On Wed, Oct 26, 2016 at 2:19 PM,  <julima...@gmail.com> wrote:
> b'/osceleton2/joint\x00\x00\x00,siiffffd\x00\x00\x00head\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05C\xec\xad&C\xa0\x81vDG\x84N?\x80\x00\x00Bu\x7f\xedh5f\x9b'
> --------------------------------------------------
>
>
> It supouse to be this:
> --------------------------------------------------
> Address pattern: "/osceleton2/joint"
> Type tag: "siiffffd"
> s: Joint name, check out the full list of joints below
> i: The ID of the sensor
> i: The ID of the user
> f: X coordinate of joint in real world coordinates (centimetres)
> f: Y coordinate of joint in real world coordinates (centimetres)
> f: Z coordinate of joint in real world coordinates (centimetres)
> f: confidence value in interval [0.0, 1.0]
> d: time stamp in milliseconds since Unix epoch
>
> example:
>
> /osceleton2/joint head 0 1 109.07692 54.557518 666.81543 1. 0.

Well, the first bit clearly matches. Then you have four bytes ending
with a comma (0x2C) and then siiffffd. A few more NULs and "head". So
really, the interesting part starts after that.

Can you find information you recognize in any of the bytes that follow that?

ChrisA
-- 
https://mail.python.org/mailman/listinfo/python-list

Reply via email to