Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for many applications dismissing the use of DL. Having sufficient data is the first step toward any successful and trustworthy DL application. This paper presents a holistic survey on state-of-the-art techniques to deal with training DL models to overcome three challenges including small, imbalanced datasets, and lack of generalization. This survey starts by listing the learning techniques. Next, the types of DL architectures are introduced. After that, state-of-the-art solutions to address the issue of lack of training data are listed, such as Transfer Learning (TL), Self-Supervised Learning (SSL), Generative Adversarial Networks (GANs), Model Architecture (MA), Physics-Informed Neural Network (PINN), and Deep Synthetic Minority Oversampling Technique (DeepSMOTE). Then, these solutions were followed by some related tips about data acquisition needed prior to training purposes, as well as recommendations for ensuring the trustworthiness of the training dataset. The survey ends with a list of applications that suffer from data scarcity, several alternatives are proposed in order to generate more data in each application including Electromagnetic Imaging (EMI), Civil Structural Health Monitoring, Medical imaging, Meteorology, Wireless Communications, Fluid Mechanics, Microelectromechanical system, and Cybersecurity. To the best of the authors’ knowledge, this is the first review that offers a comprehensive overview on strategies to tackle data scarcity in DL.
A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreThis research aims to test the ability of glass waste powder to adsorb cadmium from aqueous solutions. The glass wastes were collected from the Glass Manufacturing Factory in Ramadi. The effect of concentration and reaction time on sorption was tested through a series of laboratory experiments. Four Cd concentrations (20, 40, 60, and 80) as each concentration was tested ten times for 5, 10, 15, 20, 25, 30, 35, 40, 45, and 50 min. Solid (glass wastes) to liquid was 2g to 30ml was fixed in each experiment where the total volume of the solution was 30ml. The pH, total dissolved salts and electrical conductivity were measured at 30ºC. The equilibrium concentration was determined at 25 minutes, thereafter it was noted that the sorption
... Show MoreSixty samples of commercially available contact lens solutions were collected from students at the Pharmacy College/Baghdad University. The types of lenses used varied from medical to cosmetic. They were cultured to diagnose any microbial contamination within the solutions. Both used and unused solutions were subject for culturing. Thirty six (60%) used samples showed bacterial growth, fungal growth was absent. Pseudomonas aeruginosa accounts for the highest number of isolates (25%) followed by E. coli (21%), Staphylococcus epidermidis (6.6%), Pseudomonas fluorescence (5%) and Proteus mirabilis (1.6%) respectively. Only one (1) unused (sealed) sample showed growth of P. fluorescence.
... Show MoreChronic kidney disease is one of the leading public health problems that affect millions of women and men worldwide.
This study aims to examine the effect of deep breathing to reduce discomfort amongst patient undergoing haemodialysis (HD).
This randomised controlled experimental study was conducted consisted of 108 patients (54 in each group) who undergoing HD in hospitalised adults’ patients between November 2024 an
This study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts
... Show MoreSummary of the research in English:
the research seeks to define the provisions of voluntary charity and some of its contemporary applications, so the research is after the definition of charity and voluntary charity, define the provisions of the Most important thing charity, where the one who is given charity, in the introduction, he talked about the importance of charity in social solidarity,As for the first topic ,it deait with a statement and definition of charity in the Quran,sunnah and comparative juris prudence,whil the second topic was conducted with clarifying the provisions of the ratified, the ratified,while the third topic was concerned with clarifying the application of voluntary charity contemporary investing the Mo
... Show MoreObjective: In this work we design and evaluate a bidirectional pneumatic soft actuator made from silicone rubber (RTV2 C10) for the use in prosthetic hand. The actuator aimed to enhance flexibility and provide motion in two directions that mimic the actions of the human fingers. Materials and Methods: Two parallel air chambers are used in the actuator design where each chamber is divided into smaller internal cavities. These chambers are linked through a narrow connecting channel. The fabrication process relied on a molding technique based on 3D printed molds. Three separate mold components were designed and printed to allow accurate casting of silicone rubber into the desired shape. The completed actuators were then tested using an experim
... Show MoreTechnological advances have yielded new molecular biology-based methods for the diagnosis of infectious diseases. The newest and most powerful molecular diagnostic tests are available at regional and national reference laboratories, as well as at specialized centers that are certified to conduct metagenomic testing. Metagenomic assays utilize advances in DNA extraction technology, DNA sequence library construction, high throughput DNA sequencing and automated data analysis to identify millions of individual strands of DNA extracted from clinical samples. At present, metagenomic assays are only possible at a small number of special research, academic and commercial laboratories. Continued research in human and path
... Show MoreIn this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show More