Journal articles on the topic 'Flood routing Computer programs'

To see the other types of publications on this topic, follow the link: Flood routing Computer programs.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Flood routing Computer programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Thandaveswara, B. S., and N. Sajikumar. "Flood Routing Using Spreadsheet." Computer-Aided Civil and Infrastructure Engineering 6, no. 2 (November 6, 2008): 161–72. http://dx.doi.org/10.1111/j.1467-8667.1991.tb00185.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karahan, Halil. "Predicting Muskingum flood routing parameters using spreadsheets." Computer Applications in Engineering Education 20, no. 2 (December 28, 2009): 280–86. http://dx.doi.org/10.1002/cae.20394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pung, HK. "Simulation study of a flood routing technique for mesh-like LANs." Computer Communications 13, no. 6 (July 1990): 354–64. http://dx.doi.org/10.1016/0140-3664(90)90058-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kiczko, A., R. J. Romanowicz, M. Osuch, and E. Karamuz. "Maximizing the usefulness of flood risk assessment for the River Vistula in Warsaw." Natural Hazards and Earth System Sciences Discussions 1, no. 3 (June 13, 2013): 2695–730. http://dx.doi.org/10.5194/nhessd-1-2695-2013.

Full text
Abstract:
Abstract. The derivation of flood risk maps requires an estimation of maximum inundation extent for a flood with a given return period, e.g. 100 or 500 yr. The results of numerical simulations of flood wave propagation are used to overcome the lack of relevant observations. In practice, deterministic 1-D models are used for flow routing, giving a simplified image of flood wave propagation. The solution of a 1-D model depends on the initial and boundary conditions and estimates of model parameters which are usually identified using the inverse problem based on the available noisy observations. Therefore, there is a large uncertainty involved in the derivation of flood risk maps. Bayesian conditioning based on multiple model simulations can be used to quantify this uncertainty; however, it is too computer-time demanding to be applied in flood risk assessment in practice, without further flow routing model simplifications. In order to speed up the computation times the assumption of a gradually varied flow and the application of a steady state flow routing model may be introduced. The aim of this work is an analysis of the influence of those simplifying model assumptions and uncertainty of observations and modelling errors on flood inundation mapping and a quantitative comparison with deterministic flood extent maps. Apart from the uncertainty related to the model structure and its parameters, the uncertainty of the estimated flood wave with a specified probability of return period (so-called 1-in-10 yr, or 1-in-100 yr flood) is also taken into account. In order to derive the uncertainty of inundation extent conditioned on the design flood wave, the probabilities related to the design wave and flow model uncertainties are integrated. In the present paper we take into account the dependence of roughness coefficients on discharge. The roughness is parameterised based on the available observed historical flood waves. The approach presented allows for the relationship between flood extent and flow values to be derived thus giving a cumulative assessment of flood risk. The methods are illustrated using the Warsaw reach of the River Vistula as a case study. The results indicate that the uncertainties have a substantial influence on flood risk assessment.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Si, Degan Zhang, Xiaohuan Liu, Ting Zhang, and Hao Wu. "Adaptive repair algorithm for TORA routing protocol based on flood control strategy." Computer Communications 151 (February 2020): 437–48. http://dx.doi.org/10.1016/j.comcom.2020.01.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pung, HK. "Comparative performance study of flood routing LANs and a CSMA-CD bus." Computer Communications 14, no. 5 (June 1991): 298–304. http://dx.doi.org/10.1016/0140-3664(91)90005-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abebe, A. J., and Roland K. Price. "Information Theory and Neural Networks for Managing Uncertainty in Flood Routing." Journal of Computing in Civil Engineering 18, no. 4 (October 2004): 373–80. http://dx.doi.org/10.1061/(asce)0887-3801(2004)18:4(373).

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alansari, Zainab, Nor Badrul Anuar, Amirrudin Kamsin, and Mohammad Riyaz Belgaum. "A systematic review of routing attacks detection in wireless sensor networks." PeerJ Computer Science 8 (October 21, 2022): e1135. http://dx.doi.org/10.7717/peerj-cs.1135.

Full text
Abstract:
Wireless sensor networks (WSNs) consist of hundreds, or thousands of sensor nodes distributed over a wide area and used as the Internet of Things (IoT) devices to benefit many home users and autonomous systems industries. With many users adopting WSN-based IoT technology, ensuring that the sensor’s information is protected from attacks is essential. Many attacks interrupt WSNs, such as Quality of Service (QoS) attacks, malicious nodes, and routing attacks. To combat these attacks, especially on the routing attacks, we need to detect the attacker nodes and prevent them from any access to WSN. Although some survey studies on routing attacks have been published, a lack of systematic studies on detecting WSN routing attacks can be seen in the literature. This study enhances the topic with a taxonomy of current and emerging detection techniques for routing attacks in wireless sensor networks to improve QoS. This article uses a PRISMA flow diagram for a systematic review of 87 articles from 2016 to 2022 based on eight routing attacks: wormhole, sybil, Grayhole/selective forwarding, blackhole, sinkhole, replay, spoofing, and hello flood attacks. The review also includes an evaluation of the metrics and criteria used to evaluate performance. Researchers can use this article to fill in any information gaps within the WSN routing attack detection domain.
APA, Harvard, Vancouver, ISO, and other styles
9

Karahan, Halil, Gurhan Gurarslan, and Zong Woo Geem. "A new nonlinear Muskingum flood routing model incorporating lateral flow." Engineering Optimization 47, no. 6 (May 20, 2014): 737–49. http://dx.doi.org/10.1080/0305215x.2014.918115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sil, Briti Sundar, Angana Borah, Shubrajyoti Deb, and Biplab Das. "DEVELOPMENT OF RIVER FLOOD ROUTING MODEL USING NON-LINEAR MUSKINGUM EQUATION AND EXCEL TOOL 'GANetXL'." Journal of Urban and Environmental Engineering 10, no. 2 (April 28, 2017): 214–20. http://dx.doi.org/10.4090/juee.2016.v10n2.214-220.

Full text
Abstract:
Flood routing is of utmost importance to water resources engineers and hydrologist. Muskingum model is one of the popular methods for river flood routing which often require a huge computational work. To solve the routing parameters, most of the established methods require knowledge about different computer programmes and sophisticated models. So, it is beneficial to have a tool which is comfortable to users having more knowledge about everyday decision making problems rather than the development of computational models as the programmes. The use of micro-soft excel and its relevant tool like solver by the practicing engineers for normal modeling tasks has become common over the last few decades. In excel environment, tools are based on graphical user interface which are very comfortable for the users for handling database, modeling, data analysis and programming. GANetXL is an add-in for Microsoft Excel, a leading commercial spreadsheet application for Windows and MAC operating systems. GANetXL is a program that uses a Genetic Algorithm to solve a wide range of single and multi-objective problems. In this study, non-linear Muskingum routing parameters are solved using GANetXL. Statistical Model performances are compared with the earlier results and found satisfactory.
APA, Harvard, Vancouver, ISO, and other styles
11

Sil, Briti Sundar, Angana Borah, Shubrajyoti Deb, and Biplab Das. "DEVELOPMENT OF RIVER FLOOD ROUTING MODEL USING NON-LINEAR MUSKINGUM EQUATION AND EXCEL TOOL 'GANetXL'." Journal of Urban and Environmental Engineering 10, no. 2 (April 28, 2017): 214–20. http://dx.doi.org/10.4090/juee.2016.v10n2.214220.

Full text
Abstract:
Flood routing is of utmost importance to water resources engineers and hydrologist. Muskingum model is one of the popular methods for river flood routing which often require a huge computational work. To solve the routing parameters, most of the established methods require knowledge about different computer programmes and sophisticated models. So, it is beneficial to have a tool which is comfortable to users having more knowledge about everyday decision making problems rather than the development of computational models as the programmes. The use of micro-soft excel and its relevant tool like solver by the practicing engineers for normal modeling tasks has become common over the last few decades. In excel environment, tools are based on graphical user interface which are very comfortable for the users for handling database, modeling, data analysis and programming. GANetXL is an add-in for Microsoft Excel, a leading commercial spreadsheet application for Windows and MAC operating systems. GANetXL is a program that uses a Genetic Algorithm to solve a wide range of single and multi-objective problems. In this study, non-linear Muskingum routing parameters are solved using GANetXL. Statistical Model performances are compared with the earlier results and found satisfactory.
APA, Harvard, Vancouver, ISO, and other styles
12

Heisterman, J., and T. Lengauer. "The efficient solution of integer programs for hierarchical global routing." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 10, no. 6 (June 1991): 748–53. http://dx.doi.org/10.1109/43.137503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Uncu, Nuşin, and Rızvan Erol. "Capacity Optimization in Dynamically Routing Computer Network Systems." Tehnički glasnik 16, no. 1 (February 4, 2022): 23–32. http://dx.doi.org/10.31803//tg-20201215233216.

