Hi David,
it's totally possible to do that without modifying the script, for instance by
specifying sourcepoints and targetpoints:
vmtkcenterlines -ifile foo.vtp -seedselector pointlist -sourcepoints 2.94 60.07
-96.04 -targetpoints 28.79 58.05 -323.46 -36.92 64.15 -323.33 -ofile foo_c.vtp
Hope this helps
Luca
On Jun 17, 2012, at 10:27 PM, David Roy wrote:
> Hi Luca,
>
> I would need to make the process of building centerlines without following
> the default procedure of
> letting the code opening a window and asking for manually picking points.
>
> I would rather have to make the process fully automatic (and without opening
> any window, like in batch then),
> provided I know in advance the coordinates of source and target points.
>
> So, is this possible to provide vmtkcenterlines.py with such coordinates
> directly, either by any command
> (maybe via -sourcepoints x1, y1, z1 and -targetpoints x2, y2, z2, x3, y3, z3
> ), or modifying centerlines.py
> (by initializing SourcePoints and TargetPoints as shown below, and commenting
> all unrelevant parts of the script
> to prevent them running) ?
>
> self.SourceIds = [1]
> self.TargetIds = [2, 3]
> self.SourcePoints = [2.94, 60.07, -96.04]
> self.TargetPoints = [28.79, 58.05, -323.46, -36.92, 64.15, -323.33]
>
>
> Thanks in advance
>
> David
> (PhD student)
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats.
> http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/_______________________________________________
> vmtk-users mailing list
> vmtk-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/vmtk-users
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
vmtk-users mailing list
vmtk-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/vmtk-users