Preferred Language
Articles
/
bsj-6652
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing considered tasks despite the limitation in the number of expert demonstrations, which clearly indicate the potential of our model.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Experimental Investigation of a Single Basin -Single Slope Solar Still Coupled with Evacuated Tube Solar Collector
...Show More Authors

This work is an experimental investigation for single basin-single slope solar still coupled with an evacuated tube solar collector. The work is carried out under the climatic conditions of Baghdad city (33.2456º North and East latitude, 44.3337º longitude) through certain days of the months of the year 2019 to study the impact of using evacuated tube solar collector on the daily productivity and efficiency under the outdoors climatic conditions. It was found that using the evacuated tube solar collector increase daily productivity from 2.175 kg/  to 2.95 kg/ for 9 hours (35.63 %) for clear days, also an enhancement about 10.97 % in daily efficiency.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Constructivist Learning Model on the Achievement and Reflective Thinking of the Fifth Grade Literary Preparatory Students in History Subject
...Show More Authors

The aim of the study is to reveal the effect of the constructivist learning Model on the achievement and reflective thinking of the fifth grade literary Preparatory students in History subject. A random sample was chosen which consisted of 64 students divided into experimental and control groups, each group consisted of 32 students. The experimental group was taught via the constructivist learning model, and the control group was taught via the traditional method. The experiment was lasted for Eight weeks, each week taught two lessons. The researcher adopted the experimental design with partial control. The two groups were equalized statistically. The researcher used two instruments, the achievement test and the reflective thinking test.

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Constructivist Learning Model on the Achievement and Reflective Thinking of the Fifth Grade Literary Preparatory Students in History Subject
...Show More Authors

The aim of the study is to reveal the effect of the constructivist learning Model on the achievement and reflective thinking of the fifth grade literary Preparatory students in History subject. A random sample was chosen which consisted of 64 students divided into experimental and control groups, each group consisted of 32 students. The experimental group was taught via the constructivist learning model, and the control group was taught via the traditional method. The experiment was lasted for Eight weeks, each week taught two lessons. The researcher adopted the experimental design with partial control. The two groups were equalized statistically. The researcher used two instruments, the achievement test and the reflective thinking test.

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2019
Journal Name
Journal Of The College Of Education For Women
The Effect use of the Internet in Academic Libraries A Case Study
...Show More Authors

The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.

View Publication Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Foavedur mass media for children and modifyin Their behaviour from point of their parents view: Foavedur mass media for children and modifyin Their behaviour from point of their parents view
...Show More Authors

Abstract:
The research aimed to know favoured mass media for children and
modifying their behaviour ,the child became aquires the information from
mass media that he exposure them without any guidance , where upon the
quidance proqrammes becomes real danger whereas qet out their civil

style and converting to deadly poisons,and because of little study for this
supject the two researchers opined to perform astudy to know the favoured
mass media to the children and what are the mass media that modify their
behavior according to ther parent points of view ,after propring the research
measurement and the suilable statical methods it has shown that there are
mass media affect in children behavior ,they are st

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ADSORPTION POTENTIAL FOR A MIXTURE OF CHEMICALLY AND THERMALLY TREATED CLAYS TO REMOVE ORANGE G DYE FROM WASTE-WATER: ADSORPTION POTENTIAL FOR A MIXTURE OF CHEMICALLY AND THERMALLY TREATED CLAYS TO REMOVE ORANGE G DYE FROM WASTE-WATER
...Show More Authors

This study examined the adsorption behavior of anionic dye (orange G) from aqueous solution onto the raw and activated a mixture of illite, kaolinite and chlorite clays from area of Zorbatiya (east of Iraq).The chemical treatment involved alkali and acid activation. The alkali activation obtained by treated the raw clay (RC) with 5M NaOH (ACSO) and the acid activation founded by treated it with 0.25M HCl (ACH) and 0.25M  (ACS). The thermal treatment carried out by calcination the produce activated clay at 750oC for acid activation and 105oC for alkali activation. Batch

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 20 2024
Journal Name
Journal Of Petroleum Research And Studies
Advanced Machine Learning application for Permeability Prediction for (M) Formation in an Iraqi Oil Field
...Show More Authors

Permeability estimation is a vital step in reservoir engineering due to its effect on reservoir's characterization, planning for perforations, and economic efficiency of the reservoirs. The core and well-logging data are the main sources of permeability measuring and calculating respectively. There are multiple methods to predict permeability such as classic, empirical, and geostatistical methods. In this research, two statistical approaches have been applied and compared for permeability prediction: Multiple Linear Regression and Random Forest, given the (M) reservoir interval in the (BH) Oil Field in the northern part of Iraq. The dataset was separated into two subsets: Training and Testing in order to cross-validate the accuracy

... Show More
View Publication Preview PDF
Crossref (2)
Crossref