terms are considered "further |
|||
restrictions" within the meaning of section 10. If the Program as you |
|||
received it, or any part of it, contains a notice stating that it is |
|||
governed by this License along with a term that is a further |
|||
restriction, you may remove that term. If a license document contains |
|||
a further restriction but permits relicensing or conveying under this |
|||
License, you may add to a covered work material governed by the terms |
|||
of that license document, provided that the further restriction does |
|||
not survive such relicensing or conveying. |
|||
|
|||
If you add terms to a covered work in accord with this section, you |
|||
must place, in the relevant source files, a statement of the |
|||
additional terms that apply to those files, or a notice indicating |
|||
where to find the applicable terms. |
|||
|
|||
Additional terms, permissive or non-permissive, may be stated in the |
|||
form of a separately written license, or stated as exceptions; |
|||
the above requirements apply either way. |
|||
|
|||
8. Termination. |
|||
|
|||
You may not propagate or modify a covered work except as expressly |
|||
provided under this License. Any attempt otherwise to propagate or |
|||
modify it is void, and will automatically terminate your rights under |
|||
this License (including any patent licenses granted under the third |
|||
paragraph of section 11). |
|||
|
|||
However, if you cease all violation of this License, then your |
|||
license from a particular copyright holder is reinstated (a) |
|||
provisionally, unless and until the copyright holder explicitly and |
|||
finally terminates your license, and (b) permanently, if the copyright |
|||
holder fails to notify you of the violation by some reasonable means |
|||
prior to 60 days after the cessation. |
|||
|
|||
Moreover, your license from a particular copyright holder is |
|||
reinstated permanently if the copyright holder notifies you of the |
|||
violation by some reasonable means, this is the first time you have |
|||
received notice of violation of this License (for any work) from that |
|||
copyright holder, and you cure the violation prior to 30 days after |
|||
your receipt of the notice. |
|||
|
|||
Termination of your rights under this section does not terminate the |
|||
licenses of parties who have received copies or rights from you under |
|||
this License. If your rights have been terminated and not permanently |
|||
reinstated, you do not qualify to receive new licenses for the same |
|||
material under section 10. |
|||
|
|||
9. Acceptance Not Required for Having Copies. |
|||
|
|||
You are not required to accept this License in order to receive or |
|||
run a copy of the Program. Ancillary propagation of a covered work |
|||
occurring solely as a consequence of using peer-to-peer transmission |
|||
to receive a copy likewise does not require acceptance. However, |
|||
nothing other than this License grants you permission to propagate or |
|||
modify any covered work. These actions infringe copyright if you do |
|||
not accept this License. Therefore, by modifying or propagating a |
|||
covered work, you indicate your acceptance of this License to do so. |
|||
|
|||
10. Automatic Licensing of Downstream Recipients. |
|||
|
|||
Each time you convey a covered work, the recipient automatically |
|||
receives a license from the original licensors, to run, modify and |
|||
propagate that work, subject to this License. You are not responsible |
|||
for enforcing compliance by third parties with this License. |
|||
|
|||
An "entity transaction" is a transaction transferring control of an |
|||
organization, or substantially all assets of one, or subdividing an |
|||
organization, or merging organizations. If propagation of a covered |
|||
work results from an entity transaction, each party to that |
|||
transaction who receives a copy of the work also receives whatever |
|||
licenses to the work the party's predecessor in interest had or could |
|||
