ArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, automation of drainage network extraction from DEMs is an efficient way and has received considerable attention. This study aims to extract drainage networks from Digital Elevation Model (DEM) for Lesser Zab River Basin. Composition parameters of the drainage network including the numbers of streams and the stream lengths are derived from the DEM beside the delineation of catchment areas in the basin. The results from this application can be used to create input files for many hydrologic models.
Visualization of subsurface geology is mainly considered as the framework of the required structure to provide distribution of petrophysical properties. The geological model helps to understand the behavior of the fluid flow in the porous media that is affected by heterogeneity of the reservoir and helps in calculating the initial oil in place as well as selecting accurate new well location. In this study, a geological model is built for Qaiyarah field, tertiary reservoir, relying on well data from 48 wells, including the location of wells, formation tops and contour map. The structural model is constructed for the tertiary reservoir, which is an asymmetrical anticline consisting of two domes separated by a saddle. It is found that
... Show MoreHere we present the results of experiments involving cynomolgus macaques, in which a model of traumatic spinal cord injury (TSCI) was created by using a balloon catheter inserted into the epidural space. Prior to the creation of the lesion, we inserted an EMG recording device to facilitate measurement of tail movement and muscle activity before and after TSCI. This model is unique in that the impairment is limited to the tail: the subjects do not experience limb weakness, bladder impairment, or bowel dysfunction. In addition, 4 of the 6 subjects received a combination treatment comprising thyrotropin releasing hormone, selenium, and vitamin E after induction of experimental TSCI. The subjects tolerated the implantation of the recording devi
... Show MoreThere is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn
The aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More