Physics for Games Programmers: Crash Course in Collision Detection

Slides:



Advertisements
Similar presentations
The Gilbert-Johnson-Keerthi (GJK) Algorithm
Advertisements

2.5. B ASIC P RIMITIVE I NTERSECTION Details of common forms of primitive intersection test.
Christian Lauterbach COMP 770, 2/16/2009. Overview  Acceleration structures  Spatial hierarchies  Object hierarchies  Interactive Ray Tracing techniques.
2.3. B OUNDING V OLUMES Bounding volumes of use for collision detection.
Chapter 4.2 Collision Detection and Resolution. 2 Collision Detection Complicated for two reasons 1. Geometry is typically very complex, potentially requiring.
Collision Detection CSCE /60 What is Collision Detection?  Given two geometric objects, determine if they overlap.  Typically, at least one of.
Collision Detection and Resolution Zhi Yuan Course: Introduction to Game Development 11/28/
Computer graphics & visualization Collisions. computer graphics & visualization Simulation and Animation – SS07 Jens Krüger – Computer Graphics and Visualization.
Geometry Primer Lines and rays Planes Spheres Frustums Triangles Polygon Polyhedron.
Ray Tracing CMSC 635. Basic idea How many intersections?  Pixels  ~10 3 to ~10 7  Rays per Pixel  1 to ~10  Primitives  ~10 to ~10 7  Every ray.
2.1. C OLLISION D ETECTION Overview. Collision detection is used within many types of application, e.g. from robotics, through engineering simulations,
Motion Planning CS 6160, Spring 2010 By Gene Peterson 5/4/2010.
CSE 380 – Computer Game Programming Collision Detection & Response Erin Catto’s Box2D.
Continuous Collision Detection: Progress and Challenges Gino van den Bergen dtecta
Advanced Computer Graphics Spring 2014
Computational Geometry & Collision detection
Week 14 - Monday.  What did we talk about last time?  Bounding volume/bounding volume intersections.
CSE 872 Dr. Charles B. Owen Advanced Computer Graphics1 Basic 3D collision detection We want to know if objects have touched Objects are considered to.
Collision Detection CSE 191A: Seminar on Video Game Programming Lecture 3: Collision Detection UCSD, Spring, 2003 Instructor: Steve Rotenberg.
UNC Chapel Hill M. C. Lin References Collision Detection between Geometric Models: A Survey, by M. Lin and S. Gottschalk, Proc. of IMA Conference on Mathematics.
1 Geometry A line in 3D space is represented by  S is a point on the line, and V is the direction along which the line runs  Any point P on the line.
The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Continuous Collision Detection David Knott COMP 259 class presentation.
Oct 26, Fall 2006IAT 4101 Collision Detection. Oct 26, Fall 2006IAT 4102 Collision Detection  Essential for many games –Shooting –Kicking, punching,
OBBTree: A Hierarchical Structure for Rapid Interference Detection Gottschalk, M. C. Lin and D. ManochaM. C. LinD. Manocha Department of Computer Science,
UNC Chapel Hill M. C. Lin Overview of Last Lecture About Final Course Project –presentation, demo, write-up More geometric data structures –Binary Space.
Oct 3, Fall 2005Game Design1 Collision Detection.
Collision Detection David Johnson Cs6360 – Virtual Reality.
Computer graphics & visualization Collision Detection – Narrow Phase.
12/4/2001CS 638, Fall 2001 Today Using separating planes/axes for collision testing Collision detection packages.
INTERACTION TECHNIQUES Collision Detection and Other Interactions Collision Detection and Other Interactions.
CS 450: Computer Graphics REVIEW: OVERVIEW OF POLYGONS
CSE 381 – Advanced Game Programming Quickhull and GJK.
CSE 381 – Advanced Game Programming GJK. GJK Gilbert – Johnson – Keerthi distance algorithm Used to determine the minimum distance between convex sets.
Contact Manifolds Erin Catto Blizzard Entertainment.
Collision handling: detection and response
Computer Animation Rick Parent Computer Animation Algorithms and Techniques Collisions & Contact.
Week 13 - Monday.  What did we talk about last time?  Exam 2!  Before that…  Polygonal techniques ▪ Tessellation and triangulation  Triangle strips,
PRESENTED BY – GAURANGI TILAK SHASHANK AGARWAL Collision Detection.
Collaborative Visual Computing Lab Department of Computer Science University of Cape Town Graphics Topics in VR By Shaun Nirenstein.
1 KIPA Game Engine Seminars Jonathan Blow Ajou University December 6, 2002 Day 10.
CIS 350 – I Game Programming Instructor: Rolf Lakaemper.
Chapter 11 Collision Detection 가상현실 입문 그래픽스 연구실 민성환.
Presented by Paul Phipps
GJK Supplement Reference: SIGGRAPH2004 Course Note Original Reference: A Fast Procedure for Computing the Distance between Objects in Three-Dimensional.
Minkowski Sums and Distance Computation Eric Larsen COMP
Physics for Games Programmers: Collision Detection Crash Course Gino van den Bergen
Physics for Games Programmers: Continuous Collision Detection Gino van den Bergen Playlogic Game Factory
Physics for Games Programmers: Collision Detection
Bounding Volume Hierarchies and Spatial Partitioning
We propose a method which can be used to reduce high dimensional data sets into simplicial complexes with far fewer points which can capture topological.
CS679 - Fall Copyright Univ. of Wisconsin
Collision Detection Spring 2004.
Bounding Volume Hierarchies and Spatial Partitioning
3D Object Representations
2.1. Collision Detection Overview.
Parts of these slides are based on
References Additional lecture notes for 2/18/02.
Collision handling: detection and response
3D Rendering Pipeline Hidden Surface Removal 3D Primitives
Craig Schroeder October 26, 2004
Geometry.
2.5. Basic Primitive Intersection
References Collision Detection between Geometric Models: A Survey, by M. Lin and S. Gottschalk, Proc. of IMA Conference on Mathematics of Surfaces 1998.
INTERACTION TECHNIQUES
Computer Animation Algorithms and Techniques
Collision Detection.
CO Games Concepts Week 12 Collision Detection
David Johnson Cs6360 – Virtual Reality
Geometry.
GPAT – Chapter 7 Physics.
Presentation transcript:

