ABSTRACT
Monitoring whether a student is opening other files other than the allowed file/s during an examination period is really a challenging task. The art of cheating in a written examination is also pertinent to a computer-based examination. Since the proctor is not at all time looking at the student’s computer activities, students still have the chance to open restricted applications. In this hurdle, developing a system that will send to the proctor’s machine the list and screenshots of the classified computer programs accessed in every student machine in real-time is beneficial. This system will detect the deceitful act through a warning message. If the act is not discontinued, the student machine will be penalized by either be locked, restarted, shutdown, sleep, or hibernate depending on the penalty set by the proctor. Furthermore, this system also records the student attendance during digital exams or as the students log-on to their machine.
This document describes a project to develop an Institute Management System using Java. It includes:
1. An overview of the objectives to automate operations like student, teacher, course and fee management currently done manually.
2. A description of the technologies used - Notepad for text editing, Java for programming, Eclipse IDE for development.
3. An outline of the modules to be developed including student information, teacher information, course management, fees management, and admin functionality.
lab access and management using barcode scannerbilalengg24
This document describes a barcode-based student attendance system developed at SIES Graduate School of Technology in Navi Mumbai, India. The system uses barcode scanners to read barcode IDs on student ID cards to automatically record student attendance in classes. Each student is issued an ID card with a unique barcode containing student details like roll number. When a student scans their barcode, the system records their attendance for that class. Teachers can access attendance reports and generate lists of students with low attendance. The system aims to automate and simplify the attendance recording process compared to traditional paper-based methods.
This document describes a student management system project developed using C++. The project aims to manage student records and make the process more efficient than a manual system. It allows administrators to view, edit, search for, update, and delete student profiles by details like name, roll number, course, and contact. The interfaces support entering new student data, viewing all data, searching by roll number, updating existing records, deleting single or all records, and exiting the program. The hardware and software requirements are also provided.
Android project Icons Management Sysytem Report
Using Google's firebase online realtime database its was so much fun working with firebase. Its too boring first time but when it worked it's very interesting
Student Progress Report, Result Analysis & Time Table GenerationIRJET Journal
The document describes a student progress report, result analysis, and timetable generation software. It includes 3 modules - progress report, result analysis, and timetable generation. For progress report, it imports student details, attendance, and test marks from Excel sheets and stores it in a database. It generates progress reports using Crystal Reports. For result analysis, it imports subject marks and stores in the database. It can analyze results and generate graphs. For timetable generation, it enters staff, subject, class, and time details to generate a timetable without clashes or overlaps. The objectives are to reduce manual work and efficiently generate reports, analyze results, and create timetables.
This document describes a college management app called College 360. It lists the team members and provides an introduction, overview of features, modules, database design, screenshots, and conclusion. The app allows teachers to assign homework, send notices and emails, and upload materials for students. It also enables students to view assignments, send emails to teachers, and access notices and a photo gallery. The app is designed to manage all resources and interaction between teachers and students at a college.
The document describes a proposed computer system for subject registration at a university. The system would allow students to log in with an ID and password, select between 2-5 subjects based on their year of study from a list of available options, edit their selections, and confirm their final subject registration which would be stored in a file. The system would run on Windows operating systems using Dev C++ and include features like validating login credentials, restricting subject options by year, adding/deleting subjects, and searching for subjects by ID.
This document describes a project to develop an Institute Management System using Java. It includes:
1. An overview of the objectives to automate operations like student, teacher, course and fee management currently done manually.
2. A description of the technologies used - Notepad for text editing, Java for programming, Eclipse IDE for development.
3. An outline of the modules to be developed including student information, teacher information, course management, fees management, and admin functionality.
lab access and management using barcode scannerbilalengg24
This document describes a barcode-based student attendance system developed at SIES Graduate School of Technology in Navi Mumbai, India. The system uses barcode scanners to read barcode IDs on student ID cards to automatically record student attendance in classes. Each student is issued an ID card with a unique barcode containing student details like roll number. When a student scans their barcode, the system records their attendance for that class. Teachers can access attendance reports and generate lists of students with low attendance. The system aims to automate and simplify the attendance recording process compared to traditional paper-based methods.