give under the previous paragraph, plus a right to possession of the |
|||
Corresponding Source of the work from the predecessor in interest, if |
|||
the predecessor has it or can get it with reasonable efforts. |
|||
|
|||
You may not impose any further restrictions on the exercise of the |
|||
rights granted or affirmed under this License. For example, you may |
|||
not impose a license fee, royalty, or other charge for exercise of |
|||
rights granted under this License, and you may not initiate litigation |
|||
(including a cross-claim or counterclaim in a lawsuit) alleging that |
|||
any patent claim is infringed by making, using, selling, offering for |
|||
sale, or importing the Program or any portion of it. |
|||
|
|||
11. Patents. |
|||
|
|||
A "contributor" is a copyright holder who authorizes use under this |
|||
License of the Program or a work on which the Program is based. The |
|||
work thus licensed is called the contributor's "contributor version". |
|||
|
|||
A contributor's "essential patent claims" are all patent claims |
|||
owned or controlled by the contributor, whether already acquired or |
|||
hereafter acquired, that would be infringed by some manner, permitted |
|||
by this License, of making, using, or selling its contributor version, |
|||
but do not include claims that would be infringed only as a |
|||
consequence of further modification of the contributor version. For |
|||
purposes of this definition, "control" includes the right to grant |
|||
patent sublicenses in a manner consistent with the requirements of |
|||
this License. |
|||
|
|||
Each contributor grants you a non-exclusive, worldwide, royalty-free |
|||
patent license under the contributor's essential patent claims, to |
|||
make, use, sell, offer for sale, import and otherwise run, modify and |
|||
propagate the contents of its contributor version. |
|||
|
|||
In the following three paragraphs, a "patent license" is any express |
|||
agreement or commitment, however denominated, not to enforce a patent |
|||
(such as an express permission to practice a patent or covenant not to |
|||
sue for patent infringement). To "grant" such a patent license to a |
|||
party means to make such an agreement or commitment not to enforce a |
|||
patent against the party. |
|||
|
|||
If you convey a covered work, knowingly relying on a patent license, |
|||
and the Corresponding Source of the work is not available for anyone |
|||
to copy, free of charge and under the terms of this License, through a |
|||
publicly available network server or other readily accessible means, |
|||
then you must either (1) cause the Corresponding Source to be so |
|||
available, or (2) arrange to deprive yourself of the benefit of the |
|||
patent license for this particular work, or (3) arrange, in a manner |
|||
consistent with the requirements of this License, to extend the patent |
|||
license to downstream recipients. "Knowingly relying" means you have |
|||
actual knowledge that, but for the patent license, your conveying the |
|||
covered work in a country, or your recipient's use of the covered work |
|||
in a country, would infringe one or more identifiable patents in that |
|||
country that you have reason to believe are valid. |
|||
|
|||
If, pursuant to or in connection with a single transaction or |
|||
arrangement, you convey, or propagate by procuring conveyance of, a |
|||
covered work, and grant a patent license to some of the parties |
|||
receiving the covered work authorizing them to use, propagate, modify |
|||
or convey a specific copy of the covered work, then the patent license |
|||
you grant is automatically extended to all recipients of the covered |
|||
work and works based on it. |
|||
|
|||
A patent license is "discriminatory" if it does not include within |
|||
the scope of its coverage, prohibits the exercise of, or is |
|||
conditioned on the non-exercise of one or more of the rights that are |
|||
specifically granted under this License. You may not convey a covered |
|||