Full text
Abstract:
A computer network system is a complex system with a great number of dynamic components. There are many devices in the system, such as computers, routers, lines, hubs, and switches. In addition to these hardware systems, many protocols are integrated to set the rules and provide the way of communication. Due to the nature of the system, it is hard to formulate and solve problems analytically without making any assumptions. One of the prominent problems that occur in computer systems is the line capacity assignment problem. In the previous mathematical models, message routes were predetermined and the dynamic nature of the system was neglected. This study deals with the line capacity assignment problem under a dynamically routing policy. Four different computer network topologies are used and solved by two heuristic algorithms via simulation. A dynamic search approach based on the occupancy rate of lines is used to define the consecutive routes of messages. The performances of harmony search and genetic algorithms via simulation are compared with the results of OptQuest, one of the optimization packet programs embedded in simulation software Arena®.
APA, Harvard, Vancouver, ISO, and other styles
14

Kiczko, A., R. J. Romanowicz, M. Osuch, and E. Karamuz. "Maximising the usefulness of flood risk assessment for the River Vistula in Warsaw." Natural Hazards and Earth System Sciences 13, no. 12 (December 23, 2013): 3443–55. http://dx.doi.org/10.5194/nhess-13-3443-2013.

Full text
Abstract:
Abstract. The derivation of the flood risk maps requires an estimation of maximum inundation extent for a flood with a given return period, e.g. 100 or 500 yr. The results of numerical simulations of flood wave propagation are used to overcome the lack of relevant observations. In practice, deterministic 1-D models are used for that purpose. The solution of a 1-D model depends on the initial and boundary conditions and estimates of model parameters based on the available noisy observations. Therefore, there is a large uncertainty involved in the derivation of flood risk maps using a single realisation of a flow model. Bayesian conditioning based on multiple model simulations can be used to quantify this uncertainty; however, it is too computer-time demanding to be applied in flood risk assessment in practice, without further flow routing model simplifications. We propose robust and feasible methodology for estimating flood risk. In order to decrease the computation times the assumption of a gradually varied flow and the application of a steady state flow routing model is introduced. The aim of this work is an analysis of the influence of those simplifying assumptions and uncertainty of observations and modelling errors on flood inundation mapping and a quantitative comparison with deterministic flood extent maps. Apart from the uncertainty related to the model structure and its parameters, the uncertainty of the estimated flood wave with a specified probability of return period (so-called 1-in-10 yr, or 1-in-100 yr flood) is also taken into account. In order to derive the uncertainty of inundation extent conditioned on the design flood, the probabilities related to the design wave and flow model uncertainties are integrated. In the present paper that integration is done whilst taking into account the dependence of roughness coefficients on discharge. The roughness is parameterised based on maximum annual discharges. This approach allows for the relationship between flood extent and flow values to be derived, thus giving a cumulative assessment of flood risk. The methods are illustrated using the Warsaw reach of the River Vistula as a case study. The results indicate that deterministic and stochastic flood inundation maps cannot be quantitatively compared. We show that the proposed simplified approach to flood risk assessment can be applied even when breaching of the embankment occurs, with the condition that the flooded area is small enough to be filled rapidly.
APA, Harvard, Vancouver, ISO, and other styles
15

Geem, Zong Woo. "Issues in optimal parameter estimation for the nonlinear Muskingum flood routing model." Engineering Optimization 46, no. 3 (April 29, 2013): 328–39. http://dx.doi.org/10.1080/0305215x.2013.768242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Al Mhdawi, Ammar K., and Hamed S. Al-Raweshidy. "iPRDR: Intelligent Power Reduction Decision Routing Protocol for Big Traffic Flood in Hybrid-SDN Architecture." IEEE Access 6 (2018): 10944–55. http://dx.doi.org/10.1109/access.2018.2800408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hosseini, S. M. "Application of spreadsheets in developing flexible multiple-reach and multiple-branch methods of Muskingum flood routing." Computer Applications in Engineering Education 17, no. 4 (December 2009): 448–54. http://dx.doi.org/10.1002/cae.20234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Tong, Yongzhe Zhou, Yunfeng Wang, and Mengbo Tang. "Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication." Journal of Computer Networks and Communications 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2717403.

Full text
Abstract:
In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G) mobile communication networks, among which device-to-device (D2D) communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT) is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT) over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.
APA, Harvard, Vancouver, ISO, and other styles
19

Dehghan, Milad, Seyed Reza Hejazi, Maryam Karimi-Mamaghan, Mehrdad Mohammadi, and Amir Pirayesh. "Capacitated location routing problem with simultaneous pickup and delivery under the risk of disruption." RAIRO - Operations Research 55, no. 3 (May 2021): 1371–99. http://dx.doi.org/10.1051/ro/2021050.

Full text
Abstract:
This paper develops a new mathematical model to study a location-routing problem with simultaneous pickup and delivery under the risk of disruption. A remarkable number of previous studies have assumed that network components (e.g., routes, production factories, depots, etc.) are always available and can permanently serve the customers. This assumption is no longer valid when the network faces disruptions such as flood, earthquake, tsunami, terrorist attacks and workers strike. In case of any disruption in the network, tremendous cost is imposed on the stockholders. Incorporating disruption in the design phase of the network will alleviate the impact of these disasters and let the network resist disruption. In this study, a mixed integer programming (MIP) model is proposed that formulates a reliable capacitated location-routing problem with simultaneous pickup and delivery (RCLRP-SPD) services in supply chain distribution network. The objective function attempts to minimize the sum of location cost of depots, routing cost of vehicles and cost of unfulfilled demand of customers. Since the model is NP-Hard, three meta-heuristics are tailored for large-sized instances and the results show the outperformance of hybrid algorithms comparing to classic genetic algorithm. Finally, the obtained results are discussed and the paper is concluded.
APA, Harvard, Vancouver, ISO, and other styles
20

Tracy, Fred Thomas, Jodi L. Ryder, Martin T. Schultz, Ghada S. Ellithy, Benjamin R. Breland, T. Chris Massey, and Maureen K. Corcoran. "Monte Carlo Simulations of Coupled Transient Seepage Flow and Soil Deformation in Levees." Scalable Computing: Practice and Experience 21, no. 1 (March 19, 2020): 147–56. http://dx.doi.org/10.12694/scpe.v21i1.1629.

Full text
Abstract:
The purpose of this research is to compare the results from two different computer programs of flow analysesof two levees at Port Arthur, Texas where rising water of a flood from Hurricane Ike occurred on the levees. The first program (Program 1) is a two-dimensional (2-D) transient finite element program that couples the conservation of mass flow equation with accompanying hydraulic boundary conditions with the conservation of force equations with accompanying x and y displacement and force boundary conditions, thus yielding total head, x displacement, and y displacement as unknowns at each finite element node. The second program (Program 2) is a 2-D transient finite element program that considers only the conservation of mass flowequation with its accompanying hydraulic boundary conditions, yielding only total head as the unknown at each finite element node. Compressive stresses can be computed at the centroid of each finite element when using the coupled program. Programs 1 and 2 were parallelized for high performance computing to consider thousands of realisations of the material properties. Since a single realisation requires as much as one hour of computer time for certain levees, the large realisation computation is made possible by utilising HPC. This Monte Carlo type analysis was used to compute the probability of unsatisfactory performance for under seepage, through seepage, and uplift for the two levees. Respective hydrographs from the flood resulting from Hurricane Ike were applied to each levee. When comparing the computations from the two programs, the most significant result was the two programs yielded significantly different values in the computed results in the two clay levees considered in this research.
APA, Harvard, Vancouver, ISO, and other styles
21

Fitriansyah, Fitriansyah, Miftahul Iman, and Aminullah Aminullah. "Pemodelan Numerik Kekuatan Pintu Air Baja." Media Ilmiah Teknik Sipil 9, no. 2 (June 1, 2021): 116–23. http://dx.doi.org/10.33084/mits.v9i2.2098.

