Preferred Language
Articles
/
bsj-6652
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing considered tasks despite the limitation in the number of expert demonstrations, which clearly indicate the potential of our model.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
An improved neurogenetic model for recognition of 3D kinetic data of human extracted from the Vicon Robot system
...Show More Authors

These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that.  The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
The effect of readings on the multiplicity of explanatory significance of a single Qur’anic word, a study through the interpretation of Ibn Attia al-Andalusi
...Show More Authors

The study aimed to clarify the meanings learned and inferred from reading books، letters and messages in Surat Al-Qur’an. The inductive method، the analytical method، and the deductive method، One of the most prominent results of the research: that the multiplicity of Qur’anic readings produces a variety and expansion in the meaning that has a clear impact on the interpretation by clarifying the meaning of the verse.

View Publication Preview PDF
Publication Date
Tue Jan 07 2020
Journal Name
Xi,an University Of Architecture &technology
The Effect of Jigsaw strategy on Academic Achievement and Engagement in Learning among the 3rd male graders students in Chemistry
...Show More Authors

The research aims to identify the effect of jigsaw strategy in learning achievement and engaging for the third grade intermediate students in chemistry. The research sample consisted of (61) students distributed in two experimental and control groups. The research tools consisted in the achievement test and the measure of engaging learning. The results showed that there are statistically significant differences at the level of (α = 0.05) between the experimental group and the control group in both the achievement test and the measure of learning involvement for the benefit of the experimental group. In this light, the researcher recommended the use of jigsaw strategy for teaching the subject matter. Lamia because of its impact in raising

... Show More
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Trends In Network And Communications
Header Compression Scheme over Hybrid Satellite-WiMAX Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Optimized Artificial Neural network models to time series
...Show More Authors

        Artificial Neural networks (ANN) are powerful and effective tools in time-series applications. The first aim of this paper is to diagnose better and more efficient ANN models (Back Propagation, Radial Basis Function Neural networks (RBF), and Recurrent neural networks) in solving the linear and nonlinear time-series behavior. The second aim is dealing with finding accurate estimators as the convergence sometimes is stack in the local minima. It is one of the problems that can bias the test of the robustness of the ANN in time series forecasting. To determine the best or the optimal ANN models, forecast Skill (SS) employed to measure the efficiency of the performance of ANN models. The mean square error and

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
International Scientific Congress Of Pure, Applied And Technological Sciences (minar Congress)
Evaluation Of Electromagnetic Pollution Of Cellular Mobile Network
...Show More Authors

Wireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in

... Show More
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 31 2025
Journal Name
The Iraqi Geological Journal
Evaluation of Machine Learning Techniques for Missing Well Log Data in Buzurgan Oil Field: A Case Study
...Show More Authors

The investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutti

... Show More
View Publication Preview PDF
Crossref