work if you are a party to an arrangement with a third party that is |
|||
in the business of distributing software, under which you make payment |
|||
to the third party based on the extent of your activity of conveying |
|||
the work, and under which the third party grants, to any of the |
|||
parties who would receive the covered work from you, a discriminatory |
|||
patent license (a) in connection with copies of the covered work |
|||
conveyed by you (or copies made from those copies), or (b) primarily |
|||
for and in connection with specific products or compilations that |
|||
contain the covered work, unless you entered into that arrangement, |
|||
or that patent license was granted, prior to 28 March 2007. |
|||
|
|||
Nothing in this License shall be construed as excluding or limiting |
|||
any implied license or other defenses to infringement that may |
|||
otherwise be available to you under applicable patent law. |
|||
|
|||
12. No Surrender of Others' Freedom. |
|||
|
|||
If conditions are imposed on you (whether by court order, agreement or |
|||
otherwise) that contradict the conditions of this License, they do not |
|||
excuse you from the conditions of this License. If you cannot convey a |
|||
covered work so as to satisfy simultaneously your obligations under this |
|||
License and any other pertinent obligations, then as a consequence you may |
|||
not convey it at all. For example, if you agree to terms that obligate you |
|||
to collect a royalty for further conveying from those to whom you convey |
|||
the Program, the only way you could satisfy both those terms and this |
|||
License would be to refrain entirely from conveying the Program. |
|||
|
|||
13. Use with the GNU Affero General Public License. |
|||
|
|||
Notwithstanding any other provision of this License, you have |
|||
permission to link or combine any covered work with a work licensed |
|||
under version 3 of the GNU Affero General Public License into a single |
|||
combined work, and to convey the resulting work. The terms of this |
|||
License will continue to apply to the part which is the covered work, |
|||
but the special requirements of the GNU Affero General Public License, |
|||
section 13, concerning interaction through a network will apply to the |
|||
combination as such. |
|||
|
|||
14. Revised Versions of this License. |
|||
|
|||
The Free Software Foundation may publish revised and/or new versions of |
|||
the GNU General Public License from time to time. Such new versions will |
|||
be similar in spirit to the present version, but may differ in detail to |
|||
address new problems or concerns. |
|||
|
|||
Each version is given a distinguishing version number. If the |
|||
Program specifies that a certain numbered version of the GNU General |
|||
Public License "or any later version" applies to it, you have the |
|||
option of following the terms and conditions either of that numbered |
|||
version or of any later version published by the Free Software |
|||
Foundation. If the Program does not specify a version number of the |
|||
GNU General Public License, you may choose any version ever published |
|||
by the Free Software Foundation. |
|||
|
|||
If the Program specifies that a proxy can decide which future |
|||
versions of the GNU General Public License can be used, that proxy's |
|||
public statement of acceptance of a version permanently authorizes you |
|||
to choose that version for the Program. |
|||
|
|||
Later license versions may give you additional or different |
|||
permissions. However, no additional obligations are imposed on any |
|||
author or copyright holder as a result of your choosing to follow a |
|||
later version. |
|||
|
|||
15. Disclaimer of Warranty. |
|||
|
|||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY |
|||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT |
|||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY |
|||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, |
|||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
