Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing considered tasks despite the limitation in the number of expert demonstrations, which clearly indicate the potential of our model.
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Home Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad
... Show MoreThe research aims to identify the relationship between employing future skills during teaching from the viewpoint of students of Islamic studies at the Northern Border University, as well as their attitudes towards future professions. The researcher employed the correlational descriptive approach. The tools were a questionnaire for employing future skills, and a scale for the attitude towards the future profession. The two research tools were applied to a random sample of (242) male and female students from the department of Islamic Studies, College of Education and Arts. The findings showed that the total level of employing future skills and their three axes during teaching was average. It was also found that the attitude towards future
... Show MoreAO Dr. Ali Jihad, Journal of Physical Education, 2021
The dynamics of a single condensing two-phase bubble of two different dispersed-continuous systems were studied. The systems were, CCl4 - water and CCl4 - 100% glycerol. Cinephotography was used to determine the change in height, diameter and time. These results were used to determine the experimental rise velocity of the bubble, which was compared with a theoretical one based on some equations used. It was found that the velocity of the first system remained almost constant, while it decreased gradually for the second system.
Bending effects on the transmission of optical signal are investigated on a single mode
optical fiber (SMOF) of 10 m length, core radius of 5 μm and optical refractive index difference
0.003. The bending radii (R) were between 0.08 and 0.0015 m. A great decrease in the amplitude is
shown for radii below 0.01 m. Sudden break down occurs for radii less than 0.0015 m. Birefringence
(B) is difficult to measure for long fibers. Meanwhile, B was found by comparing with calibrated
fiber of the same properties but of length of 0.075 m. The results show an increase in propagation
constant (Δβ) and the decrease in beat length (Lb), and show that bending decreases the critical radius
of curvature (Rc) related to B. The chang
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreThis paper aims to identify the approaches used in assessment the credit applications by Iraqi banks, as well as which approach is most used. It also attempted to link these approaches with reduction of credit default and banks’ efficiency particularly for the Gulf Commercial Bank. The paper found that the Gulf Bank widely relies on the method of Judgment Approach for assessment the credit applications in order to select the best of them with low risk of default. In addition, the paper found that the method of Judgment Approach was very important for the Gulf Bank and it driven in reduction the ratio of credit default as percentage of total credit. However, it is important to say that the adoption of statistical approaches for
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show More