Solved

graphics programming

Posted on 2004-04-01
11
173 Views
Last Modified: 2013-12-04
i need the lines of code for the following algorithms.

flat fill
body fill
ellipse
morphing
scaling
rotation
translation
0
Comment
Question by:khansaquib
  • 2
  • 2
  • 2
  • +2
11 Comments
 
LVL 30

Expert Comment

by:Mayank S
ID: 10738707
This is not a homework site.
0
 
LVL 2

Expert Comment

by:funvill
ID: 10738786
+ you did not give us much information on how to help you

what language ?
....
..
.
0
 
LVL 37

Expert Comment

by:Harisha M G
ID: 10738924
Graphics Programming in .... ? (C/C++/VC++ or others)
0
 

Author Comment

by:khansaquib
ID: 10739093
c or c++
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 6

Expert Comment

by:mmusante
ID: 10739189
Translation :
x1 = x + xt
y1 = y + yt

Scaling :
x1 = (x-x0)*fx + x0
y1 = (y-y0)*fy + y0

where (x,y) = original point
          (x1,y1) = new point
          (x0,y0) = scaling center point
          fx, fy = scaling factors
          xt, yt = translation offsets
0
 
LVL 6

Accepted Solution

by:
mmusante earned 20 total points
ID: 10739207
for a more general approach to translation-scaling-rotation take a look here ...

http://www.engineeringsurveyor.com/transformations.htm
0
 

Author Comment

by:khansaquib
ID: 10915626
'Hi

Ive made the code in VB and its working well. Thanx for your help. I want this question to be closed.
0
 
LVL 30

Expert Comment

by:Mayank S
ID: 10947734
You said that you want to do this in C/ C++. So the experts gave you help for that. Then you said that you did it in VB. That's not the correct thing to say, is it? You should've told us initially, that a VB solution was also fine with you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

A short article about a problem I had getting the GPS LocationListener working.
Whether you’re a college noob or a soon-to-be pro, these tips are sure to help you in your journey to becoming a programming ninja and stand out from the crowd.
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
In this fourth video of the Xpdf series, we discuss and demonstrate the PDFinfo utility, which retrieves the contents of a PDF's Info Dictionary, as well as some other information, including the page count. We show how to isolate the page count in a…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now