Full text
Abstract:
The intake building for Embung Sei Bubu had been designed to be an open channel with the flood gate. The flood gate had been designed from steel with a net width of 1.35 m and the height of the door opening is 0.0076 m. The corrosion is one of the hazardous threat to the strengthness and durability of the flood gate. This research numerically models flood gate that was attacked by pitting corrosion. The pitting corrosion had been modelled in several small holes randomly were distributed on the surface of the flood gate, precisely on the surface of the water. The numerical modeling had been performed in finite element method utilized computer programs such Abaqus. The results showed there was a reduction in the capacity of the steel flood gate due the hole increasing. The reduction in stress capacity had been indicated by the stress concentration that was occured around the pitting corrosion. The stress reduction occured with the change in the percentage of pitting corrosion distribution area of ​​10% (225 MPa), 20% (175 MPa) and 30% (120 MPa)
APA, Harvard, Vancouver, ISO, and other styles
22

Darnell, MSCE, EIT, Andrew, Richard Wise, MSCE, EIT, and John Quaranta, PhD, PE. "Comparison of ArcToolbox and Terrain Tiles processing procedures for inundation mapping in mountainous terrain." Journal of Emergency Management 11, no. 2 (February 16, 2017): 133. http://dx.doi.org/10.5055/jem.2013.0132.

Full text
Abstract:
Floodplain management consists of efforts to reduce flood damage to critical infrastructure and to protect the life and health of individuals from flooding. A major component of this effort is the monitoring of flood control structures such as dams because the potential failure of these structures may have catastrophic consequences. To prepare for these threats, engineers use inundation maps that illustrate the flood resulting from high river stages. To create the maps, the structure and river systems are modeled using engineering software programs, and hydrologic events are used to simulate the conditions leading to the failure of the structure. The output data are then exported to other software programs for the creation of inundation maps. Although the computer programs for this process have been established, the processing procedures vary and yield inconsistent results. Thus, these processing methods need to be examined to determine the functionality of each in floodplain management practices. The main goal of this article is to present the development of a more integrated, accurate, and precise graphical interface tool for interpretation by emergency managers and floodplain engineers. To accomplish this purpose, a potential dam failure was simulated and analyzed for a candidate river system using two processing methods: ArcToolbox and Terrain Tiles. The research involved performing a comparison of the outputs, which revealed that both procedures yielded similar inundations for single river reaches. However, the results indicated key differences when examining outputs for large river systems. On the basis of criteria involving the hydrologic accuracy and effects on infrastructure, the Terrain Tiles inundation surpassed the ArcToolbox inundation in terms of following topography and depicting flow rates and flood extents at confluences, bends, and tributary streams. Thus, the Terrain Tiles procedure is a more accurate representation of flood extents for use by floodplain engineers, hydrologists, geographers, and emergency managers.
APA, Harvard, Vancouver, ISO, and other styles
23

Yu, Dan, Ping Xie, Xiaohua Dong, Xiaonong Hu, Ji Liu, Yinghai Li, Tao Peng, Haibo Ma, Kai Wang, and Shijin Xu. "Improvement of the SWAT model for event-based flood simulation on a sub-daily timescale." Hydrology and Earth System Sciences 22, no. 9 (September 27, 2018): 5001–19. http://dx.doi.org/10.5194/hess-22-5001-2018.

Full text
Abstract:
Abstract. Flooding represents one of the most severe natural disasters threatening the development of human society. A model that is capable of predicting the hydrological responses in watershed with management practices during flood period would be a crucial tool for pre-assessment of flood reduction measures. The Soil and Water Assessment Tool (SWAT) is a semi-distributed hydrological model that is well capable of runoff and water quality modeling under changed scenarios. The original SWAT model is a long-term yield model. However, a daily simulation time step and a continuous time marching limit the application of the SWAT model for detailed, event-based flood simulation. In addition, SWAT uses a basin level parameter that is fixed for the whole catchment to parameterize the unit hydrograph (UH), thereby ignoring the spatial heterogeneity among the sub-basins when adjusting the shape of the UHs. This paper developed a method to perform event-based flood simulation on a sub-daily timescale based on SWAT2005 and simultaneously improved the UH method used in the original SWAT model. First, model programs for surface runoff and water routing were modified to a sub-daily timescale. Subsequently, the entire loop structure was broken into discrete flood events in order to obtain a SWAT-EVENT model in which antecedent soil moisture and antecedent reach storage could be obtained from daily simulations of the original SWAT model. Finally, the original lumped UH parameter was refined into a set of distributed ones to reflect the spatial variability of the studied area. The modified SWAT-EVENT model was used in the Wangjiaba catchment located in the upper reaches of the Huaihe River in China. Daily calibration and validation procedures were first performed for the SWAT model with long-term flow data from 1990 to 2010, after which sub-daily (Δt=2 h) calibration and validation in the SWAT-EVENT model were conducted with 24 flood events originating primarily during the flood seasons within the same time span. Daily simulation results demonstrated that the SWAT model could yield very good performances in reproducing streamflow for both whole year and flood period. Event-based flood simulation results simulated by the sub-daily SWAT-EVENT model indicated reliable performances, with ENS values varying from 0.67 to 0.95. The SWAT-EVENT model, compared to the SWAT model, particularly improved the simulation accuracies of the flood peaks. Furthermore, the SWAT-EVENT model results of the two UH parameterization methods indicated that the use of the distributed parameters resulted in a more reasonable UH characterization and better model fit compared to the lumped UH parameter.
APA, Harvard, Vancouver, ISO, and other styles
24

Khankhour, Hala, Otman Abdoun, and Jâafar Abouchabaka. "Parallel genetic approach for routing optimization in large ad hoc networks." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 748. http://dx.doi.org/10.11591/ijece.v12i1.pp748-755.

Full text
Abstract:
<span>This article presents a new approach of integrating parallelism into the genetic algorithm (GA), to solve the problem of routing in a large ad hoc network, the goal is to find the shortest path routing. Firstly, we fix the source and destination, and we use the variable-length chromosomes (routes) and their genes (nodes), in our work we have answered the following question: what is the better solution to find the shortest path: the sequential or parallel method?. All modern systems support simultaneous processes and threads, processes are instances of programs that generally run independently, for example, if you start a program, the operating system spawns a new process that runs parallel elements to other programs, within these processes, we can use threads to execute code simultaneously. Therefore, we can make the most of the available central processing unit (CPU) cores. Furthermore, the obtained results showed that our algorithm gives a much better quality of solutions. Thereafter, we propose an example of a network with 40 nodes, to study the difference between the sequential and parallel methods, then we increased the number of sensors to 100 nodes, to solve the problem of the shortest path in a large ad hoc network.</span>
APA, Harvard, Vancouver, ISO, and other styles
25

Melby, Jeffrey, Norberto Caraballo-Nadal, and Nobuhisa Kobayashi. "WAVE RUNUP PREDICTION FOR FLOOD MAPPING." Coastal Engineering Proceedings 1, no. 33 (December 28, 2012): 79. http://dx.doi.org/10.9753/icce.v33.management.79.

Full text
Abstract:
Wave runup determines the extent over which waves act. Wave runup is therefore an important parameter to determine flood inundation extents from coastal storms. Cross-shore and longshore sediment transport are a function of the hydrodynamics on the beach and are therefore related to wave runup. Several benchmark wave runup data sets are summarized and used to evaluate the available tools for predicting wave runup for flood hazard assessment. Benchmark data span a range of shoreline conditions including sandy beaches on the Pacific and Atlantic coasts, dissipative to reflective beaches, as well as structures ranging from impermeable smooth levees to rough permeable rubble mounds. Data include laboratory and prototype measurements. Tools for predicting wave runup are analyzed including empirical equations, computer programs based on empirical equations, and the CSHORE time-averaged cross-shore model. Most of the tools show fairly high degrees of skill but some do not. The study recommends using CSHORE to model runup for most beach and structure conditions. However, CSHORE is not likely to predict wave runup on infragravity-dominated dissipative beaches well. For these cases, it is recommended that one of the recommended empirical equations for beaches be used.
APA, Harvard, Vancouver, ISO, and other styles
26

Radityo, Tithan, Masimin Masimin, and Eldina Fatimah. "PENELUSURAN BANJIR PADA EMBUNG LAMBADEUK KABUPATEN ACEH BESAR." Jurnal Teknik Sipil 1, no. 4 (February 28, 2018): 1027–48. http://dx.doi.org/10.24815/jts.v1i4.10064.

