Enhancing Control Flow Comprehension Using Zoom Visual Flow (ZViF) Technique To Represent Control Structures
When novice users learn programming, they have to comprehend a lot of things related to programming. Many techniques and tools have been developed to help users to improve their program comprehension but most tools are unsuitable for novices. Some tools are not user friendly, some designs are just f...
| Main Author: | Kadar, Rozita |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/42473/ |
| Abstract | Abstract here |
Similar Items
Ontology-Based Source Code Retrieval Model To Support Program Comprehension
by: Kadar, Rozita
Published: (2019)
by: Kadar, Rozita
Published: (2019)
Per-Priority Flow Control (Ppfc) Framework For Enhancing Qos In Metro Ethernet
by: Pahlevanzadeh, Bahareh
Published: (2013)
by: Pahlevanzadeh, Bahareh
Published: (2013)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Synchronization Controller To Solve
The Mismatched Sampling Rates For
Acoustic Echo Cancellation
by: Naeem, Adel Nadhem
Published: (2015)
by: Naeem, Adel Nadhem
Published: (2015)
Common Radio Resource Management: Joint Call Admission Control And Traffic Offloading Method
by: Zaini, Khuzairi Mohd
Published: (2018)
by: Zaini, Khuzairi Mohd
Published: (2018)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
Genogram Visualization Using Social Network Approach For Medical Family Tree
by: Bokhare, Siti Fatimah
Published: (2018)
by: Bokhare, Siti Fatimah
Published: (2018)
Soccer Video Event Detection Via Collaborative Textual, Aural And Visual Analysis
by: Halin, Alfian Abdul
Published: (2011)
by: Halin, Alfian Abdul
Published: (2011)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
Pengubahsuaian Senibina Rangkaian Neural Secara Berhirarki Dalam Penentuan Jenis Dan Kualiti Air Sungai [QA76.87. F177 2008 f rb].
by: Hashim, Fakroul Ridzuan
Published: (2007)
by: Hashim, Fakroul Ridzuan
Published: (2007)
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012)
by: Kareem, Emad Issa Abdul
Published: (2012)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
by: Cheng, Wai Khuen
Published: (2007)
by: Cheng, Wai Khuen
Published: (2007)
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015)
by: Wong, Kai Sin
Published: (2015)
Optimized feature construction methods for data summarizations of relational data
by: Sze, Florence Sia Fui
Published: (2014)
by: Sze, Florence Sia Fui
Published: (2014)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
Personalizable Models For Business-To-Business Information Interchange In Communication Layers
by: Ting, Tin Tin
Published: (2011)
by: Ting, Tin Tin
Published: (2011)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Harmony search algorithms for ab initio protein tertiary structure prediction.
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Enhanced Network Connectivity And Node Lifetime Techniques In Wireless Sensor Networks
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
Segmentation Assisted Object Distinction For Direct
Volume Rendering
by: Irani, Arash Azim Zadeh
Published: (2013)
by: Irani, Arash Azim Zadeh
Published: (2013)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Game Theoretic Spatial Evacuation Simulation Models To Predict Crowd Disaster
by: Ibrahim, Azhar Mohd
Published: (2018)
by: Ibrahim, Azhar Mohd
Published: (2018)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Harmony Search-Based Hyper-Heuristic For Scheduling Problems
by: Anwar, Khairul
Published: (2018)
by: Anwar, Khairul
Published: (2018)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Multi Criteria Decision Making Approach For Product Aspect Extraction And Ranking In Aspect-Based Sentiment Analysis
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Document And Query Expansion Method
With Dirichlet Smoothing Model For
Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
Similar Items
-
Ontology-Based Source Code Retrieval Model To Support Program Comprehension
by: Kadar, Rozita
Published: (2019) -
Per-Priority Flow Control (Ppfc) Framework For Enhancing Qos In Metro Ethernet
by: Pahlevanzadeh, Bahareh
Published: (2013) -
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018) -
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022) -
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