This document describes a student management system project developed using C++. The project aims to manage student records and make the process more efficient than a manual system. It allows administrators to view, edit, search for, update, and delete student profiles by details like name, roll number, course, and contact. The interfaces support entering new student data, viewing all data, searching by roll number, updating existing records, deleting single or all records, and exiting the program. The hardware and software requirements are also provided.
Android project Icons Management Sysytem Report
Using Google's firebase online realtime database its was so much fun working with firebase. Its too boring first time but when it worked it's very interesting
Student Progress Report, Result Analysis & Time Table GenerationIRJET Journal
The document describes a student progress report, result analysis, and timetable generation software. It includes 3 modules - progress report, result analysis, and timetable generation. For progress report, it imports student details, attendance, and test marks from Excel sheets and stores it in a database. It generates progress reports using Crystal Reports. For result analysis, it imports subject marks and stores in the database. It can analyze results and generate graphs. For timetable generation, it enters staff, subject, class, and time details to generate a timetable without clashes or overlaps. The objectives are to reduce manual work and efficiently generate reports, analyze results, and create timetables.
This document describes a college management app called College 360. It lists the team members and provides an introduction, overview of features, modules, database design, screenshots, and conclusion. The app allows teachers to assign homework, send notices and emails, and upload materials for students. It also enables students to view assignments, send emails to teachers, and access notices and a photo gallery. The app is designed to manage all resources and interaction between teachers and students at a college.
The document describes a proposed computer system for subject registration at a university. The system would allow students to log in with an ID and password, select between 2-5 subjects based on their year of study from a list of available options, edit their selections, and confirm their final subject registration which would be stored in a file. The system would run on Windows operating systems using Dev C++ and include features like validating login credentials, restricting subject options by year, adding/deleting subjects, and searching for subjects by ID.
This document provides a summary of the software development life cycle for the "Student Supervision System" project. It describes the typical phases of a project including initiation, concept development, planning, requirements analysis, design, development, integration and testing, implementation, and operations and maintenance. The goal is to develop a system to automate the manual student supervision processes currently in use through planning and implementing the necessary phases of the software development life cycle.
This project report describes a student faculty document sharing application created by Krishan Kant Gupta of Aryabhatta International College of Technical Education in Ajmer, Rajasthan, India. The application allows college faculty to upload documents like syllabi, timetables, notes etc for students to view and download. It was developed using Android Studio and uses SQLite database. The report discusses the development tools, techniques and technologies used like Android, SQLite and provides implementation details, limitations and future enhancements.
The document describes a student result management system that will manage information about users, subjects offered each semester, and marks obtained by students. It will generate reports. The system requirements include maintaining data on students, subjects, marks and user accounts with validation checks. The system will have security, maintainability and portability. Key modules include login, subject info maintenance, marks entry and maintenance of user accounts.
Porposal on Student information management systemREHAN IJAZ
This document outlines a student information management system that stores student data for long-term use and prevents data redundancy. The system has a simple interface that allows easy use without special skills. It stores student data and information in a database and displays results from basic queries. The system has limited functionality and scope currently but could be expanded to manage information for staff and teachers as well. It requires minimum hardware specifications and has no data or logical errors.
This document describes a student result system project created using C programming language. It allows users to perform operations like adding student records, viewing all records, searching records by roll number, calculating average marks, and sorting records by marks or roll number. The key algorithms used are merge sort for sorting and linear search for searching and insertion. The source code implements functions for the main menu, record insertion, display, sorting, searching, and average calculation. UML diagrams show the design of the student record class and interaction between functions.
Student management system project report c++Student
This document describes a student management system project that uses C++ and file handling. The system allows users to create, read, modify and delete student records which are stored in files. It also generates reports like grade reports and displays individual or all student data. The system ensures correct data is input and stored through validation checks. It utilizes common functions for file handling and output formatting.
This document describes a student result management system created by Kazi Hasnayeen Emad. The system allows users to add, view, and update student records and results in a secure manner. It uses Java for development and MySQL for data storage. The system has features like proper login, easy addition and modification of student details and results. It aims to simplify the task of maintaining large numbers of student records in an educational organization.
