Automatic calibration of groundwater models using global optimization techniques
نویسندگان
چکیده
منابع مشابه
Automatic Retinal Registration using Global Optimization Techniques
In this paper, a new automatic scheme to register retinal images is presented and is currently tested in a clinical environment. The scheme considers the suitability and efficiency of different image transformation models and function optimization techniques, following an initial preprocessing stage. Three different transformation models -Affine, Bilinear and Projectiveas well as two global opt...
متن کاملAutomatic Calibration of HEC-HMS Model Using Multi-Objective Fuzzy Optimal Models
Estimation of parameters of a hydrologic model is undertaken using a procedure called “calibration” in order to obtain predictions as close as possible to observed values. This study aimed to use the particle swarm optimization (PSO) algorithm for automatic calibration of the HEC-HMS hydrologic model, which includes a library of different event-based models for simulating the rainfall-runoff pr...
متن کاملGroundwater Remediation Strategy Using Global Optimization Algorithms
The remediation of groundwater contamination by pumping and injection is generally a long-term and costly strategy. Aquifer cleanup time is a highly nonlinear and nonconvex function of pumping rates. The cleanup objective often involves minimizing or constraining the cleanup time or cleanup cost. Linear programming and nonlinear optimization cannot guarantee the global solution. In this study, ...
متن کاملToward calibration of regional groundwater models using GRACE data
0022-1694/$ see front matter 2011 Published by doi:10.1016/j.jhydrol.2011.10.025 ⇑ Corresponding author. Present address: Bureau o School of Geosciences, University of Texas at Austi Tel.: +1 512 475 6190. E-mail address: [email protected] (A.Y. Sun). Regional groundwater models are increasingly used for shortand long-termwater resources planning, in anticipation of greater climate variability and ...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Hydrological Sciences Journal
سال: 1999
ISSN: 0262-6667,2150-3435
DOI: 10.1080/02626669909492287