Transformation for 3-d scaling, Computer Graphics

Assignment Help:

Transformation for 3-D Scaling

As we already seen that the scaling process is mainly utilized to change the size of an object. The scale factors find out whether the scaling is a magnification as s>1 or a reduction, s<1. 2-dimensional scaling, is in equation (8), can be simply extended to scaling in 3-dimensional case by consisting the z-dimension.

For any point (x,y,z), we move in (x.sx,y.sy,z.sz), here sx, sy, and sz are the scaling factors in the x,y, and z-directions correspondingly.

Hence, scaling w.r.t. origin is given by:

Ssx,sy,sz =    x'= x.sx

         y'= y.sy                                                  

z'= z.sz

In matrix form:

1186_Transformation for 3-D Scaling 1.png

In terms of Homogeneous coordinate system, above equation is written as:

1834_Transformation for 3-D Scaling 2.png

As, P'=P. Ssx,sy,sz


Related Discussions:- Transformation for 3-d scaling

Arguments made in favour of analog sound, Arguments made in favour of Analo...

Arguments made in favour of Analog Sound Shape of the waveforms: from digital signals sound reconstructed which is claimed to be harsher and unnatural compared to analog si

Scan line polygon fill and seed fill or flood fill algorithm, 1.   Distingu...

1.   Distinguish among Scan line polygon fill and Seed fill or Flood fill algorithm? Scan Line Polygon Flood Fill Algorithms ?1. This

What is the theory of gestalt, Question: (a) After having worked for s...

Question: (a) After having worked for several years as a graphic designer you decide to start a company of your own; MediaDesign ltd. The most valuable asset of a company is i

Use the outline method to plot font boundaries, 1. Use the outline method t...

1. Use the outline method to plot the following font boundaries (style should remain the same). Implement your method in C language.    ANswer: Here letter G is produced

Beam penetration method and shadow mask method, Beam Penetration Method and...

Beam Penetration Method and Shadow Mask Method Two methods exist for displaying colors in a CRT monitor - beam penetration method and shadow mask method. Beam penetration metho

De casteljeau algorithm - bezier curves, De Casteljeau algorithm: The cont...

De Casteljeau algorithm: The control points P 0 , P 1 , P 2 and P 3 are combined with line segments termed as 'control polygon', even if they are not actually a polygon although

Audio file formats, Audio File Formats: It is a container format for ...

Audio File Formats: It is a container format for storing audio data in a computer system. Many file formats are there for storing audio files. The common approach towards

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd