Assessment of infiltration models developed using soft computing techniques

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating electrochemical drilling (ECD) using statistical and soft computing techniques

In the present study, five modeling approaches of RA, MLP, MNN, GFF, and CANFIS were applied so as to estimate the radial overcut values in electrochemical drilling process. For these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. The developed models were evaluated in terms of their prediction capability with m...

متن کامل

assessment of the efficiency of s.p.g.c refineries using network dea

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

investigating electrochemical drilling (ecd) using statistical and soft computing techniques

in the present study, five modeling approaches of ra, mlp, mnn, gff, and canfis were applied so as to estimate the radial overcut values in electrochemical drilling process. for these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. the developed models were evaluated in terms of their prediction capability with m...

متن کامل

Damage identification by using soft-computing techniques

This paper describes a soft computing approach to solve the damage identification problem using Case-Based Reasoning (CBR) to obtain an initial diagnostic exploiting the outcomes given in known structure models simulations and the data acquired by the sensors in operating conditions once the system has started. It creates an incremental database (since a new experience is retained each time a p...

متن کامل

Intrusion Detection Using Soft Computing Techniques

As the popularity and usage of Internet increases all over the world, security issues have also become very essential that have to be considered. In literature, different techniques from various disciplines have been utilized to develop efficient security methods but those techniques always have some shortcomings. In this chapter the author discuss soft computing techniques that have been appli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Geology, Ecology, and Landscapes

سال: 2020

ISSN: 2474-9508

DOI: 10.1080/24749508.2020.1720475