Physics for Games Programmers: Crash Course in Collision Detection Gino van den Bergen gino@dtecta.com

Three Phases Broad phase: Determine all pairs of objects that potentially collide. Mid phase: Determine potentially colliding primitives of a pair of objects. Narrow phase: Determine contact between two primitive shapes.

Overview Narrow phase: Mid phase: AABB tree Broad phase: Discrete: GJK algorithm Continuous: GJK ray cast algorithm Mid phase: AABB tree Broad phase: Discrete: Sweep & Prune Continuous: Space-time Sweep & Prune

Narrow Phase: GJK Algorithm An iterative method for computing the distance between convex objects. First publication in 1988 by Gilbert, Johnson, and Keerthi. Solves queries in configuration space. Uses an implicit object representation.

GJK Algorithm: Pros Extremely versatile: Applicable to any combination of convex shape types. Computes distances, common points, and separating axes. Can be tailored for finding space-time collisions. Allows a smooth trade-off between accuracy and speed.

GJK Algorithm: Pros (cont'd) Performs well: Exploits frame coherence. Competitive with dedicated solutions for polytopes (Lin-Canny, V-Clip, SWIFT) . Despite its conceptual complexity, implementing GJK is not too difficult. Small code size.

GJK Algorithm: Cons Difficult to grasp: Concepts from linear algebra and convex analysis (determinants, Minkowski addition), take some time to get comfortable with. Maintaining a “geometric” mental image of the workings of the algorithm is challenging and not very helpful.

