Application of Genetic Programming to Modeling and Prediction of Activity Coefficient Ratio of Electrolytes in Aqueous Electrolyte Solution Containing Amino Acids

Authors

  • Hamid Modarress Department of Chemical Engineering, Amirkabir University of Technology, P.O. Box 15875-4413 Tehran, I.R. IRAN
  • Mahdi Zaeifi Yamchi Department of Chemistry, Amirkabir University of Technology, P.O. Box 15875-4413 Tehran, I.R. IRAN
  • Majid Abdouss Department of Chemistry, Amirkabir University of Technology, P.O. Box 15875-4413 Tehran, I.R. IRAN
Abstract:

Genetic programming (GP) is one of the computer algorithms in the family of evolutionary-computational methods, which have been shown to provide reliable solutions to complex optimization problems. The genetic programming under discussion in this work relies on tree-like building blocks, and thus supports process modeling with varying structure. In this paper the systems containing amino acids + water + one electrolyte (NaCl, KCl, NaBr, KBr) are modeled by GP that can predict the mean ionic activity coefficient ratio of electrolytes in presence and in absence of amino acid in different mixtures better than the common polynomial equations proposed for this kind of predictions. A set of 750 data points was used for model training and the remaining 105 data points were used for model validation. The root mean square deviation (RMSD) of the designed GP model in prediction of the mean ionic activity coefficient ratio of electrolytes is less than 0.0394 and proves the effectiveness of the GP in correlation and prediction of activity coefficients in the studied mixtures.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

application of genetic programming to modeling and prediction of activity coefficient ratio of electrolytes in aqueous electrolyte solution containing amino acids

genetic programming (gp) is one of the computer algorithms in the family of evolutionary-computational methods, which have been shown to provide reliable solutions to complex optimization problems. the genetic programming under discussion in this work relies on tree-like building blocks, and thus supports process modeling with varying structure. in this paper the systems containing amino acids ...

full text

Measurement and Modeling of Mean Ionic Activity Coefficient in Aqueous Solution Containing NaNO3 and Poly Ethylene Glycol

Potentiometric investigation on {H2O+NaNO3+PEG1500} mixtures were made at T=308.15K, using electrochemical cells with two ion-selective electrodes, (Na+ glass) as the cation ion-selective electrode against (NO3- solvent-polymer PVC) as the anion ion-selective electrode. The mean ionic activity coefficients of NaNO3 were measu...

full text

morphology, geochemistry, mineralogy, and micromorphology of soils of hormozgan province in relation to parent materials

ویژگی های زمین شیمیایی، کانی شناسی، و میکرومورفولوژیکی خاک ها و سنگ مادر مربوطه در منطقه بین بخش های جنوبی زاگرس و خلیج فارس تا دریای عمان(استان هرمزگان، ایران) مورد بررسی قرار گرفت. هدف های این مطالعه شناسایی تغییرات در خصوصیات فیزیکی، شیمیایی، و ترکیب کانی شناسی خاک، مطالعه میکرومورفولوژی و تکامل خاک، و بررسی توزیع عنصر خاک بر اساس هوازدگی، پروسه های خاک و زمین شناسی جهت توصیف اثرات مواد مادر...

15 صفحه اول

the role of russia in transmission of energy from central asia and caucuses to european union

پس ازفروپاشی شوروی،رشد منابع نفت و گاز، آسیای میانه و قفقاز را در یک بازی ژئوپلتیکی انرژی قرار داده است. با در نظر گرفتن این منابع هیدروکربنی، این منطقه به یک میدانجنگ و رقابت تجاری برای بازی های ژئوپلتیکی قدرت های بزرگ جهانی تبدیل شده است. روسیه منطقه را به عنوان حیات خلوت خود تلقی نموده و علاقمند به حفظ حضورش می باشد تا همانند گذشته گاز طبیعی را به وسیله خط لوله مرکزی دریافت و به عنوان یک واس...

15 صفحه اول

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 28  issue 3

pages  71- 80

publication date 2009-09-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023