Full text
Abstract:
Abstract: Lambadeuk Dam whose construction was completed in 2013. The main source of water from Lambadeuk Dam comes from a river channel located in the Lambadeuk mountain area which has a wide watershed of ± 3,1 Km2, with the storage reservoir is ± 6 Ha. This study is intended to recalculate the flood discharge plan and re-analyze flood tracking. To calculate the duration of hour-time rain used Alternating Block Method that converts hourly rain. A procedure is needed to determine the flow time and flow at a point on a flow based on a known hydrograph upstream. So flooding in the dam can be calculated the form hydrograph flood in the downstream using Hidrograf Unit Synthetic SCS. Flood search analysis in the dam using Level Pool Routing method. With a rain of 1.000 year repeat period of 268,102 mm. The flood discharge of the Q1000 plan is 59,772 m3/s. Has a storage capacity of 258.992,80 m3 at +17.80 m elevation. The peak inflow of 59,772 m3/s occurred at 11,7 hours. Dam can reduce the outflow to 42,552 m3/s and slow down the peak flow until the hour to 12,35, water level above the overflow (Hd) is 1,6 m with a width of 10 m spill. Thus the highest water elevation is at + 19,40 m, if taken free board of 2 m, then the crest embung elevation is at + 21,40 m. Continuous rain does not cause the water level of the pond to continue rising. From the results of this study can be concluded that when the peak rain conditions dam only able to accommodate the amount of flowing flow until the hour to 12,35 only. The results of this study are expected to provide information for flood forecasting and flood early warning system and support flood prevention programs both physically and non-physically. Abstrak: Embung Lambadeuk selesai dibangun tahun 2013. Sumber air utama embung Lambadeuk berasal dari alur yang berada di kawasan pegunungan Lambadeuk yang mempunyai luas DAS sebesar ± 3,1 Km2, dengan luas genangan ± 6 Ha. Penelitian ini dimaksudkan untuk menghitung kembali debit banjir rencana dan menganalisis kembali penelusuran banjir. Untuk menghitung durasi hujan jam-jaman digunakan Alternating Block Method yang mengkonversi hujan jam-jaman. Perlu dilakukan suatu prosedur untuk menentukan waktu dan debit aliran di suatu titik pada aliran berdasarkan hidrograf yang diketahui di sebelah hulu. Maka dilakukan penelusuran banjir di embung agar dapat dihitung bentuk hidrograf banjir di bagian hilirnya menggunakan Hidrograf Satuan Sintetik SCS. Analisis penelusuran banjir di embung menggunakan metode Level Pool Routing. Dengan hujan rencana periode ulang 1000 tahun sebesar 268,102 mm. Debit banjir rencana Q1000 didapat sebesar 59,772 m3/dt. Memiliki kapasitas tampungan sebesar 258.992,80 m3 pada elevasi +17,80 m. Puncak aliran masuk (inflow) sebesar 59,772 m3/dt terjadi pada jam ke 11,7. Embung dapat mereduksi aliran yang keluar (outflow) menjadi 42,552 m3/dt dan memperlambat terjadinya aliran puncak sampai pada jam ke 12,35, ketinggian air di atas pelimpah (Hd) adalah 1,6 m dengan lebar pelimpah 10 m. Dengan demikian elevasi air tertinggi berada pada + 19,40 m, jika diambil tinggi jagaan (free board) sebesar 2,0 m, maka elevasi crest embung berada pada +21,40 m. Hujan yang terus menerus tidak menyebabkan tinggi muka air embung terus menerus naik. Dari hasil penelitian tersebut dapat disimpulkan bahwa saat kondisi hujan embung hanya mampu menampung jumlah debit yang mengalir sampai pada jam ke 12,35 saja. Hasil penelitian ini diharapkan dapat memberi informasi untuk peramalan banjir dan sistem peringatan dini banjir dan mendukung program-program penanggulangan banjir baik secara fisik maupun nonfisik.
APA, Harvard, Vancouver, ISO, and other styles
27

Wise, MSCE, EIT, Richard, Andrew Darnell, MSCE, EIT, and John Quaranta, PhD, PE. "Critical review of Terrain Tile and Google Earth: Virtual image mapping methods for floodplain management." Journal of Emergency Management 10, no. 6 (March 21, 2018): 433. http://dx.doi.org/10.5055/jem.2012.0120.

Full text
Abstract:
Inundation mapping is a major component of floodplain management, providing critical information as to the consequences of potential failures of flood control structures. Flood mitigation efforts rely on the creation of inundation maps to develop appropriate response measures for crisis situations, including dam failures. To develop inundation maps, a dam and river system is modeled with engineering computer programs, and a simulation of the dam failure is performed to generate data for the flood. This output data are input into other programs to develop inundation maps. Inundation maps have traditionally been produced in a paper format, but recent advances in computer modeling have provided the capability for virtual inundation maps. Virtual inundation maps offer new methods of presentation and analysis of flood impacts; thus, these mapping methods need to be investigated to determine the applications and relevance to floodplain management. The goal of this research is to advance the development and use of inundation maps by floodplain managers and emergency agencies. A simulation of a potential dam failure was performed using computer modeling for a candidate river system, and the inundation maps were created using two procedures: Terrain Tiles and Google Earth. An analysis of the strengths and weaknesses of each mapping procedure was conducted. The results indicated that the Terrain Tiles procedure has advantages in displaying critical information, such as arrival times and water depths. However, this mapping procedure is more labor intensive, and the online file sharing may not be accessible for all users. The strengths of the Google Earth procedure include two-dimensional and three-dimensional views for analysis, user-friendly file sharing, and the inclusion of built-in critical infrastructure and terrain data. Drawbacks of this procedure are that the inundation must still be generated in ArcGIS, the display of critical information is not as clear, and the online file sharing may pose security issues. Thus, the Terrain Tiles procedure should be used for the development of emergency response measures, and the Google Earth procedure should be used by emergency responders in the event of an actual emergency.
APA, Harvard, Vancouver, ISO, and other styles
28

McGrath, H., E. Stefanakis, and M. Nastev. "RAPID RISK EVALUATION (ER<sup>2</sup>) USING MS EXCEL SPREADSHEET: A CASE STUDY OF FREDERICTON (NEW BRUNSWICK, CANADA)." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences III-8 (June 7, 2016): 27–34. http://dx.doi.org/10.5194/isprsannals-iii-8-27-2016.

Full text
Abstract:
Conventional knowledge of the flood hazard alone (extent and frequency) is not sufficient for informed decision-making. The public safety community needs tools and guidance to adequately undertake flood hazard risk assessment in order to estimate respective damages and social and economic losses. While many complex computer models have been developed for flood risk assessment, they require highly trained personnel to prepare the necessary input (hazard, inventory of the built environment, and vulnerabilities) and analyze model outputs. As such, tools which utilize open-source software or are built within popular desktop software programs are appealing alternatives. The recently developed Rapid Risk Evaluation (ER&lt;sup&gt;2&lt;/sup&gt;) application runs scenario based loss assessment analyses in a Microsoft Excel spreadsheet. User input is limited to a handful of intuitive drop-down menus utilized to describe the building type, age, occupancy and the expected water level. In anticipation of local depth damage curves and other needed vulnerability parameters, those from the U.S. FEMA’s Hazus-Flood software have been imported and temporarily accessed in conjunction with user input to display exposure and estimated economic losses related to the structure and the content of the building. Building types and occupancies representative of those most exposed to flooding in Fredericton (New Brunswick) were introduced and test flood scenarios were run. The algorithm was successfully validated against results from the Hazus-Flood model for the same building types and flood depths.
APA, Harvard, Vancouver, ISO, and other styles
29

McGrath, H., E. Stefanakis, and M. Nastev. "RAPID RISK EVALUATION (ER2) USING MS EXCEL SPREADSHEET: A CASE STUDY OF FREDERICTON (NEW BRUNSWICK, CANADA)." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences III-8 (June 7, 2016): 27–34. http://dx.doi.org/10.5194/isprs-annals-iii-8-27-2016.

