Developing reservoir operational decision rule by genetic programming

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing optimal operating reservoir rule-curves in drought periods

In this study a simulation-optimization model is developed for deriving operation rule-curves in drought ‎periods. To each reservoir, two rule-curves with adjustable monthly levels are introduced dividing the ‎reservoir capacity into three zones between the normal water level and minimum operation level. To each ‎zone of a reservoir and for each month of the year a hedging coefficient is introd...

متن کامل

Co-evolutionary Rule-Chaining Genetic Programming

A novel Genetic Programming (GP) paradigm called Coevolutionary Rule-Chaining Genetic Programming (CRGP) has been proposed to learn the relationships among attributes represented by a set of classification rules for multi-class problems. It employs backward chaining inference to carry out classification based on the acquired acyclic rule set. Its main advantages are: 1) it can handle more than ...

متن کامل

Using Genetic Programming to Increase Rule Quality

Rule extraction is a technique aimed at transforming highly accurate opaque models like neural networks into comprehensible models without losing accuracy. G-REX is a rule extraction technique based on Genetic Programming that previously has performed well in several studies. This study has two objectives, to evaluate two new fitness functions for G-REX and to show how G-REX can be used as a ru...

متن کامل

Genetic Programming for Design Grammar Rule Induction

The knowledge engineering effort associated with defining grammar systems can become a barrier for the practical use of such systems. Existing grammar and rule induction algorithms offer rather limited support for discovering context-sensitive graph grammar rules as required by some applications in the domain of engineering design. For this task the present work proposes a rule induction method...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Hydroinformatics

سال: 2012

ISSN: 1464-7141,1465-1734

DOI: 10.2166/hydro.2012.140