Preview

Information Technology

Good Essays
Open Document
Open Document
4787 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology
Master of Computer Application(MCA)-Semester 3
MC0072-Computer Graphics
1.) Describe the theory of Polygon and Pattern filling along with their corresponding algorithms.
Ans.)
Polygon Filling
Filling the polygon means highlighting all the pixels which lie inside the polygon with any color other than background color. Polygons are easier to fill since they have linear boundaries.
There are 2 basic approaches used to fill the polygon. One way to fill a polygon is to start from a given “seed point” known to be inside the polygon and highlight outward from this point i.e neighboring pixels until we encounter the boundary pixel. This approach is called seed fill because color flows from the seed pixel until reaching the polygon boundary. Another approach to fill the polygon is to apply the inside test i.e to check whether pixel is inside the polygon or outside the polygon and then highlight pixels which lie inside the polygon. This approach is known as scan line algorithm. Seed fill
This seed fill algorithm is further classified as flood-fill algorithm and boundary fill algorithm. Algorithms that fill interior defines regions are called flood-fill algorithms, those that fill boundary-defined regions are called boundary-fill algorithms or edge-fill algorithms. Boundary Fill algorithm
In this method edges of a polygon are drawn. Then starting with some seed (point) , any point inside the polygon we examine the neighboring pixels to check whether the boundary pixel is reached. If boundary pixels are not reached, pixels are highlighted and the process is continued until boundary pixels are reached.
Boundary defined regions may be either 4-connected or 8-connected as shown in the fig if a region is 4-connected, then every pixel in the region may be reached by a combination of moves in only 4 directions: left, right, up and down. For an 8-connected region every pixel in the region may be reached by a combination of moves in the 2 horizontal, 2 vertical and 4

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsbwor501 Final Exam

    • 397 Words
    • 2 Pages

    (TCO 1) Which of the following best describes the result of using the fill handle…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    4. In the range A20:H20, add a Thick Box Border and then change the fill color to Standard Yellow (4th column, 1st row in the Standard Colors palette).…

    • 560 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Wad A Watershed Lab 2

    • 804 Words
    • 3 Pages

    5. Use the marker to color the major folds or ridges in the paper, as well as some of the minor folds or ridges, as shown below. Do not allow the marker to color any other part of the paper.…

    • 804 Words
    • 3 Pages
    Good Essays
  • Good Essays

    description actually create the boundary lines and corner marks. The last way a boundary can be…

    • 592 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bubble Cursor Report

    • 287 Words
    • 2 Pages

    We then chose two objects which are closest to the cursor and set the Intersecting Distance (the length of the shortest line connecting the center of the bubble cursor and the second closest object border) and Containment Distance (the length of the longest line connecting the center of the bubble cursor and the closest object border). We set the radius of the bubble cursor to minimum of Containment Distance and Intersecting Distance [26]. When a part of the object is included in the cursor, it would be highlighted and, in such cases, we made sure that there would only be one object being highlighted.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Essentially, the period of Renaissance art was about the revival or the rebirth of classical Greek and Roman learning. The key difference is that while the Greeks were more inclined to idealism, the Renaissance people gravitated towards ideas of Humanism, making use of human based ideals, which resulted in greater realism in art. Humanism places emphasis on individual potential and the expansion on human knowledge as compared to the middle Ages, where art and learning was very much based on religion and the church . It was also during the Renaissance that Filippo Brunelleschi rediscovered linear perspective, which had a significant impact especially on art and architecture. This is evident from how it was passionately pursued by the Renaissance…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Audrey00

    • 852 Words
    • 4 Pages

    middle, and top because the strands are going in each of these directions. One bundle of…

    • 852 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 4224 Words
    • 17 Pages

    6. If you wanted to ensure that your business maintains a desirable return on your investment with technology, what should be one of your main concerns?…

    • 4224 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 729 Words
    • 3 Pages

    1. In relation to your current business environment (or one that you are familiar with), identify at least two different types of information technology that may be used when completing work tasks.…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Adobe Photoshop Essay

    • 1474 Words
    • 6 Pages

    A vector based drawing program creates the various elements of the image as individual vector objects which retain their characteristics and do not become part of a "bitmap".…

    • 1474 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Pattern recognition is a useful tool for mathematics, mathematical visualization, and art. After a brief description of Bongard’s methodology in the field of pattern recognition, the author introduces the concept of colour modularity and evaluates how it affects pattern recognition classification. Combining Bongard's methodology and colour modularity, the author attains a richer, more persuasive dynamic in pattern description and recognition of five- and ten-pointed star polygons.".…

    • 1304 Words
    • 6 Pages
    Good Essays

Related Topics