Full text
Abstract:
Conventional knowledge of the flood hazard alone (extent and frequency) is not sufficient for informed decision-making. The public safety community needs tools and guidance to adequately undertake flood hazard risk assessment in order to estimate respective damages and social and economic losses. While many complex computer models have been developed for flood risk assessment, they require highly trained personnel to prepare the necessary input (hazard, inventory of the built environment, and vulnerabilities) and analyze model outputs. As such, tools which utilize open-source software or are built within popular desktop software programs are appealing alternatives. The recently developed Rapid Risk Evaluation (ER<sup>2</sup>) application runs scenario based loss assessment analyses in a Microsoft Excel spreadsheet. User input is limited to a handful of intuitive drop-down menus utilized to describe the building type, age, occupancy and the expected water level. In anticipation of local depth damage curves and other needed vulnerability parameters, those from the U.S. FEMA’s Hazus-Flood software have been imported and temporarily accessed in conjunction with user input to display exposure and estimated economic losses related to the structure and the content of the building. Building types and occupancies representative of those most exposed to flooding in Fredericton (New Brunswick) were introduced and test flood scenarios were run. The algorithm was successfully validated against results from the Hazus-Flood model for the same building types and flood depths.
APA, Harvard, Vancouver, ISO, and other styles
30

Hagg, Wilfried, Stefan Ram, Alexander Klaus, Simon Aschauer, Sinan Babernits, Dennis Brand, Peter Guggemoos, and Theodor Pappas. "Hazard Assessment for a Glacier Lake Outburst Flood in the Mo Chu River Basin, Bhutan." Applied Sciences 11, no. 20 (October 12, 2021): 9463. http://dx.doi.org/10.3390/app11209463.

Full text
Abstract:
The frequency of glacier lake outbursts floods (GLOFs) is likely to increase with the ongoing glacier retreat, which produces new glacial lakes and enlarges existing ones. Here, we simulate the outburst of a potentially dangerous glacial lake in Bhutan by applying hydrodynamic modelling. Although the lake volume is known, several parameters connected to the dam breach and the routing of the flood are rough estimates or assumptions, which introduce uncertainties in the results. For this reason, we create an ensemble of nine outburst scenarios. The simulation of magnitude and timing of possible inundation depths is an important asset to prepare emergency action plans. For our case study in the Mo Chu River Basin, the results show that, even under the worst case scenario, little damage to residential buildings can be expected. However, such an outburst flood would probably destroy infrastructure and farmland and might even affect the operation of a hydroelectric powerplant more than 120 km downstream the lake. Our simulation efforts revealed that, by using a 30-m elevation model instead of a 5-m raster, flood magnitude and inundation areas are overestimated significantly, which highly suggests the use of high-resolution terrain data. These results may be a valuable input for risk mitigation efforts.
APA, Harvard, Vancouver, ISO, and other styles
31

Mishra, Debesh, and Suchismita Satapathy. "MCDM Approach for Mitigation of Flooding Risks in Odisha (India) Based on Information Retrieval." International Journal of Cognitive Informatics and Natural Intelligence 14, no. 2 (April 2020): 77–91. http://dx.doi.org/10.4018/ijcini.2020040105.

Full text
Abstract:
Multi-criteria decision-making (MCDM) provides a suitable platform for groups as well as promotion of the participants' role in decision processes. This also enables the development of real participatory processes essential for the successful implementation and sustainable flood management programs. The present study contributes by applying two MCDM approaches for weighting the criteria related to the environmental impacts of flooding. Moreover, an attempt was made in this study by an extensive review of literature, and consultations with experts to identify the environmental impacts of flooding in Odisha State (India). Then, the Best Worst Method (BWM) followed by the Step-Wise Weight Assessment Ratio Analysis (SWARA) method was used to rank the environmental impacts which were considered as the risk factors. The result of this study will be useful to the governance system for an effective and proper planning, and implementation of flood mitigation projects.
APA, Harvard, Vancouver, ISO, and other styles
32

Gacu, Jerome G., Cris Edward F. Monjardin, Delia B. Senoro, and Fibor J. Tan. "Flood Risk Assessment Using GIS-Based Analytical Hierarchy Process in the Municipality of Odiongan, Romblon, Philippines." Applied Sciences 12, no. 19 (September 21, 2022): 9456. http://dx.doi.org/10.3390/app12199456.

Full text
Abstract:
The archipelagic Romblon province frequently experiences typhoons and heavy rains that causes extreme flooding, this produces particular concern about the severity of damage in the Municipality of Odiongan. Hence, this study aimed to assess the spatial flood risk of Odiongan using the analytical hierarchy process (AHP), considering disaster risk factors with data collected from various government agencies. The study employed the geographic information system (GIS) to illustrate the spatial distribution of flooding in the municipality. Sendai Framework was the basis of risk analysis in this study. The hazard parameters considered were average annual rainfall, elevation, slope, soil type, and flood depth. Population density, land use, and household number were considered parameters for the exposure assessment. Vulnerability assessments considered gender ratio, mean age, average income, number of persons with disabilities, educational attainment, water usage, emergency preparedness, type of structures, and distance to evacuation area as physical, social, and economic factors. Each parameter was compared to one another by pairwise comparison to identify the weights based on experts’ judgment. These weights were then integrated into the flood risk assessment computation. The results led to a flood risk map which recorded nine barangays (small local government units) at high risk of flooding, notably the Poblacion Area. The results of this study will guide local government units in developing prompt flood management programs, appropriate mitigation measures, preparedness, and response and recovery strategies to reduce flood risk and vulnerability to the population of Odiongan.
APA, Harvard, Vancouver, ISO, and other styles
33

David, Ioan, Erika Beilicci, and Zsuzsanna Nagy. "Life-Long Learning Know-How Transfer Centers for Flood Risk Assessment in Romania and Hungary." International Journal of Systems Applications, Engineering & Development 15 (November 28, 2021): 198–201. http://dx.doi.org/10.46300/91015.2021.15.29.

Full text
Abstract:
The sector affected by surplus or scarcity of water requires proper understanding of river and landscape system behavior, what is possible to be done to prevent potential damages and losses need skilled professionals, who are familiar also with the newest IT based hydroinformatic tools and technological achievements to find the best possible solutions. An extensive programs of Water Authorities in Romania and in Hungary have been running to provide flood risk maps in all the main river basins including also those which across the both countries. The obtained results will be contribute to the better understanding and general prediction of flooding on the major river systems and assist the governments to act (in real time and space) in accordance with contingency planning based on flood risk management plans, moreover future development plans of regions and cities will get a proper guidance and platforms for future feasibility studies. However Flood Directive implementation has been ongoing in Romania and Hungary, `bridging and direct trainings` for relevant sectors as it is planned in this project have not been provided and have not been planned for future in Romania and Hungary. Based on these needs in 2011 was initiated and organized an international cooperation project financed by the European Union with the theme: “Development of knowledge canters for life-long learning by involving of specialists and decision makers in flood risk management using advanced Hydroinformatic tools” [1]. In this paper we give a brief overview of the main objectives proposed, a description of the partners and some aspects of the activities developed in the project and some of the results obtained
APA, Harvard, Vancouver, ISO, and other styles
34

Manik, Ngarap Im. "Perancangan Program Peramalan Kanal Banjir Barat Jakarta Menggunakan Autoregresi Multivariant." ComTech: Computer, Mathematics and Engineering Applications 3, no. 1 (June 1, 2012): 186. http://dx.doi.org/10.21512/comtech.v3i1.2402.

Full text
Abstract:
This paper discusses the design of computer programs that is able to discern the characteristics description of water surface elevation data in Manggarai water gate, which variable is the most influential on the water surface elevation model and find a proper flood forecasting model using multivariate autoregressive model. The result of this study is able to assist the water gate officer in delivering early warning, prevention and anticipation of flood countermeasure. The forecast equation model obtained is Yt = 109,.7828 + 0,9291 CHt-6 – 24,484 T t-2 – 0,06245 PM t-2 + 1,4706 KB t-2 in which temperature and water surface elevation is a variable that owns the strongest correlation. This variable owns negative correlation which means that if the temperature falls, the water levels will rise. The coefficient of determination has a value of R2 = 0.4056 and the Durbin Watson statistics for DW = 0.7429.
APA, Harvard, Vancouver, ISO, and other styles
35

A.A., Petunin, Chentsov A.G., and Chentsov P.A. "Some applications of optimization routing problems with additional constraints." Vestnik Udmurtskogo Universiteta. Matematika. Mekhanika. Komp'yuternye Nauki 32, no. 2 (June 2022): 187–210. http://dx.doi.org/10.35634/vm220203.

