Knowledge design in rule-based system architecture for C tutorial / V Thavachelvi Velautham
C Tutorial4u is a standalone system developed in Visual Basic 6.0 which is able to provide guidance to the students who are pursuing C programming subject in their higher learning institutes. It is designed based on rule-based system architecture in order to provide a flexible knowledge base founda...
| Main Author: | V Thavachelvi, Velautham |
|---|---|
| Format: | Thesis |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/10258/ http://studentsrepo.um.edu.my/10258/1/V_Thavachelvi_Velautham.pdf |
Similar Items
Knowledge design in rule-based system architecture for C tutorial / V. Thavachelvi a/p Velautham.
by: Velautham, V. Thavachelvi
Published: (2005)
by: Velautham, V. Thavachelvi
Published: (2005)
Online tutorial and test for system analysis and design / Muthukumaran Raman
by: Muthukumaran , Raman
Published: (2003)
by: Muthukumaran , Raman
Published: (2003)
Online reference & tutorial for microprocessor subject / Velan Ramalingam
by: Velan, Ramalingam
Published: (2003)
by: Velan, Ramalingam
Published: (2003)
Tutorial atas talian (OTL) / Ahmed Faizzuddin Mohd Imam
by: Ahmed Faizzuddin, Mohd Imam
Published: (2003)
by: Ahmed Faizzuddin, Mohd Imam
Published: (2003)
Tutorials on African Buffalo Optimization for Solving the Travelling Salesman Problem
by: Odili, Julius Beneoluchi, et al.
Published: (2017)
by: Odili, Julius Beneoluchi, et al.
Published: (2017)
Multimedia package: Learning how to program in C, plus interactive tutorial / Norsuhana Azman
by: Norsuhana, Azman
Published: (2003)
by: Norsuhana, Azman
Published: (2003)
A discourse analysis of three Malaysian short stories / Lalitha Velautham.
by: Velautham, Lalitha
Published: (2000)
by: Velautham, Lalitha
Published: (2000)
Sistem tutorial pintar / Siti Halimah Tun Nisak Mohd. Rukiban
by: Siti Halimah Tun Nisak, Mohd. Rukiban
Published: (2003)
by: Siti Halimah Tun Nisak, Mohd. Rukiban
Published: (2003)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
An architecture design of the intelligent agent for speech recognition and translation
by: Ahmad, Abdul Manan, et al.
Published: (2005)
by: Ahmad, Abdul Manan, et al.
Published: (2005)
Design and Development of Architectural Model Darul Ridzuan Museum
by: Jaafar, J., et al.
Published: (2010)
by: Jaafar, J., et al.
Published: (2010)
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013)
by: Zailani, Abdullah, et al.
Published: (2013)
Combinatorial Rules Approach to Improve Priority Rules Scheduler in Grid Computing Environment
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
Stochastic process and tutorial of the African bufalo optimization
by: Odili, Julius Beneoluchi, et al.
Published: (2022)
by: Odili, Julius Beneoluchi, et al.
Published: (2022)
Computer-based instrumentation system for temperature measurement using thermocouple in visual basic application (C.I.S.T.V.A.)
by: Muhamad Akmal, Ishak
Published: (2008)
by: Muhamad Akmal, Ishak
Published: (2008)
Car Rental System With Rule Based Technique
by: Chin, Hong Jie
Published: (2022)
by: Chin, Hong Jie
Published: (2022)
Formal Semantics of Dynamic Constraints and Derivation Rules in ORM
by: Balsters, Herman, et al.
Published: (2016)
by: Balsters, Herman, et al.
Published: (2016)
WLAR-Viz: Weighted least association rules visualization
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Study of FSKKP portal based on Shneidermanâs eight golden rules
by: Ooi Boon, Khuan
Published: (2013)
by: Ooi Boon, Khuan
Published: (2013)
Analysis of Traffic Accident Patterns Using Association Rule Mining
by: Yudy, Pranata, et al.
Published: (2024)
by: Yudy, Pranata, et al.
Published: (2024)
v-Faculty / Leong Kee Foo
by: Leong , Kee Foo
Published: (2001)
by: Leong , Kee Foo
Published: (2001)
Market Basket Analysis for E-Commerce using Association Rule Mining
by: Kayalvily, Tabianan*, et al.
Published: (2020)
by: Kayalvily, Tabianan*, et al.
Published: (2020)
Malaysia tour package website using rule-based expert system
by: Ng Yee, Shian
Published: (2012)
by: Ng Yee, Shian
Published: (2012)
Mining Indirect Least Association Rule from Students’ Examination Datasets
by: Zailani, Abdullah, et al.
Published: (2014)
by: Zailani, Abdullah, et al.
Published: (2014)
Mining Least Association Rules of Degree Level Programs Selected by Students
by: Zailani, Abdullah, et al.
Published: (2014)
by: Zailani, Abdullah, et al.
Published: (2014)
Comparative study on job scheduling using priority rule and machine learning
by: Murad, Saydul Akbar, et al.
Published: (2021)
by: Murad, Saydul Akbar, et al.
Published: (2021)
Binary vote assignment on grid quorum replication technique with association rule
by: Ainul Azila, Che Fauzi
Published: (2018)
by: Ainul Azila, Che Fauzi
Published: (2018)
CNAR-M: A model for mining critical negative association rules
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
Extracting highly positive association rules from students' enrollment data
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Rule-based Pattern Extractor and Named Entity Recognition: A Hybrid Approach
by: Sari, Y., et al.
Published: (2010)
by: Sari, Y., et al.
Published: (2010)
Intelligent mining multi dimensional association rules from large inconsistent databases.
by: Defit, Sarjon, et al.
Published: (2003)
by: Defit, Sarjon, et al.
Published: (2003)
A knowledge-based e-tutorial system based on the ORM model
by: Leelawatananon, Thanaporn, et al.
Published: (2004)
by: Leelawatananon, Thanaporn, et al.
Published: (2004)
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
by: Arif, Hanafi, et al.
Published: (2016)
by: Arif, Hanafi, et al.
Published: (2016)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Energy efficient computing architecture for rural applications
by: Yew, Sin Giap
Published: (2014)
by: Yew, Sin Giap
Published: (2014)
Consistency rules between UML use case and activity diagrams using logical approach
by: Noraini, Ibrahim, et al.
Published: (2011)
by: Noraini, Ibrahim, et al.
Published: (2011)
A study of database connection pool in microservice architecture
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
A review on job scheduling technique in cloud computing and priority rule based intelligent framework
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
Similar Items
-
Knowledge design in rule-based system architecture for C tutorial / V. Thavachelvi a/p Velautham.
by: Velautham, V. Thavachelvi
Published: (2005) -
Online tutorial and test for system analysis and design / Muthukumaran Raman
by: Muthukumaran , Raman
Published: (2003) -
Online reference & tutorial for microprocessor subject / Velan Ramalingam
by: Velan, Ramalingam
Published: (2003) -
Tutorial atas talian (OTL) / Ahmed Faizzuddin Mohd Imam
by: Ahmed Faizzuddin, Mohd Imam
Published: (2003) -
Tutorials on African Buffalo Optimization for Solving the Travelling Salesman Problem
by: Odili, Julius Beneoluchi, et al.
Published: (2017)