Preferred Language
Articles
/
joe-79
Optimum Dimensions of Hydraulic Structures and Foundation Using Genetic Algorithm coupled with Artificial Neural Network
...Show More Authors

      A model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure against the uplift pressure force and sufficient protection length at the  downstream side of the structure to overcome an excessive exit gradient. The Geo-studio software was used to analyze 1200 different cases. For each case the
length of protection (L) and volume of structure (V) required to satisfy the safety factors mentioned previously were estimated for the input values, namely, the upstream cutoff depth (S1), the downstream cutoff depth (S2), the foundation width (B), the angle of inclination of the upstream cutoff (Ɵ1)  and the angle of inclination of the downstream cutoff (Ɵ2), H (differencehead), kr (degree of anisotropy) and D (depth of impervious layer). An ANN model was developed and verified using these cases input-output sets as its data base. A MatLAB code was written to perform a genetic algorithm optimization modeling coupled with this ANN model using a formulated optimization model. A sensitivity analysis was done for selecting the crossover probability, the mutation probability and level,
the number of population, the position of the crossover and the weights distribution for all the terms of the objective function. Results indicate
that the most factors that affects. the optimum solution is the $ number of population required. The minimum value that gives stable global optimum solution of this parameter is (30000) while other variables have little effect on the optimum solution. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Improved Firefly Algorithm with Variable Neighborhood Search for Data Clustering
...Show More Authors

Among the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Irrigation And Drainage Engineering
Hydraulic and Statistical Analyses of Design Emission Uniformity of Trickle Irrigation Systems
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
I-manager’s Journal On Communication Engineering And Systems
SOLVING NETWORK CONGESTION PROBLEM BY QUALITY OF SERVICE ANALYSIS USING OPNET
...Show More Authors

Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r

... Show More
Publication Date
Wed Nov 02 2016
Journal Name
Australian Journal Of Basic And Applied Sciences
Full synchronization of 2$\times$ 2 optocouplers network using LEDs
...Show More Authors

The synchronization of a complex network with optoelectronic feedback has been introduced theoretically, with use of 2×2 oscillators network; each oscillator considered is an optocoupler (LED coupled with photo-detector). Fixing the bias current (δ) and increasing the feedback strength (Ԑ) of each oscillator, the dynamical sequence like chaotic and periodic mixed mode oscillations has been observed. Synchronization of unidirectionally coupled of light emitting diodes network has been featured when coupling strength equal to 1.7×10-4. The transition between non-synchronization and synchronization states by means of the spatio-temporal distribution has been investigated.

Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Hydraulic Analysis of the Samarra-Al Tharthar System
...Show More Authors

Low incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Succession of Urban Structures of the City of Baghdad
...Show More Authors

The research shed light on the historic evolution of Baghdad through its long, expansive history. The starting point focuses on the geographic characteristics, and the nature of its habitation, prior to laying the circular plan of Baghdad. Then the research proceeds to cover the stage of building the round city of Baghdad. The research continue to cover the expansion and sequential growth across the banks of Tigris river.
A concentrated attention is devoted to analyses the morphological, geographical and above all the makeup of present day city of Baghdad, pinpointing the apathetic plans, decisions, and actions which completely disfigured the image, and tradition of the old city of Baghdad, behind the delusive slogans of “comprehens

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Science And Technology (ijst)
Study of Optical and Structures for TiO2 prepared by Pulse Laser Deposition
...Show More Authors

Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Deep Learning-Based Speech Enhancement Algorithm Using Charlier Transform
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Crossref