Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
14,622
result(s) for
"Parallel processing"
Sort by:
Parallel programming with co-arrays
This book describes the coarray parallel programming model that will be part of the next standard version of the Fortran language. It provides a practical guide for Fortran programmers who want to start writing parallel applications using coarrays as soon as the compilers become commercially available. The authors present the technical specification of the coarray model in enough detail for programmers to write standard-conforming code. They also offer a large number of examples of parallel algorithms written in the coarray model and include exercises with solutions. A supplementary website offers Fortran code samples for download-- Provided by publisher.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
by
Mishra, Brojo Kishore
,
Khari, Manju
,
Kumar, Raghvendra
in
Computer networks
,
Computer networks -- Security measures
,
Computer security
2019
The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book. This important book cover subjects such as: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain technology and how it is crucial to the security industry Security for the Internet of Things Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc. Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms Security issues in the healthcare sector with existing solutions and emerging threats.
You That Read Wrong Again! A Transposed-Word Effect in Grammaticality Judgments
by
Grainger, Jonathan
,
Snell, Joshua
,
Mirault, Jonathan
in
Comprehension
,
Court decisions
,
Encoding
2018
We report a novel transposed-word effect in speeded grammaticality judgments made about five-word sequences. The critical ungrammatical test sequences were formed by transposing two adjacent words from either a grammatical base sequence (e.g., “The white cat was big” became “The white was cat big”) or an ungrammatical base sequence (e.g., “The white cat was slowly” became “The white was cat slowly”). These were intermixed with an equal number of correct sentences for the purpose of the grammaticality judgment task. In a laboratory experiment (N = 57) and an online experiment (N = 94), we found that ungrammatical decisions were harder to make when the ungrammatical sequence originated from a grammatically correct base sequence. This provides the first demonstration that the encoding of word order retains a certain amount of uncertainty. We further argue that the novel transposed-word effect reflects parallel processing of words during written sentence comprehension combined with top-down constraints from sentence-level structures.
Journal Article
Area V5-a microcosm of the visual brain
2015
Area V5 of the visual brain, first identified anatomically in 1969 as a separate visual area, is critical for the perception of visual motion. As one of the most intensively studied parts of the visual brain, it has yielded many insights into how the visual brain operates. Among these are: the diversity of signals that determine the functional capacities of a visual area; the relationship between single cell activity in a specialized visual area and perception of, and preference for, attributes of a visual stimulus; the multiple asynchronous inputs into, and outputs from, an area as well as the multiple operations that it undertakes asynchronously; the relationship between activity at given, specialized, areas of the visual brain and conscious awareness; and the mechanisms used to \"bind\" signals from one area with those from another, with a different specialization, to give us our unitary perception of the visual world. Hence V5 is, in a sense, a microcosm of the visual world and its study gives important insights into how the whole visual brain is organized-anatomically, functionally and perceptually.
Journal Article
High-Speed Vision and its Applications Toward High-Speed Intelligent Systems
2022
Currently, high-speed vision based on parallel processing exists, and its various applications as high-speed intelligent systems have been proposed and implemented. The basic goal of high-speed vision is to realize vision capabilities and systems that operate at speeds necessary for intelligent systems, in which intelligence operating at the speed inherently required by the application system is achieved. This paper described the vision chip and parallel image processing architectures, presented outlines of system architectures, image-processing algorithms, and related peripheral technologies; described the concepts required to configure high-speed intelligent systems, such as hierarchical parallel distributed architecture, parallel decomposition, orthogonal decomposition, dynamics matching, latency minimization, high-speed 3D shape measurement, active vision, tracking vision, dynamic compensation, and dynamic projection mapping; and discussed a wide range of application systems in a systematic manner.
Journal Article
A content analysis of Canadian influencer crisis messages on Instagram and the public’s response during COVID-19
by
McWhirter, Jennifer E.
,
Colangeli, Taylor
,
Ford, Caitlin
in
Analysis
,
Behavior
,
Beliefs, opinions and attitudes
2022
Successful mitigation of emerging infectious disease requires that the public adopt recommended behaviours, which is directly influenced by effective crisis communication. Social media has become an important communication channel during COVID-19 where official actors, influencers, and the public are co-creating crisis messages. Our research examined COVID-19-related crisis messages across Canadian influencer accounts within news media, politicians, public health and government, science communicators, and brand influencer and celebrities, posted on Instagram between December 2019 and March 2021 for Health Belief Model and Extended Parallel Processing Model constructs and the corresponding public comment sentiment and engagement. Thirty-three influencer accounts resulted in a total of 2,642 Instagram posts collected, along with 461,436 comments, which showed overall low use of constructs in both captions and images. Further, most posts used no combinations (
n
= 0 or 1 construct per post) of constructs in captions and images and very infrequently used captions that combined threat (severity and susceptibility) with cues to action and efficacy. Brand influencers and celebrities, politicians, and science communicators had above average post engagement while public health and government and news media had lower. Finally, most influencers saw the largest proportion of neutral sentiment comments. Crisis messages must be designed to include combinations of constructs that increase message acceptance and influence risk perception and efficacy to increase the adoption of recommended and mandated behaviours.
Journal Article