GJK Algorithm: Cons (cont'd) Suffers from numerical issues: Termination is governed by predicates that rely on tolerances. Despite the use of tolerances, certain “hacks” are needed in order to guarantee termination in all cases. Using 32-bit floating-point numbers is doable but tricky.

Configuration Space (recap) The configuration space obstacle of objects A and B is the set of all vectors from a point of B to a point of A.

Configuration Space (cont’d) A and B intersect: A – B contains origin. Distance between A and B: length of shortest vector in A – B.

Translation Translation of A and/or B results in a translation of A – B.

Rotation Rotation of A and/or B changes the shape of A – B.

GJK Algorithm: Workings Approximate the point of the CSO closest to the origin Generate a sequence of simplices inside the CSO, each simplex lying closer to the origin than its predecessor. A simplex is a point, a line segment, a triangle, or a tetrahedron.

GJK Algorithm: Workings (cont’d) Simplex vertices are computed using support mappings. (Definition follows) Terminate as soon as the current simplex is close enough. In case of an intersection, the simplex contains the origin.

Any point on this face may be returned as support point Support Mappings A support mapping sA of an object A maps vectors to points of A, such that Any point on this face may be returned as support point

Primitives

More Primitives

Affine Transformation Shapes can be translated, rotated, and scaled. For T(x) = Bx + c, we have

Convex Hull Convex hulls of arbitrary convex shapes are readily available.

Minkowski Sum Shapes can be fattened by Minkowski addition.

Basic Steps (1/6) Suppose we have a simplex inside the CSO…

Basic Steps (2/6) …and the point v of the simplex closest to the origin.

Basic Steps (3/6) Compute support point w = sA-B(-v).

Basic Steps (4/6) Add support point w to the current simplex.

Basic Steps (5/6) Compute the closest point v’ of the new simplex.

Basic Steps (6/6) Discard all vertices that do not contribute to v’.

Termination (1/3) As upper bound for the squared distance we take the squared length of v. As lower bound we take v∙w, the signed distance of the supporting plane through w. Terminate a soon as where εrel is the tolerance for the relative error in the computed distance.

Termination (2/3) +

Termination (3/3) In case of a (near) contact, v will approximate zero, in which case previous termination condition is not likely to be met. As secondary termination condition we use where v is the current closest point, W is the set of vertices of the current simplex, and εtol is a tolerance based on the machine epsilon.

Separating Axes If only an intersection test is needed then let GJK terminate as soon as the lower bound v∙w becomes positive. For a positive lower bound v∙w, the vector v is a separating axis. The origin and the CSO lie on different sides of the supporting plane, and thus, the CSO cannot contain the origin.

Separating Axes (cont'd) The supporting plane through w separates the origin from the CSO. +

Separating Axes and Coherence Separating axes can be cached and reused as initial v in future tests on the same object pairs. When the degree of frame coherence is high, the cached v is likely to be a separating axis in the new frame as well. An incremental version of GJK takes roughly one iteration per frame for smoothly moving objects.

Barycentric Coordinates A point x of a simplex can be expressed as a convex combination of the vertices yi The parameters λi are better known as barycentric coordinates of x with respect to yi.

Computing Contact Data For interpenetrating objects GJK returns a simplex W (usually a tetrahedron) that contains the origin. GJK also returns the barycentric coordinates of the origin with respect to W. These are the λi for which

Common Point Recall that simplex W is obtained from subtracting support points of A and B, thus These support points form simplices contained by the respective objects. By storing these support points we can compute a common point

Contact Normal For doing physics we also need a contact normal. For non-intersecting objects, the vector v at termination can be used as a contact normal. Compute the closest points using the barycentric coordinates of v, similar to common-point computation.

Contact Normal (cont’d) The closest points form proper contact data as long as the objects do not interpenetrate. However, keeping the objects from interpenetrating can be problematic.

