Thesis

TEACHER STATION TRANSFER SYSTEM WITH ANALYTICS FOR THE DEPARTMENT OF EDUCATION

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Difficulties in the approval of the request for teacher transfer occur due to imbalances in the deployment of public school teachers. The study focused on the development of a web-based system that provides analytics on the transfer requests of teachers for the Department of Education. It utilized both descriptive and developmental research designs employing interviews, document analysis, and survey questionnaires. First, a decision tree model based on entropy was created to classify the application of teacher transfer. Second, the web-based system was developed following the Agile Scrum Methodology integrating the created decision tree as its algorithm for transfer eligibility. Third, the system’s prototype was tested and evaluated by 26 selected participants based on ISO 25010. Significant findings of the study include the dominant and insignificant predictors of teachers’ eligibility for transfer, features of the developed transfer station web-based system, and a highly acceptable rating of 3.65.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
This research work investigated the effects of teachers' transfer on students' academic performance in senior secondary schools Abuja Nigeria. The population of the study was limited to all senior secondary school teachers in six Area councils of the FCT. Stratified random sampling technique was adopted to select 2 schools in each of the six Area councils and 25 teachers were randomly selected in each selected school totalling 300 respondents. Descriptive survey method was adopted. Three research questions were asked and analyzed using frequency counts and mean. The data gathered were further analyzed and interpreted to arrive at findings which showed that high rate of transfer occurs in FCT Senior Secondary Schools; teachers' transfer affects students' academic performance; teachers sometimes voluntarily request for transfer and principals sometimes seek transfer of erring staff. Recommendations were suggested that there should inconvenient allowances for the transferred teachers in FCT Secondary Schools and accessible road network as this will reduce rural-urban transfer in FCT secondary schools.
Article
Full-text available
We investigate the impact of descriptive analytics adoption on online retailers’ performance and the underlying mechanism.
Article
Full-text available
Achievement of excellent academic performance depends largely on the quality of the teachers deployed in the school. The main objective of this study was to examine the relationship between teacher transfer and teachers' performance in Uganda. The study used exploratory and descriptive designs where both qualitative and quantitative approaches were applied. Quantitative data was analyzed using Statistical Package for Social Scientists (SPSS) Ver. 20 which helped to obtain descriptive statistics that were used in interpreting the data while correlation and regression analyses were used for testing and predicting the study hypotheses. Qualitative data was analyzed using content analysis where data was divided into themes, sub-themes and categories which helped to sort data according to its relevance to each piece of data that was obtained in the findings. Questionnaires and interview guide were used to collect data from a sample of 140 respondents of which 111 returned their completed usable filled questionnaires giving a response rate of 79.3%. The findings revealed that all the dimensions of teacher transfers (voluntary and involuntary transfers) were positively and significantly associated with teachers' performance in Uganda. The major reasons for voluntary transfer were lack of accommodation, distance from families, promotion and illness while involuntary transfers were due to poor performance of teachers, misconduct, conflict with management and drunkenness. The study concludes that voluntary transfer factors are stronger than involuntary factors in accounting for a variation in teachers' performance in Uganda primary schools. The study recommends that the district leadership should map or grade all schools in the district in terms of low, average and high performing schools as well as bring indiscipline teachers to book instead of transferring and establish adhoc transfer committees.
Presentation
Full-text available
Lecture Notes on Introduction to Data Analytics, M Phil Computer Science, Course: Research Methodology in Information Technology Spring 2019, COMSATS University Islamabad.
Article
Full-text available
Decision tree classifiers are regarded to be a standout of the most well-known methods to data classification representation of classifiers. Different researchers from various fields and backgrounds have considered the problem of extending a decision tree from available data, such as machine study, pattern recognition, and statistics. In various fields such as medical disease analysis, text classification, user smartphone classification, images, and many more the employment of Decision tree classifiers has been proposed in many ways. This paper provides a detailed approach to the decision trees. Furthermore, paper specifics, such as algorithms/approaches used, datasets, and outcomes achieved, are evaluated and outlined comprehensively. In addition, all of the approaches analyzed were discussed to illustrate the themes of the authors and identify the most accurate classifiers. As a result, the uses of different types of datasets are discussed and their findings are analyzed.