The document describes a project report submitted by 5 students for their Bachelor of Technology degree. It outlines the development of an IIMSR Student Management System. The system will manage student records like personal details, contact details, marks details, and other functions like student/faculty profiles, marks submission, attendance records, examination results, and timetable management. It conducted a feasibility study and identified problems with the current manual system. The project aims to automate the process and make it more efficient by reducing paperwork.
The document outlines a proposed student result management system with the following key points:
1. The system will manage student, subject, and marks information for classes 6-10 and generate tabulation sheets. It will also maintain the institute website.
2. The background discusses similar existing systems used in education sectors.
3. Performance will be evaluated based on user interfaces, validity checks, and software attributes like security, maintainability and portability.
The system aims to simplify and speed up the result preparation and management process for educational institutes.
This presentation summarizes a student result management system created by students at North Western University. The system was created using PHP, CSS, HTML, and SQL Server to allow automatic management of student results. It includes features for administrators, teachers, and students, such as allowing admins to manage student data, teachers to input marks, and students to view their own results online. Authentication controls access for each user type. The system aims to reduce workload for teachers and provide online access to results. Entity relationship diagrams were presented to show how user, course, teacher, and student data are linked within the database structure.
This document describes a student results management system that was developed as a web application to manage student results. It has three main modules: a registration/login module, an admin module, and a student module. The admin module allows administrators to create subjects, classes, add students and their results. The student module allows students to view and download their results. The proposed system aims to replace the manual process of managing student results and provide easier access for students to check their results and course information online. It reduces the time needed for students to access their results compared to the existing manual system.
Result processing is a part of the post-examination process that needs accuracy and transparency as the betterment of students is based on their report card and grade history.
This document describes a student management system (SMS) developed as an extension to the Hospital Management Information System (HMIS) to manage student records for dental students across government hospitals in Gujarat. The SMS allows for management of admission, fees payment, exam scheduling, result entry and generation of reports. It follows an iterative development approach and uses a multilayer architecture with layers for data, control, business and presentation. Various diagrams like use case, class, entity-relationship and data flow are provided to depict the system. Screenshots demonstrate modules for admission, fees, exam scheduling and results. The system aims to reduce paper work and efficiently manage student information and resources.
This document describes a college management system project. It lists the group members and project guide for the system. The system allows for student information entry and editing, generation of fee receipts, and includes modules for login, student data functions, and fee payment. It is designed to automate college functions for both students and administrators for easier management of student records and fees. Hardware requirements include a laptop or desktop computer and the software will run on a Fedora operating system utilizing text files and binary data for data storage and access.
The document describes a student database management system created for T.B.G. Polytechnic in Ambajogai, India. The system was created to streamline processes like registration, admission, class and staff management by utilizing a database instead of manual records. The system uses a graphical user interface and database features for easy data entry, retrieval, and manipulation compared to paper records. This saves time and reduces paperwork.
This document presents a student management system project developed in Java. It allows users to view, edit, and manage student records and results. The key modules allow students to view their academic records while faculty can both view and edit records. It uses a MS Access database and was created using technologies like JDK, JDBC, and NetBeans. The future scope includes adding printing, improved design, and connecting it to an online system. The goal is to create an easy to use system to manage all student information for educational institutions.
This document presents a student information system project by two students. It describes the system's ability to facilitate online registration, password changes, adding/dropping subjects, viewing department and fee information, and rules. It allows students to overcome long department lines. The system registration procedure involves registering unregistered students by entering details, and registered students logging in with credentials to access functions like viewing rules. A flowchart shows the registration and login processes.
The objective of Student information System is to allow the administrator
of any organization to edit and find out the personal details of a student and
allows the student to keep up to date his profile .It’ll also facilitate keeping
all the records of students, such as their id, name, mailing address, phone
number, DOB etc. So all the information about an student will be available
in a few seconds.
Overall, it’ll make Student Information Management an easier job for the
administrator and the student of any organization. The main purpose of this SRS document is to illustrate the requirements of the project Student information System and is intended to help any organization to maintain and manage its student’s personal data.
1) The document proposes developing a web-based course enrollment system using PHP, MySQL, JavaScript, HTML, and CSS.
2) It will allow students to enroll in courses online and provide reports to staff.
