{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T09:06:57Z","timestamp":1777626417545,"version":"3.51.4"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031393853","type":"print"},{"value":"9783031393860","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-39386-0_10","type":"book-chapter","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T15:03:00Z","timestamp":1690470180000},"page":"198-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Deep Neural Network Training Techniques for\u00a0Overfitting Avoidance"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4317-568X","authenticated-orcid":false,"given":"Bihi","family":"Sabiri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8502-4623","authenticated-orcid":false,"given":"Bouchra","family":"EL Asri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0147-8466","authenticated-orcid":false,"given":"Maryem","family":"Rhanoui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,28]]},"reference":[{"key":"10_CR1","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.R.: Improving neural networks by preventing co-adaptation of feature detectors, vol. 1 (2012)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Wu, J.-W., Chang, K.-Y., Fu, L.-C.: Adaptive under-sampling deep neural network for rapid and reliable image recovery in confocal laser scanning microscope measurements. IEEE Trans. Instrum. Meas. 71, 1\u20139 (2022). OCLC: 9359636331","DOI":"10.1109\/TIM.2021.3134324"},{"key":"10_CR3","unstructured":"Yingbin, B., Erkun, Y., Bo, H.: Understanding and Improving Early Stopping for Learning with Noisy Labels. OCLC: 1269561528 (2021)"},{"key":"10_CR4","unstructured":"Senen-Cerda, A., Sanders, J.: Almost sure convergence of dropout algorithms for neural networks. OCLC: 1144830913 (2020)"},{"key":"10_CR5","unstructured":"Liang, X., Wu, L., Li, J., Wang, Y., Meng, Q.: R-Drop: Regularized Dropout for Neural Networks. OCLC: 1269560920 (2021)"},{"key":"10_CR6","unstructured":"Shaeke, S., Xiuwen, L.: Overfitting Mechanism and Avoidance in Deep Neural Networks. OCLC: 1106327112 (2019)"},{"key":"10_CR7","unstructured":"Wei, C., Kakade, S., Ma, T.: The Implicit and Explicit Regularization Effects of Dropout. OCLC: 1228392785 (2020)"},{"key":"10_CR8","unstructured":"Arora, R., Bartlett, P., Mianjy, P., Srebro, N.: Dropout: Explicit Forms and Capacity Control. OCLC: 1228394951 (2020)"},{"key":"10_CR9","unstructured":"Cavazza, J., Morerio, P., Haeffele, B., Lane, C., Murino, V., Vidal, R.: Dropout as a low-rank regularizer for matrix factorization. In: Proceedings of the Twenty-First International Conference on Artificial Intelligence and Statistics, vol. 84, pp. 435\u2013444 (2018). https:\/\/proceedings.mlr.press\/v84\/cavazza18a.html"},{"key":"10_CR10","unstructured":"IBM_Cloud_Education. What is Overfitting? (2021)"},{"key":"10_CR11","unstructured":"Brownlee, J.: How to Avoid Overfitting in Deep Learning Neural Networks (2018)"},{"key":"10_CR12","unstructured":"Maren, M., Lukas, B., Christoph, L., Philipp, H.: Early Stopping without a Validation Set. OCLC: 1106261430 (2017)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Moolayil, J.: Learn Keras for deep neural networks: a fast-track approach to modern deep learning with Python. OCLC: 1079007529 (2019)","DOI":"10.1007\/978-1-4842-4240-7"},{"issue":"6","key":"10_CR14","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Hinton, G.E., Sutskever, I.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Hinton, G., Bengio, Y.: Deep learning. Nature 521(7553), 436\u2013444 (2015). OCLC: 5831400088","DOI":"10.1038\/nature14539"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Bengio, Y., Lamblin, P., Popovici, D., Larochelle, H.: Greedy layer-wise training of deep networks. In: Advances in Neural Information Processing Systems, vol. 19, pp. 153\u2013160. Morgan Kaufmann Publishers, San Mateo (2007). OCLC: 181070563","DOI":"10.7551\/mitpress\/7503.003.0024"},{"key":"10_CR17","unstructured":"Ng, A.Y.: Feature selection, L1 vs. L2 regularization, and rotational invariance. OCLC: 