Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing considered tasks despite the limitation in the number of expert demonstrations, which clearly indicate the potential of our model.
The aim of this study is know the five leadership practices according to the theory of network of leadership by Black and Mouton for the presidents of the Taxation General Board from their prospective, that is through answering the questionnaire questions. To achieving the objectives of this study, the researcher organized a questionnaire form as a main instrument for data collection. It includes (30) items distributed into five leadership practices according to the theory of network of leadership. Each one is subdivided into (6) questions.
The questionnaire was distributed to the presidents of the Taxation General Board of (14). The researcher used the SPSS program to analyses the answers. Through the answers, h
... Show MoreThe current study sheds light on the measurement and estimation of the radioactivity of radionuclides (238U, 226Ra, 232Th, and 40k) in natural waters of different regions of Nineveh Governorate in Iraq.15 samples were collected from different sources of natural waters, where gamma-ray spectroscopy was used using NaI)TI) sodium iodide detector to determine the concentration of radioactivity in the samples. According to the results, the radioactivity concentration in the tested water sample were ranged from 0.36 ± 0.04-1.57 ± 0.09with an average value of 0.69 ± 0.06 Bq/l for 238U, and 2.9 ± 0.02-0.88 ± 0.03 with an average value of 0.65 ± 0.03 Bq/l for 226Ra Bq/l
... Show MoreWater supply and distribution networks play an important role in our daily activities. They make a substantial contribution to public health by providing potable water for public consumption and non-potable applications such as firefighters and other purposes such as irrigation. This study used ArcMap 10.8 and WaterGEMS CONNECT Edition update 1 version to create a hydraulic network model to simulate the pipes’ network. Detailed network information, including pipe lengths, layouts, and diameters, was given by the Baghdad Water Department. The TUF-2000H Handheld digital ultrasonic flow meter has been used to measure the water flows in the network’s source nodes. In eight junctions,
Darcy-Weisbach (D-W) is a typical resistance equation in pressured flow; however, some academics and engineers prefer Hazen-Williams (H-W) for assessing water distribution networks. The main difference is that the (D-W) friction factor changes with the Reynolds number, while the (H-W) coefficient is a constant value for a certain material. This study uses WaterGEMS CONNECT Edition update 1 to find an empirical relation between the (H-W) and (H-W) equations for two 400 mm and 500 mm pipe systems. The hydraulic model was done, and two scenarios were applied by changing the (H-W) coefficient to show the difference in results of head loss. The results showed a strong relationship between both equations with correlation coefficients of 0.999,
... Show MoreThis paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreIn this paper, the memorization capability of a multilayer interpolative neural network is exploited to estimate a mobile position based on three angles of arrival. The neural network is trained with ideal angles-position patterns distributed uniformly throughout the region. This approach is compared with two other analytical methods, the average-position method which relies on finding the average position of the vertices of the uncertainty triangular region and the optimal position method which relies on finding the nearest ideal angles-position pattern to the measured angles. Simulation results based on estimations of the mobile position of particles moving along a nonlinear path show that the interpolative neural network approach outperf
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Clean water supply is one of the major factors contributing significantly to society’s socio-economic transformation by improving living standards, health, and increasing productivity. It is imperative to plan and construct appropriate water supply systems in modern society, which supply various segments of society with safe drinking water according to their requirements to ensure adequate and quality water supply. In the current study, here was an attempt to develop a model for geographic information systems to manage the assets of the water distribution networks in the Karrada region and to evaluate the network geometrically, and from the results of the engineering analysis of the