Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: flexibiilty in brute-force computation #164

Open
yucongalicechen opened this issue Feb 2, 2025 · 0 comments
Open

feat: flexibiilty in brute-force computation #164

yucongalicechen opened this issue Feb 2, 2025 · 0 comments

Comments

@yucongalicechen
Copy link
Collaborator

We want to allow users to modify the global parameters N_POINTS_ON_DIAMETER (the number of points on each diameter to sample the circle) and TTH_GRID (the range of angles) when using the brute-force method.
Have compute_cve(input_pattern, mud, method="polynomial_interpolation", xtype="tth", n_points_on_diameter=None, tth_grid=None) so that people can pass in different n_points_on_diameter and tth_grid as they wish.
Refer to #163 for more details.

@sbillinge sbillinge added this to the feature-requests milestone Feb 2, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants