Transformation for 3-d scaling, Computer Graphics

Assignment Help:

As we already seen that the scaling process is mainly utilized to change the size of an object. The scale factors find out whether the scaling is a magnification as s>1 or a reduction, s<1. 2-dimensional scaling, is in equation (8), can be simply extended to scaling in 3-dimensional case by consisting the z-dimension.

For any point (x,y,z), we move in (x.sx,y.sy,z.sz), here sx, sy, and sz are the scaling factors in the x,y, and z-directions correspondingly.

 Hence, scaling w.r.t. origin is given by:

Ssx,sy,sz =    x'= x.sx

y'= y.sy                                                  

z'= z.sz---------(43)

In matrix form:

352_equation 44.png------------------------(44)

In terms of Homogeneous coordinate system, above equation (44) is written as:

1878_equation 45.png

As, P'=P. Ssx,sy,sz      -----------------------------(45)


Related Discussions:- Transformation for 3-d scaling

Engineering-applications for computer animation, Engineering: CAD has alwa...

Engineering: CAD has always been an imperative tool in industry. For illustration in automobile design, CAD could be utilized to model a car. Although with the advent of computer

Define random scan and raster scan displays, Define Random Scan/Raster Scan...

Define Random Scan/Raster Scan displays. Ans. Random scan is a process in which the display is made by the electronic beam, which is directed, only to the points or division of

Algorithm scan-line, Algorithm (scan-line): For each scan line perform ...

Algorithm (scan-line): For each scan line perform from step (1) to (3). 1) For all pixels on a scan-line, arrange depth [x]=1.0 i.e. max value and Intensity [x] = background

digital audio technologies, Digital audio technologies DAB (Digita...

Digital audio technologies DAB (Digital Audio Broadcasting) Digital Audio Tape (DAT) DVD DVD-A Digital audio player Compact disc (CD) Minidisc (obsolete

Convert the intensity value of the current pixel, Step1:  Read a text file ...

Step1:  Read a text file which we want to hide. Step2:  Transform it into an array of its binary value. Step3: Transform this array into its equivalent one dimensional array

Functioning of input devices - 2d shape primitives, Functioning of Input De...

Functioning of Input Devices Functioning of input devices-Keyboard, mouse, trackball and space ball, Joystick, data glove, digitizer, scanner, touch panel, light pen, voice sys

Beam penetration method and shadow mask method, Beam Penetration Method and...

Beam Penetration Method and Shadow Mask Method Two methods exist for displaying colors in a CRT monitor - beam penetration method and shadow mask method. Beam penetration metho

What are the utilizations of inverse transformation, What are the utilizati...

What are the utilizations of Inverse transformation? Provide the Inverse transformation for translation, shearing, reflection, scaling and rotation. Solution: We have observed

What are the different ways of specifying spline curve, What are the differ...

What are the different ways of specifying spline curve?  Using a set of boundary conditions that are imposed on the spline. Using the state matrix that characteristics

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd