SlideShare a Scribd company logo
1 of 11
Controlling Virtual Reality using Kinect
Jerry Le
Chao Mei
Nesthor Perez
Introduction
• Build a virtual human using Unity
• Gesture recognition with Kinect.
• Control the virtual human with gestures
• Enable user to interact with the virtual human
Gesture Recognition
Gesture Recognition
Gesture Recognition
• Kinect can only recognize locations of joints and bones, not
gestures
• Use relative locations of various joints to recognize gestures
• Left hand move up/down: Compare location of left wrist with
shoulder left, hip center:
• Right hand move up/down: Compare location of right wrist
with shoulder right, hip center:
Control Virtual Human
• Unity program and Kinect program communicate via a socket.
• Change Heart Rate: Move Left hand up or down
• Change Blood Pressure: Move Right hand up or down
Doing CPR
• Move both hands in and out.
• Kinect sends locations of Left Wrist/Right Wrist and Shoulder
Center joint to the Unity program.
• Measure distance between Left Wrist/Right Wrist and
Shoulder Center joint.
• The Unit program know that user want to do CPR.
Virtual Human Animations
• Mathematically Driven Virtual Human
• Human reactions to Low(<60), normal(60-100), higher heart
rate(100-150 and BP>120) ,heart attack(>150) and CPR
procedure.
• Motion captured from real human by MS Kinect
• Heart beating animation
• CPR animation
CPR posture identification
• From MS kinect tracking data of human skeleton.
• Bend both arms and release them would be count as one
effective electric shock using defibrillator .
• Three times of shocks would make the patient back to live.
Questions or Comments

More Related Content

Viewers also liked

How to create a market for the traditional crafts men group
How to create a market for the traditional crafts men groupHow to create a market for the traditional crafts men group
How to create a market for the traditional crafts men groupFrederik Tamariska
 
FinalProject
FinalProjectFinalProject
FinalProjectsat3003
 
Opium drug in afghanistan
Opium drug in afghanistanOpium drug in afghanistan
Opium drug in afghanistankarolyn6
 
Comunicação Android Arduino - JASI 2015
Comunicação Android Arduino - JASI 2015Comunicação Android Arduino - JASI 2015
Comunicação Android Arduino - JASI 2015Rodrigo Reis Alves
 
Draft master plan desa pampang harapan
Draft master plan desa pampang harapanDraft master plan desa pampang harapan
Draft master plan desa pampang harapanFrederik Tamariska
 
Microsoft котляров
Microsoft котляровMicrosoft котляров
Microsoft котляровIvan Kotlyarov
 

Viewers also liked (13)

Rome presentation
Rome presentationRome presentation
Rome presentation
 
Micro hydro
Micro hydroMicro hydro
Micro hydro
 
How to create a market for the traditional crafts men group
How to create a market for the traditional crafts men groupHow to create a market for the traditional crafts men group
How to create a market for the traditional crafts men group
 
Cgfp3
Cgfp3Cgfp3
Cgfp3
 
FinalProject
FinalProjectFinalProject
FinalProject
 
Opium drug in afghanistan
Opium drug in afghanistanOpium drug in afghanistan
Opium drug in afghanistan
 
Cgfp2
Cgfp2Cgfp2
Cgfp2
 
Comunicação Android Arduino - JASI 2015
Comunicação Android Arduino - JASI 2015Comunicação Android Arduino - JASI 2015
Comunicação Android Arduino - JASI 2015
 
Draft master plan desa pampang harapan
Draft master plan desa pampang harapanDraft master plan desa pampang harapan
Draft master plan desa pampang harapan
 
Development woven products
Development woven  productsDevelopment woven  products
Development woven products
 
Pertanian organik
Pertanian organikPertanian organik
Pertanian organik
 
Microsoft котляров
Microsoft котляровMicrosoft котляров
Microsoft котляров
 
Kelab komputer
Kelab komputerKelab komputer
Kelab komputer
 

Similar to Cgfp

HaiXiu: Emotion Recognition from Movements
HaiXiu: Emotion Recognition from MovementsHaiXiu: Emotion Recognition from Movements
HaiXiu: Emotion Recognition from MovementsDebmalya Sinha
 
Computer vision towards an automatic recognition of communicative gestures
Computer vision   towards an automatic recognition of communicative gesturesComputer vision   towards an automatic recognition of communicative gestures
Computer vision towards an automatic recognition of communicative gesturesDonato Di Pierro
 
Haptic Retargeting For Virtual Reality
Haptic Retargeting For Virtual RealityHaptic Retargeting For Virtual Reality
Haptic Retargeting For Virtual RealitySoheil Khodayari
 

Similar to Cgfp (7)

Animal killer
Animal killerAnimal killer
Animal killer
 
Animal killer
Animal killerAnimal killer
Animal killer
 
How body movement influences Virtual Reality analgesia?
How body movement influences Virtual Reality analgesia?How body movement influences Virtual Reality analgesia?
How body movement influences Virtual Reality analgesia?
 
Animal killer
Animal killerAnimal killer
Animal killer
 
HaiXiu: Emotion Recognition from Movements
HaiXiu: Emotion Recognition from MovementsHaiXiu: Emotion Recognition from Movements
HaiXiu: Emotion Recognition from Movements
 
Computer vision towards an automatic recognition of communicative gestures
Computer vision   towards an automatic recognition of communicative gesturesComputer vision   towards an automatic recognition of communicative gestures
Computer vision towards an automatic recognition of communicative gestures
 
Haptic Retargeting For Virtual Reality
Haptic Retargeting For Virtual RealityHaptic Retargeting For Virtual Reality
Haptic Retargeting For Virtual Reality
 

Recently uploaded

Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligencePrecisely
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 

Recently uploaded (20)

Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

Cgfp

  • 1. Controlling Virtual Reality using Kinect Jerry Le Chao Mei Nesthor Perez
  • 2. Introduction • Build a virtual human using Unity • Gesture recognition with Kinect. • Control the virtual human with gestures • Enable user to interact with the virtual human
  • 5. Gesture Recognition • Kinect can only recognize locations of joints and bones, not gestures • Use relative locations of various joints to recognize gestures • Left hand move up/down: Compare location of left wrist with shoulder left, hip center: • Right hand move up/down: Compare location of right wrist with shoulder right, hip center:
  • 6. Control Virtual Human • Unity program and Kinect program communicate via a socket. • Change Heart Rate: Move Left hand up or down • Change Blood Pressure: Move Right hand up or down
  • 7.
  • 8. Doing CPR • Move both hands in and out. • Kinect sends locations of Left Wrist/Right Wrist and Shoulder Center joint to the Unity program. • Measure distance between Left Wrist/Right Wrist and Shoulder Center joint. • The Unit program know that user want to do CPR.
  • 9. Virtual Human Animations • Mathematically Driven Virtual Human • Human reactions to Low(<60), normal(60-100), higher heart rate(100-150 and BP>120) ,heart attack(>150) and CPR procedure. • Motion captured from real human by MS Kinect • Heart beating animation • CPR animation
  • 10. CPR posture identification • From MS kinect tracking data of human skeleton. • Bend both arms and release them would be count as one effective electric shock using defibrillator . • Three times of shocks would make the patient back to live.