Article
Full-text available
This study reviews software security, etc. It studies the methods for the analysis of software security. The problems of software protection are identified. The risks for software projects, their management, determination and categories are studied. Software development process includes the construction of an agreed structure for software development. The design of large distributed systems uses many programming languages, which in turn causes certain difficulties. That is, security in these cases is not provided. Software security is a set of measures aimed at its protection. Security in software exploitation is also a key issue. Software security is understood as its functioning without any problems. Information security threats arise in the process of software exploitation.
Article
Full-text available
To date, remote schools in the Philippines still faces scarcity of teaching resources and teachers are continuously challenged in delivering quality basic education in the countryside. The conditions of far-flung schools require passionate, committed teachers to provide the much needed services. This study tried to document the lived experiences of six far-flung elementary school teachers in south-western part of Samar. Experiences of teachers in this school are similar to many teachers in Geographically Isolated and Depressed Area (GIDA) in the country. The school, their students, and the community exhibit poverty. The school lacks the much-needed teaching-learning resources. Many students are slow-learners, and some are non-readers. The families of the students are poor; some skips meals and could not afford to buy school supplies for their use. Teachers need to ride a motorcycle and walk for kilometers in sometimes slippery/muddy trails to reach the school. Some students come from adjacent barangays and also walk daily to school. To facilitate learning, teachers shed a portion of their salaries to buy school supplies for classroom use. Giving money for food and school supplies for students is also common to them. Despite fulfilling experiences for serving a deprived community, teachers in this study are also looking forward to a much better assignment in the future.
Article
Full-text available
Rapid of information technology development grow a new competitive environment. Including higher education, they need to improve their service quality in order to provide education service in more competitive. One of the ways of using information technology in higher education is the used of Academic Information System (AIS). AIS was developed to achieve the goals of the learning process which is one of vision and mission organization success factor. The measurement is needed to evaluate the quality of AIS. Functionality is one of the quality factors which is measured by observing the correlation between function and functional suitability. In this study, the quality of AIS functional suitability is measured using goal-oriented approach base on ISO/IEC 25010 in the perspective of a lecturer. The strategic plan of an institution is used as a reference to measure if the system used to have meet institution goals when using this approach. The result shows that the measurement using goal-oriented approach become more objective and suitable to the need of used AIS quality improvement for the institution than the measurement with ISO/IEC 25010 only.
Article
Full-text available
One strategy used to assure that an interface meets user requirements is to conduct usability testing. When conducting such testing one of the unknowns is sample size. Since extensive testing is costly, minimizing the number of participants can contribute greatly to successful resource management of a project. Even though a significant number of models have been proposed to estimate sample size in usability testing, there is still not consensus on the optimal size. Several studies claim that 3 to 5 users suffice to uncover 80% of problems in a software interface. However, many other studies challenge this assertion. This study analyzed data collected from the user testing of a web application to verify the rule of thumb, commonly known as the “magic number 5”. The outcomes of the analysis showed that the 5-user rule significantly underestimates the required sample size to achieve reasonable levels of problem detection.
Article
Full-text available
The ability to derive new insights from data using advanced machine learning or analytics techniques can enhance the decision-making process in companies. Nevertheless, researchers have found that the actual application of analytics in companies is still in its initial stages. Therefore, this paper studies by means of a descriptive survey the application of analytics with regards to five different aspects as defined by the DELTA model: data, enterprise or organization, leadership, targets or techniques and applications, and the analysts who apply the techniques themselves. We found that the analytics organization in companies matures with regards to these aspects. As such, if companies started earlier with analytics, they apply nowadays more complex techniques such as neural networks, and more advanced applications such as HR analytics and predictive analytics. Moreover, analytics is differently propagated throughout companies as they mature with a larger focus on department-wide or organization-wide analytics and a more advanced data governance policy. Next, we research by means of clustering how these characteristics can indicate the analytics maturity stage of companies. As such, we discover four clusters with a clear growth path: no analytics, analytics bootstrappers, sustainable analytics adopters and disruptive analytics innovators.
