Author of the publication

The Estimation of Students' Academic Success by Data Mining Methods.

, , and . ICMLA (2), page 535-539. IEEE, (2013)978-0-7695-5144-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XML-Based Automatic Test Data Generation., and . Comput. Informatics, 27 (4): 660-680 (2008)Client's Cache Updating Using Idle Time of Clients in Relational Database Management Systems., and . J. Inf. Sci. Eng., 23 (1): 329-341 (2007)Analysis for Status of the Road Accident Occurance and Determination of the Risk of Accident by Machine Learning in Istanbul., , and . ICMLA, page 426-430. IEEE Computer Society, (2016)Estimating the Effect of Structural Damage on the Flight by Using Machine Learning., and . ICMLA, page 1333-1337. IEEE, (2018)Investigation of Factors Affecting Ownership the Household Informatics Equipment with CHAID Algorithm., and . ICMLA, page 1976-1981. IEEE, (2019)Deep Learning Based Vehicle Detection From Aerial Images., and . ICMLA, page 956-960. IEEE, (2020)Improving an Early Warning System to Prediction of Student Examination Achievement., and . ICMLA, page 568-573. IEEE, (2014)Determination of Vocational Fields with Machine Learning Algorithm., and . ICMLA, page 710-713. IEEE Computer Society, (2010)Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols., , and . e-Forensics, page 9. ICST/ACM, (2008)Detection Success Assessment of Machine Learning Algorithms Through Manifest File Permissions Demanded by Malicious Android Wares., and . ICMLA, page 1684-1686. IEEE, (2023)