Search Results - (( code application kano algorithm ) OR ( _ education module algorithm ))*
Search alternatives:
- code application »
- application kano »
- module algorithm »
- kano algorithm »
- _ education »
-
1
-
2
Text Extraction Algorithm for Web Text Classification
Published 2010Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
Computational Thinking (Algorithms) Through Unplugged Programming Activities: Exploring Upper Primary Students’ Learning Experiences
Published 2021“…This study may serve as a reference in establishing a comprehensive UPA module for teaching algorithms aspect of CT skills.…”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
Fuzzy control algorithm for educational light tracking system
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
8
FSKKP final year student-supervisor matchmaking expert system
Published 2011“…In this project,the algorithm is used to get the highest index of lecturer.…”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
-
11
Hybrid BLEU Algorithm For Structured Exam Management System
Published 2008“…This system incorporate algorithm BLEU into the expert system to check the answer and evaluate marks for every assessment. …”
Get full text
Get full text
Get full text
Thesis -
12
Determining Suitable Program For SPM Holder Using Neural Network Approach
Published 2002“…This methodology should be able to provide us with some new insights into the type of patterns that exist in educational data. Therefore, NN has a great potential in supporting the policy development for the current education.…”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
15
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
Framework of Designing Multiple Microcontroller Based Applications
Published 2011“…Throughout the paper, a special attention is given to the use of framework in the electronics engineering education process. Keywords: - PIC microcontrollers, HC11 microcontrollers, MCS51 microcontrollers Development system, Electronics engineering education…”
Get full text
Get full text
Conference or Workshop Item -
19
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…The proposed algorithm can also help in designing credibility-based information systems in the areas of education, health, stocks, networking and media, requiring accurate and credible information, and would help enforce new Web-publishing standards, thus enhancing overall Web experience.…”
Get full text
Get full text
Get full text
Thesis -
20