Article
Full-text available
Software maintenance is an expensive activity that consumes a major portion of the cost of the total project. Various activities carried out during maintenance include the addition of new features, deletion of obsolete code, correction of errors, etc. Software maintainability means the ease with which these operations can be carried out. If the maintainability can be measured in early phases of the software development, it helps in better planning and optimum resource utilization. Measurement of design properties such as coupling, cohesion, etc. in early phases of development often leads us to derive the corresponding maintainability with the help of prediction models. In this paper, we performed a systematic review of the existing studies related to software maintainability from January 1991 to October 2015. In total, 96 primary studies were identified out of which 47 studies were from journals, 36 from conference proceedings and 13 from others. All studies were compiled in structured form and analyzed through numerous perspectives such as the use of design metrics, prediction model, tools, data sources, prediction accuracy, etc. According to the review results, we found that the use of machine learning algorithms in predicting maintainability has increased since 2005. The use of evolutionary algorithms has also begun in related sub-fields since 2010. We have observed that design metrics is still the most favored option to capture the characteristics of any given software before deploying it further in prediction model for determining the corresponding software maintainability. A significant increase in the use of public dataset for making the prediction models has also been observed and in this regard two public datasets User Interface Management System (UIMS) and Quality Evaluation System (QUES) proposed by Li and Henry is quite popular among researchers. Although machine learning algorithms are still the most popular methods, however, we suggest that researchers working on software maintainability area should experiment on the use of open source datasets with hybrid algorithms. In this regard, more empirical studies are also required to be conducted on a large number of datasets so that a generalized theory could be made. The current paper will be beneficial for practitioners, researchers and developers as they can use these models and metrics for creating benchmark and standards. Findings of this extensive review would also be useful for novices in the field of software maintainability as it not only provides explicit definitions, but also lays a foundation for further research by providing a quick link to all important studies in the said field. Finally, this study also compiles current trends, emerging sub-fields and identifies various opportunities of future research in the field of software maintainability.
Article
Full-text available
This article studied and compared the two nonprobability sampling techniques namely, Convenience Sampling and Purposive Sampling. Convenience Sampling and Purposive Sampling are Nonprobability Sampling Techniques that a researcher uses to choose a sample of subjects/units from a population. Although, Nonprobability sampling has a lot of limitations due to the subjective nature in choosing the sample and thus it is not good representative of the population, but it is useful especially when randomization is impossible like when the population is very large. It can be useful when the researcher has limited resources, time and workforce. It can also be used when the research does not aim to generate results that will be used to create generalizations pertaining to the entire population. Therefore, there is a need to use nonprobability sampling techniques. The aim of this study is to compare among the two nonrandom sampling techniques in order to know whether one technique is better or useful than the other. Different articles were reviewed to compare between Convenience Sampling and Purposive Sampling and it is concluded that the choice of the techniques (Convenience Sampling and Purposive Sampling) depends on the nature and type of the research.
Article
Full-text available
One of the significantaspects of software quality is usability. It is one of the characteristics that judge by the success or failure of software applications. The most important risk facing the software applications is usability which may lead to the existence of a gap between users and systems. This may lead to system failure because of Poor design. This is due to the design is not based on the desires and requirements of the customer. To overcome these problems, this paper proposed an approach to improve usability of software applications to meet the needs of the customer and interacts with the user easily with an efficient and effective manner.The proposed approach is based prototyping technique due to itssimplicity and it does not require additional costs to elicit precise and complete requirement and design.
