首页 > 最新文献

Recent Advances in Computer Science and Communications最新文献

英文 中文
Advancements in Data Augmentation and Transfer Learning: A Comprehensive Survey to Address Data Scarcity Challenges 数据扩充和迁移学习的进展:应对数据稀缺挑战的全面调查
Pub Date : 2024-01-10 DOI: 10.2174/0126662558286875231215054324
Salma Fayaz, Syed Zubair Ahmad Shah, Nusrat Mohi ud din, Naillah Gul, Assif Assad
Deep Learning (DL) models have demonstrated remarkable proficiency in image classification and recognition tasks, surpassing human capabilities. The observed enhancement in performance can be attributed to the utilization of extensive datasets. Nevertheless, DL models have huge data requirements. Widening the learning capability of such models from limited samples even today remains a challenge, given the intrinsic constraints of small da-tasets. The trifecta of challenges, encompassing limited labeled datasets, privacy, poor general-ization performance, and the costliness of annotations, further compounds the difficulty in achieving robust model performance. Overcoming the challenge of expanding the learning ca-pabilities of Deep Learning models with limited sample sizes remains a pressing concern even today. To address this critical issue, our study conducts a meticulous examination of estab-lished methodologies, such as Data Augmentation and Transfer Learning, which offer promis-ing solutions to data scarcity dilemmas. Data Augmentation, a powerful technique, amplifies the size of small datasets through a diverse array of strategies. These encompass geometric transformations, kernel filter manipulations, neural style transfer amalgamation, random eras-ing, Generative Adversarial Networks, augmentations in feature space, and adversarial and me-ta-learning training paradigms.Furthermore, Transfer Learning emerges as a crucial tool, leveraging pre-trained models to fa-cilitate knowledge transfer between models or enabling the retraining of models on analogous datasets. Through our comprehensive investigation, we provide profound insights into how the synergistic application of these two techniques can significantly enhance the performance of classification tasks, effectively magnifying scarce datasets. This augmentation in data availa-bility not only addresses the immediate challenges posed by limited datasets but also unlocks the full potential of working with Big Data in a new era of possibilities in DL applications.
深度学习(DL)模型在图像分类和识别任务中表现出了非凡的能力,超越了人类的能力。观察到的性能提升可归功于对大量数据集的利用。然而,DL 模型需要大量数据。鉴于小型数据集的内在限制,即使在今天,从有限的样本中扩大此类模型的学习能力仍然是一项挑战。有限的标注数据集、隐私、泛化性能差以及注释成本高等三重挑战进一步加剧了实现强大模型性能的难度。时至今日,如何克服挑战,在样本量有限的情况下扩大深度学习模型的学习能力,仍然是一个亟待解决的问题。为了解决这一关键问题,我们的研究对数据扩增和迁移学习等成熟方法进行了细致的研究,这些方法为数据稀缺的困境提供了有希望的解决方案。数据扩增是一种强大的技术,它通过一系列不同的策略来扩大小型数据集的规模。此外,迁移学习(Transfer Learning)也是一种重要的工具,它利用预先训练好的模型来促进模型之间的知识转移,或在类似的数据集上对模型进行再训练。通过全面的研究,我们深入了解了这两种技术的协同应用如何显著提高分类任务的性能,从而有效地扩大稀缺数据集。这种数据可用性的提升不仅解决了有限数据集带来的直接挑战,还释放了大数据在 DL 应用新时代的全部潜力。
{"title":"Advancements in Data Augmentation and Transfer Learning: A Comprehensive Survey to Address Data Scarcity Challenges","authors":"Salma Fayaz, Syed Zubair Ahmad Shah, Nusrat Mohi ud din, Naillah Gul, Assif Assad","doi":"10.2174/0126662558286875231215054324","DOIUrl":"https://doi.org/10.2174/0126662558286875231215054324","url":null,"abstract":"\u0000\u0000Deep Learning (DL) models have demonstrated remarkable proficiency in image classification and recognition tasks, surpassing human capabilities. The observed enhancement in performance can be attributed to the utilization of extensive datasets. Nevertheless, DL models have huge data requirements. Widening the learning capability of such models from limited samples even today remains a challenge, given the intrinsic constraints of small da-tasets. The trifecta of challenges, encompassing limited labeled datasets, privacy, poor general-ization performance, and the costliness of annotations, further compounds the difficulty in achieving robust model performance. Overcoming the challenge of expanding the learning ca-pabilities of Deep Learning models with limited sample sizes remains a pressing concern even today. To address this critical issue, our study conducts a meticulous examination of estab-lished methodologies, such as Data Augmentation and Transfer Learning, which offer promis-ing solutions to data scarcity dilemmas. Data Augmentation, a powerful technique, amplifies the size of small datasets through a diverse array of strategies. These encompass geometric transformations, kernel filter manipulations, neural style transfer amalgamation, random eras-ing, Generative Adversarial Networks, augmentations in feature space, and adversarial and me-ta-learning training paradigms.\u0000Furthermore, Transfer Learning emerges as a crucial tool, leveraging pre-trained models to fa-cilitate knowledge transfer between models or enabling the retraining of models on analogous datasets. Through our comprehensive investigation, we provide profound insights into how the synergistic application of these two techniques can significantly enhance the performance of classification tasks, effectively magnifying scarce datasets. This augmentation in data availa-bility not only addresses the immediate challenges posed by limited datasets but also unlocks the full potential of working with Big Data in a new era of possibilities in DL applications.\u0000","PeriodicalId":506582,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":"89 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139440441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Access Control Techniques on the Blockchain-Enabled SecureData Sharing Scheme in Edge Computing 边缘计算中区块链安全数据共享方案的访问控制技术研究
