Various cases of cohen sutherland line clippings - algorithm, Computer Graphics

Various cases of Cohen Sutherland Line Clippings

Currently, we study how this clipping algorithm works. For the sake of simplicity we will tackle all the cases with the assist of illustration lines line1 to line 5 demonstrated in following figure. All line segments present a case.

69_Various cases of Cohen Sutherland Line Clippings.png

Figure: Various cases of Cohen Sutherland Line Clippings

Note, that in above figure of various cases of Cohen Sutherland Line Clippings, line l1 is completely observable, line l2 and line l3 are completely invisible; line l4and line l5 are partially observable. We will determine these out comings as three separate cases.

Case 1: l1 → totally visible, that is, Trival acceptance

∴both points lie inside the window

Case 2: l2 and l3 → unseen that is Trival acceptance rejection

Case 3: l4 and l5→ partially visible

Posted Date: 4/3/2013 2:57:11 AM | Location : United States







Related Discussions:- Various cases of cohen sutherland line clippings - algorithm, Assignment Help, Ask Question on Various cases of cohen sutherland line clippings - algorithm, Get Answer, Expert's Help, Various cases of cohen sutherland line clippings - algorithm Discussions

Write discussion on Various cases of cohen sutherland line clippings - algorithm
Your posts are moderated
Related Questions
1. Implement the boundary fill algorithm and flood fill algorithm in C-language and use your code to fill two different types of closed areas such as  i)  A Circle ii)  A sel

Scan Conversion of Line with the slope (0 Currently the pixel positions beside the line path are determined through sampling at Unit x intervals that is, starting from the fi

Algorithms for filled-area primitives These algorithms are classified into two categories (i)  Scan line algorithms (ii) Seed fill algorithms.

Ray Casting -polygon rendering and ray tracing methods It is a method wherein the surfaces of objects visible to the camera are determined by throwing or say casting rays of

Geometric tables - Polygon Tables 1) Vertex table: Keep vertices' coordinates values in the object. 2) Edge table: Keep pointers back in to the vertex table for identif

Explain the merits and demerits of Penetration techniques. The merits and demerits of the Penetration techniques are as follows:     It is an inexpensive method.     It h

Behavioral Animation - Computer Animation It used for control the motion of several objects automatically. Objects or "actors" are specified rules about how they respond to th

Q: For the following polygon, prepare an initial sorted edge list and then make the active edge list for scan lines y = 5,20,30,35 Coordinates of the vertices are as shown in Figur

DV Encoder Type 1 : The video and audio streams are together interfaces by standard DV bit stream. Such format is fully supported through DirectShow which accepts this interleaved

Objectives of 2-D Viewing and Clipping After going through this section, you should be capable to: 1. Describe the concept of clipping, 2. Observe how line clipping is p