Application of computer based simulation in gas network system using graph theory algorithms and numerical methods
The existing gas network software is highly depending on the Breadth First Search (BFS) and the Depth First Search (DFS) in performing gas network computation of any topology. This is causing the other graph theory algorithms remain least known to users. Apart from that, there are many numerical met...
| Auteur principal: | Poh, Hong Hwee |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2007
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/6801/1/PohHonhHweeMFKKKSA2007.pdf |
Documents similaires
Fuzzy neural networks with genetic algorithm-based learning method
par: Mashinchi, M. Reza
Publié: (2013)
par: Mashinchi, M. Reza
Publié: (2013)
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
par: Nur Aniza, Alang Ismail
Publié: (2009)
par: Nur Aniza, Alang Ismail
Publié: (2009)
An enhancement of classification technique based on rough set theory for intrusion detection system application
par: Noor Suhana, Sulaiman
Publié: (2019)
par: Noor Suhana, Sulaiman
Publié: (2019)
Exam Timetabling Using Graph Colouring Approach
par: Norwahida Syazwani, Othman
Publié: (2010)
par: Norwahida Syazwani, Othman
Publié: (2010)
Vibration based bearing fault diagnosis identification using neural network
par: Tan, Hwee Mean
Publié: (2013)
par: Tan, Hwee Mean
Publié: (2013)
A Network Disaster Recovery Plan Framework for Academic Computing Centre
par: Adibah Che Mat Daon, Mat Daon
Publié: (2004)
par: Adibah Che Mat Daon, Mat Daon
Publié: (2004)
Design and development of application program interface (API) and related tools for real-time distributed computer control system through local area network (LAN)
par: Lim, Chan Hin
Publié: (2001)
par: Lim, Chan Hin
Publié: (2001)
Malaysia network transit route adviser: hybrid didistra's algorithm
par: Mohd Syafiq, Bachok
Publié: (2014)
par: Mohd Syafiq, Bachok
Publié: (2014)
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
par: Nurshafiqa Saffah, Mohd Sharif
Publié: (2018)
par: Nurshafiqa Saffah, Mohd Sharif
Publié: (2018)
Frame alignment and insertion algorithm for video stream over mobile network
par: Syahbana, Yoanda Alim
Publié: (2013)
par: Syahbana, Yoanda Alim
Publié: (2013)
Radial basis function neural network learning with modified backpropagation algorithm
par: Tukur, Usman Muhammad
Publié: (2014)
par: Tukur, Usman Muhammad
Publié: (2014)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
par: Eric, Karerangabo
Publié: (2009)
par: Eric, Karerangabo
Publié: (2009)
Controller placement mechanism in software defined network using k-median algorithm
par: Fahad, Noor Saad
Publié: (2016)
par: Fahad, Noor Saad
Publié: (2016)
Mobile game application development using evolutionary algorithms
par: Ong, Jia Hui
Publié: (2014)
par: Ong, Jia Hui
Publié: (2014)
Application of neural network for solving job scheduling problems
par: Elawad, Abdelaziz Hamad
Publié: (2002)
par: Elawad, Abdelaziz Hamad
Publié: (2002)
Some variations of the commutativity degree of some groups and their applications in graph theory
par: Alrehaili, Suad
Publié: (2020)
par: Alrehaili, Suad
Publié: (2020)
Neural network and genetic algorithm techniques for energy efficient relay node placement in smart grid
par: Safaei, Mahmood
Publié: (2014)
par: Safaei, Mahmood
Publié: (2014)
A secure method to detect wormhole attack in mobile adhoc network
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
The Application of Artificial Neural Networks Techniques to the Prediction of Ringgit Exchanges Rates
par: Fizlin, Zakaria
Publié: (2004)
par: Fizlin, Zakaria
Publié: (2004)
Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network