3) The system will be tested at the database level and interface level before full implementation. Maintenance of the system will be conducted regularly to ensure functionality.
The document describes a proposed student information system that would allow institutions to more easily manage student data. It would include functions for recording, searching, modifying, and deleting student records. The system would use a prototyping model since requirements are not yet fully defined. It then provides details on the hardware, software, and functional requirements including use of a SQL database, Windows OS, and securing student data.
Design and Implementation of a Heterogeneous Distributed Database System for ...AhmedAliAlsamman
International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys. 15, No.1 (Mar-24) http://dx.doi.org/10.12785/ijcds/150175 Design and Implementation of a Heterogeneous Distributed Database System for Students Absence Automation Using Portable Devices Ahmed A. Alsamman1 1College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq Received 5 Apr. 2023, Revised 26 Jan. 2024, Accepted 7 Feb. 2024, Published 1 Mar. 2024 Abstract: Students’ absence recording is a fundamental daily process that occurs within colleges, often relying on paper forms, which is inefficient when the college administration wants to gather absences from multiple remote departments (sites) and calculate the college’s students’ absence rates. In response to these challenges, a heterogeneous distributed database system was designed to declare and automate student absences in the colleges using smartphones or laptops and send absences in real-time from inside lecture halls or laboratories in departments to the college administration to generate absence reports. The system employed a client-server model to deliver services to the college and its various departments through the local area network (LAN) and the Internet. MSSQL database tables were designed and fragmented across college sites using horizontal fragmentation technology and then encrypted with the AES265 algorithm. The proposed system used private SQLite or MSSQL databases for the lecture’s Android or Windows devices. On the other hand, college administration staff used a secure website built with ASP.NET to access the MySQL database server, which contains the absence table populated from all sites. The system was protected against false absence declarations by utilizing the local server’s timing factor, allowing the lecturer only to declare absences on specific days and times. The experimental results showed high reliability and accuracy of the system and high satisfaction among the users about achieving the desired goals. The findings demonstrated a strong preference for the system among the lecturers over other systems that relied on student, biometric, and AI-based devices. At the same time, the college administration staff preferred automatic absence collection using the distributed design of the system over manual collection.
USABILITY EVALUATION OF A CONTROL AND PROGRAMMING ENVIRONMENT FOR PROGRAMMING...ijseajournal
This paper presents an assessment of usability of Control and Programming Environment (CPE) of a
remote mobile robot. The CPE is an educational environment focused on computer programming education
that integrates a program development online tool with a remote lab. To evaluate system usability,
empirical test was conducted with computer science students in order to identify the views of users on the
system and get directions on how to improve the quality of interface use. The study used questionnaire and
observation of the evaluator. The degree of users’ satisfaction was measured by using a quantitative
approach that establishes the average ranking for each question of the questionnaire. The results indicate
that the system is simple, easy to use and suited to programming practices, however needed changes to
make it more intuitive and efficient. The realization test of usability, even with a small sample user, is
important to provide feedback on the system's user experience and help identify problems.
This document provides a summary of the software development life cycle for the "Student Supervision System" project. It describes the typical phases of a project including initiation, concept development, planning, requirements analysis, design, development, integration and testing, implementation, and operations and maintenance. The goal is to develop a system to automate the manual student supervision processes currently in use through planning and implementing the necessary phases of the software development life cycle.
This project report describes a student faculty document sharing application created by Krishan Kant Gupta of Aryabhatta International College of Technical Education in Ajmer, Rajasthan, India. The application allows college faculty to upload documents like syllabi, timetables, notes etc for students to view and download. It was developed using Android Studio and uses SQLite database. The report discusses the development tools, techniques and technologies used like Android, SQLite and provides implementation details, limitations and future enhancements.
The document describes a student result management system that will manage information about users, subjects offered each semester, and marks obtained by students. It will generate reports. The system requirements include maintaining data on students, subjects, marks and user accounts with validation checks. The system will have security, maintainability and portability. Key modules include login, subject info maintenance, marks entry and maintenance of user accounts.
