Skip to main content

Research on Fast Loading Large Scale Point Cloud Data File

  • Conference paper
  • 1567 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 391))

Abstract

To meet the requirement of fast loading large scale point could data file, proposed a new method based on memory pre-allocation and multiple-point concurrency writing technologies which depend on thread pool and memory mapping file mechanism under Windows platform. Test result shows that the new method based on memory pre-allocation and multiple-point concurrency writing technologies improve the performance of loading large-scale point-could data file notably with 220%~300% in loading efficiency, and along with the file size increment, the extra loading time caused by the method is the least compared with the other three methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, B., Wicke, M., Dutré, P., Gross, M., Pauly, M., Teschner, M.: Interactive 3D painting on point-sampled objects. In: Proceedings of the Eurographics Symposium on Point-based Graphics, pp. 57–66 (2004)

    Google Scholar 

  2. Kazhdan, M.: Reconstruction of solid models from oriented point sets. In: Symposium on Geometry Processing, Vienna, Austria, pp. 73–82 (2005)

    Google Scholar 

  3. Hu, W.-Z., Liu, N., Liu, R.-Y.: Quick-read Means for Large Scale Images Based on Storage Mapping File Technique. Computer Application Research 2, 111–112, 107 (2005)

    Google Scholar 

  4. Zhu, G.-S., Zhou, T.-R., Pang, H.-P.: A New Rapid-reading method for Point Cloud of Laser Scanner. Computer System Application 1, 102–104 (2007)

    Google Scholar 

  5. Yang, N.-X., Zhu, C.-Q., Nie, A.-L.: Memory-mapped Files and It’s Application on Fast Read/Write from Mass Data Files. Application Research of Computers 8, 187–188 (2004)

    Google Scholar 

  6. Li, X.-G., Wang, Z.-M., Huang, Z.-Q.: on memory mapping file technique to visualize large scene watershed model quickly. Application Research of Computers 26, 527–528 (2009)

    Google Scholar 

  7. Liu, S., Ye, Y.: Source: Point cloud segmentation using gradient vector flow snake. In: 2011 International Conference on Information Science and Technology, pp. 1114–1118 (2011)

    Google Scholar 

  8. Hou, W., Chan, T., Ding, M.: Denoising point cloud. Inverse Problems in Science and Engineering, 287–298 (2012)

    Google Scholar 

  9. Liu, S., Xie, X.: Research on algorithm of point cloud MapReduce registration. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 338–341 (2011)

    Google Scholar 

  10. Bouvier, D.J., Gordon, C., McDonald, M.: An approach for occlusion detection in construction site point cloud data. In: Proceedings of the Congress on Computing in Civil Engineering, pp. 234–241 (2011)

    Google Scholar 

  11. Li, F., Tang, R., Liu, C., Yu, H.: A method for object reconstruction based on point-cloud data via 3D scanning. In: Proceedings of the 2010 International Conference on Audio, Language and Image Processing, pp. 302–306 (2010)

    Google Scholar 

  12. Chen, J.-Y., Lai, H.-J., Lin, C.-H.: Point cloud modeling using algebraic template. International Journal of Innovative Computing, Information and Control, 1521–1532 (2011)

    Google Scholar 

  13. Levoy, M., Whitted, T.: The use of points as a display primitive. Technical report, Computer Science Department, University of North Carolina at Chapel Hill (January 1985)

    Google Scholar 

  14. Hoppe, H., DeRose, T., Duchamp, T., McDonald, J., Stuetzle, W.: Surface reconstruction from unorganized points. In: Catmull, E.E. (ed.) Computer Graphics, pp. 71–78 (1992)

    Google Scholar 

  15. Kazhdan, M., Bolitho, M., Hoppe, H.: Poisson surface reconstruction. In: Symposium on Geometry Processing, pp. 43–52 (2006)

    Google Scholar 

  16. Tian, H.-S., He, Y.-J., Cai, H.-M.: Survey of Point-based Computer Graphics. Journal of System Simulation, 42–45 (2006)

    Google Scholar 

  17. Qiu, H., Chen, L.-T.: Research and Development of Point-based Computer Graphics. Computer Science, 10–15 (2009)

    Google Scholar 

  18. Thomas, K., Tatiana, T., Tobias, S., Frank, Z.: GPU-accelerated 2D point cloud visualization using smooth splines for visual analytics applications. In: Proceedings - SCCG 2008: 24th Spring Conference on Computer Graphics, pp. 97–104 (2010)

    Google Scholar 

  19. Ardagna, D., Casolari, S., Colajanni, M., Panicucci, B.: Dual time-scale distributed capacity allocation and load redirect algorithms for cloud systems. Journal of Parallel and Distributed Computing, 796–808 (2012)

    Google Scholar 

  20. Ma, H., Zongyue, W.: Distributed data organization and parallel data retrieval methods for huge laser scanner point clouds. Computers & Geosciences, 193–201 (2011)

    Google Scholar 

  21. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing, University of California, Berkeley, Tech. Rep. USB-EECS-2009-28 (February 2009)

    Google Scholar 

  22. 104th United States Congress, Health Insurance Portability and Accountability Act of 1996 (HIPPA) (1996), http://aspe.hhs.gov/admnsimp/pl104191.htm

  23. Harney, H., Colgrove, A., McDaniel, P.D.: Principles of policy in secure groups. In: Proc. of NDSS 2001 (2001)

    Google Scholar 

  24. McDaniel, P.D., Prakash, A.: Methods and limitations of security policy reconciliation. In: Proc. of SP 2002 (2002)

    Google Scholar 

  25. Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proc. of SP 2003 (2003)

    Google Scholar 

  26. Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Proc. of CCS 2005 (2005)

    Google Scholar 

  27. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Scalable secure file sharing on untrusted storage. In: Proc. of FAST 2003 (2003)

    Google Scholar 

  28. Goh, E., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: Proc. of NDSS 2003 (2003)

    Google Scholar 

  29. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proc. of NDSS 2005 (2005)

    Google Scholar 

  30. di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proc. of VLDB 2007 (2007)

    Google Scholar 

  31. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of CCS 2006 (2006)

    Google Scholar 

  32. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  33. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  34. Yu, S., Ren, K., Lou, W., Li, J.: Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 311–329. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  35. Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  36. Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Proc. of CCS 2005 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, J. (2013). Research on Fast Loading Large Scale Point Cloud Data File. In: Yang, Y., Ma, M., Liu, B. (eds) Information Computing and Applications. ICICA 2013. Communications in Computer and Information Science, vol 391. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53932-9_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-53932-9_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-53931-2

  • Online ISBN: 978-3-642-53932-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics