Abstract
To meet the requirement of fast loading large scale point could data file, proposed a new method based on memory pre-allocation and multiple-point concurrency writing technologies which depend on thread pool and memory mapping file mechanism under Windows platform. Test result shows that the new method based on memory pre-allocation and multiple-point concurrency writing technologies improve the performance of loading large-scale point-could data file notably with 220%~300% in loading efficiency, and along with the file size increment, the extra loading time caused by the method is the least compared with the other three methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adams, B., Wicke, M., Dutré, P., Gross, M., Pauly, M., Teschner, M.: Interactive 3D painting on point-sampled objects. In: Proceedings of the Eurographics Symposium on Point-based Graphics, pp. 57–66 (2004)
Kazhdan, M.: Reconstruction of solid models from oriented point sets. In: Symposium on Geometry Processing, Vienna, Austria, pp. 73–82 (2005)
Hu, W.-Z., Liu, N., Liu, R.-Y.: Quick-read Means for Large Scale Images Based on Storage Mapping File Technique. Computer Application Research 2, 111–112, 107 (2005)
Zhu, G.-S., Zhou, T.-R., Pang, H.-P.: A New Rapid-reading method for Point Cloud of Laser Scanner. Computer System Application 1, 102–104 (2007)
Yang, N.-X., Zhu, C.-Q., Nie, A.-L.: Memory-mapped Files and It’s Application on Fast Read/Write from Mass Data Files. Application Research of Computers 8, 187–188 (2004)
Li, X.-G., Wang, Z.-M., Huang, Z.-Q.: on memory mapping file technique to visualize large scene watershed model quickly. Application Research of Computers 26, 527–528 (2009)
Liu, S., Ye, Y.: Source: Point cloud segmentation using gradient vector flow snake. In: 2011 International Conference on Information Science and Technology, pp. 1114–1118 (2011)
Hou, W., Chan, T., Ding, M.: Denoising point cloud. Inverse Problems in Science and Engineering, 287–298 (2012)
Liu, S., Xie, X.: Research on algorithm of point cloud MapReduce registration. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 338–341 (2011)
Bouvier, D.J., Gordon, C., McDonald, M.: An approach for occlusion detection in construction site point cloud data. In: Proceedings of the Congress on Computing in Civil Engineering, pp. 234–241 (2011)
Li, F., Tang, R., Liu, C., Yu, H.: A method for object reconstruction based on point-cloud data via 3D scanning. In: Proceedings of the 2010 International Conference on Audio, Language and Image Processing, pp. 302–306 (2010)
Chen, J.-Y., Lai, H.-J., Lin, C.-H.: Point cloud modeling using algebraic template. International Journal of Innovative Computing, Information and Control, 1521–1532 (2011)
Levoy, M., Whitted, T.: The use of points as a display primitive. Technical report, Computer Science Department, University of North Carolina at Chapel Hill (January 1985)
Hoppe, H., DeRose, T., Duchamp, T., McDonald, J., Stuetzle, W.: Surface reconstruction from unorganized points. In: Catmull, E.E. (ed.) Computer Graphics, pp. 71–78 (1992)
Kazhdan, M., Bolitho, M., Hoppe, H.: Poisson surface reconstruction. In: Symposium on Geometry Processing, pp. 43–52 (2006)
Tian, H.-S., He, Y.-J., Cai, H.-M.: Survey of Point-based Computer Graphics. Journal of System Simulation, 42–45 (2006)
Qiu, H., Chen, L.-T.: Research and Development of Point-based Computer Graphics. Computer Science, 10–15 (2009)
Thomas, K., Tatiana, T., Tobias, S., Frank, Z.: GPU-accelerated 2D point cloud visualization using smooth splines for visual analytics applications. In: Proceedings - SCCG 2008: 24th Spring Conference on Computer Graphics, pp. 97–104 (2010)
Ardagna, D., Casolari, S., Colajanni, M., Panicucci, B.: Dual time-scale distributed capacity allocation and load redirect algorithms for cloud systems. Journal of Parallel and Distributed Computing, 796–808 (2012)
Ma, H., Zongyue, W.: Distributed data organization and parallel data retrieval methods for huge laser scanner point clouds. Computers & Geosciences, 193–201 (2011)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing, University of California, Berkeley, Tech. Rep. USB-EECS-2009-28 (February 2009)
104th United States Congress, Health Insurance Portability and Accountability Act of 1996 (HIPPA) (1996), http://aspe.hhs.gov/admnsimp/pl104191.htm
Harney, H., Colgrove, A., McDaniel, P.D.: Principles of policy in secure groups. In: Proc. of NDSS 2001 (2001)
McDaniel, P.D., Prakash, A.: Methods and limitations of security policy reconciliation. In: Proc. of SP 2002 (2002)
Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proc. of SP 2003 (2003)
Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Proc. of CCS 2005 (2005)
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Scalable secure file sharing on untrusted storage. In: Proc. of FAST 2003 (2003)
Goh, E., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: Proc. of NDSS 2003 (2003)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proc. of NDSS 2005 (2005)
di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proc. of VLDB 2007 (2007)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of CCS 2006 (2006)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)
Yu, S., Ren, K., Lou, W., Li, J.: Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 311–329. Springer, Heidelberg (2009)
Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Proc. of CCS 2005 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, J. (2013). Research on Fast Loading Large Scale Point Cloud Data File. In: Yang, Y., Ma, M., Liu, B. (eds) Information Computing and Applications. ICICA 2013. Communications in Computer and Information Science, vol 391. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53932-9_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-53932-9_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-53931-2
Online ISBN: 978-3-642-53932-9
eBook Packages: Computer ScienceComputer Science (R0)