Full text
Abstract:
The paper deals with an extremal routing problem with constraints. In the general formulation, it is assumed that the objects of visiting are any non-empty finite sets — megalopolises. The main applied problem considered in this study is the tool path optimization problem for CNC sheet-cutting machines, known as the Cutting Path Problem. This problem arises at the stage of developing control programs for CNC machines. Other applications are also possible. In particular, the results obtained in the chapter can be used in the problem of minimizing the radiation dose when dismantling a system of radiation-hazardous elements after accidents at nuclear power plants and in transport problems. Among tasks constraints, the precedence constraints are investigated. These constraints can be used to reduce computational complexity. As the main method, the study used broadly understood dynamic programming. The offered realization of the method takes into account the precedence constraints and the dependence of the objective functions on the task list. This dependence belongs to the class of very complex conditions that determine the route admissibility at each routing step, depending on the tasks already completed or, on the contrary, not yet completed. As applied to the Cutting Path Problem, the dependence of the objective function on the task list makes it possible to reduce thermal deformations of the material during cutting. The chapter provides a mathematical formalization of an extremal routing problem with additional constraints, a description of the method, and the exact algorithm obtained with its help. The order of task execution, the specific trajectory of the process, and the starting point are optimized.
APA, Harvard, Vancouver, ISO, and other styles
36

Zhang, Yinggui, Zengru Chen, Min An, and Aliyu Mani Umar. "An Integration of Train Timetabling, Platforming and Routing-Based Cooperative Adjustment Methodology for Dealing with Train Delay." International Journal of Software Engineering and Knowledge Engineering 30, no. 07 (July 2020): 901–19. http://dx.doi.org/10.1142/s0218194020400112.

Full text
Abstract:
Train delay is a serious issue that can spread rapidly in the railway network leading to further delay of other trains and detention of passengers in stations. However, the current practice in the event of the trail delay usually depends on train dispatcher’s experience, which cannot manage train operation effectively and may have safety risks. The application of intelligent railway monitor and control system can improve train operation management while increasing railway safety. This paper presents a methodology in which train timetabling, platforming and routing models are combined by studying the real-time adjustment and optimization of high-speed railway in the case of the train delay in order to produce a cooperative adjustment algorithm so that the train operation adjustment plan can be obtained. MATLAB computer programs have been developed based on the proposed methodology and adjustment criteria have been established from knowledge data bases in order to calculate optimized solutions. A case study is used to demonstrate the proposed methodology. The results show that the proposed method can quickly adjust the train operation plan in the case of the train delay, restore the normal train operation order, and reduce the impact of train delay on railway network effectively and efficiently.
APA, Harvard, Vancouver, ISO, and other styles
37

Mowla, Nishat, Inshil Doh, and Kijoon Chae. "CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word." Computer Science and Information Systems 15, no. 1 (2018): 163–85. http://dx.doi.org/10.2298/csis170328044m.

Full text
Abstract:
Content Delivery Networks (CDNs) are increasingly deployed for their efficient content delivery and are often integrated with Software Defined Networks (SDNs) to achieve centrality and programmability of the network. However, these networks are also an attractive target for network attackers whose main goal is to exhaust network resources. One attack approach is to over-flood the OpenFlow switch tables containing routing information. Due to the increasing number of different flooding attacks such as DDoS, it becomes difficult to distinguish these attacks from normal traffic when evaluated with traditional attack detection methods. This paper proposes an architectural method that classifies and defends all possible forms of DDoS attack and legitimate Flash Crowd traffic using a segregated dimension functioning cognitive process based in a controller module. Our results illustrate that the proposed model yields significantly enhanced performance with minimal false positives and false negatives when classified with optimal Support Vector Machine and Logistic Regression algorithms. The traffic classifications initiate deployment of security rules to the OpenFlow switches, preventing new forms of flooding attacks. To the best of our knowledge, this is the first work conducted on SDN-driven CDNi used to detect and defend against all possible DDoS attacks through traffic segregated dimension functioning coupled with cognitive classification.
APA, Harvard, Vancouver, ISO, and other styles
38

Garcia Ribera, Eric, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, and Vassilios G. Vassilakis. "An Intrusion Detection System for RPL-Based IoT Networks." Electronics 11, no. 23 (December 5, 2022): 4041. http://dx.doi.org/10.3390/electronics11234041.

Full text
Abstract:
The Internet of Things (IoT) has become very popular during the last decade by providing new solutions to modern industry and to entire societies. At the same time, the rise of the industrial Internet of Things (IIoT) has provided various benefits by linking infrastructure around the world via sensors, machine learning, and data analytics. However, the security of IoT devices has been proven to be a major concern. Almost a decade ago, the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was designed to handle routing in IoT and IIoT. Since then, numerous types of attacks on RPL have been published. In this paper, a novel intrusion detection system (IDS) is designed and implemented for RPL-based IoT. The objective is to perform an accurate and efficient detection of various types of routing and denial-of-service (DoS) attacks such as version number attack, blackhole attack, and grayhole attack, and different variations of flooding attacks such as Hello flood attack, DIS attack, and DAO insider attack. To achieve this, different detection strategies are combined, taking advantage of the strengths of each individual strategy. In addition, the proposed IDS is experimentally evaluated by performing a deep analysis of the aforementioned attacks in order to study the impact caused. This evaluation also estimates the accuracy and effectiveness of the IDS performance when confronted with the considered attacks. The obtained results show high detection accuracy. Furthermore, the overhead introduced in terms of CPU usage and power consumption is negligible. In particular, the CPU usage overhead is less than 2% in all cases, whereas the average power consumption increase is no more than 0.5%, which can be considered an insignificant impact on the overall resource utilisation.
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Xiao Gen, Zhi Quan Huang, Tong Jiang, and An Ming Wang. "Real-Time Interactive Multi-Resolution Watershed Model." Advanced Materials Research 236-238 (May 2011): 2290–94. http://dx.doi.org/10.4028/www.scientific.net/amr.236-238.2290.

Full text
Abstract:
Through the researches and discussions of each constituents of multi-resolution watershed model, the article comes to the conclusion that could apply the LOD(Level of Detail, LOD) technique , the blanking technique and so on to the deletions and replaces of DEM(Digital Elevation Model, DEM) data nodes and the unimportant watershed region in the multi-resolution watershed model, the remote sensing images, the multi-resolution building model, the multi-resolution flood routing model. The method could reduce the data quantity of valley model. The experiment has proved that the multi-resolution watershed model with the applications of this method could not only express three dimensional virtual large scene of the watershed better, but also make the visualization of the mass data model in real-time interactive manner in condition of the computer capability nowadays. This achievement has provided the new thought for the compression of remote sensing images and data transmission of WebGIS in real-time interactive manner.
APA, Harvard, Vancouver, ISO, and other styles
40

Lin, Yung Chin, Kuo Lan Su, and Chih Hung Chang. "Development of the Searching Algorithm with Complexity Environment for Mobile Robots." Applied Mechanics and Materials 284-287 (January 2013): 1826–30. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.1826.

Full text
Abstract:
The article programs the shortest path searching problems of the mobile robot in the complexity unknown environment, and uses the mobile robot to present the movement scenario from the start point to the target point in a collision-free space. The complexity environment contains variety obstacles, such as road, tree, river, gravel, grass, highway and unknown obstacle. We set the relative dangerous grade for variety obstacles. The mobile robot searches the target point to locate the positions of unknown obstacles, and avoids these obstacles moving in the motion platform. We develop the user interface to help users filling out the positions of the mobile robot and the obstacles on the supervised computer, such the initial point of the mobile robot, the start point and the target point. The supervised computer programs the motion paths of the mobile robot according to A* searching algorithm, flood-fill algorithm and 2-op exchange algorithm The simulation results present the proposed algorithms that program the shortest motion paths from the initial point approach to the target point for the mobile robot. The supervised computer controls the mobile robot that follows the programmed motion path moving to the target point in the complexity environment via wireless radio frequency (RF) interface.
APA, Harvard, Vancouver, ISO, and other styles
41

Rakhymberdina, M. Ye, E. V. Grokhotov, Zh A. Assylkhanova, and M. M. Toguzova. "USING SPACE SURVEY MATERIALS FOR MODELING HYDRODYNAMIC ACCIDENTS AT MINING ENTERPRISES IN KAZAKHSTAN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-5/W1-2022 (February 3, 2022): 193–98. http://dx.doi.org/10.5194/isprs-archives-xlvi-5-w1-2022-193-2022.