Penetration Depth For interpenetrating objects we use the penetration depth vector as contact normal. The penetration depth is the shortest distance over which one of the two objects needs to be translated in order to stop the objects from interpenetrating.

Penetration Depth (cont'd) The vector v is the penetration depth vector. +

Expanding Polytope Algorithm Penetration depth cannot be computed using GJK. For this you need a separate algorithm called Expanding Polytope Algorithm. EPA relies also on support mappings and is applicable to the same family of convex shapes.

Hybrid Approach Fatten objects by Minkowski addition of a tiny sphere. The addition creates a smooth skin around the objects (bones). If only the skins are overlapping, use the closest points of the bones to find the contact data.

Hybrid Approach (cont’d) As soon as the bones start overlapping use EPA on the fattened objects to find the penetration depth vector. EPA is used only for emergencies. Bonus: fattened objects have rounded edges, so normals behave less jumpy over time. (No jitter!)

Contact Manifolds (1/4) GJK and EPA return a pair of simplices at termination. These lie in the contact plane but do not form the complete contact manifold. Not having the complete contact manifold will result in jitter.

Contact Manifolds (2/4) Create contact manifold by performing a local search on the objects: Slightly perturb the normal by adding a tiny vector. Add the support point for the perturbed normal if it is a new vertex. Perturb in some structured fashion, e.g. N, NE, E, SE, S, SW, W, NW.

Contact Manifolds (3/4) The added support points for the perturbed vectors result in a complete contact manifold. The perturbation needs to be only slightly larger that the numerical noise in computed normal.

Contact Manifolds (4/4) Manifolds obtained from convex objects are points, line segments, and convex polygons. The intersection of the manifolds, again a point, a line segment, or a convex polygon, forms the contact manifold.

Shape Casting Find the earliest time two translated objects come in contact. Boils down to performing a ray cast in the objects’ configuration space. For objects A and B being translated over respectively vectors s and t, we perform a ray cast along the vector r = t – s onto A – B. The earliest time of contact is

Normals A normal at the hit point of the ray is normal to the contact plane.

Ray Clipping

GJK Ray Cast Do a standard GJK iteration, and use the support planes as clipping planes. Each time the ray is clipped, the origin is “shifted” to λr,… …and the current simplex is set to the last-found support point. The vector -v that corresponds to the latest clipping plane is the normal at the hit point.

The origin advances to the new lower bound. GJK Ray Cast (cont'd) The origin advances to the new lower bound. The vector -v is the latest normal.

Accuracy vs. Performance Accuracy can be traded for performance by tweaking the error tolerance εtol. A greater tolerance results in fewer iterations but less accurate hit points and normals.

Accuracy vs. Performance εtol = 10-7, avg. time: 3.65 μs @ 2.6 GHz

Accuracy vs. Performance εtol = 10-6, avg. time: 2.80 μs @ 2.6 GHz

Accuracy vs. Performance εtol = 10-5, avg. time: 2.03 μs @ 2.6 GHz

Accuracy vs. Performance εtol = 10-4, avg. time: 1.43 μs @ 2.6 GHz

Accuracy vs. Performance εtol = 10-3, avg. time: 1.02 μs @ 2.6 GHz

Accuracy vs. Performance εtol = 10-2, avg. time: 0.77 μs @ 2.6 GHz

Accuracy vs. Performance εtol = 10-1, avg. time: 0.62 μs @ 2.6 GHz

Mid Phase: BV Trees Used for objects composed of lots of primitives, such as triangle meshes. Aim is to quickly reject groups of primitives based on geometric locality. ‘Capture’ locality by constructing a hierarchy of bounding volumes.

Bounding Volumes Should fit the model as tightly as possible. Overlap tests between volumes should be cheap. Should use a small amount of memory. Cost of computing the best-fit bounding volume should be low.