|||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM |
|||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF |
|||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION. |
|||
|
|||
16. Limitation of Liability. |
|||
|
|||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING |
|||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS |
|||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY |
|||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE |
|||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF |
|||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD |
|||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), |
|||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF |
|||
SUCH DAMAGES. |
|||
|
|||
17. Interpretation of Sections 15 and 16. |
|||
|
|||
If the disclaimer of warranty and limitation of liability provided |
|||
above cannot be given local legal effect according to their terms, |
|||
reviewing courts shall apply local law that most closely approximates |
|||
an absolute waiver of all civil liability in connection with the |
|||
Program, unless a warranty or assumption of liability accompanies a |
|||
copy of the Program in return for a fee. |
|||
|
|||
END OF TERMS AND CONDITIONS |
|||
|
|||
How to Apply These Terms to Your New Programs |
|||
|
|||
If you develop a new program, and you want it to be of the greatest |
|||
possible use to the public, the best way to achieve this is to make it |
|||
free software which everyone can redistribute and change under these terms. |
|||
|
|||
To do so, attach the following notices to the program. It is safest |
|||
to attach them to the start of each source file to most effectively |
|||
state the exclusion of warranty; and each file should have at least |
|||
the "copyright" line and a pointer to where the full notice is found. |
|||
|
|||
{one line to give the program's name and a brief idea of what it does.} |
|||
Copyright (C) {year} {name of author} |
|||
|
|||
This program is free software: you can redistribute it and/or modify |
|||
it under the terms of the GNU General Public License as published by |
|||
the Free Software Foundation, either version 3 of the License, or |
|||
(at your option) any later version. |
|||
|
|||
This program is distributed in the hope that it will be useful, |
|||
but WITHOUT ANY WARRANTY; without even the implied warranty of |
|||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|||
GNU General Public License for more details. |
|||
|
|||
You should have received a copy of the GNU General Public License |
|||
along with this program. If not, see <http://www.gnu.org/licenses/>. |
|||
|
|||
Also add information on how to contact you by electronic and paper mail. |
|||
|
|||
If the program does terminal interaction, make it output a short |
|||
notice like this when it starts in an interactive mode: |
|||
|
|||
{project} Copyright (C) {year} {fullname} |
|||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. |
|||
This is free software, and you are welcome to redistribute it |
|||
under certain conditions; type `show c' for details. |
|||
|
|||
The hypothetical commands `show w' and `show c' should show the appropriate |
|||
parts of the General Public License. Of course, your program's commands |
|||
might be different; for a GUI interface, you would use an "about box". |
|||
|
|||
You should also get your employer (if you work as a programmer) or school, |
|||
if any, to sign a "copyright disclaimer" for the program, if necessary. |
|||
For more information on this, and how to apply and follow the GNU GPL, see |
|||
<http://www.gnu.org/licenses/>. |
|||
|
|||
The GNU General Public License does not permit incorporating your program |
|||
into proprietary programs. If your program is a subroutine library, you |
|||
may consider it more useful to permit linking proprietary applications with |
|||
the library. If this is what you want to do, use the GNU Lesser General |
|||
Public License instead of this License. But first, please read |
|||
<http://www.gnu.org/philosophy/why-not-lgpl.html>. |