Full text
Abstract:
Abstract. The timeliness of using modern computer programs for modelling flood zones, the consequences of hydraulic accidents, dam breakthroughs, flood and flood forecasting in a complex system of rivers and channels for the prevention of hydro meteorological emergencies is beyond doubt. The use of BIM technologies will make it possible to move from point-based flood risk assessments to areal ones, which will significantly improve the reliability of planned measures to prevent natural and anthropogenic emergencies.The purpose - to perform works on modelling of hydrodynamic accident and forecast of its development by the example of tailings dumps in concentration plant in East Kazakhstan. As the initial data - digital model for the area of work, technical reports on engineering-hydrographical survey, topographic-geodetic works, engineering-geological survey, high-resolution satellite images in a panchromatic survey mode. On the basis of geoinformation modelling methods with use of initial and remote sensing data, final digital terrain model was built in Digital software. The method based on direct hydrodynamic modelling of area flooding was used to calculate hydrodynamic accidents, to model the dynamics of area flooding because of tailings dam break in several levels. The practical result is numerical hydrodynamic modelling of dynamics flooding area because of partial destruction, erosion of embankment dam of tailings concentrator, total area and extent of flooding, as well as the area and depth of partially flooded buildings of residential development was estimated, thematic maps of flooded area were created, as well as maps of water passage with flow velocities during the hydrodynamic accident.Thus, the application of advanced space imagery, GIS technologies in full measure allow for simulating the occurrence, development of hydrodynamic accidents in structures, to determine area, time of flooding.
APA, Harvard, Vancouver, ISO, and other styles
42

Abdullah, Abdullah, and Rizki Fitriana. "SISTEM PERINGATAN DINI BANJIR BERDASARKAN KETINGGIAN AIR, DEBIT AIR DAN CURAH HUJAN DILENGKAPI DENGAN SISTEM MONITORING DATA SENSOR." ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA 4, no. 1 (May 4, 2020): 16. http://dx.doi.org/10.30829/algoritma.v4i1.7243.

Full text
Abstract:
<p><em>The river often overflows during the rainy season and floods very detrimental. For the community. Therefore designed a monitoring tool and water discharge and rainfall intensity. This tool is constructed using a combination of water level sensors, ultrasonic sensors (SRF-05) and water flow to produce a monitoring system that provides participation early banji, make a program that can display the results surface monitoring and air discharge. See flood early and learn about the performance of surface monitoring systems and flood air discharge with faster rainfall and understand the microcontroller in measuring and controlling system. Tests carried out with aquarium prototypes and carried out. Measurement for one day on a continuous basis. Test results show that this tool can be updated reminded of flood early efficiently. With Thus, the tool designed is able to monitor the height of water activity, discharge and rainfall in rivers, programs are made capable run the designed tool and the results of monitoring can be accessed through LCD that is able to visualize water activities and this early permit system able to work to measure the height and air discharger rain and be able to implement data input from sensors too displays data on the state of the river so that it can be monitored through a computer. As well as a microcontroller capable of measuring and controlling the system accurately and input data from sensors in height and air discharge measurements as well. Rainfall intensity can be monitored via computer.</em></p><p> </p><p><strong><em>Keywords: </em></strong><em>Rainfall, </em><em>Water Discharge, Water level, Monitoring</em></p>
APA, Harvard, Vancouver, ISO, and other styles
43

Galay, V. J., R. S. Pentland, and R. A. Halliday. "Degradation of the South Saskatchewan River below Gardiner Dam." Canadian Journal of Civil Engineering 12, no. 4 (December 1, 1985): 849–62. http://dx.doi.org/10.1139/l85-098.

Full text
Abstract:
The construction of Gardiner Dam on the South Saskatchewan River has resulted in the trapping of substantial sediment loads within the reservoir, causing some degradation of the riverbed below the dam. Analysis of cross-section and sediment data collected since the closure of the dam indicates that the average bed level has dropped 2 m (6.5 ft) downstream of the dam and that the bed has started to armour (become coarser). The degradation has progressed approximately 8 km (5 mi) below the dam. The pattern of the river channel has not altered significantly and the river has become more stable since the operation of the dam, especially in the lower reach just above Saskatoon.Detailed computations using the U.S. Army Corps of Engineers HEC-6 sediment model indicate that, by the year 2001, total degradation may be about 5.3 m (13.8 ft). The computer model also verifies that a high flood release could result in a substantial increase to the degradation that has already taken place. Key words: river behaviour, degradation, fluvial processes, sediment routing model.
APA, Harvard, Vancouver, ISO, and other styles
44

Benoit, R., N. Kouwen, W. Yu, S. Chamberland, and P. Pellerin. "Hydrometeorological aspects of the Real-Time Ultrafinescale Forecast Support during the Special Observing Period of the MAP<sup>*</sup>." Hydrology and Earth System Sciences 7, no. 6 (December 31, 2003): 877–89. http://dx.doi.org/10.5194/hess-7-877-2003.

Full text
Abstract:
Abstract. During the Special Observation Period (SOP, 7 September–15 November, 1999) of the Mesoscale Alpine Programme (MAP), the Canadian Mesoscale Compressible Community Model (MC2) was run in real time at a horizontal resolution of 3 km on a computational domain of 350☓300☓50 grid points, covering the whole of the Alpine region. The WATFLOOD model was passively coupled to the MC2; the former is an integrated set of computer programs to forecast flood flows, using all available data, for catchments with response times ranging from one hour to several weeks. The unique aspect of this contribution is the operational application of numerical weather prediction data to forecast flows over a very large, multinational domain. An overview of the system performance from the hydrometeorological aspect is presented, mostly for the real-time results, but also from subsequent analyses. A streamflow validation of the precipitation is included for large basins covering upper parts of the Rhine and the Rhone, and parts of the Po and of the Danube. In general, the MC2/WATFLOOD model underestimated the total runoff because of the under-prediction of precipitation by MC2 during the MAP SOP. After the field experiment, a coding error in the cloud microphysics scheme of MC2 explains this underestimation to a large extent. A sensitivity study revealed that the simulated flows reproduce the major features of the observed flow record for most of the flow stations. The experiment was considered successful because two out of three possible flood events in the Swiss-Italian border region were predicted correctly by data from the numerical weather models linked to the hydrological model and no flow events were missed. This study has demonstrated that a flow forecast from a coupled atmospheric-hydrological model can serve as a useful first alert and quantitative forecast. Keywords: mesoscale atmospheric model, hydrological model, flood forecasting, Alps
APA, Harvard, Vancouver, ISO, and other styles
45

Khamprapai, Wanida, Cheng-Fa Tsai, Paohsi Wang, and Chi-En Tsai. "Multiple-Searching Genetic Algorithm for Whole Test Suites." Electronics 10, no. 16 (August 19, 2021): 2011. http://dx.doi.org/10.3390/electronics10162011.

Full text
Abstract:
A test suite is a set of test cases that evaluate the quality of software. The aim of whole test suite generation is to create test cases with the highest coverage scores possible. This study investigated the efficiency of a multiple-searching genetic algorithm (MSGA) for whole test suite generation. In previous works, the MSGA has been effectively used in multicast routing of a network system and in the generation of test cases on individual coverage criteria for small- to medium-sized programs. The performance of the algorithms varies depending on the problem instances. In this experiment were generated whole test suites for complex programs. The MSGA was expanded in the EvoSuite test generation tool and compared with the available algorithms on EvoSuite in terms of the number of test cases, the number of statements, mutation score, and coverage score. All algorithms were evaluated on 14 problem instances with different corpus to satisfy multiple coverage criteria. The problem instances were Java open-source projects. Findings demonstrate that the MSGA generated test cases reached greater coverage scores and detected a larger number of faults in the test class when compared with the others.
APA, Harvard, Vancouver, ISO, and other styles
46

Truden, Christian, Kerstin Maier, Anna Jellen, and Philipp Hungerländer. "Computational Approaches for Grocery Home Delivery Services." Algorithms 15, no. 4 (April 9, 2022): 125. http://dx.doi.org/10.3390/a15040125.

Full text
Abstract:
The steadily growing popularity of grocery home-delivery services is most likely based on the convenience experienced by its customers. However, the perishable nature of the products imposes certain requirements during the delivery process. The customer must be present when the delivery arrives so that the delivery process can be completed without interrupting the cold chain. Therefore, the grocery retailer and the customer must mutually agree on a time window during which the delivery can be guaranteed. This concept is referred to as the attended home delivery (AHD) problem in the scientific literature. The phase during which customers place orders, usually through a web service, constitutes the computationally most challenging part of the logistical processes behind such services. The system must determine potential delivery time windows that can be offered to incoming customers and incrementally build the delivery schedule as new orders are placed. Typically, the underlying optimization problem is a vehicle routing problem with a time windows. This work is concerned with a case given by an international grocery retailer’s online shopping service. We present an analysis of several efficient solution methods that can be employed to AHD services. A framework for the operational planning tools required to tackle the order placement process is provided. However, the basic framework can easily be adapted to be used for many similar vehicle routing applications. We provide a comprehensive computational study comparing several algorithmic strategies, combining heuristics utilizing local search operations and mixed-integer linear programs, tackling the booking process. Finally, we analyze the scalability and suitability of the approaches.
APA, Harvard, Vancouver, ISO, and other styles
47

van Luijtelaar, H., and P. P. G. Ganzevles. "Dynamic Design of Sewer Detention Tanks." Water Science and Technology 27, no. 5-6 (March 1, 1993): 133–43. http://dx.doi.org/10.2166/wst.1993.0493.

