Preferred Language
Articles
/
7hb2-okBVTCNdQwCe46x
A survey on deep learning tools dealing with data scarcity: definitions, challenges, solutions, tips, and applications
...Show More Authors
Abstract<p>Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for many applications dismissing the use of DL. Having sufficient data is the first step toward any successful and trustworthy DL application. This paper presents a holistic survey on state-of-the-art techniques to deal with training DL models to overcome three challenges including small, imbalanced datasets, and lack of generalization. This survey starts by listing the learning techniques. Next, the types of DL architectures are introduced. After that, state-of-the-art solutions to address the issue of lack of training data are listed, such as Transfer Learning (TL), Self-Supervised Learning (SSL), Generative Adversarial Networks (GANs), Model Architecture (MA), Physics-Informed Neural Network (PINN), and Deep Synthetic Minority Oversampling Technique (DeepSMOTE). Then, these solutions were followed by some related tips about data acquisition needed prior to training purposes, as well as recommendations for ensuring the trustworthiness of the training dataset. The survey ends with a list of applications that suffer from data scarcity, several alternatives are proposed in order to generate more data in each application including Electromagnetic Imaging (EMI), Civil Structural Health Monitoring, Medical imaging, Meteorology, Wireless Communications, Fluid Mechanics, Microelectromechanical system, and Cybersecurity. To the best of the authors’ knowledge, this is the first review that offers a comprehensive overview on strategies to tackle data scarcity in DL.</p>
Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Opcion- Universidad Del Zulia
Sample for the inner control on the quality in accordance with standard
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Mar 30 2024
Journal Name
Iraqi Journal Of Science
On Certain Subclass of Meromorphic Multivalent Functions Associated with Fractional Calculus Operator
...Show More Authors

     In this paper, the class of meromorphic multivalent functions of the form by using fractional differ-integral operators is introduced. We get Coefficients estimates, radii of convexity and star likeness. Also closure theorems and distortion theorem for the class ,  is calculaed.

View Publication
Scopus Crossref
Publication Date
Thu Mar 01 2018
Journal Name
2018 Tenth International Conference On Advanced Computational Intelligence (icaci)
On low-level control strategies of lower extremity exoskeletons with power augmentation
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Iraqi Journal Of Biotechnology
BIOCHEMICAL STUDY ON SUPEROXIDE DISMUTASE ENZYME IN PATIENTS WITH DIFFERENT BRAIN TUMORS
...Show More Authors

The aim of the current study is to in evaluate the role of SOD activity in the previously reported oxidative stress in our laboratory(1), in the patients with different brain tumors. SOD activity was assayed according to riboflavin/NBT method and its specific activity was calculated in patients with benign and malignant brain tumors and control. Moreover the specific activity was compared in these samples according to gender and the occurrence of disease.Non significant elevation (P > 0.05) in SOD specific activity was observed in tissue of malignant tumors in comparison to that of in benign brain tumors. While a highly significant decrease (P < 0.001) of the specific activity was found in sera of malignant patients group in comparison to t

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Nanostructures
Effect of Selenium Nanoparticles with Cress Extract on Polycystic Ovary Syndrome (PCOS)
...Show More Authors

Selenium is naturally present in the human body, animals, and plants, and is one of the important elements in their growth and maintenance. Recently, the nanoform of selenium has attracted attention due to its low toxicity and a high degree of adsorption compared to its organic and inorganic forms. The current study aimed to examine the effect of Cress leaves (Lepidium sativum L.) extract in combination with selenium nanoparticles in alleviating polycystic ovary syndrome in letrozole-induced PCOS in adult female rats. Nonthermal or cold plasma was used in the synthesis of selenium nanoparticles. Subsequently, the produced nanoparticles were identified, the 30 rats were divided into 6 equal groups, the first group was healthy (negative contr

... Show More
View Publication Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Oct 01 2025
Journal Name
Civil Engineering Journal
Study on Shear Behavior of Reinforced Concrete Beams Confined with Reinforcing Meshes
...Show More Authors

This study reveals the results of a numerical simulation performed using the ABAQUS/CAE finite element program. The study aimed to provide a simulation model that can forecast the shear behavior of reinforced concrete beams confined with reinforcing meshes. Limited numerical studies have been conducted using geogrid or FRP mesh as shear reinforcement, with limited representation accuracy and limited material quality. The results were compared to published experimental findings in the literature. The finding of the finite element model and the experimental results were highly comparable; consequently, the model was determined to be valid. Following this, the domain of numerical analyses was broadened to include the investigation of m

... Show More
View Publication
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Journal Of Legal Sciences
Sale Based on an Open Price – A Comparative Study
...Show More Authors

The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the

... Show More
View Publication
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
A Brief view on the pediatric COVID- 19 pandemic
...Show More Authors

The world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.

View Publication Preview PDF
Crossref