Porposal on Student information management systemREHAN IJAZ
This document outlines a student information management system that stores student data for long-term use and prevents data redundancy. The system has a simple interface that allows easy use without special skills. It stores student data and information in a database and displays results from basic queries. The system has limited functionality and scope currently but could be expanded to manage information for staff and teachers as well. It requires minimum hardware specifications and has no data or logical errors.
This document describes a student result system project created using C programming language. It allows users to perform operations like adding student records, viewing all records, searching records by roll number, calculating average marks, and sorting records by marks or roll number. The key algorithms used are merge sort for sorting and linear search for searching and insertion. The source code implements functions for the main menu, record insertion, display, sorting, searching, and average calculation. UML diagrams show the design of the student record class and interaction between functions.
Student management system project report c++Student
This document describes a student management system project that uses C++ and file handling. The system allows users to create, read, modify and delete student records which are stored in files. It also generates reports like grade reports and displays individual or all student data. The system ensures correct data is input and stored through validation checks. It utilizes common functions for file handling and output formatting.
This document describes a student result management system created by Kazi Hasnayeen Emad. The system allows users to add, view, and update student records and results in a secure manner. It uses Java for development and MySQL for data storage. The system has features like proper login, easy addition and modification of student details and results. It aims to simplify the task of maintaining large numbers of student records in an educational organization.
The document describes a project report submitted by 5 students for their Bachelor of Technology degree. It outlines the development of an IIMSR Student Management System. The system will manage student records like personal details, contact details, marks details, and other functions like student/faculty profiles, marks submission, attendance records, examination results, and timetable management. It conducted a feasibility study and identified problems with the current manual system. The project aims to automate the process and make it more efficient by reducing paperwork.
The document outlines a proposed student result management system with the following key points:
1. The system will manage student, subject, and marks information for classes 6-10 and generate tabulation sheets. It will also maintain the institute website.
2. The background discusses similar existing systems used in education sectors.
3. Performance will be evaluated based on user interfaces, validity checks, and software attributes like security, maintainability and portability.
The system aims to simplify and speed up the result preparation and management process for educational institutes.
This presentation summarizes a student result management system created by students at North Western University. The system was created using PHP, CSS, HTML, and SQL Server to allow automatic management of student results. It includes features for administrators, teachers, and students, such as allowing admins to manage student data, teachers to input marks, and students to view their own results online. Authentication controls access for each user type. The system aims to reduce workload for teachers and provide online access to results. Entity relationship diagrams were presented to show how user, course, teacher, and student data are linked within the database structure.
This document describes a student results management system that was developed as a web application to manage student results. It has three main modules: a registration/login module, an admin module, and a student module. The admin module allows administrators to create subjects, classes, add students and their results. The student module allows students to view and download their results. The proposed system aims to replace the manual process of managing student results and provide easier access for students to check their results and course information online. It reduces the time needed for students to access their results compared to the existing manual system.
Result processing is a part of the post-examination process that needs accuracy and transparency as the betterment of students is based on their report card and grade history.
This document describes a student management system (SMS) developed as an extension to the Hospital Management Information System (HMIS) to manage student records for dental students across government hospitals in Gujarat. The SMS allows for management of admission, fees payment, exam scheduling, result entry and generation of reports. It follows an iterative development approach and uses a multilayer architecture with layers for data, control, business and presentation. Various diagrams like use case, class, entity-relationship and data flow are provided to depict the system. Screenshots demonstrate modules for admission, fees, exam scheduling and results. The system aims to reduce paper work and efficiently manage student information and resources.
This document describes a college management system project. It lists the group members and project guide for the system. The system allows for student information entry and editing, generation of fee receipts, and includes modules for login, student data functions, and fee payment. It is designed to automate college functions for both students and administrators for easier management of student records and fees. Hardware requirements include a laptop or desktop computer and the software will run on a Fedora operating system utilizing text files and binary data for data storage and access.
The document describes a student database management system created for T.B.G. Polytechnic in Ambajogai, India. The system was created to streamline processes like registration, admission, class and staff management by utilizing a database instead of manual records. The system uses a graphical user interface and database features for easy data entry, retrieval, and manipulation compared to paper records. This saves time and reduces paperwork.
