US boffins claim graphics processing breakthrough

 

US computer scientists have developed a technique that allows the generation of highly complex images like smoke-filled bars and smog-choked cityscapes without the computational drag and slow speeds that have dogged previous computer graphics methods.

"This is a huge computational saving. It lets you render explosions, smoke, and the architectural lighting design in the presence of these kinds of visual effects much faster," said Wojciech Jarosz, the UC San Diego computer science PhD candidate who led the study.

Currently rendering realistic computer generated images with smoke, fog, clouds or other 'participating media' (some of the light is actually absorbed or reflected by the material, thus the term 'participating') generally requires computational 'heavy lifting', lots of processor time, or both.

"Being able to accurately and efficiently simulate these kinds of scenes is very useful," said Jarosz.

With the boffins’ new approach, when smoke, clouds, fog or other participating media vary smoothly across a scene, the lighting is computed accurately at a small set of locations and then this information is used to interpolate the lighting at nearby points.

This approach, which is an extension of 'irradiance caching', cuts the number of computations along the line of sight that need to be done to render an image.

Copyright ©v3.co.uk


US boffins claim graphics processing breakthrough
 
 
 
Top Stories
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
Sydney Trains chief thinks beyond Opal
Plots app to help you find a seat on the train.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 414

Vote