Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for many applications dismissing the use of DL. Having sufficient data is the first step toward any successful and trustworthy DL application. This paper presents a holistic survey on state-of-the-art techniques to deal with training DL models to overcome three challenges including small, imbalanced datasets, and lack of generalization. This survey starts by listing the learning techniques. Next, the types of DL architectures are introduced. After that, state-of-the-art solutions to address the issue of lack of training data are listed, such as Transfer Learning (TL), Self-Supervised Learning (SSL), Generative Adversarial Networks (GANs), Model Architecture (MA), Physics-Informed Neural Network (PINN), and Deep Synthetic Minority Oversampling Technique (DeepSMOTE). Then, these solutions were followed by some related tips about data acquisition needed prior to training purposes, as well as recommendations for ensuring the trustworthiness of the training dataset. The survey ends with a list of applications that suffer from data scarcity, several alternatives are proposed in order to generate more data in each application including Electromagnetic Imaging (EMI), Civil Structural Health Monitoring, Medical imaging, Meteorology, Wireless Communications, Fluid Mechanics, Microelectromechanical system, and Cybersecurity. To the best of the authors’ knowledge, this is the first review that offers a comprehensive overview on strategies to tackle data scarcity in DL.
Many researchers tried to prevent or reduce moisture damage and its sensitivity to temperature to improving the performance of hot mix asphalt because it is decreasing the functional and structural life of fixable pavement due to the moisture damage had exposed to it.
The main objective of this study is to inspect the effect of (fly ash “3%, 6%, 12%”, hydrated lime”5%, 10%, 20%” and silica fumes”1%, 2%, 4%) referring to previous research by the net weight asphalt cement as a modified material on the moisture and temperature sensitivity of hot mix asphalt. This was done using asphalt from AL-Nasiria refinery with penetration grade 40-50, nominal maximum size (12.5) mm (surface course) of aggregate and on
... Show MoreThe cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
The research aims to prepare special exercises according to specific areas in the accuracy of performing the reverse low blow for squash players, and to identify the effect of special exercises according to specific areas in the accuracy of performing the reverse low blow for squash players. To achieve the goal, the researchers used the experimental method by designing the experimental and control groups with pre- and post-tests to suit it with the research problem. The research population was chosen intentionally, and they are junior squash players aged (13-15) years, who number (12 junior players), as the research sample constituted (100%). ) From the research community, they were chosen intentionally because there were no other p
... Show MoreWe studied the effect of certain environmental conditions for removing heavy metal elements from contaminated aqueous solutions (Cd, Cu, Pb, Fe, Zn, Ni, Cr) using the bacterium Bacillus subtilis to appoint the optimal conditions for removal ,The best optimum temperature range for two isolate was 30-35○C while the hydrogen number for the maximum mineral removal range was 6-7. The best primary mineral removal was 100 mg/L, while the maximum removal for all minerals was obtained after 6 hrs of Cu element time and the maximum removal efficiency was obtained after 24 hrs of Cu element. The results have proved that the best aeration for maximum removal was obtained at rotation speed of 150 rpm/minute. Inoculums of 5ml/100ml which contained 1
... Show MoreThis study was designed to compare the effect of two types of viral hepatitis A and E (HAV
and HEV) on liver functions in Iraqi individuals by the measurement of biochemical changes
associated with hepatitis.
The study performed on 58 HEV and 66 HAV infected patients compared with 28 healthy
subjects. The measured biochemical tests include total serum bilirubin, serum transminases (ALT
and AST) alkaline phosphatase (ALP) and gamma glutamyl transferase (GGT).
The study showed that adolescent and young adults (17-29) years, were mostly affected by
HEV while children (5-12) years were frequently affected by HAV. The severity of liver damage in
HEV patients was higher than HAV patients as a result of high serum transa
The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged
... Show More