US boffins claim graphics processing breakthrough

 

US computer scientists have developed a technique that allows the generation of highly complex images like smoke-filled bars and smog-choked cityscapes without the computational drag and slow speeds that have dogged previous computer graphics methods.

"This is a huge computational saving. It lets you render explosions, smoke, and the architectural lighting design in the presence of these kinds of visual effects much faster," said Wojciech Jarosz, the UC San Diego computer science PhD candidate who led the study.

Currently rendering realistic computer generated images with smoke, fog, clouds or other 'participating media' (some of the light is actually absorbed or reflected by the material, thus the term 'participating') generally requires computational 'heavy lifting', lots of processor time, or both.

"Being able to accurately and efficiently simulate these kinds of scenes is very useful," said Jarosz.

With the boffins’ new approach, when smoke, clouds, fog or other participating media vary smoothly across a scene, the lighting is computed accurately at a small set of locations and then this information is used to interpolate the lighting at nearby points.

This approach, which is an extension of 'irradiance caching', cuts the number of computations along the line of sight that need to be done to render an image.

Copyright ©v3.co.uk


US boffins claim graphics processing breakthrough
 
 
 
Top Stories
There's no coke and hookers in the cloud
[Blog post] Where did the love go?
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1037

Vote