Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
14,622 result(s) for "Parallel processing"
Sort by:
Parallel programming with co-arrays
This book describes the coarray parallel programming model that will be part of the next standard version of the Fortran language. It provides a practical guide for Fortran programmers who want to start writing parallel applications using coarrays as soon as the compilers become commercially available. The authors present the technical specification of the coarray model in enough detail for programmers to write standard-conforming code. They also offer a large number of examples of parallel algorithms written in the coarray model and include exercises with solutions. A supplementary website offers Fortran code samples for download-- Provided by publisher.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book. This important book cover subjects such as: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain technology and how it is crucial to the security industry Security for the Internet of Things Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc. Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management Security policies and mechanisms, various categories of attacks (e.g., denial-of-service),  global security architecture, along with distribution of security mechanisms Security issues in the healthcare sector with existing solutions and emerging threats.
You That Read Wrong Again! A Transposed-Word Effect in Grammaticality Judgments
We report a novel transposed-word effect in speeded grammaticality judgments made about five-word sequences. The critical ungrammatical test sequences were formed by transposing two adjacent words from either a grammatical base sequence (e.g., “The white cat was big” became “The white was cat big”) or an ungrammatical base sequence (e.g., “The white cat was slowly” became “The white was cat slowly”). These were intermixed with an equal number of correct sentences for the purpose of the grammaticality judgment task. In a laboratory experiment (N = 57) and an online experiment (N = 94), we found that ungrammatical decisions were harder to make when the ungrammatical sequence originated from a grammatically correct base sequence. This provides the first demonstration that the encoding of word order retains a certain amount of uncertainty. We further argue that the novel transposed-word effect reflects parallel processing of words during written sentence comprehension combined with top-down constraints from sentence-level structures.
Area V5-a microcosm of the visual brain
Area V5 of the visual brain, first identified anatomically in 1969 as a separate visual area, is critical for the perception of visual motion. As one of the most intensively studied parts of the visual brain, it has yielded many insights into how the visual brain operates. Among these are: the diversity of signals that determine the functional capacities of a visual area; the relationship between single cell activity in a specialized visual area and perception of, and preference for, attributes of a visual stimulus; the multiple asynchronous inputs into, and outputs from, an area as well as the multiple operations that it undertakes asynchronously; the relationship between activity at given, specialized, areas of the visual brain and conscious awareness; and the mechanisms used to \"bind\" signals from one area with those from another, with a different specialization, to give us our unitary perception of the visual world. Hence V5 is, in a sense, a microcosm of the visual world and its study gives important insights into how the whole visual brain is organized-anatomically, functionally and perceptually.
High-Speed Vision and its Applications Toward High-Speed Intelligent Systems
Currently, high-speed vision based on parallel processing exists, and its various applications as high-speed intelligent systems have been proposed and implemented. The basic goal of high-speed vision is to realize vision capabilities and systems that operate at speeds necessary for intelligent systems, in which intelligence operating at the speed inherently required by the application system is achieved. This paper described the vision chip and parallel image processing architectures, presented outlines of system architectures, image-processing algorithms, and related peripheral technologies; described the concepts required to configure high-speed intelligent systems, such as hierarchical parallel distributed architecture, parallel decomposition, orthogonal decomposition, dynamics matching, latency minimization, high-speed 3D shape measurement, active vision, tracking vision, dynamic compensation, and dynamic projection mapping; and discussed a wide range of application systems in a systematic manner.
A content analysis of Canadian influencer crisis messages on Instagram and the public’s response during COVID-19
Successful mitigation of emerging infectious disease requires that the public adopt recommended behaviours, which is directly influenced by effective crisis communication. Social media has become an important communication channel during COVID-19 where official actors, influencers, and the public are co-creating crisis messages. Our research examined COVID-19-related crisis messages across Canadian influencer accounts within news media, politicians, public health and government, science communicators, and brand influencer and celebrities, posted on Instagram between December 2019 and March 2021 for Health Belief Model and Extended Parallel Processing Model constructs and the corresponding public comment sentiment and engagement. Thirty-three influencer accounts resulted in a total of 2,642 Instagram posts collected, along with 461,436 comments, which showed overall low use of constructs in both captions and images. Further, most posts used no combinations ( n  = 0 or 1 construct per post) of constructs in captions and images and very infrequently used captions that combined threat (severity and susceptibility) with cues to action and efficacy. Brand influencers and celebrities, politicians, and science communicators had above average post engagement while public health and government and news media had lower. Finally, most influencers saw the largest proportion of neutral sentiment comments. Crisis messages must be designed to include combinations of constructs that increase message acceptance and influence risk perception and efficacy to increase the adoption of recommended and mandated behaviours.