International Journal of advanced studies in Computer Science and Engineering
نویسندگان
چکیده
the analysis of students’ feedback can reveal imperfections and shortcomings of educational environments. The Common methods of analysis and data evaluation can’t singly uncover valuable information that is hidden behind the students’ feedback. This paper use two applicable data mining techniques that known as “Classification” and “Association rule discovery” to explore effective factors on non re taking a course by students. Keywords-Datamining; Apriori; REPTree.
منابع مشابه
DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs
Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...
متن کاملCost Benefits Ratio of Organic Horticultural Products and Comparison with Conventional Products
Recently, the quality and safety of organic products is the topic of prime concern. While this demand increases since consumer considers organic products are healthier and harmless than conventional products. In the country like India, organic agricultural is not novel and are effectively performs in varied climates such as tribal mountains, mountainous areas and rain-fed zones of the country. ...
متن کاملCost Benefits Ratio of Organic Horticultural Products and Comparison with Conventional Products
Recently, the quality and safety of organic products is the topic of prime concern. While this demand increases since consumer considers organic products are healthier and harmless than conventional products. In the country like India, organic agricultural is not novel and are effectively performs in varied climates such as tribal mountains, mountainous areas and rain-fed zones of the country. ...
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملImproving QoS in VANETs: A Survey
The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”. ITS integrates information, communications, computers and other technologies and uses them in the field of transportation to build an integrated system of people, roads ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014