Posts
Feb, 14
Nonlinear dynamic finite element analysis with GPU
Newmark family of algorithms have been utilized by many engineering applications for the solution of nonlinear dynamic analysis of various structural models. Dynamic and nonlinear nature of such problems and numerical stability requirements of the algorithms increase the need for computation power in order to achieve practical solution times. Thus, this study intends to decrease […]
Feb, 14
Efficient Exploitation of Heterogeneous Platforms for Images Features Extraction
Image processing algorithms present a necessary tool for various domains related to computer vision, such as video surveillance, medical imaging, pattern recognition, etc. However, these algorithms are hampered by their high consumption of both computing power and memory, which increase significantly when processing large sets of high resolution images. In this work, we propose a […]
Feb, 14
Partial Volume Effect Correction using Anisotropic Backward Diffusion
This paper proposes an algorithm for correcting Partial Volume Effect in Positron Emission Tomography (PET) images, using registered Computed Tomography (CT) data to enhance the blurred PET image. The algorithm is based on a forward-and-backward anisotropic heat equation solver, deblurring the PET image along CT gradients. A forward diffusion force is also utilized to stabilize […]
Feb, 14
Finite-size scaling method for the Berezinskii-Kosterlitz-Thouless transition
We present an improved finite-size scaling method for reliably extracting the critical temperature T_BKT of a Berezinskii-Kosterlitz-Thouless (BKT) transition. Using the known Weber-Minhagen multiplicative logarithmic correction to the spin stiffness rho_s at T_BKT and the Kosterlitz-Nelson relation between the transition temperature and the stiffness, rho_s(T_BKT)=2T_BKT/pi, we define a size dependent transition temperature T_ BKT(L_1,L_2) based […]
Feb, 14
Evaluation of Standardized Password-based Key Derivation against Parallel Processing Platforms
Passwords are still the preferred method of user authentication for a large number of applications. In order to derive cryptographic keys from (human-entered) passwords, key-derivation functions are used. One of the most well-known key-derivation functions is the standardized PBKDF2 (RFC2898), which is used in TrueCrypt, CCMP of WPA2, and many more. In this work, we […]
Feb, 14
Real-Time 3D Face Identification from a Depth Camera
We present a real-time 3D face identification system using a consumer level depth camera (PrimeSensor). Our system takes a noisy sequence as input and produces reliable identification. Instead of registering a probe to all instances in the database, we propose to only register it with several intermediate references, which considerably reduces processing, while preserving the […]
Feb, 13
ADBIS workshop on GPUs In Databases, GID 2013
High performance of modern Graphics Processing Units may be utilized not only for graphics related application but also for general computing. This computing power has been utilized in new variants of many algorithms from almost every computer science domain. Unfortunately, while other application domains strongly benefit from utilizing the GPUs, databases related applications seem not […]
Feb, 12
Exploiting Multiple Levels of Parallelism and Online Refinement of Unstructured Meshes in Atmospheric Model Application
Weather forecasts for long periods of time has emerged as increasingly important. The global concern with the consequences of climate changes has stimulated researches to determine the climate in coming decades. At the same time the steps needed to better defining the modeling and the simulation of climate/weather is far of the desired accuracy. Upscaling […]
Feb, 12
The Implement of Common Beam Forming Using GPU
In order to study how to use GPU in real-time signal processing system, we implement common beam forming arithmetic using it. In a GTX285 GPU, computing speed is 170-450 times faster than AD TigerSharc201. This shows good prospects of GPU.
Feb, 12
A Networked Dataflow Simulation Environment for Signal Processing and Data Mining Applications
In networked signal processing systems, dataflow graphs can be used to describe the processing on individual network nodes. However, to analyze the correctness and performance of these systems, designers must understand the interactions across these individual "node-level" dataflow graphs — as they communicate across the network – in addition to the characteristics of the individual […]
Feb, 12
A volume segmentation approach based on GrabCut
The representation of an image as a flow network has gained an increased interest in research for the 2D and 3D segmentation field. One of these segmentation approaches consists in applying a minimum cut algorithm to separate the image in background and foreground. The most remarkable algorithm to segment a 2D image using this approach […]
Feb, 12
Parallel Unsmoothed Aggregation Algebraic Multigrid Algorithms on GPUs
We design and implement a parallel algebraic multigrid method for isotropic graph Laplacian problems on multicore Graphical Processing Units (GPUs). The proposed AMG method is based on the aggregation framework. The setup phase of the algorithm uses a parallel maximal independent set algorithm in forming aggregates and the resulting coarse level hierarchy is then used […]