An Artificial Neural Network-Based Decision Support System to Evaluate Hydropower Releases on Salinity Intrusion
نویسنده
چکیده
Six reservoirs in North Carolina, USA, discharge into the Pee Dee River, which flows 260 kilometers through South Carolina to the coastal communities near Myrtle Beach. During the Southeast’s record-breaking drought from 1998 to 2002, salinity intrusions inundated a coastal municipal freshwater intake, limiting water supplies. The North Carolina reservoirs are currently (2006) undergoing a re-licensing process by the Federal Energy Regulatory Commission for a 50-year operating permit. Stakeholders along the Pee Dee River formed a coalition to determine the necessary flows to protect the freshwater intakes in the future. Salinity intrusion results from the interaction of three principal forces—streamflow, mean tidal water levels, and tidal range. To analyze, model, and simulate hydrodynamic behaviors at critical coastal gages, data mining techniques were applied to more than 15 years of hourly streamflow, coastal waterquality, and water-level data. Artificial neural network (ANN) models were trained to learn the variable interactions that cause salinity intrusions. Streamflow data from the 47,900-square-kilometer basin are used as input to the model as time-delayed variables and accumulated tributary inflows. Tidal inputs to the models were obtained by decomposing tidal water-level data into a “multiply periodic” signal of tidal range and a “chaotic” signal of mean water levels. The ANN models were able to convincingly reproduce historical behaviors and generate alternative scenarios of interest. To make the models directly available to all stakeholders, a user-friendly decision support system was developed as a spreadsheet application that integrates the historical database, ANN models, user controls, streaming graphics, and simulation output.
منابع مشابه
Yarn tenacity modeling using artificial neural networks and development of a decision support system based on genetic algorithms
Yarn tenacity is one of the most important properties in yarn production. This paper addresses modeling of yarn tenacity as well as optimally determining the amounts of the effective inputs to produce yarn with desired tenacity. The artificial neural network is used as a suitable structure for tenacity modeling of cotton yarn with 30 Ne. As the first step for modeling, the empirical data is col...
متن کاملA Hybrid Machine Learning Method for Intrusion Detection
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
متن کاملA clinical decision support system for contact lens evaluation
Background: Contact lenses are transparent, thin plastic disks that cover the surface of the cornea. Appropriate lens prescription should be performed properly by an expert to provide better visual acuity and reduce side effects. The lens administration is a multi-stage, complex and time-consuming process involving many considerations. The purpose of this study was to develop a decision support...
متن کاملDeveloping a New Decision Support System to Manage Human Reliability based on HEART Method
Human performance and reliability monitoring have become the main issue for many industries since human error ratios cannot be mitigated to the zero level and many accidents, malfunctions, and quality defects are happening due to the human in production systems. Since the human resources implement a different range of tasks, the calculation of human error probability (HEP) is complicated, and s...
متن کاملAnomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کامل