International Journal of advanced studies in Computer Science and Engineering

نویسندگان

  • Nahid Hajizadeh
  • Manijeh Keshtgari
  • Marzieh Ahmadzadeh
چکیده

the analysis of students’ feedback can reveal imperfections and shortcomings of educational environments. The Common methods of analysis and data evaluation can’t singly uncover valuable information that is hidden behind the students’ feedback. This paper use two applicable data mining techniques that known as “Classification” and “Association rule discovery” to explore effective factors on non re taking a course by students. Keywords-Datamining; Apriori; REPTree.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs

Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...

متن کامل

Cost Benefits Ratio of Organic Horticultural Products and Comparison with Conventional Products

Recently, the quality and safety of organic products is the topic of prime concern. While this demand increases since consumer considers organic products are healthier and harmless than conventional products. In the country like India, organic agricultural is not novel and are effectively performs in varied climates such as tribal mountains, mountainous areas and rain-fed zones of the country. ...

متن کامل

Cost Benefits Ratio of Organic Horticultural Products and Comparison with Conventional Products

Recently, the quality and safety of organic products is the topic of prime concern. While this demand increases since consumer considers organic products are healthier and harmless than conventional products. In the country like India, organic agricultural is not novel and are effectively performs in varied climates such as tribal mountains, mountainous areas and rain-fed zones of the country. ...

متن کامل

The Idea Of Using The Steganography As Encryption Tool

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Improving QoS in VANETs: A Survey

The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”. ITS integrates information, communications, computers and other technologies and uses them in the field of transportation to build an integrated system of people, roads ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014