Solved

get y value at x,z ?

Posted on 2002-05-05
3
237 Views
Last Modified: 2013-12-26
hope this is not too off-topic but atleast it's about 3D.

I guess a picture sez more than a thousand words so here goes...

http://mabuk.virtualave.net/3d.jpg

with the information known how do i get the y value at
any x,z point ???

any formulas would be greatly appretiated...

John
0
Comment
Question by:Arachnid
3 Comments
 
LVL 1

Accepted Solution

by:
lordxeroth earned 300 total points
ID: 6991363
Hi John,

I asume that you expect something in the 'plain' created by p0 through p4? So for a certain x and z point you expect one 'valid' y value?
Now in that case, things get quite complicated. In a normal plain (described by 3 points) you can just use some basic maths, but here you've got a 4th point.
In this case you have to define a 4th parameter to handle the curve (or bending of the plain) created by that 4th point. Look at it like it is a part of the surface a sphere. The problem here is that you don't know if it is a sphere and you certainly don't know the radius of the sphere.
So with the given information it is impossible to get a y value, unless you use a 4th paramater to define curve (which can be anything from a nice spherisch thing to more complex things like sinuses, etc...).

Jan
0
 
LVL 2

Expert Comment

by:jonnin
ID: 6998677
Its a shallow saddle surface.
You will have to create an equation that describes the surface y = f(x,z);

or use interpolation to approximate a value (or treat as a plane and correct with an error term). It would really help to have the point in the center of the thing; then your equation to describe it could be very close! Without that, we don't know the depth of that point, so we don't know how curved it is...



 
0
 

Author Comment

by:Arachnid
ID: 7000601
i'll pass the points to you Jan, since your answer got me going in the right direction.


John
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Artificial Intelligence comes in many forms, and for game developers, Path-Finding is an important ability for making an NPC (Non-Playable Character) maneuver through terrain.  A* is a particularly easy way to approach it.  I’ll start with the algor…
As game developers, we quickly learn that Artificial Intelligence (AI) doesn’t need to be so tough.  To reference Space Ghost: “Moltar, I have a giant brain that is able to reduce any complex machine into a simple yes or no answer. (http://www.youtu…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now