Full text
Abstract:
In the Netherlands new regulations regarding combined sewer overflows have been proposed to reduce the pollution of surface water. These regulations will lead to the construction of ancillary sewer facilities. The current design methods are not suitable for optimizing measures to control overflow loads. Therefore a new method, called ‘Dynamic Design', is proposed. This design method is based upon the use of time series of rainfall and advanced computer programs. By using longterm continuous simulation in combination with historical time series of rainfall overflow volumes, discharge durations and frequencies can be derived. These results can be analysed statistically to obtain frequency distributions of overflow volumes and discharge flows. This procedure ensures not only the assessment of detention tanks but also the evaluation of alternative measures like real time control and flow routing strategies. Dynamic design aims at the efficient use of ancillary sewer facilities to minimise receiving water impact. Several cases are discussed to show the advantages of dynamic design in comparison with current design procedures.
APA, Harvard, Vancouver, ISO, and other styles
48

Yu, Miao, Viswanath Nagarajan, and Siqian Shen. "Improving Column Generation for Vehicle Routing Problems via Random Coloring and Parallelization." INFORMS Journal on Computing 34, no. 2 (March 2022): 953–73. http://dx.doi.org/10.1287/ijoc.2021.1105.

Full text
Abstract:
We consider a variant of the vehicle routing problem (VRP) where each customer has a unit demand and the goal is to minimize the total cost of routing a fleet of capacitated vehicles from one or multiple depots to visit all customers. We propose two parallel algorithms to efficiently solve the column-generation-based linear-programming relaxation for this VRP. Specifically, we focus on algorithms for the “pricing problem,” which corresponds to the resource-constrained elementary shortest path problem. The first algorithm extends the pulse algorithm for which we derive a new bounding scheme on the maximum load of any route. The second algorithm is based on random coloring from parameterized complexity which can be also combined with other techniques in the literature for improving VRPs, including cutting planes and column enumeration. We conduct numerical studies using VRP benchmarks (with 50–957 nodes) and instances of a medical home care delivery problem using census data in Wayne County, Michigan. Using parallel computing, both pulse and random coloring can significantly improve column generation for solving the linear programming relaxations and we can obtain heuristic integer solutions with small optimality gaps. Combining random coloring with column enumeration, we can obtain improved integer solutions having less than 2% optimality gaps for most VRP benchmark instances and less than 1% optimality gaps for the medical home care delivery instances, both under a 30-minute computational time limit. The use of cutting planes (e.g., robust cuts) can further reduce optimality gaps on some hard instances, without much increase in the run time. Summary of Contribution: The vehicle routing problem (VRP) is a fundamental combinatorial problem, and its variants have been studied extensively in the literature of operations research and computer science. In this paper, we consider general-purpose algorithms for solving VRPs, including the column-generation approach for the linear programming relaxations of the integer programs of VRPs and the column-enumeration approach for seeking improved integer solutions. We revise the pulse algorithm and also propose a random-coloring algorithm that can be used for solving the elementary shortest path problem that formulates the pricing problem in the column-generation approach. We show that the parallel implementation of both algorithms can significantly improve the performance of column generation and the random coloring algorithm can improve the solution time and quality of the VRP integer solutions produced by the column-enumeration approach. We focus on algorithmic design for VRPs and conduct extensive computational tests to demonstrate the performance of various approaches.
APA, Harvard, Vancouver, ISO, and other styles
49

Smith, Peter N. "Hydrologic Data Development System." Transportation Research Record: Journal of the Transportation Research Board 1599, no. 1 (January 1997): 118–27. http://dx.doi.org/10.3141/1599-15.

Full text
Abstract:
The Hydrologic Data Development System is a prototype system of spatial data and menu-driven programs that allows user-interactive determination of hydrologic parameters and estimation of flood-frequency relationships for the design of highway drainage structures. The program employs Arc/Info, a commercial geographical information system. A data base was developed to cover the extent of Texas at a scale of 1:2,000,000 and a smaller sample area of northeast Texas at a scale of 1:250,000. The data include digital-elevation models, major highways, soil characteristics, design rainfall depth-frequency-duration, land use, stream gauge sites, hydrologic regions, and political boundaries. New tables were developed to spatially relate soil characteristics and land use to runoff coefficients used in the Natural Resources Conservation Service Runoff Curve Number method. The system employs spatial-analysis techniques to establish an outfall, to delineate drainage boundaries and flow paths using relevant digital-elevation data, and to use other data layers to determine parameters such as average watershed slope, time of concentration, area-weighted runoff curve numbers, and area-weighted design rainfall. Input files can be established and submitted to the Texas Hydraulic System computer program to determine food-frequency relationships.
APA, Harvard, Vancouver, ISO, and other styles
50

Uhlig, Steve. "The April 2022 issue." ACM SIGCOMM Computer Communication Review 52, no. 2 (April 30, 2022): 1. http://dx.doi.org/10.1145/3544912.3544913.

Full text
Abstract:
This April 2022 issue contains five technical papers and two editorial notes. The first technical paper, Data-Plane Security Applications in Adversarial Settings , by Liang Wang and colleagues, investigates security issues that may arise when creating and running data-plane applications for programmable switches. This work moves security analysis and design forward in this particular area. This paper also calls for a more thorough rethinking of security for data-plane applications for programmable switches. The second technical paper, One Bad Apple Can Spoil Your IPv6 Privacy , by Said Jawad Saidi and colleagues, leverages IPv6 passive measurements to pinpoint that a non-negligible portion of devices encodes their MAC address in their IPv6 address. This threatens users' privacy, allowing content providers and CDNs to consistently track users and their devices across multiple sessions and locations. Overall, the paper is an excellent contribution toward privacy-by-design solutions and a nicely executed measurements study that clarifies the problem and provides solid suggestions to mitigate the problem. The third technical paper, Hyper-Specific Prefixes: Gotta Enjoy the Little Things in Interdomain Routing , by Khwaja Zubair Sediqi and colleagues, investigates the presence of high-specific prefixes (HSP) on the BGP Internet routing during the last decade. These prefixes are more-specific than /24 (/48) for IPv4 (IPv6) and are commonly filtered by Autonomous Systems operators. Overall this paper offers a nice contribution to the understanding of the BGP universe, with a clear message and a nice quantification of the phenomenon. The authors clearly present and motivate the work, offering also to not experts a nice view of the routing complexity of the nowadays internet. The fourth technical paper, Programming Socket-Independent Network Functions with Nethuns , by Nicola Bonelli and colleagues, proposes a new solution to transparently develop packet-processing programs on top of different network I/O frameworks. The authors design and develop an open-source library, nethuns, serving as a unified programming abstraction for network functions that natively supports multi-core programming. Not only is this work very relevant to our community, but also the code is released open-source through a BSD license, which can be used to foster more research in the area, towards unifying programming mechanisms of end-host networking. The fifth technical paper, Measuring DNS over TCP in the Era of Increasing DNS Response Sizes: A View from the Edge , by Mike Kosek and colleagues, studies one of the foundations of today's Internet: the Domain Name Service (DNS). The original RFC document of DNS instructs to send queries either over UDP (DoUDP) or TCP (DoTCP). This paper presents a measurement study on DoTCP focusing on two perspectives: failure rates and response times. Finally, we have two editorial notes. A Case for an Open Customizable Cloud Network , by Dean H. Lorenz and his colleagues, argues for the desirability of the new ecosystem of managed network solutions to connect to the Cloud, outlines the main requirements and sketches possible solutions. Recommendations for Designing Hybrid Conferences , by Vaibhav Bajpai and colleagues, presents guidelines and considerations-spanning technology, organization and social factors-for organizing successful hybrid conferences. I hope that you will enjoy reading this new issue and welcome comments and suggestions on CCR Online (https://ccronline.sigcomm.org) or by email at ccr-editor at sigcomm.org.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography