Prediction of daily rainfall is important for flood forecasting, reservoir operation, and many other hydrological applications. The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. A new model is developed in this study for prediction of daily rainfall for different lead times based on sea level pressure (SLP) which is physically related to rainfall on land and thus able to predict unseen rainfall events. Daily rainfall of east coast of Peninsular Malaysia (PM) was predicted using SLP data over the climate domain. Five advanced AI algorithms such as extreme learning machine (ELM), Bayesian regularized neural networks (BRNNs), Bayesian additive regression trees (BART), extreme gradient boosting (xgBoost), and hybrid neural fuzzy inference system (HNFIS) were used considering the complex relationship of rainfall with sea level pressure. Principle components of SLP domain correlated with daily rainfall were used as predictors. The results revealed that the efficacy of AI models is predicting daily rainfall one day before. The relative performance of the models revealed the higher performance of BRNN with normalized root mean square error (NRMSE) of 0.678 compared with HNFIS (NRMSE = 0.708), BART (NRMSE = 0.784), xgBoost (NRMSE = 0.803), and ELM (NRMSE = 0.915). Visual inspection of predicted rainfall during model validation using density-scatter plot and other novel ways of visual comparison revealed the ability of BRNN to predict daily rainfall one day before reliably.
This paper is summarized with one of the applications of adsorption behavior; A UV-Vis method has been applied to survey the isotherm of adsorption. Results for experimental showed the applicability of Langmuir equation. The effect of temperature on the adsorption of cobalt (II) Complex by bentonite surface was studied. The results shown that the amount of adsorption was formed to increase, such as the temperature increase (Endothermic process). Cobalt (II) Complex has adsorption studies by bentonite surface at different pH values (1.6-10); these studies displayed an increase in adsorption with increasing pH. ΔG, ΔH, and ΔS thermodynamic functions of the cobalt (II) Complex for their adsorption have been calculated.
The appearance of Mixed Mode Oscillations (MMOs) and chaotic spiking in a Light Emitting Diode (LED) with optoelectronic feedback theoretically and experimentally have been reported. The transition between periodic and chaotic mixed-mode states has been investigated by varying feedback strength. In incoherent semiconductor chaotically spiking attractors with optoelectronic feedback have been observed to be the result of canard phenomena in three-dimensional phase space (incomplete homoclinic scenarios).
The present study has three objectives: 1) to investigate the prevalence of complex nominals in economic discourse represented via the selected business news texts, 2) to shed some light on the most common translation errors made by second year students in the Department of Translation in rendering complex nominals into Arabic, and 3) to detect the possible causes behind such translation errors and suggest some translation tips which might sound helpful to the students of translation to find the most suitable translation equivalent. The present study is based on an empirical survey in which a selective analysis of someeconomic texts represented in business news texts is made. A corpus of 159 complex nominals was selected from seven busin
... Show MoreAtorvastatin calcium (ATR) is an antihyperlipidemic agent used for lowering blood cholesterol levels. However, it is very slightly soluble in water with poor oral bioavailability, which interferes with its therapeutic action. It is classified as a class II drug according to Biopharmaceutical Classification System (low solubility and high permeability).
The coefficient of performance of a window type Air-Conditioner system can be improved if a reduction in the work of compressor can be achieved by a suitable technique. The present study investigates the effect of dispersing a low concentration of TiO2 nanoparticles in the mineral oil based lubricant, as well as on the overall performance of a window type Air-Conditioner system using R22 as the working fluid. An enhancement in the COP of the refrigeration system has been observed and the existence of an optimum volume fraction noticed, with low concentrations of nanoparticles suspended in the mineral oil. Results showed that the average compressor work reduced by 13.3%, which ultimately resulted in an increase of 11.99% in the COP due to
... Show MoreAbstract
Electrical magnate was designed and constructed, the optimum Magnetic flux and the effect of time on the physical properties of the alkaline (magnetic water) produced from the bottled drinking water [the total dissolved solids (TDS) or the electrical conductivity, and pH] were studied, to simulate ZamZam water in Mekka Saudi Arabia. Also, the efficiency of magnetic field from this designed electrical magnate in decreasing the TDS of sea water (of 1500 ppm NaCl Content), to convert it to water suitable for irrigation (TDS<1000 ppm) was investigated in this work.The results show that the magnetic flux from our designed electrical magnate in the range of (0.013- 0.08) Tesla and 30 minut
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More