“…Data collection [24], [81], [82], [83], [84], [85], [86], [87], [88], [91], [92], [94], [95], [96], [97], [98], [99], [100], [101], [102], [103], [104], [105], [106], [109], [110], [111], [112], [113], [114], [115], [116], keypoint extraction [81], [82], [83], [84], [85], [86], [87], [88], [91], [92], [94], [95], [96], [97], [98], [99], [100], [101], [102]<...…”