NL scoring and Bloom competency test: an experimental result
Assessing learner' answers is an important task and also require a lot of time. In many cases, exam papers comprise of questions that require learners to write at least one or two sentences to express their understanding. However, there are not many computer-based assessment tools able to cater...
| Main Authors: | Lajis, Adidah, Abdul Aziz, Normaziah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/29196/ http://irep.iium.edu.my/29196/1/NL_SCORING_AND_BLOOM_COMPETENCY_TEST.pdf |
Similar Items
NL scoring technique for the assessment of learners' understanding
by: Lajis, Adidah, et al.
Published: (2010)
by: Lajis, Adidah, et al.
Published: (2010)
Competency assessment of short free text answers
by: Lajis, Adidah, et al.
Published: (2014)
by: Lajis, Adidah, et al.
Published: (2014)
Assessment of learners’ understanding: an experimental result
by: Lajis, Adidah, et al.
Published: (2009)
by: Lajis, Adidah, et al.
Published: (2009)
Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming
by: Lajis, Adidah, et al.
Published: (2018)
by: Lajis, Adidah, et al.
Published: (2018)
Assessment of learner's understanding: an experimental result
by: Lajis, Adidah, et al.
Published: (2009)
by: Lajis, Adidah, et al.
Published: (2009)
Experimental Model for Teaching Software Testing
by: Kamal Z., Zamli, et al.
Published: (2015)
by: Kamal Z., Zamli, et al.
Published: (2015)
Part-of-speech in a node-link scoring techniques for assessing learners' understanding
by: Lajis, Adidah, et al.
Published: (2011)
by: Lajis, Adidah, et al.
Published: (2011)
An Analysis of Basketball Scores Statistics
by: Lee, Tim Soon
Published: (2011)
by: Lee, Tim Soon
Published: (2011)
Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
Modelling learners’ understanding through Node-link analysis and scoring
by: Lajis, Adidah, et al.
Published: (2010)
by: Lajis, Adidah, et al.
Published: (2010)
Modelling learners' understanding through node-link analysis and scoring
by: Lajis, Adidah, et al.
Published: (2010)
by: Lajis, Adidah, et al.
Published: (2010)
Image retrieval based on similarity score fusion
by: Mohd. Ali, Iliana
Published: (2007)
by: Mohd. Ali, Iliana
Published: (2007)
e-PSC: Progress ScoreCard Application in the Construction Industry
by: Wan Azlee, Wan Abdullah, et al.
Published: (2009)
by: Wan Azlee, Wan Abdullah, et al.
Published: (2009)
Convergence results and sharp estimates for the
voter model interfaces
by: brahim belhaouari, samir, et al.
Published: (2010)
by: brahim belhaouari, samir, et al.
Published: (2010)
An algebraic approach for sentence based feature extraction applied for automatic text summarization
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
A new efficient text detection method for image spam filtering
by: Al Muataz, Zubaidah, et al.
Published: (2015)
by: Al Muataz, Zubaidah, et al.
Published: (2015)
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Frequencies determination of characters for Bahasa Melayu:
results of preliminary investigation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Exploring multifactorial techniques in rat swarm optimization: Preliminary results
by: Kang, Haw Yuan, et al.
Published: (2025)
by: Kang, Haw Yuan, et al.
Published: (2025)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
WeiFu: A novel pan-cancer driver gene identification method using incidence-weighted mutation scores
by: Ren, Yanjie, et al.
Published: (2024)
by: Ren, Yanjie, et al.
Published: (2024)
Simplifying multivariate survival analysis using global score test methodology
by: Zain, Zakiyah, et al.
Published: (2015)
by: Zain, Zakiyah, et al.
Published: (2015)
Ground penetrating radar system using OFDM technology
by: Mohamed Hassan, Ahmed Abbas, et al.
Published: (2012)
by: Mohamed Hassan, Ahmed Abbas, et al.
Published: (2012)
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
An online badminton motion tracking system
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Web and mobile based phrase dictionary
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Computerized observation and motion in badminton tracking system
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
An empirical investigation of the SMS Exam Result Query System Model (SERQSM) in Malaysia : the case of Universiti Malaysia Sabah
by: Hanudin, Amin, et al.
Published: (2008)
by: Hanudin, Amin, et al.
Published: (2008)
Real time astrocyte in spiking neural network
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
Relationship between employability and graduate’s competencies based on programme learning outcomes analysis
by: Wan Nor Afiqah, Wan Othman
Published: (2020)
by: Wan Nor Afiqah, Wan Othman
Published: (2020)
Similar Items
-
NL scoring technique for the assessment of learners' understanding
by: Lajis, Adidah, et al.
Published: (2010) -
Competency assessment of short free text answers
by: Lajis, Adidah, et al.
Published: (2014) -
Assessment of learners’ understanding: an experimental result
by: Lajis, Adidah, et al.
Published: (2009) -
Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming
by: Lajis, Adidah, et al.
Published: (2018) -
Assessment of learner's understanding: an experimental result
by: Lajis, Adidah, et al.
Published: (2009)