cpclean(1)


NAME

   cpclean - Remove wrong control points by statistical methods

SYNOPSIS

   cpclean [options] input.pto

DESCRIPTION

   cpclean uses statistical methods to remove wrong control points.

   Step 1 optimises all images pairs, calculates for each pair mean and
   standard deviation and removes all control points with error bigger
   than mean+n*sigma.

   Step 2 optimises the whole panorama, calculates mean and standard
   deviation for all control points and removes all control points with
   error bigger than mean+n*sigma.

OPTIONS

   --output|-o output.pto
       Output Hugin PTO file. Default: '<filename>_clean.pto'.

   --max-distance|-n num
       distance factor for checking (default: 2)

   --pairwise-checking|-p
       do only pairwise optimisation (skip step 2)

   --whole-pano-checking|-w
       do optimise whole panorama (skip step 1)

   --dont-optimize|-s
       skip optimisation step when optimising the whole panorama

   --check-line-cp|-l
       also include line control points for calculation and filtering in
       step 2

   --help|-h
       shows help

AUTHORS

   Thomas Modes

"Version: 2016.2.0"               2016-09-11                        CPCLEAN(1)


More Linux Commands

manpages/wcstombs.3.html
wcstombs(3) - convert a wide-character string to a multibyte
If dest is not NULL, the wcstombs() function converts the wide-character string src to a multibyte string starting at dest. At most n bytes are written to dest.

manpages/mysql_table.5.html
mysql_table(5) - Postfix MySQL client configuration.........
mysql_table.5 - The Postfix mail system uses optional tables for address rewriting or mail routing. These tables are usually in dbm or db format. Alternatively,

manpages/gnutls_certificate_free_credentials.3.html
gnutls_certificate_free_credentials(3) - API function.......
This structure is complex enough to manipulate directly thus this helper function is provided in order to free (deallocate) it. This function does not free any

manpages/XtSessionGetToken.3.html
XtSessionGetToken(3) - token management for checkpointing...
The XtSessionGetToken function will return NULL if the checkpoint operation instigated by the session manager is not currently under way. To indicate the comple

manpages/tzset.3.html
tzset(3) - initialize time conversion information (ManPage)
The tzset() function initializes the tzname variable from the TZ environment variable. This function is automatically called by the other time conversion functi

manpages/padsp.1.html
padsp(1) - PulseAudio OSS Wrapper - Linux manual page.......
padsp.1 - padsp starts the specified program and redirects its access to OSS compatible audio devices (/dev/dsp and auxiliary devices) to a PulseAudio sound ser

manpages/ldap_unbind.3.html
ldap_unbind(3) - LDAP bind routines - Linux manual page.....
These routines provide various interfaces to the LDAP bind operation. After an association with an LDAP server is made using ldap_init(3), an LDAP bind operatio

manpages/Tcl_SetEnsembleUnknownHandler.3.html
Tcl_SetEnsembleUnknownHandler(3) - manipulate ensemble comma
An ensemble is a command, bound to some namespace, which consists of a collection of subcommands implemented by other Tcl commands. The first argument to the en

manpages/xml2-config.1.html
xml2-config(1) - script to get information about the install
xml-config is a tool that is used to determine the compile and linker flags that should be used to compile and link programs that use GNOME-XML. OPTIONS xml-con

manpages/aio_cancel.3.html
aio_cancel(3) - cancel an outstanding asynchronous I/O reque
The aio_cancel() function attempts to cancel outstanding asynchronous I/O requests for the file descriptor fd. If aiocbp is NULL, all such requests are canceled

manpages/XkbAddGeomShape.3.html
XkbAddGeomShape(3) - Add a shape to a keyboard geometry.....
XkbAddGeomShape.3 - Xkb provides functions to add a single new element to the top-level keyboard geometry. In each case the num_ * fields of the corresponding s

manpages/gkeytool-4.6.1.html
gkeytool-4.6(1) - Manage private keys and public certificate
Cryptographic credentials, in a Java environment, are usually stored in a Key Store. The Java SDK specifies a Key Store as a persistent container of two types o





We can't live, work or learn in freedom unless the software we use is free.