Modelling learners’ understanding through Node-link analysis and scoring
| Main Authors: | Lajis, Adidah, Abdul Aziz, Normaziah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/11209/ http://irep.iium.edu.my/11209/1/WA_11209_NORMAZIAH_Modelling_Learners%27_Understanding.pdf |
Similar Items
Part-of-speech in a node-link scoring techniques for assessing learners' understanding
by: Lajis, Adidah, et al.
Published: (2011)
by: Lajis, Adidah, et al.
Published: (2011)
Modelling learners' understanding through node-link analysis and scoring
by: Lajis, Adidah, et al.
Published: (2010)
by: Lajis, Adidah, et al.
Published: (2010)
Assessing learner’s understanding via node-link analysis: an information theory approach
by: Lajis, Adidah, et al.
Published: (2008)
by: Lajis, Adidah, et al.
Published: (2008)
NL scoring technique for the assessment of learners' understanding
by: Lajis, Adidah, et al.
Published: (2010)
by: Lajis, Adidah, et al.
Published: (2010)
Young learners' use of ICT facilities and the development of their language skills
by: Mat Daud, Nuraihan
Published: (2012)
by: Mat Daud, Nuraihan
Published: (2012)
Scale free network analysis of a large crowd through their
spatio-temporal activities
by: Ahmad, Akhlaq, et al.
Published: (2016)
by: Ahmad, Akhlaq, et al.
Published: (2016)
Introducing learner infrastructural capabilities into information systems success model using e-learning
by: Atanda, Balogun Naeem, et al.
Published: (2017)
by: Atanda, Balogun Naeem, et al.
Published: (2017)
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Evaluating heuristic for EG portal design model
by: Mahmud, Murni, et al.
Published: (2010)
by: Mahmud, Murni, et al.
Published: (2010)
A conceptual model of customer relationship management alignment
by: Mohamed, Norshidah, et al.
Published: (2012)
by: Mohamed, Norshidah, et al.
Published: (2012)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Decision to cast a vote: an ordinal regression statistical analysis
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Multi-layered alert filtration and feedback cycle using Brahms model
by: Ghaffar, Abid, et al.
Published: (2016)
by: Ghaffar, Abid, et al.
Published: (2016)
In search of a model to explain digital divide in information technology organizations
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
Assessing the impact of presentation mining on understanding among visual learners
by: Kasinathan, Vinothini, et al.
Published: (2018)
by: Kasinathan, Vinothini, et al.
Published: (2018)
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al.
by: Yusoff, Aiman, et al.
Basic emotions verification and identification using Gaussian Mixture Model (GMM) features extraction
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
Understanding components of IT risks and enterprise risk management
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
Computer-supported cooperative work in Malaysian tourism industry
by: Abd Aziz, Puteri Noor Ruzanna, et al.
Published: (2013)
by: Abd Aziz, Puteri Noor Ruzanna, et al.
Published: (2013)
Affective four dimensional design principles of mobile mathematics application for primary school low vision learners
by: Nur Amirah, Abdul Mutalib
Published: (2024)
by: Nur Amirah, Abdul Mutalib
Published: (2024)
Creating a GUI solver for linear programming models in MATLAB
by: Siaw, Chong Lee, et al.
Published: (2018)
by: Siaw, Chong Lee, et al.
Published: (2018)
A coherent framework for understanding the success of an information system project: a revised version
by: Jaya Putra, Sopiyanshah, et al.
Published: (2016)
by: Jaya Putra, Sopiyanshah, et al.
Published: (2016)
Understanding the process of cross-cultural code switching of global virtual teams in knowledge sharing
by: Nursakirah, Ab Rahman Muton
Published: (2022)
by: Nursakirah, Ab Rahman Muton
Published: (2022)
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018)
by: Wen, Chuah Chai, et al.
Published: (2018)
Why thinking aloud matters for usability evaluation?
by: Abu Seman, Esmadi Abu, et al.
Published: (2010)
by: Abu Seman, Esmadi Abu, et al.
Published: (2010)
Evaluating the accessibility and visibility of Quranic websites
by: Abu Bakar, Ahmad Bakeri
Published: (2010)
by: Abu Bakar, Ahmad Bakeri
Published: (2010)
Preliminary investigation of Islamic websites design & content feature: A heuristic evaluation from user perspective
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
User experience:assesing the effectiveness of internet booking service
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
HCI practice in Malaysia : a reflection of ICT professionals' perspective
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
iSpeechNews:s real time speech news service for ubiquitous computing environment
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Web-based e-learning systems acceptance and success: a review of contributing factors from the instructors’ perception
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
Similar Items
-
Part-of-speech in a node-link scoring techniques for assessing learners' understanding
by: Lajis, Adidah, et al.
Published: (2011) -
Modelling learners' understanding through node-link analysis and scoring
by: Lajis, Adidah, et al.
Published: (2010) -
Assessing learner’s understanding via node-link analysis: an information theory approach
by: Lajis, Adidah, et al.
Published: (2008) -
NL scoring technique for the assessment of learners' understanding
by: Lajis, Adidah, et al.
Published: (2010) -
Young learners' use of ICT facilities and the development of their language skills
by: Mat Daud, Nuraihan
Published: (2012)