@ -0,0 +1,2 @@ |
|||
# Tracking code for processing, using Open CV |
|||
See comments in code. |
@ -0,0 +1,71 @@ |
|||
/* Scrollbar class */ |
|||
class HScrollbar { |
|||
int swidth, sheight; // width and height of bar |
|||
float xpos, ypos; // x and y position of bar |
|||
float spos, newspos; // x position of slider |
|||
float sposMin, sposMax; // max and min values of slider |
|||
int loose; // how loose/heavy |
|||
boolean over; // is the mouse over the slider? |
|||
boolean locked; |
|||
float ratio; |
|||
|
|||
|
|||
HScrollbar (float xp, float yp, int sw, int sh, int l) { |
|||
swidth = sw; |
|||
sheight = sh; |
|||
int widthtoheight = sw - sh; |
|||
ratio = (float)sw / (float)widthtoheight; |
|||
xpos = xp; |
|||
ypos = yp-sheight/2; |
|||
spos = xpos + swidth/2 - sheight/2; |
|||
newspos = spos; |
|||
sposMin = xpos; |
|||
sposMax = xpos + swidth - sheight; |
|||
loose = l; |
|||
} |
|||
|
|||
boolean update(boolean scroll_lock) { |
|||
if (mousePressed && overEvent() && ! scroll_lock) { |
|||
locked = true; |
|||
scroll_lock=true; |
|||
} |
|||
if (!mousePressed) { |
|||
locked = false; |
|||
scroll_lock=false; |
|||
} |
|||
if (locked) { |
|||
newspos = constrain(mouseX-sheight/2, sposMin, sposMax); |
|||
|
|||
if (abs(newspos - spos) > 1) { |
|||
spos = newspos; |
|||
} |
|||
} |
|||
return scroll_lock; |
|||
} |
|||
|
|||
float constrain(float val, float minv, float maxv) { |
|||
return min(max(val, minv), maxv); |
|||
} |
|||
|
|||
boolean overEvent() { |
|||
return (mouseX > xpos && mouseX < xpos+swidth && mouseY > ypos && mouseY < ypos+sheight); |
|||
} |
|||
|
|||
void display() { |
|||
noStroke(); |
|||
fill(204); |
|||
rect(xpos, ypos, swidth, sheight); |
|||
if (over || locked) { |
|||
fill(0, 0, 0); |
|||
} else { |
|||
fill(102, 102, 102); |
|||
} |
|||
rect(spos, ypos, sheight, sheight); |
|||
} |
|||
|
|||
float getPos() { |
|||
// Convert spos to be values between |
|||
// 0 and the total width of the scrollbar |
|||
return spos * ratio; |
|||
} |
|||
} |
After Width: 20 | Height: 20 | Size: 210 B |
@ -0,0 +1,240 @@ |
|||
/* |
|||
This code is free software: you can redistribute it and/or modify |
|||
it under the terms of the GNU General Public License as published |
|||
by the Free Software Foundation, either version 3 of the License, |
|||
or (at your option) any later version. |
|||
This code is distributed in the hope that it will be useful, but |
|||
WITHOUT ANY WARRANTY; without even the implied warranty of |
|||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
|||
General Public License for more details. |
|||
You should have received a copy of the GNU General Public License |
|||
along with this code. If not, see <http://www.gnu.org/licenses/>. |
|||
*/ |
|||
|
|||
/* Code logic in short: |
|||
The code reads the webcam image |
|||
Detects contours |
|||
Filter contours based on size |
|||
Checks whether contour is new or a movement of an existing contour based on a threshold |
|||
Reoccuring contours are saved as blobs |
|||
The first blob is assigned as being pacman, you can also click on another blob to switch pacman |
|||
A matrix of dots is drawn |
|||
In case pacman is near a dot, it gets destroy and score + 1 |
|||
*/ |
|||
|
|||
/* Most important values for tracking: |
|||
contourTreshold |
|||
sizeTreshold |
|||
/* |
|||
|
|||
/* Load libraries */ |
|||
import gab.opencv.*; // Load library https://github.com/atduskgreg/opencv-processing |
|||
import processing.video.*; // Load video camera library |
|||
|
|||
/* Declare variables */ |
|||
Capture video; // Camera stream |
|||
OpenCV opencv; // OpenCV |
|||
PImage now, diff; // PImage variables to store the current image and the difference between two images |
|||
|
|||
PGraphics drawing; // PGraphics buffer |
|||
|
|||
ArrayList<Contour> contours; // ArrayList to hold all detected contours |
|||
ArrayList<Blob> blobs = new ArrayList <Blob>(); // ArrayList to hold all blobs |
|||
|
|||
PFont font; // A new font object |
|||
|
|||
