Hi,

Here is a summary of the progress I've made so far and a list with my
future milestones:

__Summary__

   - Studied the two potential graph libraries: *Adaptagrams* and
*GOBLIN*. Adaptagrams was eventually chosen to work with.

   - Integrated the Adaptagrams' *libavoid* library into BRL-CAD (see
the files: misc/CMake/FindADAPTAGRAMS.cmake,
src/libged/CMakeLists.txt, and src/libged/Makefile.am) -- gained
knowledge in working with cmake configurations and in how they are set
inside BRL-CAD.

   - Worked on the model part of this project. It can be found in the
src/libged/dag.cpp file. The accomplished goals so far are:

     -- traverse a geometry
     -- identify its objects based on their type: solid / comb
     -- for each such object, add a shape (Avoid::ShapeRef) to the
graph (internally, by attaching it to a router (Avoid::Router))
     -- there are 3 hash table structures corresponding to each type
of objects (solid, regions and groups (the last two are subtypes of
comb))
     -- depending on the type of object do one of these two things:

        --- for a solid: add a rectangle to the graph
        --- for a comb: add a rectangle along with connections between
this shape and the ones belonging to its "subtree"

     -- assign IDs to each object. This helped in avoiding node
duplications which rose when an object was first considered a solid
and then, later, a comb.


__Updated goals for the next period__

   - Milestone 1: create a user-visible feature in Archer/MGED, i.e.,
a command (possibly, called "igl") that opens a window showing the
graph for the currently displayed geometry.

   - Milestone 2: align the graph's nodes and structure it.

   - Milestone 3: work on the interactive capabilities of the visual
layout: commands such as *delete* and *move* for nodes.

   - Milestone 4: track bugs; make tests. Document the source code.


Best regards,
--
Cristina Precup

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
BRL-CAD Developer mailing list
brlcad-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/brlcad-devel

Reply via email to