Article
Full-text available
This paper presents an evaluation strategy and method which is applied to characterize from a technical point of view a set of remote laboratories. These remote laboratory experiments are set in the Maghrebian countries (Morocco, Algeria, and Tunisia) and serve as teaching materials in engineering education. The technical evaluation strategy is based on guidelines defined by specific standards. According to this standard, the product quality model categorizes product quality properties into eight characteristics (functional suitability, reliability, performance efficiency, usability, security, compatibility, maintainability and portability). Each characteristic is composed of a set of related sub-characteristics. The performed technical evaluation focuses on functional suitability but is only concerned with whether the functions meet stated and implied needs, not the functional specification and does not deal with pedagogical outcomes; these were evaluated by another group of specialists. The main goal of this evaluation is to find and quantify measurable parameters in order to have functional suitability analysis tools.
Article
Full-text available
This paper deals with the comparative study of agile processes. The paper will serve as guide to other software development process models. Agile processes have important applications in the areas of software project management, software schedule management, etc. In particular the aim of agile processes is to satisfy the customer, faster development times with lower defects rate. This paper compares the agile processes with other software development life cycle models. Agile processes are not always advantageous, they have some drawbacks as well; the advantages and disadvantages of agile processes are also discussed in this paper.
Article
Full-text available
Decision tree induction is one of the most popular data mining techniques with applications in various fields. Present algorithms for construction decision trees can not deal with missing value in information systems properly. A new concept, rough gain ratio, is first introduced by the aid of tolerance relations in the extended rough sets theory. Then, an approach for inducing decision trees under the rough gain ratio is presented. Examples show that the decision trees generated by the proposed method tend to have simpler structure and more understandable rules than C4.5.
Article
Full-text available
We view Web-based Support Systems (WSS) as a multidisciplinary research area that focuses on supporting human activities in specific domains or fields based on computer science, information technology, and Web technology. Research on WSS is motivated by the challenges and opportunities of the Internet and the Web. The recent advancements of computer and Web technologies make the implementation of WSS feasible. This paper presents the fundamental issues of WSS, a framework of WSS, and research on WSS. We also present preliminary studies on two examples of WSS, Web-based research support systems (WRSS) and Web-based information retrieval support systems (WIRSS).
Article
Full-text available
Suppose, you have thoroughly tested some application system. You have found some software bugs, but all critical errors and even most cosmetic errors have been repaired, as confirmed by regression tests. Furthermore, due to the use of advanced testing specification techniques, the expected coverage of potential failures was very high. Why should you still want to do Usability Testing? Some answers are given below. Most importantly, the notion of a mismatch be- tween human beings and information appliances is introduced, which differs on several points from the classical notion of a software defect. This has far- reaching implications for testing management and practice, so at the end of this paper we will introduce a general reference model combining Software Testing with Usability Testing.
Conference Paper
Full-text available
Today's software systems are typically composed of multiple components, each with different versions. Software compat- ibility testing is a quality assurance task aimed at ensuring that multi-component based systems build and/or execute correctly across all their versions' combinations, or config- urations. Because there are complex and changing interde- pendencies between components and their versions, and be- cause there are such a large number of configurations, it is generally infeasible to test all potential configurations. Con- sequently, in practice, compatibility testing examines only a handful of default or popular configurations to detect prob- lems; as a result costly errors can and do escape to the field. This paper presents a new approach to compatibility test- ing, called Rachet. We formally model the entire config- uration space for software systems and use the model to generate test plans to sample a portion of the space. In this paper, we test all direct dependencies between components and execute the test plan efficiently in parallel. We present empirical results obtained by applying our approach to two large-scale scientific middleware systems. The results show that for these systems Rachet scaled well and discovered in- compatibilities between components, and that testing only direct dependences did not compromise test quality.
Article
Full-text available
Software metrics have been much criticized in the last few years, sometimes justly but more often unjustly, because critics misunderstand the intent behind the technology. Software complexity metrics, for example, rarely measure the “inherent complexity” embedded in software systems, but they do a very good job of comparing the relative complexity of one portion of a system with another. In essence, they are good modeling tools. Whether they are also good measuring tools depends on how consistently and appropriately they are applied
Article
Full-text available
Topics related to software portability and maintenance are often overlooked in favour of code optimisation and other shorter-term programming issues. However, in the long run these can be crucial in ensuring continuity of work, for example when personnel change or a new machine becomes available. We have gained some experience in working with HPCI consortia and on the HPC’97 procurement in these areas. This paper highlights some of the potential difficulties which have arisen, and describes techniques which may be used to minimise the amount of work required to port codes to different machines and maintain multi-developer projects.
Book
Research Methods: The Basics is an accessible, user-friendly introduction to the different aspects of research theory, methods and practice. Structured in two parts, the first covering the nature of knowledge and the reasons for research, and the second the specific methods used to carry out effective research, this book covers: Structuring and planning a research project The ethical issues involved in research Different types of data and data quality Analysing and organising data to draw sound conclusions Writing up and displaying data in effective ways Complete with a glossary of key terms and guides to further reading, this book is an essential text for anyone coming to research for the first time, and is widely relevant across the social sciences and humanities.
Chapter
After reading this chapter you should be able to: use PHP to manage a MySQL database use PHP to send MySQL commands to a MySQL server use PHP to display the results of a MySQL SELECT, SHOW or DESCRIBE command in tabular form use PHP to determine the number of rows of a table affected by a MySQL INSERT, UPDATE, REPLACE or DELETE command understand the difference between PHP functions with names prefixed with mysql_ and those prefixed with mysqli_ display the version of MySQL you are using.
Article
In recent years the proportion and complexity of software in medical devices has increased considerably. This has presented an opportunity for software development organisations to expand into the medical device domain. Due to the high level of risk associated with medical devices, strict regulations must be adhered to in order to market such products. One key aspect of these regulations is the necessity to have in place a Quality Management System to help ensure an organisations' ability to consistently meet customer and regulatory requirements. This paper presents a roadmap which can be used to assist organisations, wishing to develop medical device software to implement a Quality Management System.
Article
This paper describes a metric called "performance efficiency," and its use in cognitive task analysis. This metric provides a means of determining the learning efficiency of instructional conditions. Performance efficiency will be described in the context of recording technologies that are often used in software usability studies. While usability is often considered in the programming of software environments, the "learnability" of these environments is more the concern of instructional designers. The advantages and disadvantages of these types of metrics and methodologies will be discussed in detail. Thus the purpose of this paper is to consider the applications of the "performance efficiency" metric to the design of instructional materials. Introduction Educational researchers have used a medical model to develop instructional materials; that is we hope to design instruction, which is both efficient and effective (Lewis & Barron, 2009). Gagné (1964) was one of the earliest educators to describe these two general categories of dependent variables. He proposed most educators are concerned with (1) "the rate of attainment of some criterion performance" (efficiency) and (2) "the degree of correctness of this performance" (effectiveness) (Gagné, 1964, p.295). It is an underlying theme of this paper that when these variables are applied to the design of instructional materials, we are considering the "learnability" of the instruction. Nielsen (1993) defined usability by developing several subcomponents (learnability, efficiency, memorability, errors, and satisfaction). Soloway, Guzdial, and Hay (1994) called for Norman's "user-centered" design philosophy to be more "learner-centered." Nielsen's (1993) definition of learnability "How easy is it for users to accomplish basic tasks" is a subjective measure of "perceived usability," rather than a more objective measure. However, Nielsen (2001) proposed we should consider the user's opinions and suggestions, but only after actually watching them work with the software. That is we must start by observing learners before considering their perceptions. It's interesting that if we were to look to the international standards organization (ISO) for a definition of usability, we would find that they also chose to use Gagné's variables (ISO 9241-11, 1998). While cognitive load may not seem related to usability, similarities reveal themselves if you consider the measures underlying this theoretical framework. Cognitive load theory is an instructional theory that is concerned with the learnability of instructional materials. This theoretical framework has become quite influential within the field of instructional design (Ozcinar, 2009; Paas, van Gog, & Sweller, 2010). Cognitive load theory is primarily concerned with procedural knowledge, task performances and problem-solving. Cognitive load measures are a combination of subjective data (mental-effort ratings) and performance scores (Tuovinen & Paas, 2004). These measures have been found to be reliable and correlated with error rates (Ayres, 2006) but not all cognitive load theorists agree with the use of subjective measures, and have proposed we consider more direct or objective measures (Brünken, Plass, & Leutner, 2003; Whelan, 2007). This concern has led to the impetus for this paper and the "performance efficiency" metric described in the next couple of sections. This type of research (task analysis) has a rich history and is certainly a metric to be used in cognitive task analysis. Task Analysis Task analysis researchers have used observation or photography/videography as a means of data collection for decades (Clark & Estes, 1996; Gilbreth & Gilbreth, 1917). Some of the earliest task analysis studies were made with stopwatches and the newly developed technology of chronocyclegraphy (Gilbreth & Gilbreth, 1917). This was the use of long exposure photography, which allowed for the detection of movements over time. While the Gilbreths were early pioneers of time motion studies, even they were aware of the underlying rationale for this type of research. They state it when they say "that the learner shall be taught the best way immediately, that is, from the beginning of his practice" (Gilbreth & Gilbreth, 1917, p.82). So they were amongst the first to promote efficient instruction, for it allows a learner to be more efficient with their time, and simply learn more.
Article
Teacher transfer requests interfere with the stability and continuity of teaching thereby causing low student performance. The purpose of the study was to investigate how teacher transfer requests can be minimized. The study employed a descriptive survey design. The population of the study included 16 head teachers, 126 teachers and the provincial staffing officer. The sample had 13 head teachers, 98 teachers and the provincial staffing officer after 30% of the stratified population were involved in the pilot. The 3 strata were rural location, urban location and the school located within the Islands, which had diverse working conditions. However, 29 (30%) of the teachers were randomly sampled for interviews. The data were collected using questionnaires as well as interview schedules. The study revealed that teacher transfer requests could be reduced if transport and communication to schools was improved; electricity and houses were made available to teachers; teachers employed from the locality and posted next to their families, class sizes were reduced, teacher induction and mentoring programs encouraged, retention bonuses instituted and teachers involved in decision making at school level. The study recommended that the government should provide electricity and improve accessibility in Suba district by improving roads; school boards should facilitate the availability of housing facilities to teachers. More teachers should be employed through decentralized system to reduce student teacher ratio. The head teachers and school managements should adopt induction programs to support new teachers and provide retention bonuses for teachers to make them want to stay longer.
Article
This article focuses on an overlooked factor in the unequal sorting of teachers across schools: the geographic preferences of teachers. Using data from the National Education Longitudinal Study, the author examines the patterns of geographic mobility of new teachers and compares them to the patterns of other college graduates. Specifically, the author demonstrates that teachers’ preference for working close to where they grew up is a distinct characteristic of teachers, and the author further explores the implications of those preferences for schools facing chronic shortages of teachers. The author finds that the local nature of the labor force and the differential rates of graduation and production of teachers from traditionally hard-to-staff schools are reinforcing existing deficits of local teacher labor supply.
Article
We provide a state-of-the-art explication of application se- curity and software protection. The relationship between application security and data security, network security, and software security is discussed. Three simplified threat models for software are sketched. To better understand what attacks must be defended against in order to improve software security, we survey software attack approaches and at- tack tools. A simplified software security view of a software application is given, and along with illustrative examples, used to motivate a partial list of software security requirements for applications.
Article
Software compatibility is an extremely complex and pervasive topic. Unfortunately it is not well defined nor well documented. To say anything useful within the space and time constraints we must confine ourselves to generalities and readily admit in advance that there are many exceptions.
Article
Software portability is often cited as desirable, but rarely receives systematic attention in the software development process. With the growing diversity of computing platforms, it is increasingly likely that software of all types may need to migrate to a variety of environments and platforms over its lifetime. This tutorial is intended to show the reader how to design portability into software projects, and how to port software when required. Full Text at Springer, may require registration or fee
Article
In the past of computer science, sometimes, a gap between the testing and the formal methods community could be observed. Testers did not believe in the applicability of formal verification techniques to real world problems, and formal methods' advocates could not accept testing-techniques as an adequate verification method for producing correct software. However, today the gap is closing and this thesis contributes to building the bridge by offering new results on testing based on formal development techniques. Others have worked on testing based on formal specifications before, but only a few considered the related development techniques such as program synthesis. Most of the previous work focused on generating test-cases by partitioning the formal specification into equivalence classes of input-output behavior. This related work on testing is reviewed. In this thesis three formal development techniques have been examined, regarding their support in the testing of computer-based systems...
The Transfer of Public Secondary School Teachers in the National Capital Region (NCR): An Analysis
  • R N Asenas
Asenas, R. N. (2013). The Transfer of Public Secondary School Teachers in the National Capital Region (NCR): An Analysis. Journal of Education and Practice, 4(22), 174-180. https://www.iiste.org/Journals/index.php/JEP/article/download/8344/8678
Journey of Teachers of Last-Mile Schools: A Phenomenological Inquiry
  • C J C Brillantes
  • E L Nebria
Brillantes, C. J. C., & Nebria, E. L. (2021). Journey of Teachers of Last-Mile Schools: A Phenomenological Inquiry. International Journal of Research Publication and Reviews, 2(9), 921-930, https://ijrpr.com/uploads/V2ISSUE9/IJRPR1353.pdf
Decision Trees Explained -Entropy, Information Gain, Gini Index, CCP Pruning. Towards Data Science
  • S Dash
Dash, S. (2022). Decision Trees Explained -Entropy, Information Gain, Gini Index, CCP Pruning. Towards Data Science. Retrieved from https://towardsdatascience.com /decision -trees-explained-entropy-information-gain-gini-index-ccp-pruning-4d78070db36c
Developing a Web Based Content Management System Using PHP
  • A M Erickson
Erickson, A. M. (2012). Developing a Web Based Content Management System Using PHP. Retrieved from http://www.a-erickson.com/wpcontent/uploads/2014/05/Adam-M-Erickson-December-2012-PHP-Development.pdf
Effects of teachers' transfer on school system
  • F Noor
  • S M Ishaque
  • A A Memon
  • F A Lodhi
Noor, F., Ishaque, S. M., Memon, A. A, & Lodhi, F. A. (2012). Effects of teachers' transfer on school system. Interdisciplinary Journal of Contemporary Research in Business, 4(2), 85-94. https://journal-archieves19.webs.com/593-617.pdf
Design and development research
  • R Richey
  • J D Klein
Richey, R. & Klein, J.D. (2014). Design and development research. Taylor & Francis Group. https://doi.org/10.4324/9780203826034
Decision Table Testing. Sofware Testing
  • L Sharma
  • V Singh
Sharma, L., Singh, V. (2021). Decision Table Testing. Sofware Testing. Retrieved from https://www.toolsqa.com/software-testing/istqb/decision-table-testing/
Involuntary Teacher Transfer in Special Education: Concepts and Strategies for Teacheres Facing New Assignments
  • J Stivers
  • S F Cramer
  • K Riordan
Stivers, J., Cramer S. F., & Riordan, K. (2012). Involuntary Teacher Transfer in Special Education: Concepts and Strategies for Teacheres Facing New Assignments. Journal of the American of Speical Education Professionals. Retrieved from https://files.eric.ed.gov/fulltext/EJ1135694.pdf