Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing considered tasks despite the limitation in the number of expert demonstrations, which clearly indicate the potential of our model.
In current generation of technology, a robust security system is required based on biometric trait such as human gait, which is a smooth biometric feature to understand humans via their taking walks pattern. In this paper, a person is recognized based on his gait's style that is captured from a video motion previously recorded with a digital camera. The video package is handled via more than one phase after splitting it into a successive image (called frames), which are passes through a preprocessing step earlier than classification procedure operation. The pre-processing steps encompass converting each image into a gray image, cast off all undesirable components and ridding it from noise, discover differen
... Show MoreThe purpose of this resesrh know (the effectiveness of cooperative lerarning implementation of floral material for calligraphy and ornamentation) To achieve the aim of the research scholar put the two zeros hypotheses: in light of the findings of the present research the researcher concluded a number of conclusions, including: -
1 - Sum strategy helps the learner to be positive in all the information and regulations, monitoring and evaluation during the learning process.
2 - This strategy helps the learner to use information and knowledge and their use in various educational positions, and to achieve better education to increase its ability to develop thinking skills and positive trends towards the article.
In light of this, the
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.
This research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students
... Show MoreKeywords provide the reader with a summary of the contents of the document and play a significant role in information retrieval systems, especially in search engine optimization and bibliographic databases. Furthermore keywords help to classify the document into the related topic. Keywords extraction included manual extracting depends on the content of the document or article and the judgment of its author. Manual extracting of keywords is costly, consumes effort and time, and error probability. In this research an automatic Arabic keywords extraction model based on deep learning algorithms is proposed. The model consists of three main steps: preprocessing, feature extraction and classification to classify the document
... Show MoreWisconsin Breast Cancer Dataset (WBCD) was employed to show the performance of the Adaptive Resonance Theory (ART), specifically the supervised ART-I Artificial Neural Network (ANN), to build a breast cancer diagnosis smart system. It was fed with different learning parameters and sets. The best result was achieved when the model was trained with 50% of the data and tested with the remaining 50%. Classification accuracy was compared to other artificial intelligence algorithms, which included fuzzy classifier, MLP-ANN, and SVM. We achieved the highest accuracy with such low learning/testing ratio.
The study aims to identify the level of cognitive beliefs, as well as to identify the level of self-organized learning strategies among intermediate school students. The study also aims to identify the differences in the level of self-organized learning strategies among intermediate school students in term of gender, branch (scientific, literary). In order to achieve the research objectives, the researcher designed a scale to measure the cognitive beliefs. As for the scale of self-organized learning strategies, the researcher adopted a scale of (Pintrich et al. 1991), which was translated by (Izzat Abdelhamid, 1999) , For self-organized learning strategies, the sample consisted of (400) students from the research population, whic
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed