A hardware based implementation of the Multipath method
نویسندگان
چکیده
This paper presents a depth buffer hardware implementation of the multipath algorithm for radiosity. The implementation makes use of bundles of parallel lines implemented with the OpenGL's depth buffer. The new algorithm is compared with the earlier painter algorithm implementation and we conclude that the proposed technique can result in half a magnitude of speed increase, and can render the indirect illumination in moderately complex scenes in a few seconds. keywords: Radiosity, depth buffer, OpenGL, Monte Carlo.
منابع مشابه
A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کاملModel Based Design approach for Implementation of PHEV Energy Management
Hardware implementation of the Plug-in hybrid electric vehicles (PHEVs) control strategy is an important stage of the development of the vehicle electric control unit (ECU). This paper introduces Model-Based Design (MBD) approach for implementation of PHEV energy management. Based on this approach, implementation of the control algorithm on an electronic hardware is performed using automatic co...
متن کاملFPGA Implementation of JPEG and JPEG2000-Based Dynamic Partial Reconfiguration on SOC for Remote Sensing Satellite On-Board Processing
This paper presents the design procedure and implementation results of a proposed hardware which performs different satellite Image compressions using FPGA Xilinx board. First, the method is described and then VHDL code is written and synthesized by ISE software of Xilinx Company. The results show that it is easy and useful to design, develop and implement the hardware image compressor using ne...
متن کاملHardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملMultipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002