par: Bojnord, Hoda Soltanian
Publié: (2013)
par: Bojnord, Hoda Soltanian
Publié: (2013)
Simulation of LAPD protocol
par: Khadri, Norasimah
Publié: (1992)
par: Khadri, Norasimah
Publié: (1992)
Data Compression For Multimedia Computing
par: Mohd Tarmizi, Musa
Publié: (1995)
par: Mohd Tarmizi, Musa
Publié: (1995)
Improved design solution for motion resistance problem through integration of robust design and theory of inventive principle (TRIZ)
par: Alias, Arman
Publié: (2015)
par: Alias, Arman
Publié: (2015)
Implementation of computer simulation in rubber assembly line: a case study (Rubber Research Institute Of Malaysia)
par: Mohamad Amran, Mohd. Fahmi
Publié: (2006)
par: Mohamad Amran, Mohd. Fahmi
Publié: (2006)
Theory And Simulation Of The Incipient Gas-Solid Fluidized Bed
par: Tan, Yee Wan
Publié: (2004)
par: Tan, Yee Wan
Publié: (2004)
Theory and Simulation of Incipient Instability in Gas-Solid Fluidization
par: Look, Kar Yang
Publié: (2006)
par: Look, Kar Yang
Publié: (2006)
Authentication and authorization in cloud computing using kerberos
par: Hidar, Ahmad M. Saeed
Publié: (2014)
par: Hidar, Ahmad M. Saeed
Publié: (2014)
Keystroke dynamic authentication in mobile cloud computing
par: Babaeizadeh, Mahnoush
Publié: (2014)
par: Babaeizadeh, Mahnoush
Publié: (2014)
Managing Computer Lab-Mobile Agent Approach
par: Nor Shubaily, Khamis
Publié: (2008)
par: Nor Shubaily, Khamis
Publié: (2008)
Behaviour analysis and development of the detection algorithm and application prototype to detect the presence of the premium short message service(SMS) abusers malware on the android platform
par: Syed Mohd Hazrul Syed Salim
Publié: (2013)
par: Syed Mohd Hazrul Syed Salim
Publié: (2013)
The redundancy-based disaster recovery framework for cloud computing
par: Sabbaghi, Fatemeh
Publié: (2013)
par: Sabbaghi, Fatemeh
Publié: (2013)
Comprehensive analysis on the influences of computer ethics on information security
par: Abdul Rahim, Fiza
Publié: (2009)
par: Abdul Rahim, Fiza
Publié: (2009)
Adoption of cloud computing by Malaysian small and medium enterprises
par: Asiaei, Arash
Publié: (2021)
par: Asiaei, Arash
Publié: (2021)
Second Handed Computer Purchasing Web-Based System
par: Elgweal, Osama Ahmed A.
Publié: (2008)
par: Elgweal, Osama Ahmed A.
Publié: (2008)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
par: Othman, Fazilah
Publié: (2010)
par: Othman, Fazilah
Publié: (2010)
Discrete event simulation for telephone channel assignment problem
par: Yeoh, Chew Lan
Publié: (2003)
par: Yeoh, Chew Lan
Publié: (2003)
The factors that influence on adoption of cloud computing for small and medium enterprises
par: Amini, Mahyar
Publié: (2014)
par: Amini, Mahyar
Publié: (2014)
Improving The Algorithm To Detect Internet Worms
par: Rasheed, Mohmmad M
Publié: (2008)
par: Rasheed, Mohmmad M
Publié: (2008)
Stemming Algorithm in Searching Malay Text
par: Rizauddin, Saian
Publié: (2004)
par: Rizauddin, Saian
Publié: (2004)
MASIGIC : a CAD package for digital systems modelling and simulation
par: Abdullah, Marsella
Publié: (1988)
par: Abdullah, Marsella
Publié: (1988)
Documents similaires
-
Fuzzy neural networks with genetic algorithm-based learning method
par: Mashinchi, M. Reza
Publié: (2013) -
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
par: Nur Aniza, Alang Ismail
Publié: (2009) -
An enhancement of classification technique based on rough set theory for intrusion detection system application
par: Noor Suhana, Sulaiman
Publié: (2019) -
Exam Timetabling Using Graph Colouring Approach
par: Norwahida Syazwani, Othman
Publié: (2010) -
Vibration based bearing fault diagnosis identification using neural network
par: Tan, Hwee Mean
Publié: (2013)