Pub Date : 2024-01-08 DOI: 10.2174/0126662558276547231213075235
Neha Mathur, Shweta Sinha, Rajesh Kumar Tyagi, Nishtha Jatana
The pervasive adoption of edge computing is reshaping real-time bigdata analysis, smart city management, intelligent transportation, and various other domains. Itsappeal lies in its distributed nature, decentralization, low latency, mobile support, and spatialawareness. However, this ubiquity exposes data to security threats, jeopardizing privacy andintegrity. Consequently, access control assumes paramount importance in securing data sharingwithin edge computing and blockchain technologies.This research addresses this critical issue by conducting a comprehensive study onaccess control techniques within the context of edge computing and blockchain for secure datasharing. Our methodology commences with an exhaustive review of relevant articles, aiming toidentify and expound upon gaps in existing research. Subsequently, we perform a meticulousanalysis of access control methods, mechanisms, and performance metrics, seeking to establisha holistic understanding of the landscape.The culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address theevolving challenges within edge computing and blockchain environments.In conclusion, this research venture paves the way for secure data sharing in edgecomputing and blockchain by offering a thorough examination of access control. The findingsfrom this study are anticipated to guide future developments in access control techniques andfacilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in thedynamic landscape of digital technology.
边缘计算的广泛应用正在重塑实时大数据分析、智能城市管理、智能交通和其他各个领域。边缘计算的吸引力在于其分布式特性、去中心化、低延迟、移动支持和空间感知。然而,这种无处不在的特性会使数据面临安全威胁,危及隐私和完整性。因此,访问控制在确保边缘计算和区块链技术中的数据共享安全方面具有极其重要的意义。本研究针对这一关键问题,对边缘计算和区块链背景下的访问控制技术进行了全面研究,以确保数据共享安全。我们的研究方法首先是对相关文章进行详尽的综述,旨在识别和阐述现有研究中存在的不足。随后,我们对访问控制方法、机制和性能指标进行了细致的分析,力求建立对这一领域的整体认识。我们从多种多样的访问控制方案中提炼出独到见解,揭示出它们的细微差别和有效性。我们的分析还延伸到了对性能指标的评估,这些指标对于确保稳健的访问控制至关重要。通过这项研究,我们还指出了传统访问控制方法中存在的关键研究空白,为采用创新方法应对边缘计算和区块链环境中不断变化的挑战奠定了基础。总之,这项研究通过对访问控制进行深入研究,为边缘计算和区块链中的安全数据共享铺平了道路。本研究的发现预计将指导访问控制技术的未来发展,并促进数字技术动态景观中安全、注重隐私和高效数据共享实践的发展。
{"title":"Study of Access Control Techniques on the Blockchain-Enabled Secure\u0000Data Sharing Scheme in Edge Computing","authors":"Neha Mathur, Shweta Sinha, Rajesh Kumar Tyagi, Nishtha Jatana","doi":"10.2174/0126662558276547231213075235","DOIUrl":"https://doi.org/10.2174/0126662558276547231213075235","url":null,"abstract":"\u0000\u0000The pervasive adoption of edge computing is reshaping real-time big\u0000data analysis, smart city management, intelligent transportation, and various other domains. Its\u0000appeal lies in its distributed nature, decentralization, low latency, mobile support, and spatial\u0000awareness. However, this ubiquity exposes data to security threats, jeopardizing privacy and\u0000integrity. Consequently, access control assumes paramount importance in securing data sharing\u0000within edge computing and blockchain technologies.\u0000\u0000\u0000\u0000This research addresses this critical issue by conducting a comprehensive study on\u0000access control techniques within the context of edge computing and blockchain for secure data\u0000sharing. Our methodology commences with an exhaustive review of relevant articles, aiming to\u0000identify and expound upon gaps in existing research. Subsequently, we perform a meticulous\u0000analysis of access control methods, mechanisms, and performance metrics, seeking to establish\u0000a holistic understanding of the landscape.\u0000\u0000\u0000\u0000The culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address the\u0000evolving challenges within edge computing and blockchain environments.\u0000\u0000\u0000\u0000In conclusion, this research venture paves the way for secure data sharing in edge\u0000computing and blockchain by offering a thorough examination of access control. The findings\u0000from this study are anticipated to guide future developments in access control techniques and\u0000facilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in the\u0000dynamic landscape of digital technology.\u0000","PeriodicalId":506582,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":"32 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139444860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Recent Advances in Computer Science and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1