8876667046 (2004)"},{"key":"10_CR18","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1929\u20131958 (2014). OCLC: 5606582392"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Sabiri, B., El Asri, B., Rhanoui, M.: Mechanism of overfitting avoidance techniques for training deep neural networks. In: Proceedings of the 24th International Conference on Enterprise Information Systems, pp. 418\u2013427 (2022). https:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0011114900003179","DOI":"10.5220\/0011114900003179"},{"key":"10_CR20","unstructured":"Caruana, R., Lawrence, S., Giles, L.: Overfitting in neural nets. In: 14th Annual Neural Information Processing Systems Conference (2001). OCLC: 5574566588"},{"key":"10_CR21","unstructured":"Brownlee, J.: Develop deep learning models on Theano and TensorFlow using Keras. Machine Learning Mastery, Melbourne, Australia, vol.\u00a01 (2017)"},{"key":"10_CR22","unstructured":"Larxel. Early Diabetes Classification (2021)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Cerisara, C., Caillon, P., Le Berre, G.: Unsupervised post-tuning of deep neural networks. In: IJCNN, Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN), Virtual Event, United States (2021)","DOI":"10.1109\/IJCNN52387.2021.9534198"},{"key":"10_CR24","unstructured":"Etzold, D.: MNIST\u2014Dataset of Handwritten Digits (2022)"},{"key":"10_CR25","unstructured":"Sarvazyan, M.A.: Kaggle: Your Home for Data Science (2022)"},{"key":"10_CR26","unstructured":"Artificial intelligence in cancer: diagnostic to tailored treatment. OCLC: 1145585080"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/9973277","volume":"2021","author":"MS Iraji","year":"2021","unstructured":"Iraji, M.S., Feizi-Derakhshi, M.-R., Tanha, J.: COVID-19 detection using deep convolutional neural networks. Complexity 2021, 1\u201310 (2021)","journal-title":"Complexity"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Lee, G., Park, H., Ryu, S., Lee, H.: Acceleration of DNN training regularization: dropout accelerator. In: 2020 International Conference on Electronics, Information, and Communication (ICEIC), pp. 1\u20132 (2020). https:\/\/ieeexplore.ieee.org\/document\/9051194\/","DOI":"10.1109\/ICEIC49074.2020.9051194"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Koivu, A., Kakko, J., M\u00e4ntyniemi, S., Sairanen, M.: Quality of randomness and node dropout regularization for fitting neural networks. Expert Syst. Appl. 207, 117938 (2022). https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417422011769","DOI":"10.1016\/j.eswa.2022.117938"},{"issue":"4","key":"10_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-019-8390-z","volume":"14","author":"C Li","year":"2020","unstructured":"Li, C., Mao, Y., Zhang, R., Huai, J.: A revisit to MacKay algorithm and its application to deep network compression. Front. Comput. Sci. 14(4), 1\u201316 (2020). https:\/\/doi.org\/10.1007\/s11704-019-8390-z","journal-title":"Front. Comput. Sci."},{"key":"10_CR31","unstructured":"Wang, Z., Fu, Y., Huang, T.S.: Deep learning through sparse and low-rank modeling. OCLC: 1097183504 (2019)"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Sabiri, B., El Asri, B., Rhanoui, M.: Impact of hyperparameters on the generative adversarial networks behavior. In: Proceedings of the 24th International Conference on Enterprise Information Systems - Volume 1: ICEIS, pp. 428\u2013438 (2022)","DOI":"10.5220\/0011115100003179"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-39386-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T15:15:57Z","timestamp":1690470957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-39386-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031393853","9783031393860"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-39386-0_10","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Enterprise Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iceis.scitevents.org\/?y=2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"197","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}