int ContourThreshold = 20; // Contour detection sensitivity of the script |
|||
int SizeThreshold = 100; // Contour size threshold |
|||
int MovementMargin = 40; // Max difference in coordinates |
|||
int segmentSize = 5; // orig 5; |
|||
int segmentThreshold = segmentSize * segmentSize / 3; |
|||
|
|||
/* Slider Bar */ |
|||
HScrollbar hs1, hs2; |
|||
Boolean scroll_lock = false; |
|||
|
|||
/* Setup function */ |
|||
void setup() { |
|||
size(640, 960); // Create canvas window |
|||
|
|||
// Select camera: print all available cameras in a list |
|||
String[] cameras = Capture.list(); |
|||
if (cameras.length == 0) { |
|||
println("There are no cameras available for capture."); |
|||
exit(); |
|||
} else { |
|||
println("Available cameras:"); |
|||
for (int i = 0; i < cameras.length; i++) { |
|||
println(i, cameras[i]); |
|||
} |
|||
} |
|||
// select the number of the webcam camera from the list |
|||
// video = new Capture(this, 640, 480, cameras[12], 30); // Define video size, with webcam plugged in |
|||
video = new Capture(this, 640, 480, cameras[16], 30); |
|||
opencv = new OpenCV(this, 640, 480); // Define opencv size |
|||
|
|||
video.start(); // Start capturing video |
|||
|
|||
font = loadFont("Serif-48.vlw"); // Load the font file into memory |
|||
textFont(font, 12); // Set font size |
|||
strokeWeight(3); // Set stroke size |
|||
|
|||
noStroke(); |
|||
hs1 = new HScrollbar(0, height/2-8, width, 16, 16); |
|||
hs2 = new HScrollbar(0, height/2+8, width, 16, 16); |
|||
} |
|||
|
|||
/* Draw function */ |
|||
void draw() { |
|||
|
|||
// start buffer |
|||
drawing = createGraphics(640, 480); |
|||
drawing.beginDraw(); |
|||
drawing.noStroke(); |
|||
int[] segments = new int[int(640/segmentSize)*int((480)/segmentSize)]; // Set number segments |
|||
|
|||
opencv.loadImage(video); // Capture video from camera in OpenCV |
|||
|
|||
image(video, 0, 0); // Draw camera image to screen |
|||
|
|||
opencv.gray(); // Convert into gray scale |
|||
//opencv.contrast(2); // Increase contrast |
|||
opencv.invert(); // Invert b/w |
|||
//opencv.blur(3); // Reduce camera noise |
|||
opencv.threshold(ContourThreshold); // Convert to Black and White |
|||
//opencv.flip(OpenCV.VERTICAL); // Flip image vertical |
|||
|
|||
now = opencv.getOutput(); // Store image in PImage |
|||
image(now, 0, 480); // Show video (black and white) |
|||
|
|||
// Analyze image |
|||
int segmentCounter = 0; |
|||
for( int x = 1; x < 640; x = x + segmentSize) { |
|||
for ( int y = 1; y < 480; y = y + segmentSize) { |
|||
|
|||
int segmentBrightness = 0; |
|||
for ( int i = 0; i < segmentSize; i++) { |
|||
for ( int j = 0; j < segmentSize; j++) { |
|||
if (brightness(now.pixels[x+i+(y*width)+j]) > 127) { |
|||
segmentBrightness++; |
|||
} |
|||
} |
|||
} |
|||
if(segmentBrightness > segmentThreshold) { // segment is bright |
|||
segments[segmentCounter] = 1; |
|||
drawing.fill(255,255,255); |
|||
drawing.rect(x-1,y-1,12,12); |
|||
} |
|||
segmentCounter++; |
|||
} |
|||
} |
|||
|
|||
drawing.endDraw(); |
|||
|
|||
// Draw the offscreen buffer to the screen with image() |
|||
image(drawing, 0, 0); |
|||
|
|||
//opencv.loadImage(drawing); |
|||
|
|||
// Analyze video |
|||
contours = opencv.findContours(); // Find contours |
|||
|
|||
int evalc = 0; // Count number of evaluated contours |
|||
for (Contour contour : contours) { // Loop through all contours |
|||
int sumx = 0; // Sum of all x coordinates |
|||
int sections = 0; // # of sections |
|||
int sumy = 0; // Sum of all y coordinates |
|||
int area = 0; // Area of polygon |
|||
|
|||
ArrayList<Integer> Xcoors = new ArrayList<Integer>(); // List of all X coordinates |
|||
ArrayList<Integer> Ycoors = new ArrayList<Integer>(); // List of all Y coordinates |
|||
|
|||
for (PVector point : contour.getPolygonApproximation().getPoints()) { // Loop through all vertex X Y coordinates of polygon |
|||
sumx = sumx + int(point.x); // Sum up all X coordinates, needed for calculating the middle |
|||
sumy = sumy + int(point.y); // Sum up all Y coordinates, needed for calculating the middle |