Bounding Volumes Good bounding volume types are: Spheres Axis-aligned bounding boxes (AABBs) Discrete-orientation polytopes (k-DOPs) Oriented bounding boxes (OBBs)

Bounding Volume Types Fit Test (ops) Memory (scalars) Best-fit Cost Sphere poor 11 4 high AABB fair ≤ 6 6 low k-DOP good ≤ 2k 2k medium OBB excellent ≤ 200 15

Why AABBs? Offer a fair trade-off between storage space and fit. Overlap tests are fast. Allow for fast construction and update of bounding volumes. Storage requirements can be further reduced through compression.

AABB Tree Construction Compute the AABB of the set of primitives. Split the set using the plane that cuts the longest axis of the AABB in two equal halves. Primitives that straddle the plane are added to the dominant side. (AABBs of the two sets may overlap.) Repeat from step 1 for the split sets. Continue until all sets contain one primitive.

Test Primitive vs. AABB Tree Compute the primitive’s AABB in the AABB tree’s local coordinate system. Recursively visit all nodes whose AABBs overlap the primitive’s AABB. Test each visited leaf’s primitive against the query primtive.

Test Oriented AABB Trees Simultaneously descend in both trees. Requires an oriented-box test such as the SAT (lite). Always unfold the largest of the current two AABBs. If both sub-trees are leaves, perform a primitive-primitive test.

Updating AABB Trees AABB trees can be updated rather than recomputed for deformable meshes. First recompute the AABBs of the leaves. Work your way back to the root: A parent’s box is the AABB of the children’s boxes.

Broad Phase: Sweep & Prune Find pairs of objects whose axis-aligned bounding boxes overlap. We need something better than the O(n2) test-all-pairs approach. Exploit temporal coherence: the configuration of objects does not change a lot per frame.

Sweep and Prune (1/3) For each world axis, maintain a sorted list of interval endpoints. Maintain also the set of overlapping box pairs. When a box moves, locally re-sort the lists by comparing and (if necessary) swapping the box endpoints with adjacent endpoints.

Sweep and Prune (2/3) Re-order endpoints of moving objects. A B

Sweep and Prune (2/3) Re-order endpoints of moving objects. A B

Sweep and Prune (3/3) When swapping “][“ to “[]”, the intervals start to overlap. When swapping “[]“ to “][”, the intervals cease to overlap. If the intervals on the other axes overlap, then the box pair starts or ceases to overlap.

Adding Time: Encapsulation Enlarge AABBs of moving objects, such that they encapsulate the swept AABBs. Creates false positives: Encapsulating AABBs overlap where in space-time, the actual AABBs do not.

Adding Time: Encapsulation (cont'd) Encapsulation results in false positives. A B

Adding Time: Queued Swaps Perform endpoint swaps in the proper order. Calculate swap times and prioritize swaps on earliest time. After each swap, re-evaluate swaps with new neighbors. Needs a priority queue that offers a decrease-key operation (as in Dijkstra’s algorithm or A*).

Adding Time: Queued Swaps (cont'd) Swap endpoints in the proper order. A B

Adding Time: Queued Swaps (cont'd) Swap endpoints in the proper order. A B

Adding Time: Queued Swaps (cont'd) Swap endpoints in the proper order. A B

Motion Coherence Space-time Sweep and Prune is often faster than the original version when many objects are moving in the same direction. Among a group of objects all having the same velocity vector not a single endpoint swap needs to be done. Ideal for particle and fluid simulations.

References Thomas H. Cormen et al. Introduction to Algorithms, Second Edition. MIT Press, 2001. E. G. Gilbert, D. W. Johnson, and S. S. Keerthi. A fast procedure for computing the distance between complex objects in three-dimensional space. IEEE Journal of Robotics and Automation, 4(2):192-203, 1988. Gino van den Bergen. Collision Detection in Interactive 3D Environments. Morgan Kaufmann Publishers, 2004.

Thank You! For papers and other information, check: http://www.dtecta.com