期刊文献+

基于有界k-d树的最近点搜索算法 被引量:29

Algorithm for searching nearest-neighbor based on the bounded k-d tree
下载PDF
导出
摘要 提出了一种基于有界k-d树的最近点搜索算法.算法的原理是:由根节点中的包围盒确定树中数据的空间范围,并在搜索过程中不断划分包围盒来缩小搜索范围,同时递归地计算查询点到包围盒的距离.结合优先级队列,基于有界k-d树的最近点搜索算法拓展到搜索按距离远近排列的多个最近点.实测和仿真分析表明,本搜索算法的计算效率高于传统的搜索算法. An algorithm for searching nearest-neighbor is proposed based on the bounded k-d tree of which the spatial range of the data is restricted by the bounded box of the root node.The search area in the searching process is reduced by continually dividing bounded boxes.The distance from a query point to a bounded box is also computed recursively.Combined with a priority queue,the closest point query algorithm can be generalized to search multi-nearest-neighbors ordered by their distances to a query point.The experiments on both real and synthetic data sets show that the query algorithm based on the bounded k-d tree is computationally more efficient than some traditional algorithms.
作者 刘宇 熊有伦
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第7期73-76,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(5035020,50405032) 国家重点基础研究发展计划资助项目(2003CB716207)
关键词 逆向工程 最近点搜索 有界k-d树 包围盒 reverse engineering nearest-neighbor searching bounded k-d tree bounded box
  • 相关文献

参考文献7

  • 1Hameiri E, Shimshoni I. Estimation the principal curvatures and the Darboux frame from real 3-D range data[J].IEEE Transaction on Systems, Man, and Cybernetics, Part B, 2003, 33(4): 626-637.
  • 2Paul J B, Neil D M. A method for registration of 3D shapes[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1992, 14(2):239-256.
  • 3Bentley J L. Multidimensional binary search trees used for associative searching[J]. Communications of the ACM, 1975, 18(9): 509-517.
  • 4Friedman J H, Bentley J L, Finkel R A. An algorithm for finding best matches in logarithmic expected time[J]. ACM Transactions on Mathematical Software, 1977, 3(3): 209-226.
  • 5Sproull R F. Refinements to nearest-neighbor searching in k-dimensional trees[J]. Algorithmica, 1991, 6(4): 579-589.
  • 6Arya S, Mount D. M. Algorithms for fast vector quantization[C].// Proceedings of the IEEE Data Compression Conference. Snowbird: [s. n.].19931 381-390.
  • 7Vanco M, Brunnett G, Schreiber T. A hashing strategy for efficient k-nearest neighbors computation[C]//Proceedings of the International Conference on Computer Graphics. Canmore: [s. n.], 1999: 120- 128.

同被引文献188

引证文献29

二级引证文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部