Heterogeneous Computing and The Real-World Applications

Author(s):  
Viet Bui ◽  
Trung Pham ◽  
Huy Nguyen ◽  
Hoang Nhi Tran Gia ◽  
Tauheed Khan Mohd
Author(s):  
Michael Suk-Young Chwe

This chapter examines African American folktales that teach the importance of strategic thinking and argues that they informed the tactics of the 1960s civil rights movement. It analyzes a number of stories where characters who do not think strategically are mocked and punished by events while revered figures skillfully anticipate others' future actions. It starts with the tale of a new slave who asks his master why he does nothing while the slave has to work all the time, even as he demonstrates his own strategic understanding. It then considers the tale of Brer Rabbit and the Tar Baby, along with “Malitis,” which tackles the problem of how the slaves could keep the meat and eat it openly. These and other folktales teach how inferiors can exploit the cluelessness of status-obsessed superiors, a strategy that can come in handy. The chapter also discusses the real-world applications of these folktales' insights.


2017 ◽  
Vol 1 (2) ◽  
pp. 76-90 ◽  
Author(s):  
Jassim Happa ◽  
Michael Goldsmith

Purpose Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.


2019 ◽  
Vol 102 ◽  
pp. 299-304 ◽  
Author(s):  
Lily Riordan ◽  
Emily F. Smith ◽  
Stuart Mills ◽  
James Hudson ◽  
Sarah Stapley ◽  
...  

2017 ◽  
Vol 132 ◽  
pp. 278
Author(s):  
N. Bailey ◽  
Z. Krisnadi ◽  
R. Kaur ◽  
M.J. Phillips ◽  
S. Mulrennan ◽  
...  

1996 ◽  
Vol 89 (5) ◽  
pp. 390-393
Author(s):  
Joe D. Nichols

My objective in teaching an Advanced Placement calculus course is not only to help students pass the AP examination each spring but also to help them develop insights into advanced problem solving and real-world applications. I continually search for examples in my students' daily environment that can help them make a tangible connection from the classroom textbook to the real world. In this article, I discuss a general application of a basic concept with which all first-year-calculus students must contend: the problem of related rates.


2017 ◽  
Vol 76 (7) ◽  
pp. 1640-1651 ◽  
Author(s):  
Guangyuan Kan ◽  
Xiaoyan He ◽  
Liuqian Ding ◽  
Jiren Li ◽  
Ke Liang ◽  
...  

The shuffled complex evolution optimization developed at the University of Arizona (SCE-UA) has been successfully applied in various kinds of scientific and engineering optimization applications, such as hydrological model parameter calibration, for many years. The algorithm possesses good global optimality, convergence stability and robustness. However, benchmark and real-world applications reveal the poor computational efficiency of the SCE-UA. This research aims at the parallelization and acceleration of the SCE-UA method based on powerful heterogeneous computing technology. The parallel SCE-UA is implemented on Intel Xeon multi-core CPU (by using OpenMP and OpenCL) and NVIDIA Tesla many-core GPU (by using OpenCL, CUDA, and OpenACC). The serial and parallel SCE-UA were tested based on the Griewank benchmark function. Comparison results indicate the parallel SCE-UA significantly improves computational efficiency compared to the original serial version. The OpenCL implementation obtains the best overall acceleration results however, with the most complex source code. The parallel SCE-UA has bright prospects to be applied in real-world applications.


2021 ◽  
Vol 1 (161) ◽  
pp. 223-229
Author(s):  
Y. Rachenko ◽  
N. Dotsenko

The challenges of interviewing candidates for positions in cybersecure communications of aerospace industry. Data and experiments conducted as evidence that the improvements to the current model of selecting employees are needed in the real-world applications. A proposal of a newly developed method of selecting job candidates using information technology.


Sign in / Sign up

Export Citation Format

Share Document