Accurate cardiac motion estimation is a crucial step in assessing the kinematic and contractile properties of the cardiac chambers, thereby directly quantifying the regional cardiac function, which plays an important ...
详细信息
Query language execution is widely used in big data. The SQL standard is the major query language. Big data has a lot of SQL-like tools, for example: Spark-SQL, Hive, Drill, and Presto. This paper focused on Hive with...
详细信息
ISBN:
(纸本)9781665462730
Query language execution is widely used in big data. The SQL standard is the major query language. Big data has a lot of SQL-like tools, for example: Spark-SQL, Hive, Drill, and Presto. This paper focused on Hive with the Spark engine. To increase Hive’s query performance in a case study, NVMe Solid State Devices, we proposed the compressed Parquet file including SNAPPY, gzip, and Zstandard (zstd). Query workloads use TPC-H benchmark. Thus, this compression codec can reduce the main transaction table of TPC-H benchmark by 56%, and some queries have lower CPU usage than Text file. However, the Hive on Spark engine with our proposed compression codecs for Parquet files has lower CPU usage than Text file in some TPC-H queries. Thus, NVMe storage with the Parquet file compression codec is more efficient than text files for improving query performance on the Spark engine.
In recent years, due to the proliferation of information and communication technology, as well as AI technology, industrial control systems, which were once in a closed network environment, have also integrated relate...
详细信息
Based on WHO’s data, breast cancer is one of the most deadly diseases that has claimed many victims, especially women. This disease begins with the presence of an undetected and eventually turns into malignant (cance...
Based on WHO’s data, breast cancer is one of the most deadly diseases that has claimed many victims, especially women. This disease begins with the presence of an undetected and eventually turns into malignant (cancer). This happens due to ignorance of the importance of having a medical check-up even though in good health. Doctors and researchers can prevent the development of tumor cells through treatment that begins with radiological examinations to identify the possibility of a person being affected by this disease. One of the most frequently used techniques is Mammography. This technique can detect the presence of tumor cells using advanced technology and several methods in displaying the patient’s diagnostic results on low-dose X-rays in the form of mammogram images. The technology is inseparable from the methods used to identify the presence of tumor cells. In this study, we have proposed the CNN method based on the deep-CNN model to identify mammogram images in the detection of breast cancer cells with average evaluation results in terms of accuracy, precision, recall, specificity, and f-measure on mammogram image datasets of 99.52%, 99.72%, 99.31%, 99.72%, and 99.5%. These results showed that this method has a good performance in breast cancer detection.
While ChatGPT may help students to learn to program, it can be misused to do plagiarism, a breach of academic integrity. Students can ask ChatGPT to complete a programming task, generating a solution from other people...
详细信息
The purpose of this research was to design, produce and evaluate a stray child warning system. The device has been designed by using 2 ESP8266 boards to receive signals as specified. The system will notify the informa...
详细信息
The purpose of this research was to design, produce and evaluate a stray child warning system. The device has been designed by using 2 ESP8266 boards to receive signals as specified. The system will notify the information via Line Notify to let users know how far the board that acts as a Client is from the board that acts as an Access Point. Expressed in meters (m) in the notification line notify process. The test results of the system in terms of signal transmission between the Access Point and the Client can work well. Buzzer speaker and LED notification light according to the specified distance every time. Notifications to LINE Notify to mobile phones can be done every time.
In the era of the global village, frequent cross-border trade in goods has made container transportation a significant part in delivery of cargo. However, rollover accidents of container trucks often occur because of ...
详细信息
This paper considers the Target Set Selection (TSS) Problem in social networks, a fundamental problem in viral marketing. In the TSS problem, a graph and a threshold value for each vertex of the graph are given. We ne...
详细信息
Tourist destination reviews on Google Maps have become a valuable point of reference for visitors seeking enjoyable spots to visit. Additionally, users can gain insight into the reasons for writing reviews. Text class...
Tourist destination reviews on Google Maps have become a valuable point of reference for visitors seeking enjoyable spots to visit. Additionally, users can gain insight into the reasons for writing reviews. Text classification is used to determine the motivation behind these reviews. The aim of this study is to compare machine learning (ML) text classification techniques for identifying the intent behind sentiments expressed as complaints (0), suggestions (1), opinions (2), statements(3), and awards (4). The ML techniques assessed are Multinomial Naive Bayes (MNB), Support Vector Machine (SVM), and K-Nearest Neighbor (KNN). To achieve this, tourist destination review data sets, comprising 738 reviews, were collected using web scraping from the Google Maps website. Preprocessing stages, including case-folding, tokenisation, filtering and stemming, are executed prior to the data being prepped for feature extraction with TF-IDF. The employed classification models perform well with KNN achieving 1.00 accuracy on a 90:10 data split, and SVM obtaining 0.90 on the same data split. Although, the Multinomial Naive Bayes algorithm with 0.70 accuracy on a 90:10 data split is classified as fair. Comparison of methods was conducted by means of a Receiver Operating Characteristic (ROC) diagram. The testing accuracy for the SVM method was found to be 95%, MNB at 91%, and KNN at 84%.
Recently, Wang et al. proposed a computationally transferable authenticated key agreement protocol for smart healthcare by adopting the certificateless public-key cryptography. They claimed that their protocol could e...
Recently, Wang et al. proposed a computationally transferable authenticated key agreement protocol for smart healthcare by adopting the certificateless public-key cryptography. They claimed that their protocol could ensure privacy, resist various attacks, and possess superior properties. After analyzing their protocol, we find that it suffers from some flaws. Firstly, user privacy is not ensured as claimed. Secondly, some statements are inaccurate or missing. Thirdly, it cannot resist DoS attack. In this paper, the details of how these flaws threaten Wang et al.’s protocol are shown.
暂无评论