Using computer analysis of student writing to improve lesson planning
This paper describes the results of a study that aimed to investigate the effectiveness of using Coh-Metrix to perform a computer analysis of student writing, and the extent to which this analysis could be used by the classroom teacher to improve lesson planning and thereby create opportunity for be...
| Main Authors: | Fooks, Ian, Mohd. Asraf, Ratnawati |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Asian EFL Journal Press
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/68836/ http://irep.iium.edu.my/68836/1/68836_Using%20computer%20analysis%20of%20student%20writing%20to%20improve%20lesson%20planning_ARTICLE.pdf http://irep.iium.edu.my/68836/7/68836_Using%20computer%20analysis%20of%20student%20writing_scopus.pdf |
Similar Items
Academic Planning for Faculty Computer Science & Information Technology / Adzni Abdul Rahim
by: Adzni , Abdul Rahim
Published: (2003)
by: Adzni , Abdul Rahim
Published: (2003)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Combinatorial Rules Approach to Improve Priority Rules Scheduler in Grid Computing Environment
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
Lessons Learned from the Implementation of xGTWay families of Unit Testing Tool
by: Kamal Z., Zamli, et al.
Published: (2012)
by: Kamal Z., Zamli, et al.
Published: (2012)
Gender differences in computational thinking skills among Malaysian’s primary school students using visual programming
by: Osmanullrazi, Abdullah, et al.
Published: (2021)
by: Osmanullrazi, Abdullah, et al.
Published: (2021)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Student courses management plan
by: Mohamad Azrul Amin, Mohamed Asof
Published: (2014)
by: Mohamad Azrul Amin, Mohamed Asof
Published: (2014)
Managing building checkist plans Using BUSCLIS
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2016)
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2016)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
A computing curriculum wiki : analysis and modelling using the MAS-CommonKADS agent-oriented methodology.
by: Tang, Adelina *, et al.
Published: (2010)
by: Tang, Adelina *, et al.
Published: (2010)
Computer-aided system for extending the performance of diabetes analysis and prediction
by: Murad, Saydul Akbar, et al.
Published: (2021)
by: Murad, Saydul Akbar, et al.
Published: (2021)
Improving computational complexity using I-zag for text image authentication scheme
by: ‘Aqilah, Abd. Ghani
Published: (2024)
by: ‘Aqilah, Abd. Ghani
Published: (2024)
Blogging as a tool in developing writing skills:
lessons from the experience of the students and class teacher
by: Abdul Ghani, Rozina, et al.
Published: (2017)
by: Abdul Ghani, Rozina, et al.
Published: (2017)
An ethical assessment of computer ethics using scenario approach
by: Masrom, Maslin, et al.
Published: (2010)
by: Masrom, Maslin, et al.
Published: (2010)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Quantitative analysis and performance evaluation of target-oriented replication strategies in cloud computing
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Modelling the movement of crowd evacuation using computational simulation technique
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
E-learning system of UCOM for improving student assessment feedback in Oman higher education
by: Tawafak, Ragad M., et al.
Published: (2018)
by: Tawafak, Ragad M., et al.
Published: (2018)
Behavious based computer user clustering using rough set theory
by: Wang , Le Wei
Published: (2013)
by: Wang , Le Wei
Published: (2013)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Computer Aided Instructions (CAI) Mathematics Using Learner Centered Approach
by: Teng, Sze Le
Published: (2017)
by: Teng, Sze Le
Published: (2017)
A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem
by: Odili, Julius Beneoluchi, et al.
Published: (2021)
by: Odili, Julius Beneoluchi, et al.
Published: (2021)
Student Planning and advisory system
by: Kerk, Rui Xiang
Published: (2011)
by: Kerk, Rui Xiang
Published: (2011)
A Computational System Approach
To Develop Students’ Emotion Oriented System as Feedback Tool for
Lecturers to Enhance Teaching and Learning
by: Deshinta, Arrova Dewi, et al.
Published: (2012)
by: Deshinta, Arrova Dewi, et al.
Published: (2012)
Assessing Attention and Meditation Levels in Learning Process using Brain Computer Interface
by: Rahmah, Mokhtar, et al.
Published: (2016)
by: Rahmah, Mokhtar, et al.
Published: (2016)
Aesthetical concept for human-computer interaction using fuzzy knowledge base clustering
by: Mashinchi, M. Reza, et al.
Published: (2007)
by: Mashinchi, M. Reza, et al.
Published: (2007)
Extended planning poker: A proposed model
by: Sudarmaningtyas, Pantjawati, et al.
Published: (2020)
by: Sudarmaningtyas, Pantjawati, et al.
Published: (2020)
CD-ROM : Introduction to computers
by: Yusof, Norazah, et al.
Published: (1998)
by: Yusof, Norazah, et al.
Published: (1998)
Faculty Of Computer Systems & Software Engineering teaching workload distribution system using ERP
by: Nik Intan Syahiddatul Ilani, Jailani
Published: (2018)
by: Nik Intan Syahiddatul Ilani, Jailani
Published: (2018)
An integrated model for continuance use of cloud computing services towards SMEs organizational performance
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
Comparing Computational Thinking in Scratch and Non-Scratch Web Design Projects: A MetaAnalysis on Framing and Refactoring
by: Lee, Chien Sing *, et al.
Published: (2021)
by: Lee, Chien Sing *, et al.
Published: (2021)
The workshop as a qualitative research approach: lessons learnt from a “critical thinking through writing” workshop
by: Ahmed, Sabreena, et al.
Published: (2018)
by: Ahmed, Sabreena, et al.
Published: (2018)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
A flowchart-based intelligent tutoring system model to improve students' problem-solving skills / Danial Hooshyar
by: Danial, Hooshyar
Published: (2016)
by: Danial, Hooshyar
Published: (2016)
Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Similar Items
-
Academic Planning for Faculty Computer Science & Information Technology / Adzni Abdul Rahim
by: Adzni , Abdul Rahim
Published: (2003) -
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013) -
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012) -
Combinatorial Rules Approach to Improve Priority Rules Scheduler in Grid Computing Environment
by: Zafril Rizal, M Azmi, et al.
Published: (2012) -
Lessons Learned from the Implementation of xGTWay families of Unit Testing Tool
by: Kamal Z., Zamli, et al.
Published: (2012)