A genetic algorithm model coupled with artificial neural network model was developed to find the optimal values of upstream, downstream cutoff lengths, length of floor and length of downstream protection required for a hydraulic structure. These were obtained for a given maximum difference head, depth of impervious layer and degree of anisotropy. The objective function to be minimized was the cost function with relative cost coefficients for the different dimensions obtained. Constraints used were those that satisfy a factor of safety of 2 against uplift pressure failure and 3 against piping failure.
Different cases reaching 1200 were modeled and analyzed using geo-studio modeling, with different values of input variables. The soil was considered homogeneous anisotropic. For each case, the length of protection (L) and the volume of the superstructure (V) required to satisfy the factors of safety mentioned above were calculated. These data were used to obtain an artificial neural network model for estimating (L) and (V) for a given length of upstream cutoff (S1), length of downstream cutoff (S2), head difference (H), length of floor (B), depth of impervious layer (D) and degree of anisotropy (kx/ky).
A MatLAB code was written to perform a genetic algorithm optimization modeling using the obtained ANN model .The obtained optimum solution for some selected cases were compared with the Geo-studio modeling to find the length of protection required in the downstream side and volume required for superstructure. Values estimated were found comparable to the obtained values from the Genetic Algorithm model.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreIntrinsic viscosities have been studied for polyethylene oxide in water which has wide industrial applications. The polyethylene oxide samples had two different structures, the first one was linear and covers a wide range of molecular weight of 1, 3, 10, 20, 35, 99, 370, 1100, 4600, and 8000 kg/mol and the second one was branched and had molecular weights of 0.55 and 40 kg/mol.
Intrinsic viscosities and Huggins constants have been determined for all types and molecular weights mentioned above at 25ºC using a capillary viscometer. The values of Mark-Houwink parameters (K and a) were equal to 0.0068 ml/g and 0.67 respectively, and have not been published for this range of molecular weight in as yet.
This study was aimed to measure marketing efficiency and study important factors affecting , using TOBIT qualitative response model for wheat crop in Salahalddin province. Results revealed that independent factors such as (marketing type, crops duration in the field, average marketing cost, distance between farm and marketing center, and average productivity) had an impact on wheat marketing efficiency. This impact varied in size and direction due to value of parameters. Values of marketing efficiency fluctuated within cities and towns in the province. The average value on the province level was 76.75%. This study was recommended developing marketing infrastructures which is essential to efficiency increases. In addition, it is impo
... Show MoreIn this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreThe Bi2Se3 compound was synthesis by fusing initial compounds consisting of
extra pure elements in stoichiometric ratio from elements compound, charged inside
quartz ampoule. The crystal growth of Bi2Se3 carried out using Brighaman technique
process from melting f (Bi+Se ) at temperature of 810 ºC for about 48 hrs. Single crystal
of Bi2Se3 has been grown in direction (211) after slow cooling on account of heat
gradient to zone furnaces at cooling rate (1-3) C/hr. The structure study of the compound
was determined by x-ray diffraction technique, which it has bismuthinite structure and
orthorhombic unit cell with lattice parameters of a=10.2678 Å, b=11.2392 Å and
c=5.1737 Å
The enhancement of the thermal and thermo-hydraulic performance of a semi-circular solar air collector (SCSAC) is numerically investigated using porous semi-circular obstacles made of metal foam with and without longitudinal porous Y-shaped fins. Two 10 and 40 PPI porous material samples are examined. Three-dimensional models are built to simulate the performance of SCSAC: model (I) with clear air passage; model (II) with only metal foam obstacles, and model (III) with metal foam obstacles as well as porous Y-fins. COMSOL Multiphysics software version 6.2 based on finite element methodology is employed. A conjugate heat transfer with a (k-ε) turbulence model is selected to simulate both heat transfer and fluid flow across the entir
... Show MoreDam and powerhouse operation sustainability is a major concern from the hydraulic engineering perspective. Powerhouse operation is one of the main sources of vibrations in the dam structure and hydropower plant; thus, the evaluation of turbine performance at different water pressures is important for determining the sustainability of the dam body. Draft tube turbines run under high pressure and suffer from connection problems, such as vibrations and pressure fluctuation. Reducing the pressure fluctuation and minimizing the principal stress caused by undesired components of water in the draft tube turbine are ongoing problems that must be resolved. Here, we conducted a comprehensive review of studies performed on dams, powerhouses, a
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show More