Premium Essay

Pt1420 Unit 9 Lab Report

Submitted By
Words 1907
Pages 8
1. Scan converting a circle
Circle is one of the most widely used shape in drawing pictures and graphs and in computer graphics, various procedures are developed to draw complete circles or any portion of it such as arcs and sectors.
A circle is such a geometric shape that is defined by a center position and a fixed distance from the center which is called radius. It is drawn by combining all the points that are at a fixed distance from the center. Scan converting a circle requires each point on the circumference of the circle to be illuminated. Various algorithms and techniques are employed in computer graphics to scan convert a circle that uses equation of circle. The Polynomial equation of the circle in Cartesian coordinates whose center …show more content…
Suppose at ith position, plotted pixel is (xi , yi ). At position (i + 1)th , we have two candidate y-coordinates for xi+1 = xi + 1 as shown in figure 4.11. These candidate locations are marked as S(xi + 1 , yi -1) and T(xi + 1 , yi ). From the above figure, it can be seen that if we generating points from 90° to 45°(i.e. from x= 0 to x= y), each new pixel position closest to the actual circumference of the circle can be found by taking either of the two actions: moving in the x-direction by unit interval and not changing the y-coordinate. moving in the x-direction by unit interval and moving in the negative y-direction by unit interval (i.e. decrementing y-coordinate by unit interval).
Distance of the pixel T from the origin is calculated by using distance formula i.e. CT = √(〖(x_i + 1)〗^2+〖y_i〗^2 )
Similarly Distance of the pixel S from the origin is given as CS = √(〖(x_i + 1)〗^2+〖(y_i -1)〗^2 )
Here we are using a function D( ) that provides a relative measurement of the distance from the center of the pixel from the actual circle. Let D(T) be the square of the distance from the origin to the pixel T minus square of the distance to the actual circle ( i.e. r

Similar Documents

Premium Essay

Pt1420 Unit 9 Lab Report

...creation of the body, it acquired enough gravitation in order to separate the materials by density. The Earth is an example of a differentiated body. An undifferentiated body is a body that has the materials mixed up, not separated by the respective densities. During the creation of the body, it did not acquire enough gravitation so the materials are not separated by their densities. 5) About 0.1953125%. First, I found out the age of the solar system. It is 4.5 billions years old. Then I divided the time for one half-life to occur, 5 x 10^8, by the age of the solar system to figure out how many half-lives have occurred. I calculated that nine half-lives have occurred. The number of half lives is the number of times to multiply 1 by. 1 x 0.5^9 = 0.001953125. In order to turn that into a fraction, I multiplied it to get 0.1953125%. So, about 0.20% of the radioactive element should be left in the rock today. 6) 0.05m of new ocean crust is created each year over the entire planet. First, I divided the 5m by a 100 in order to get the rate in meters per year. I calculated the rate to be 0.05m per year. ) 0.05m of ocean crust is subducted each year also since the total area of the oceans remain the about the same....

Words: 558 - Pages: 3

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10