A Novel Method of Buffer Generation Based on Vector Boundary Tracing
Wang Jiechen
1
Yu Qing
1
Chen Yanming
1
1
Geographic Information Science Department, Nanjing University, Nanjing, 210093, China
wangjiechen@hotmail.com
ABSTRACT: Utilizing the property that the distances from all
points located on the borderline of buffer zone to corresponding
buffer target are the same, this paper presents a novel method of
buffer generation based on vector boundary tracing. The new
method can avoid complex vector calculations, such as line and
curve segment intersection, clipping and recombination, the
closure of borderline and so on, and also has an advantage of
high precision the same as all existing vector-based algorithms.
The main steps of this algorithm include: (1) Generate the initial
tracing point set located on the borderline of buffer zone; (2)
Obtain an integrated and closed borderline by tracing these
points; (3) Construct the area targets on the basis of these closed
borderlines. The test results and analysis indicate that this
algorithm has a great advantage in the aspects of decreasing
EMS memory consumption and improving calculation accuracy,
and its computational efficiency can fully meet the demand of
usual application in GIS. Furthermore, the principle of
boundary tracing in the algorithm has a potential for further
being promoted and used to design related spatial analysis
algorithms.
KEYWORDS: Buffer zone; buffer generation; GIS; algorithm;
vector; boundary tracing
I. INTRODUCTION
Buffer analysis is one of the most important functions in
geographic information system (GIS), and more and more
people pay attention to the auto-generation of buffer zone.
Buffer generation usually makes arithmetic realizations
aiming at point, line, and polygon respectively, and it’s
more significant for linear objects. At present, buffer
generation algorithms can be generally classified into raster-
based and vector-based algorithms. The representative raster
algorithms include the distance-changing method
[2]
and
Mathematical morphology expanding algorithm
[3]
based on
raster data. Most raster algorithms are simple in principle
and easy to implement, but difficult to obtain vector
boundary, and with high memory cost and low precision as
its main disadvantages. So vector algorithm has become the
focus of researchers’ attentions. Vector algorithms are
usually more complex, but don’t lower the precision of
original data within the range of machine accuracy. A
common vector algorithm is the method of angular bisector
[8]
, which consists of three steps: (a) Draw simple parallel
lines for each line segment; (b) Carry on cusp smoothing
correction; (c) Process line self-intersection, but the method
is difficult to implement perfectly because of many
abnormal problems and complicated correction process.
There is another intuitive algorithm used by many GIS
software, which needs to obtain the respective buffer zone
for each line segment firstly and then merge the buffer zones
one by one by overlaying the polygons, and the algorithm
takes polygon overlay as the core problem, which involves
judging the relationship among a lot of line segments. In
order to deal with abnormal problems such as line segments
overlapping and improve computational efficiency, some
researchers present a number of optimizations for the
existing algorithms, for example, the self-adaptive data re-
sampling algorithm
[6]
, the buffer zone growth algorithm
based on the dynamic overlay thought
[7]
. Sun, Huang and
Ren
[5]
analyze the direction rule of arc segment passing
borderline intersection point and put forward the deleting
rule for directed arc segment to avoid choosing the arc
segment by line-area inclusion relation, Dong
[1]
uses the
rotating point transformation formula and recursion method
to simplify the process of the generation of parallel lines and
the smooth correction of sharp angle, Wu, Gong and Li
[9]
propose the concept of buffer curve and buffer generation
algorithm in aid of edge constrained triangle network, which
reduces the number of line segments involving clipping and
recombination and enhances the stability of algorithm and
time efficiency.
The existing vector algorithms usually include such
processes: curve segment intersection, clipping and
recombination for arc segments, judging inclusion relation,
searching the arcs owned by certain polygon, so it’s quite
complex to implement. The author holds that a simpler
algorithm can be built if buffer generation is considered just
as boundary tracing for buffer zone. Now the thought of
vector-based boundary tracing has been applied to many
spatial algorithm designs, for example, Yang, Wang and
Lu
[10]
adopt vector-based tracing method to construct the
centerline of two curves, Li and Zhang
[4]
also use a similar
tracing process to construct the gravity-based model
algorithm for the sake of combining linear features and
eliminating some tiny unsmooth on curves. Enlightened by
the idea of boundary tracing in these algorithms, this paper
describes a novel method of buffer generation based on
vector-based boundary tracing in terms of the characteristic
that it has the same distance from each point located on the
buffer boundary to buffer target.
II. V
ECTOR-BASED TRACING ALGORITHM
In most simple cases, the result graph of the buffer
generation is a simple connectivity area; when generating
buffer zone for the set of arcs or the shape of arc is much
complicated, the result maybe a complex area with one or
more holes (see Fig. 1).
2009 International Forum on Information Technology and Application
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Application
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Application
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Application
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Application
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Application
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Applications
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Applications
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Applications
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579
2009 International Forum on Information Technology and Applications
978-0-7695-3600-2/09 $25.00 © 2009 IEEE
DOI 10.1109/IFITA.2009.177
579