This document presents a student management system project developed in Java. It allows users to view, edit, and manage student records and results. The key modules allow students to view their academic records while faculty can both view and edit records. It uses a MS Access database and was created using technologies like JDK, JDBC, and NetBeans. The future scope includes adding printing, improved design, and connecting it to an online system. The goal is to create an easy to use system to manage all student information for educational institutions.
This document presents a student information system project by two students. It describes the system's ability to facilitate online registration, password changes, adding/dropping subjects, viewing department and fee information, and rules. It allows students to overcome long department lines. The system registration procedure involves registering unregistered students by entering details, and registered students logging in with credentials to access functions like viewing rules. A flowchart shows the registration and login processes.
The objective of Student information System is to allow the administrator
of any organization to edit and find out the personal details of a student and
allows the student to keep up to date his profile .It’ll also facilitate keeping
all the records of students, such as their id, name, mailing address, phone
number, DOB etc. So all the information about an student will be available
in a few seconds.
Overall, it’ll make Student Information Management an easier job for the
administrator and the student of any organization. The main purpose of this SRS document is to illustrate the requirements of the project Student information System and is intended to help any organization to maintain and manage its student’s personal data.
1) The document proposes developing a web-based course enrollment system using PHP, MySQL, JavaScript, HTML, and CSS.
2) It will allow students to enroll in courses online and provide reports to staff.
3) The system will be tested at the database level and interface level before full implementation. Maintenance of the system will be conducted regularly to ensure functionality.
The document describes a proposed student information system that would allow institutions to more easily manage student data. It would include functions for recording, searching, modifying, and deleting student records. The system would use a prototyping model since requirements are not yet fully defined. It then provides details on the hardware, software, and functional requirements including use of a SQL database, Windows OS, and securing student data.
Design and Implementation of a Heterogeneous Distributed Database System for ...AhmedAliAlsamman
International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys. 15, No.1 (Mar-24) http://dx.doi.org/10.12785/ijcds/150175 Design and Implementation of a Heterogeneous Distributed Database System for Students Absence Automation Using Portable Devices Ahmed A. Alsamman1 1College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq Received 5 Apr. 2023, Revised 26 Jan. 2024, Accepted 7 Feb. 2024, Published 1 Mar. 2024 Abstract: Students’ absence recording is a fundamental daily process that occurs within colleges, often relying on paper forms, which is inefficient when the college administration wants to gather absences from multiple remote departments (sites) and calculate the college’s students’ absence rates. In response to these challenges, a heterogeneous distributed database system was designed to declare and automate student absences in the colleges using smartphones or laptops and send absences in real-time from inside lecture halls or laboratories in departments to the college administration to generate absence reports. The system employed a client-server model to deliver services to the college and its various departments through the local area network (LAN) and the Internet. MSSQL database tables were designed and fragmented across college sites using horizontal fragmentation technology and then encrypted with the AES265 algorithm. The proposed system used private SQLite or MSSQL databases for the lecture’s Android or Windows devices. On the other hand, college administration staff used a secure website built with ASP.NET to access the MySQL database server, which contains the absence table populated from all sites. The system was protected against false absence declarations by utilizing the local server’s timing factor, allowing the lecturer only to declare absences on specific days and times. The experimental results showed high reliability and accuracy of the system and high satisfaction among the users about achieving the desired goals. The findings demonstrated a strong preference for the system among the lecturers over other systems that relied on student, biometric, and AI-based devices. At the same time, the college administration staff preferred automatic absence collection using the distributed design of the system over manual collection.
USABILITY EVALUATION OF A CONTROL AND PROGRAMMING ENVIRONMENT FOR PROGRAMMING...ijseajournal
This paper presents an assessment of usability of Control and Programming Environment (CPE) of a
remote mobile robot. The CPE is an educational environment focused on computer programming education
that integrates a program development online tool with a remote lab. To evaluate system usability,
empirical test was conducted with computer science students in order to identify the views of users on the
system and get directions on how to improve the quality of interface use. The study used questionnaire and
observation of the evaluator. The degree of users’ satisfaction was measured by using a quantitative
approach that establishes the average ranking for each question of the questionnaire. The results indicate
that the system is simple, easy to use and suited to programming practices, however needed changes to
make it more intuitive and efficient. The realization test of usability, even with a small sample user, is
important to provide feedback on the system's user experience and help identify problems.
