Daniel,

I have changed the g-voxel.c code so that the work is done inside of a
function (Voxelize) that has two input parameters :
1. the raytrace instance rtip
2. a userParameters structure that includes voxelSize in each dimension,
threshold value (what percentage to consider as filled), and output
filename.

Right now, as before, i have given my own values to all these parameters.
These changes will be committed now.
I also removed the miss() function from the code.

Thanks and Regards,
Anurag

On Tue, Jun 26, 2012 at 1:06 AM, Daniel Roßberg <
[email protected]> wrote:

> Anurag,
>
> I would recommend to write the function in g-voxel.c first.  Moving it
> to a library is easy then.
>
> This function should contain almost all what's contained in main()
> now.  Think about how its prototype should look like (I think we
> talked about it too).  Write it down above the main() and move its
> implementation to it.
>
> Next you should generalize the part where you write the result to the
> file.  I would recommend a call-back function with the voxel's
> coordinates, components name and its level as parameters.
>
> Daniel
>
>
> PS: There is still the useless miss() function in your code.
>
>
> 2012/6/25 Anurag Murty <[email protected]>:
> > Daniel,
> >
> > I have implemented the g-voxel command which outputs the voxel file
> > according to format once suggested by you. I have also tested the output
> for
> > many cases and it seems to work fine. As discussed earlier, you had
> asked me
> > to move the functions into a library once I was done with a working
> > algorithm for g-voxel.c.
> >
> > Could you give me some pointers on how to go about doing this? I think I
> > have to add the functions to libanalyse but can you give me a bit more
> > guidance?
> >
> > Thanks and Regards,
> > --
> > Anurag Murty
> >
> ------------------------------------------------------------------------------
> > Live Security Virtual Conference
> > Exclusive live event will cover all the ways today's security and
> > threat landscape has changed and how IT managers can respond. Discussions
> > will include endpoint security, mobile security and the latest in malware
> > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> > _______________________________________________
> > BRL-CAD Developer mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/brlcad-devel
> >
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> BRL-CAD Developer mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/brlcad-devel
>



-- 
Anurag Murty
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
BRL-CAD Developer mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/brlcad-devel

Reply via email to