US boffins claim graphics processing breakthrough

 

US computer scientists have developed a technique that allows the generation of highly complex images like smoke-filled bars and smog-choked cityscapes without the computational drag and slow speeds that have dogged previous computer graphics methods.

"This is a huge computational saving. It lets you render explosions, smoke, and the architectural lighting design in the presence of these kinds of visual effects much faster," said Wojciech Jarosz, the UC San Diego computer science PhD candidate who led the study.

Currently rendering realistic computer generated images with smoke, fog, clouds or other 'participating media' (some of the light is actually absorbed or reflected by the material, thus the term 'participating') generally requires computational 'heavy lifting', lots of processor time, or both.

"Being able to accurately and efficiently simulate these kinds of scenes is very useful," said Jarosz.

With the boffins’ new approach, when smoke, clouds, fog or other participating media vary smoothly across a scene, the lighting is computed accurately at a small set of locations and then this information is used to interpolate the lighting at nearby points.

This approach, which is an extension of 'irradiance caching', cuts the number of computations along the line of sight that need to be done to render an image.

Copyright ©v3.co.uk


US boffins claim graphics processing breakthrough
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 720

Vote