1. The document describes a smart library system project that uses smart cards for university campus libraries to automate processes like book issuing and returning.
2. It provides details of the software requirements and testing done for the library management system module created during an internship. This includes unit testing of modules like admin and student login.
3. The system aims to reduce queues, overhead time and make the library management more efficient using smart card technology while saving costs. It will benefit both students and library staff.
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
This document presents a proposed mobile application-based attendance system for educational institutes using speech recognition. The current paper-based manual attendance marking system is prone to errors. The proposed system allows teachers to take attendance using a mobile app that converts student speech responses to text using Android speech libraries. Attendance records can then be uploaded to a server for monitoring. The system provides privileges for students, faculty, heads of departments and administrators. It aims to provide an accurate, automated alternative to traditional attendance systems and remove issues like impersonation.
Online Exam Proctoring using Deep LearningIRJET Journal
This document describes a system for online exam proctoring using deep learning techniques. The system tracks examinee presence, detects mobile phones and books, and checks for multiple individuals in the webcam feed during exams using a Single Shot Detector model. It aims to prevent cheating by issuing warnings if any prohibited objects or behaviors are detected. The system was tested and able to successfully detect objects, individuals, and terminate exams if too many warnings occurred. It provides an automated way to supplement human proctoring during remote online exams.
The document describes requirements for an online conference management system using a three-tier architecture. It defines functional requirements for different user types including program chairs, authors, and reviewers. Non-functional requirements address usability, security, performance and other qualities. Use case and sequence diagrams model adding a conference. The domain model depicts the structure of conferences, users, submissions and other entities. Overall an iterative development approach is proposed using a three-tier architecture to separate the user interface, business logic and data layers.
Project Phase-II - First Review - PPT Template.pptx201roopikha
The document proposes developing an automatic cheating detection system for exam halls using machine learning. It aims to identify various forms of cheating like copying or communicating without invading privacy. The system will use YOLOv3 object detection and ShuffleNets architecture for real-time detection from multiple camera feeds. When cheating is detected, the system will promptly alert administrators for intervention while minimizing false positives and negatives. The system is intended to enhance exam integrity and fairness while reducing human errors.
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEJournal For Research
Until today, most lecturers in universities are found still using the conventional methods of taking students attendance either by calling out the student names or by passing around an attendance sheet for students to sign confirming their presence.This project is absolutely on the android-based attendance management system. Android based attendance system provides efficient means of determining eligibility criteria for students to meet examination requirements. [1] The core idea of research project is to implement Android based application for attendance management system for advancement of institution and educational system [2]. This system enables student to learn anywhere, anytime and at their own convenience. This system makes students to be active, responsive while learning their academic. Another application that is provided by this system is smart attendance evaluation and report generation. [2]This makes the work even easier for the lecturers. Also there is a separate module for analyzing the results of the test exams of the students. There is a certain criterion to be met for each and every student to appearing for the test exam. The main objective of this paper is to provide an overview on the data mining techniques that have been used to predict students performance. [3]A certain action can be taken on students not fulfilling the criteria. This process basically aims at improving the overall student performance by taking into consideration student attendance and test marks.
The document describes an E-Gatepass system that was developed to simplify the process of issuing gate passes and reduce paperwork. The system uses a Model-View-Controller architecture and SQL Server database. It allows administrators to monitor users, faculty to approve student gatepass applications, and displays approved applications to guards. The system aims to automate the existing manual gatepass process. It was developed using Java, Spring Tool Suite and can be accessed on Windows devices by various user types like students, faculty and guards.
A review paper: optimal test cases for regression testing using artificial in...IJECEIAES
This document provides a review of optimal test cases for regression testing using artificial intelligence techniques. It discusses regression testing and techniques used for test case selection and prioritization, including retest all, regression test selection, and test case prioritization. Metrics for evaluating the efficiency of these techniques are described, including average percentage of faults detected, average percentage block coverage, and average percentage decision coverage. The document also reviews various artificial intelligence techniques that have been used for regression testing, such as neural networks, fuzzy logic, genetic algorithms, and machine learning. It provides examples of studies that have applied these techniques to select optimal test cases and improve the efficiency of regression testing.
