Illustrate the wire frame representation, Data Structure & Algorithms

Assignment Help:

RENDERING, SHADING AND COLOURING

By introducing hidden line removal we have already taken one step away from wire-frame drawings towards being able to realistically model and display 3-D objects. Perhaps the biggest step down that road comes when attempting to "colour in" our simple line drawings. The various algorithms for rendering, the process of applying lighting, colouring, shadow and texture to an object or scene in order to obtain a realistic image, are all based to a greater or lesser extent on the study of the physical properties of light. In this unit we shall examine various properties of light and the way it interacts with objects and develop some simple mathematical models of its behaviour. It is worth setting the following discussion in the context of our system as developed so far. Currently our 3d model is made up of surfaces, each of which we represent on the screen by drawing its outline. If we wanted to shade each polygon ("colour it in") what color would we use? What we basically are trying to achieve in this chapter is to derive a method for calculating that colour. Figure 3.16 shows the difference between a wire-frame representation and a simple rendered version

 

 


Related Discussions:- Illustrate the wire frame representation

Sort list of distinct numbers in ascending order - quicksort, (1) Sort a li...

(1) Sort a list of distinct numbers in ascending order, using the following divide- and-conquer strategy (Quicksort): divide the list of numbers into two lists: one that contains a

Data structure, Ask question #Minimum 1Mark each of the following statement...

Ask question #Minimum 1Mark each of the following statements as valid or invalid. If a statement is invalid, explain why. a. current ¼ list; b. temp->link->link ¼ NULL; c. trail->l

Sequential files, Data records are stored in some particular sequence e.g.,...

Data records are stored in some particular sequence e.g., order of arrival value of key field etc. Records of sequential file cannot be randomly accessed i.e., to access the n th

Hash clash, Q. What do you understand by the term by hash clash? Explain in...

Q. What do you understand by the term by hash clash? Explain in detail any one method to resolve the hash collisions.

Infix expression into the postfix expression, Q. Convert the given infix ex...

Q. Convert the given infix expression into the postfix expression (also Show the steps) A ∗ (B + D)/ E - F(G + H / k ) Ans. Steps showing Infix to Post fix

Diophantine Equations, Implement algorithm to solve 5-1 fifth order equati...

Implement algorithm to solve 5-1 fifth order equation given.

Ruby implements range of t abstract data type, Ruby implements Range of T A...

Ruby implements Range of T Abstract data type Ruby implements Range of T ADT in its Range class. Elements of carrier set are represented in Range instances by recording interna

Determine the types of java, Determine the types of JAVA Java has two p...

Determine the types of JAVA Java has two parts... 1. Core language -- variables, arrays, objects o Java Virtual Machine (JVM) runs the core language o Core language is

Division-remainder hashing, According to this, key value is divided by any ...

According to this, key value is divided by any fitting number, generally a prime number, and the division of remainder is utilized as the address for the record. The choice of s

Dynamic memory management, How memory is freed using Boundary tag method in...

How memory is freed using Boundary tag method in the context of Dynamic memory management? Boundary Tag Method to free Memory To delete an arbitrary block from the free li

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd