The objective of all planning research is to plan for human comfort and safety, and one of the most significant natural dangers to which humans are exposed is earthquake risk; therefore, earthquake risks must be anticipated, and with the advancement of global technology, it is possible to obtain information on earthquake hazards. GIS has been utilized extensively in the field of environmental assessment research due to its high potential, and GIS is a crucial application in seismic risk assessment. This paper examines the methodologies used in recent GIS-based seismic risk studies, their primary environmental impacts on urban areas, and the complexity of the relationship between the applied methodological approaches and the resulting environmental risk assessments. Using spatial analysis techniques based on the history of spatial earthquakes, fault lines, and residential complexes. This article provides map which depict the most significant seismic danger zones in Iran. The analysis reveals that the area of very dangerous and earthquake-prone zone is equal to (12%) from the residential areas, it is concentrated in the western region, adjacent to Iraq and close to the tectonic plate. The dangerous areas are concentrated in the western side of Iran, extending from the north to the south (20%), which is a fairly large percentage. As for the critical area by earthquake-prone, they are concentrated in the northern regions (23%), The medium critical areas are frequent in the centre and the north-east in Iran, and it is the largest area (26%), while the areas that less affected by the risk of an earthquake, are concentrated in the middle (17%), As for the areas that are not affected by the risk of earthquakes, (1%).
In this paper, Response Surface Method (RSM) is utilized to carry out an investigation of the impact of input parameters: electrode type (E.T.) [Gr, Cu and CuW], pulse duration of current (Ip), pulse duration on time (Ton), and pulse duration off time (Toff) on the surface finish in EDM operation. To approximate and concentrate the suggested second- order regression model is generally accepted for Surface Roughness Ra, a Central Composite Design (CCD) is utilized for evaluating the model constant coefficients of the input parameters on Surface Roughness (Ra). Examinations were performed on AISI D2 tool steel. The important coefficients are gotten by achieving successfully an Analysis of V
... Show MoreIn this paper,a prey-predator model with infectious disease in predator population
is proposed and studied. Nonlinear incidence rate is used to describe the transition of
disease. The existence, uniqueness and boundedness of the solution are discussed.
The existences and the stability analysis of all possible equilibrium points are
studied. Numerical simulation is carried out to investigate the global dynamical
behavior of the system.
The mucilage was isolated from mustard seeds and identification by some different methods like, thermo gravimetric, FTlR., X-ray powdered, proton NMR, FTIR spectra of the three gums contain different functional group in the gums, major peaks bands noticed were belong to OH (3410.15 – 3010.88) group from hydroxyl group, CH aliphatic (2925-2343.51), C-O (1072.42-1060.85) group and C=O 1743.65, Thermo chemical parameters of mucilage was evaluated and compared with the standard gums, Results indicated the mucilage was decomposed in 392°C and mass loss 55%, The X ray process found the mucilage had single not sharp peak
... Show MoreThe Digital Elevation Model (DEM) has been known as a quantitative description of the surface of the Earth, which provides essential information about the terrain. DEMs are significant information sources for a number of practical applications that need surface elevation data. The open-source DEM datasets, such as the Advanced Space-borne Thermal Emission and Reflection Radiometer (ASTER), the Shuttle Radar Topography Mission (SRTM), and the Advanced Land Observing Satellite (ALOS) usually have approximately low accuracy and coarser resolution. The errors in many datasets of DEMs have already been generally examined for their importance, where their quality could be affected within different aspects, including the types of sensors, algor
... Show MoreMany fuzzy clustering are based on within-cluster scatter with a compactness measure , but in this paper explaining new fuzzy clustering method which depend on within-cluster scatter with a compactness measure and between-cluster scatter with a separation measure called the fuzzy compactness and separation (FCS). The fuzzy linear discriminant analysis (FLDA) based on within-cluster scatter matrix and between-cluster scatter matrix . Then two fuzzy scattering matrices in the objective function assure the compactness between data elements and cluster centers .To test the optimal number of clusters using validation clustering method is discuss .After that an illustrate example are applied.
A modified Leslie-Gower predator-prey model with fear effect and nonlinear harvesting is developed and investigated in this study. The predator is supposed to feed on the prey using Holling type-II functional response. The goal is to see how fear of predation and presence of harvesting affect the model's dynamics. The system's positivity and boundlessness are demonstrated. All conceivable equilibria's existence and stability requirements are established. All sorts of local bifurcation occurrence conditions are presented. Extensive numerical simulations of the proposed model are shown in form of Phase portraits and direction fields. That is to guarantee the correctness of the theoretical results of the dynamic behavior of the system and t
... Show Moreيهدف هذا البحث إلى تحليل محتوى كتابي الحاسوب للمرحلة الإعدادية في جمهورية العراق وفقاً للتفكير المنطقي، واتبعت الباحثة منهج البحث الوصفي التحليلي، وتم توظيف أداة تحليل المحتوى، التي صُمِّمت وفقاً للعمليات العقلية المتضمنة في التفكير المنطقي بحسب العالم بياجيه ( Piaget )، واعتماد وحدة الفكرة (الصريحة) في عملية التحليل. تبين من نتائج هذا البحث أنَّ نسبة تضمين مهارات التفكير المنطقي في محتوى كتابي الحاسوب للمرحل
... Show MoreThis paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n
... Show MoreThis paper investigates the performance evaluation of two state feedback controllers, Pole Placement (PP) and Linear Quadratic Regulator (LQR). The two controllers are designed for a Mass-Spring-Damper (MSD) system found in numerous applications to stabilize the MSD system performance and minimize the position tracking error of the system output. The state space model of the MSD system is first developed. Then, two meta-heuristic optimizations, Simulated Annealing (SA) optimization and Ant Colony (AC) optimization are utilized to optimize feedback gains matrix K of the PP and the weighting matrices Q and R of the LQR to make the MSD system reach stabilization and reduce the oscillation of the response. The Matlab softwar
... Show MoreLink failure refers to the failure between two connections/nodes in a perfectly working simulation scenario at a particular instance. Transport layer routing protocols form an important basis of setting up a simulation, with Transmission Control Protocol and User Datagram Protocol being the primary of them. The research makes use of Network Simulator v2.35 to conduct different simulation experiments for link failure and provide validation results. In this paper, both protocols, TCP and UDP are compared based on the throughput of packets delivered from one node to the other constrained to the condition that for a certain interval of time the link fails and the simulation time remains the same for either of the protocols. Overall,
... Show More