Skip to main content

LG Real 3D

In this post i will introduce the Real 3D sdk presnted by LG in the Android platform.


What's Real 3D ?
Real3D is technically known as stereoscopic vision which refers to the human ability to view the same image with both eyes in similar, but slightly different ways. Because the normal human eyes are about 2.5" apart, there is minuscule difference between images that is gathered from each eye.
The brain then combines them to form a single picture and this vision allows the brain judge depth and distance. Real3D uses those characteristics of human perception to create a 3D image.

Type of 3D display
LG use the auto-stereoscopic display which refers to 3D display technique that creates stereoscopic images without needing special glasses, as the left and right eyes view different images. 
When different images are projected into different locations in the viewing space, a person in the correct position can feel the stereoscopic effect via binocular parallax, seeing the different images projected into their left and right eyes. A special optical device is attached to the front of the display panel in order to project different images in different directions.




Installing the LG Real3D SDK

From Eclipse's Windows menu, select Android SDK and AVD Manager.

Select Available packages in the left panel Click Add Add-on Site button. 


Enter “http://developer.lgmobile.com/sdk/android/repository.xml” in the Add Add-on Site URL 
dialog that appears, and click OK button.



  Check Real3D by LGE, Android API 8, revision 1 and click Install Selected button.



Creating the Android Virtual Device (AVD) for Real3D emulator 

In the Android SDK and AVD Manger, type name of AVD and select target to Real3D Add-On (LGE) - API Level 8.


Real3D API Demos

LG Real3D SDK provides the following API Demos which are small applications that illustrate the use of LG Real3D APIs. 

OpenGL 
A simple application that displays two rotating spheres. 
Video playback 
A simple video player application. Source code must contain hard-coded path of video file. 
Camera preview 
A simple application that displays a sample image for 3D camera preview. 



 You should now see the Real3D sample application:






  

Comments

Popular posts from this blog

What You Must Know Before Establishing a Recovery Plan ?

In today's rapidly evolving digital landscape, organizations are increasingly adopting the zero trust model, primarily due to the expanding attack surface that leaves critical systems and data exposed. This shift is also fueled by the heightened sophistication of cyber-attacks, which have become more complex and harder to detect, surpassing traditional security measures. Additionally, the existing operating models within organizations are often inconsistent, typically characterized by distributed and siloed environments.    This fragmentation creates vulnerabilities and makes it challenging to implement uniform security protocols. The zero trust model addresses these challenges by assuming that threats exist both inside and outside the network, necessitating continuous verification of all users and devices. Its adoption represents a proactive stance in the ongoing battle against cyber threats, ensuring a more robust and resilient organizational security posture. The Evolution ...

A comprehensive guide to ransomware distribution in VMware environments

In a virtualized on-premises environment based on VMware, ransomware distribution scenarios can be somewhat unique due to the nature of virtualization technology. However, many of the traditional attack vectors still apply. Here are some ransomware distribution scenarios specific to a VMware-based virtualized environment: Phishing Attacks Targeting Administrators: Administrators with access to the VMware environment might receive phishing emails. If they fall for these and their credentials are compromised, attackers can gain access to the virtualized environment. Exploiting Vulnerabilities in VMware Software: If VMware software or the underlying operating system is not kept up-to-date with security patches, vulnerabilities can be exploited by attackers to deliver ransomware into the virtualized environment. Compromised Remote Management Tools: Tools used for remote management of the virtualized environment, such as vSphere, can be a target. If these tools are compromised, attackers ca...

Edge Computing Demystified Book

After a while I'm back and pleased  to share in this post my first book around Edge computing Technologies. Edge computing has been a very hot and interesting topic nowadays for communication service provider and Enterprise so far. Augmented Reality / Virtual Reality, Smart cities, Healthcare, industrial IoT and many others use cases require a change in the way we operate and host application in the cloud.  IA, Big Data and analytics are often used today to understand the behavior of the customer and even the health of services. Real-time and high throughput demand are the characteristic of the new business services. Edge computing technology promises to resolve different challenges and brings compute, storage and bandwidth close to the data source. I tried in ‘the Edge Computing Demystified’ book to explain Edge computing technology referring to different use cases from communication service provider and enterprise industry. I h...