Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Designing a Secure Exam Management System (SEMS) for M-Learning Environment

Author : ShivaKumara 1 Dr.Sai Madhavi D 2 H.V.Yerrinand 3 Sunil Kumar 4 R.Gopal Y.V 5

Date of Publication :25th April 2018

Abstract: The Secure exam management system is a Mobile Learning process. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. By using Internet or WiFi Connections students can easily exchange information during exam time. In m-learning environments where the Students mobile/tablet devices that can be connected to an Internet browsing or e-book reading, as well as for the sake of exams. Using student’s mobile devices as exam stations offers the advantage of low cost, more exam takers at the time, and no need for a wired network. Thus, a dynamic security policy is needed in this case with an appropriate enforcing mechanism.

Reference :

    1. R. Amin, T. Gaber, G. ElTaweel, and A. E. Hassanien iometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues,” Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, Springer, pp. 423-446, 2014.
    2. Z. Xu, T. Zhang, Y. Zeng, J. Wan and W. Wu, “A Secure Mobile Payment Framework Based On Face Authentication,” Proc. Int. MultiConference of Engineers and Computer Scientists (IMECS), Mar. 2015.
    3. S. Yi, I. Yoon, C. Oh, and Y. Yi, “Real-time Integrated Face Detection and Recognition on Embedded GPGPUs,” IEEE 12th Symp. on Embedded Syst. for Real-time Multimedia (ESTIMedia), pp. 98-107, Oct. 2014.
    4. G. Wang, Y. Xiong, J. Yun, and J. R. Cavallaro, "Accelerating Computer Vision Algorithms using OpenCL Framework on the Mobile GPU - a Case Study," IEEE Int. Conf. on Acoustics, Speech, and Signal Process. (ICASSP), May 2013.
    5. A. El-Mahdy and R. Elsersy, NajwaHayaatiMohdAlwi “A : Information Security Management in E-Learning,” Proc. 22nd High Performance Computing Symposium, pp. 23, Apr. 2014.
    6. FaceRecognizer - Face Recognition with OpenCV, http://docs.opencv.org/modules/contrib/doc/facerec/facer ec_api.html.
    7. E. Weippl. Security in E-Learning, volume 16 of Advances in Information Security. Springer Science+Business Media, Inc., 2005. ISBN: 0-387- 24341-0.
    8. D. Chadwick, R. Tassabehji, and A. Yong chen . Experiences of using a public key infrastructure for the preparation of examination papers. Computers & Education, 35(1):1–20, august 2000. ISSN: 0360-1315.
    9. S. Wexler, N. Grey, D. Miller, F. Nguyen, and A. Barnevelda, “Learning management systems: The good, the bad, the ugly and the truth,” The E-learning Guild Res. 360 Rep. on Learning Manage. Syst., May 2008, Available: http://www.cedma-europe. org/newsletter%20articles/eLearning%20Guild/Learning %20Management%20Systems%202008%20(May%2008 ).pdf.

Recent Article