|||
Xcoors.add(int(point.x)); // Store all X coordinates, needed for calculating the area |
|||
Ycoors.add(int(point.y)); // Store all Y coordinates, needed for calculating the area |
|||
sections++; // Count the number of sections |
|||
} |
|||
|
|||
// Calculate the area of the polygon |
|||
int j = 0; |
|||
for (int i = 0; i < sections; i++) { |
|||
area = area + (Xcoors.get(j)+Xcoors.get(i)) * (Ycoors.get(j)-Ycoors.get(i)); |
|||
j = i; |
|||
} |
|||
area = area / 2; |
|||
|
|||
if(area > SizeThreshold && area < 100000) { // Check whether area is above threshold and not as big as the video itself |
|||
evalc++; // Up 1 for the evaluated contours counter |
|||
noFill(); // Disable filled shapes |
|||
stroke(0, 255, 0); // Set stroke color to green |
|||
contour.draw(); // Draw the contour |
|||
fill(255, 0, 0); // Set color to red |
|||
text((sumx/sections) + ", " + (sumy/sections), (sumx/sections), (sumy/sections)); // Print the coordinates on screen |
|||
|
|||
if(blobs.size() > 0) { // Check whether this is the first blob or not |
|||
boolean withinmargin = false; // Flag whether it is close to a previous blob |
|||
int withinmarginID = 0; // Remember which one that was |
|||
|
|||
for( int i = 0; i < blobs.size(); i++) { // Loop through all blobs |
|||
Blob _blob = (Blob) blobs.get(i); // Make a temp copy |
|||
int lastX = _blob.blobX.get(_blob.blobX.size()-1); // most recent X coordinate |
|||
int lastY = _blob.blobY.get(_blob.blobY.size()-1); // most recent Y coordinate |
|||
|
|||
// Check whether the contour is within movement margin, otherwise it's a new blob |
|||
if(lastX < (sumx/sections + MovementMargin)){ |
|||
if(lastX > (sumx/sections - MovementMargin)) { |
|||
if(lastY < (sumy/sections + MovementMargin)) { |
|||
if(lastY > (sumy/sections - MovementMargin)) { |
|||
withinmargin = true; |
|||
withinmarginID = i; |
|||
// println("hit X old: " + lastX + "; new:" + sumx/c + "; Y old: " + lastY + "; Y new: " +sumy/c); |
|||
} |
|||
} |
|||
} |
|||
} |
|||
|
|||
_blob = null; // Reset temp copy |
|||
} |
|||
|
|||
if(withinmargin) { // Within margin? True: add coordinates to ArrayList |
|||
Blob _blob = (Blob) blobs.get(withinmarginID); // Make temp copy of blob |
|||
_blob.addXYSA(sumx/sections, sumy/sections, sections, area); // Add the information to the ArrayLists of the blob object |
|||
blobs.set(withinmarginID, _blob); // Store the blob |
|||
} else { // else: it's a new blob |
|||
blobs.add(new Blob(sumx/sections, sumy/sections, sections, area, false)); // Add new blob to the blobs ArrayList |
|||
} |
|||
} else { // Add first blob, which becomes PacMan |
|||
blobs.add(new Blob(sumx/sections, sumy/sections, sections, area, true)); // Store blob and flag as PacMan |
|||
} |
|||
} |
|||
} |
|||
|
|||
// Print some useful monitoring info to the console |
|||
println("Found " + contours.size() + " Contours; area > "+SizeThreshold+" px " + evalc + "; Total "+ blobs.size() + " blobs" + " mouseX: " + mouseX); |
|||
|
|||
|
|||
ContourThreshold = int(hs1.getPos()); // get scrollbar position |
|||
fill(0,0,255); // Set color to blue |
|||
textSize(20); // Increase text size |
|||
text("CountourThreshold: " + ContourThreshold, 20, 40); |
|||
|
|||
int multiplySizeTreshold = 2; // variable for multiplying the Sizetreshold |
|||
SizeThreshold = int(hs2.getPos()) * multiplySizeTreshold; // NEW: multiply w/ 100 to get a bigger max SizeTreshold |
|||
// SizeThreshold = int(hs2.getPos()); |
|||
text("SizeThreshold: " + SizeThreshold * 10, 30, 60); |
|||
|
|||
scroll_lock = hs1.update(scroll_lock); |
|||
scroll_lock = hs2.update(scroll_lock); |
|||
hs1.display(); |
|||
hs2.display(); |
|||
|
|||
// Wait a little before the next round to save processing power and memory |
|||
delay(40); |
|||
} |
|||
|
|||
/* Capture function */ |
|||
void captureEvent(Capture c) { |
|||
c.read(); |
|||
} |
After Width: 20 | Height: 20 | Size: 383 B |
@ -0,0 +1,2 @@ |
|||
mode.id=processing.mode.java.JavaMode |
|||
mode=Java |
Write
Preview
Loading…
Cancel
Save
Reference in new issue