A Parallel Access Method for Spatial Data Using GPU
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 3
Abstract
Spatial access methods (SAMs) are used for information retrieval in large spatial databases. Many of the SAMs use sequential tree structures to search the result set of the spatial data which are contained in the given query region. In order to improve performance for the SAM, this paper proposes a parallel method using GPU. Since the searching process needs intensive computation but is independently examined on a lot of the MBRs of the spatial data, the spatial search function can be efficiently computed on GPU in a massive parallel way. The proposed method achieves high speed by efficiently utilizing the parallelism of the GPU throughout the whole process and by reducing the transfer latency between CPU and GPU with the memory structure which resides in GPU memory at all times and with the usage of bitwise operation for the result set. In order to measure the speedup achieved by the proposed parallel method, the execution time is compared with the sequential R*-tree that is loaded in the main memory and executed on CPU.
Authors and Affiliations
Byoung-Woo Oh
Superresolution: A Novel Application to Image Restoration
The subject of extracting particular high-resolution data from low-resolution images is one of the most important digital image processing applications in recent years, attracting much research. This paper shows how to i...
Robust Watermarking Scheme using Column DCT Wavelet Transform under Various Attacks
A novel watermarking scheme for color images has been proposed using column DCT wavelet transform. To improve the robustness of watermarking scheme, compressed watermark with tolerable fidelity is embedded into host imag...
A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transfor...
Opinion Mining Classification Using Key Word Summarization Based on Singular Value Decomposition
With the popularity of online shopping it is increasingly becoming important for manufacturers and service providers to ask customers to review their product and associated service. Typically the number of customer revie...
Signature Verification Using Neural Network
In this paper we present new improved off-line signature verification system using global and texture features of signatures. This scheme is based on the technique that applies preprocessing on the signature to get a bin...