Application of computer based simulation in gas network system using graph theory algorithms and numerical methods
The existing gas network software is highly depending on the Breadth First Search (BFS) and the Depth First Search (DFS) in performing gas network computation of any topology. This is causing the other graph theory algorithms remain least known to users. Apart from that, there are many numerical met...
| Main Author: | Poh, Hong Hwee |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/6801/1/PohHonhHweeMFKKKSA2007.pdf |
Similar Items
Fuzzy neural networks with genetic algorithm-based learning method
by: Mashinchi, M. Reza
Published: (2013)
by: Mashinchi, M. Reza
Published: (2013)
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
by: Nur Aniza, Alang Ismail
Published: (2009)
by: Nur Aniza, Alang Ismail
Published: (2009)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Exam Timetabling Using Graph Colouring Approach
by: Norwahida Syazwani, Othman
Published: (2010)
by: Norwahida Syazwani, Othman
Published: (2010)
Vibration based bearing fault diagnosis identification using neural network
by: Tan, Hwee Mean
Published: (2013)
by: Tan, Hwee Mean
Published: (2013)
A Network Disaster Recovery Plan Framework for Academic Computing Centre
by: Adibah Che Mat Daon, Mat Daon
Published: (2004)
by: Adibah Che Mat Daon, Mat Daon
Published: (2004)
Design and development of application program interface (API) and related tools for real-time distributed computer control system through local area network (LAN)
by: Lim, Chan Hin
Published: (2001)
by: Lim, Chan Hin
Published: (2001)
Malaysia network transit route adviser: hybrid didistra's algorithm
by: Mohd Syafiq, Bachok
Published: (2014)
by: Mohd Syafiq, Bachok
Published: (2014)
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
by: Nurshafiqa Saffah, Mohd Sharif
Published: (2018)
by: Nurshafiqa Saffah, Mohd Sharif
Published: (2018)
Frame alignment and insertion algorithm for video stream over mobile network
by: Syahbana, Yoanda Alim
Published: (2013)
by: Syahbana, Yoanda Alim
Published: (2013)
Radial basis function neural network learning with modified backpropagation algorithm
by: Tukur, Usman Muhammad
Published: (2014)
by: Tukur, Usman Muhammad
Published: (2014)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
Controller placement mechanism in software defined network using k-median algorithm
by: Fahad, Noor Saad
Published: (2016)
by: Fahad, Noor Saad
Published: (2016)
Mobile game application development using evolutionary algorithms
by: Ong, Jia Hui
Published: (2014)
by: Ong, Jia Hui
Published: (2014)
Application of neural network for solving job scheduling problems
by: Elawad, Abdelaziz Hamad
Published: (2002)
by: Elawad, Abdelaziz Hamad
Published: (2002)
Some variations of the commutativity degree of some groups and their applications in graph theory
by: Alrehaili, Suad
Published: (2020)
by: Alrehaili, Suad
Published: (2020)
Neural network and genetic algorithm techniques for energy efficient relay node placement in smart grid
by: Safaei, Mahmood
Published: (2014)
by: Safaei, Mahmood
Published: (2014)
A secure method to detect wormhole attack in mobile adhoc network
by: Ardestani, Parichehr Manouchehri
Published: (2013)
by: Ardestani, Parichehr Manouchehri
Published: (2013)
The Application of Artificial Neural Networks Techniques to the Prediction of Ringgit Exchanges Rates
by: Fizlin, Zakaria
Published: (2004)
by: Fizlin, Zakaria
Published: (2004)
Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network
by: Bojnord, Hoda Soltanian
Published: (2013)
by: Bojnord, Hoda Soltanian
Published: (2013)
Simulation of LAPD protocol
by: Khadri, Norasimah
Published: (1992)
by: Khadri, Norasimah
Published: (1992)
Data Compression For Multimedia Computing
by: Mohd Tarmizi, Musa
Published: (1995)
by: Mohd Tarmizi, Musa
Published: (1995)
Improved design solution for motion resistance problem through integration of robust design and theory of inventive principle (TRIZ)
by: Alias, Arman
Published: (2015)
by: Alias, Arman
Published: (2015)
Implementation of computer simulation in rubber assembly line: a case study (Rubber Research Institute Of Malaysia)
by: Mohamad Amran, Mohd. Fahmi
Published: (2006)
by: Mohamad Amran, Mohd. Fahmi
Published: (2006)
Theory And Simulation Of The Incipient Gas-Solid Fluidized Bed
by: Tan, Yee Wan
Published: (2004)
by: Tan, Yee Wan
Published: (2004)
Theory and Simulation of Incipient Instability in Gas-Solid Fluidization
by: Look, Kar Yang
Published: (2006)
by: Look, Kar Yang
Published: (2006)
Authentication and authorization in cloud computing using kerberos
by: Hidar, Ahmad M. Saeed
Published: (2014)
by: Hidar, Ahmad M. Saeed
Published: (2014)
Keystroke dynamic authentication in mobile cloud computing
by: Babaeizadeh, Mahnoush
Published: (2014)
by: Babaeizadeh, Mahnoush
Published: (2014)
Managing Computer Lab-Mobile Agent Approach
by: Nor Shubaily, Khamis
Published: (2008)
by: Nor Shubaily, Khamis
Published: (2008)
Behaviour analysis and development of the detection algorithm and application prototype to detect the presence of the premium short message service(SMS) abusers malware on the android platform
by: Syed Mohd Hazrul Syed Salim
Published: (2013)
by: Syed Mohd Hazrul Syed Salim
Published: (2013)
The redundancy-based disaster recovery framework for cloud computing
by: Sabbaghi, Fatemeh
Published: (2013)
by: Sabbaghi, Fatemeh
Published: (2013)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Adoption of cloud computing by Malaysian small and medium enterprises
by: Asiaei, Arash
Published: (2021)
by: Asiaei, Arash
Published: (2021)
Second Handed Computer Purchasing Web-Based System
by: Elgweal, Osama Ahmed A.
Published: (2008)
by: Elgweal, Osama Ahmed A.
Published: (2008)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
Discrete event simulation for telephone channel assignment problem
by: Yeoh, Chew Lan
Published: (2003)
by: Yeoh, Chew Lan
Published: (2003)
The factors that influence on adoption of cloud computing for small and medium enterprises
by: Amini, Mahyar
Published: (2014)
by: Amini, Mahyar
Published: (2014)
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008)
by: Rasheed, Mohmmad M
Published: (2008)
Stemming Algorithm in Searching Malay Text
by: Rizauddin, Saian
Published: (2004)
by: Rizauddin, Saian
Published: (2004)
MASIGIC : a CAD package for digital systems modelling and simulation
by: Abdullah, Marsella
Published: (1988)
by: Abdullah, Marsella
Published: (1988)
Similar Items
-
Fuzzy neural networks with genetic algorithm-based learning method
by: Mashinchi, M. Reza
Published: (2013) -
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
by: Nur Aniza, Alang Ismail
Published: (2009) -
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019) -
Exam Timetabling Using Graph Colouring Approach
by: Norwahida Syazwani, Othman
Published: (2010) -
Vibration based bearing fault diagnosis identification using neural network
by: Tan, Hwee Mean
Published: (2013)