A Genetic Algorithm optimization model is used in this study to find the optimum flow values of the Tigris river branches near Ammara city, which their water is to be used for central marshes restoration after mixing in Maissan River. These tributaries are Al-Areed, AlBittera and Al-Majar Al-Kabeer Rivers. The aim of this model is to enhance the water quality in Maissan River, hence provide acceptable water quality for marsh restoration. The model is applied for different water quality change scenarios ,i.e. , 10%,20% increase in EC,TDS and BOD. The model output are the optimum flow values for the three rivers while, the input data are monthly flows(1994-2011),monthly water requirements and water quality parameters (EC, TDS, BOD, DO and pH).The objective function adopted in the optimization model is in a form the sum of difference in each of the 5 water quality parameters, resulting from the
mixing equation of the waters of the rivers, from the accepted limits of these parameters , weighted by a penalty factor assigned for each water quality parameter according to its importance. The adopted acceptable limits are 1500,1000, 6,4 and 7, while the penalty factors are 1,0.8,0.8,0.8,and 0.2 for EC,TDS,BOD,DO,and pH respectively. The constraints adopted on the decision variables which the monthly flows of the three rivers are those that provide the monthly demands downstream each river, and not exceed a maximum monthly flow
limits. The maximum flow limits adopted are for three flow cases, wet, average and dry years. For each flow case three scenarios for the monthly water quality parameters were adopted , the average values(scenario 1),the 10% increase in EC,TDS, and BOD (Scenario
2),and the 20% increase in these three water quality parameters (Scenario 3). Hence nine cases are adopted and for each an optimum monthly flows are found for each river. The genetic optimization model adopt a variable number of population of 100 to 1000 in a step of
100,0.8 and 0.2 cross over and mutation rates, and three iterations to reach the stable optimum solutions. The results indicates that the flow analysis shows a significant decrease in the flow values of the three rives after year 2000,hence, the flow values for the period of (1994-1999), are excluded and the only used values are those for (2000-2011). The estimated monthly demands exhibits low variation. The observed optimum monthly flow values decrease in general as the case flow changed from wet to normal and dry cases. The change in Scenarios from S1 to S2 and S3 , do not necessarily increase all the required optimum monthly flow values. The obtained minimum objective functions do not exhibits a certain trend with the change in the flow cases and/or the change in the scenarios.
Water pollution is an issue that can be exacerbated by drought as increased concentrations of unwanted substances are a consequence of lower water levels. Polluted water that flows into natural marshlands leads to the deposition of pollutants in the interior of the marsh. Here we present evidence that the interior of the Central Marsh (CM) in southern Iraq suffers from higher levels of pollution than areas closer to the source of water entering the marsh (the Euphrates River). A 1.7m embankment that halts the flow of the Euphrates is only infrequently breached and so the CM is effectively the terminal destination of the waters (and their associated pollutants and agricultural waste) flowing from the West of Iraq.
A range of water
... Show MoreOften phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo
... Show MoreClustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant
... Show MoreA genetic algorithm model coupled with artificial neural network model was developed to find the optimal values of upstream, downstream cutoff lengths, length of floor and length of downstream protection required for a hydraulic structure. These were obtained for a given maximum difference head, depth of impervious layer and degree of anisotropy. The objective function to be minimized was the cost function with relative cost coefficients for the different dimensions obtained. Constraints used were those that satisfy a factor of safety of 2 against uplift pressure failure and 3 against piping failure.
Different cases reaching 1200 were modeled and analyzed using geo-studio modeling, with different values of input variables. The soil wa
This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.
A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments