Advisory Aided System To Institute Of Higher Learning Based On Rules Based And Personality Assessment.
This paper discuss about the implementation and method used in AAISTIH. AISTIH is a web-based database system that uses rule-based and personality assessment in assisting student to apply the suitable course in institute of higher learning in Malaysia. It is a system designed with one thing in...
| Main Authors: | Osman, Mohd Azam, Sabudin, Maziani, Sharuddin, Shaiful Hisham |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9395/ http://eprints.usm.my/9395/1/Advisory_Aided_System_To_Institute_of_Higher_Learning_%28AASTIH%29_based_on_Rule-based_%26_Personality_Assessment.pdf |
Similar Items
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
by: Osman, Mohd. Azam, et al.
Published: (2007)
by: Osman, Mohd. Azam, et al.
Published: (2007)
A Classification And Visualization Approach For Knowledge Management Of A Special Interest Group
by: Sulaiman, Shahida, et al.
Published: (2008)
by: Sulaiman, Shahida, et al.
Published: (2008)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009)
by: Song , Shen
Published: (2009)
Knowledge-based design aid tool for power electronic converters
by: Omrane, Bouketir, et al.
Published: (2005)
by: Omrane, Bouketir, et al.
Published: (2005)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Examining The Impact Of Computer-Based Assessment On Higher Education Student Performance In Kano, Nigeria
by: Bello, Hassan
Published: (2024)
by: Bello, Hassan
Published: (2024)
Zero Waste Campus A Framework And Digital Learning Module For Sustainable Environmental Practices In Higher Education Institution
by: Nalikant, Mayawi Baba
Published: (2024)
by: Nalikant, Mayawi Baba
Published: (2024)
Profiling Ict Academics At Malaysian
Research Universities (Rus) On Their
Commercialization Approaches
Based On Personal Attributes: A
Grounded Theory Study
by: Othman, Hafizul
Published: (2015)
by: Othman, Hafizul
Published: (2015)
Personalization of interactive news through J2EE, XML, XSLT, and SMIL in a Web-based multimedia content management system
by: Cheong,, S, et al.
Published: (2002)
by: Cheong,, S, et al.
Published: (2002)
Personalization of interactive news through J2EE, XML, XSLT, and SMIL in a Web-based multimedia content management system
by: Cheong,, S, et al.
Published: (2002)
by: Cheong,, S, et al.
Published: (2002)
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
by: Tan, Joi San
Published: (2017)
by: Tan, Joi San
Published: (2017)
Webcam Based Fingerprint Authentication for Personal Identification System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Knowledge Sharing in Knowledge-based Institutions
by: Jessica Sze-Yin, Ho, et al.
Published: (2008)
by: Jessica Sze-Yin, Ho, et al.
Published: (2008)
Rule Learning and Extraction Using a Hybrid Neural Network: A Case Study on Fault Detection and Diagnosis
by: Tan, Shing Chiang, et al.
Published: (2005)
by: Tan, Shing Chiang, et al.
Published: (2005)
Web Personalization Using Implicit Input
by: Pan , Yih Jyh
Published: (2007)
by: Pan , Yih Jyh
Published: (2007)
Protocol Based Interaction in Component-Based Software Systems.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Personalizable Information Interchange Architecture for EducationalInstitutions
by: Ting, Tin Tin, et al.
Published: (2008)
by: Ting, Tin Tin, et al.
Published: (2008)
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
Performance-based variations in dynamic generation of e-learning web-based presentations
by: Khor, Ean-Teng, et al.
Published: (2006)
by: Khor, Ean-Teng, et al.
Published: (2006)
A Computer-aided Multidisease Diagnostic System Using MRCP
by: Logeswaran, Rajasvaran
Published: (2008)
by: Logeswaran, Rajasvaran
Published: (2008)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Leave-one-out authentication of persons using 40 Hz EEG oscillations
by: Ravi, , KVR, et al.
Published: (2005)
by: Ravi, , KVR, et al.
Published: (2005)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Personal Online Shopping Widget:
Consumer Acceptance Level Of Online
Shopping Widget
by: Lee, Yean Hooi
Published: (2009)
by: Lee, Yean Hooi
Published: (2009)
Innovative teaching: Using multimedia to engage students in interactive learning in higher education
by: Teoh, Belinda S. P, et al.
Published: (2006)
by: Teoh, Belinda S. P, et al.
Published: (2006)
An Enhanced Electronic Health Community With Knowledge-Based E-Mail And Agent-Based Knowledge Search And Sharing.
by: Cheah, Yu N, et al.
Published: (2004)
by: Cheah, Yu N, et al.
Published: (2004)
Improving visual evoked potential feature classification for person recognition using PCA and normalization
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
by: Lim, Huan Ngee
Published: (2009)
by: Lim, Huan Ngee
Published: (2009)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
TIC : A Topic-Based Intelligent Crawler
by: Baghdadi, Hossein Shahsavand
Published: (2011)
by: Baghdadi, Hossein Shahsavand
Published: (2011)
An integrated approach for head gesture based interface
by: Lee, Gin Chong, et al.
Published: (2012)
by: Lee, Gin Chong, et al.
Published: (2012)
Lexical Functions For Ants Based Semantic Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
A Social Based Model For Genetic Algorithms.
by: AL-Madi, Nagham Azmi, et al.
Published: (2007)
by: AL-Madi, Nagham Azmi, et al.
Published: (2007)
Agent-Based Simulation Of Crowd At The Tawaf Area.
by: Sarmady, S., et al.
Published: (2007)
by: Sarmady, S., et al.
Published: (2007)
Design Processes For Web-Based Hypermedia Engineering.
by: Jantan, Azrul Hazri, et al.
Published: (2007)
by: Jantan, Azrul Hazri, et al.
Published: (2007)
Color-based Image Retrieval Using Wavelet.
by: Sumari, Putra, et al.
Published: (2004)
by: Sumari, Putra, et al.
Published: (2004)
Similar Items
-
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007) -
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
by: Osman, Mohd. Azam, et al.
Published: (2007) -
A Classification And Visualization Approach For Knowledge Management Of A Special Interest Group
by: Sulaiman, Shahida, et al.
Published: (2008) -
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018) -
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009)