With the emergence of virtualization and cloud computing technologies, several services are housed on virtualization platform. Virtualization is the technology that many cloud service providers rely on for efficient management and coordination of the resource pool. As essential services are also housed on cloud platform, it is necessary to ensure continuous availability by implementing all necessary measures. Windows Active Directory is one such service that Microsoft developed for Windows domain networks. It is included in Windows Server operating systems as a set of processes and services for authentication and authorization of users and computers in a Windows domain type network. The service is required to run continuously without downtime. As a result, there are chances of accumulation of errors or garbage leading to software aging which in turn may lead to system failure and associated consequences. This results in software aging. In this work, software aging patterns of Windows active directory service is studied. Software aging of active directory needs to be predicted properly so that rejuvenation can be triggered to ensure continuous service delivery. In order to predict the accurate time, a model that uses time series forecasting technique is built.
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern.
Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blindable access tickets, group signatures, anonymous access tickets, minimal disclosure of tickets and revocation but each one varies in realization of these features. Each feature requires different cryptography mechanism for realization. Due to this it induces computation complexity which affects the deployment of these models in practical application. Most of these techniques are designed for a particular application environment and adopt public key cryptography which incurs high cost due to computation complexity.
To address these issues this work present an secure and efficient privacy preserving of mining data on public cloud platform by adopting party and key based authentication strategy. The proposed SCPPDM (Secure Cloud Privacy Preserving Data Mining) is deployed on Microsoft azure cloud platform. Experiment is conducted to evaluate computation complexity. The outcome shows the proposed model achieves significant performance interm of computation overhead and cost.
The document describes a proposed student attendance management system. The system aims to automate and computerize the traditional paper-based process of taking student attendance. Key features include allowing teachers to take attendance digitally by selecting students' names from a displayed list, generating reports on attendance data, and identifying students who are regularly absent or below attendance thresholds. The system is intended to streamline the attendance process and make attendance data more easily accessible and analyzed and reports automatically generated.
This document provides a summary of a project proposal for developing a School Admission Process Management System. It includes sections on project initiation and scheduling, diagrams, project cost estimation, designing the user interface, and testing approaches. The project aims to automate the currently manual school admission process to make it faster and easier to use. It will develop a web-based system using technologies like ASP.NET, SQL Server, and PHP/MySQL. Testing will include white box, black box, unit, integration, and system testing approaches. The document outlines the requirements, feasibility, advantages over the current system, and includes diagrams to depict the system design.
This document describes a lab monitoring system that was developed to manage a computer lab network and address issues faced during practical sessions. The system allows for functions like compulsory student login, attendance marking with authentication, file sharing, USB prevention when drives are connected, automatic shutdown of idle systems, and remote desktop monitoring by teachers. It uses a client-server model over a LAN to connect student and teacher systems. The goal of the system is to intelligently manage the lab environment and monitor student activities and files during practical sessions in a networked computer lab.
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxDanielGuballo1
The document provides an overview of the methodology used to develop a smart attendance system using QR codes with SMS notifications. It describes the initial planning phase where the project idea was developed. In the planning phase, goals, problem statements, and objectives were identified. An analysis phase involved understanding requirements by researching related works. In the design phase, models like context diagrams, entity relationship diagrams, and data flow diagrams were created to design the system interfaces and database. The system design and modeling section explained the framework and diagrams to ensure an easy development process.
Fingerprint Based Attendance System by IOTIRJET Journal
This document summarizes a research paper that proposes a fingerprint-based attendance system using Internet of Things (IoT) technology. The system uses a NodeMCU microcontroller, fingerprint sensor module, and Google Sheets to record student attendance via fingerprint scans. Fingerprint data is uploaded securely to the cloud server in Google Sheets. This automated system aims to reduce the inefficiencies of manual attendance recording systems by eliminating fake attendances, saving time, and securely storing attendance data in the cloud. The system implementation involves a fingerprint scanner connected to a microcontroller and WiFi module to upload fingerprint IDs to Google Sheets in real-time.
School admission process management system (Documention)Shital Kat
This document outlines the project plan for developing a School Admission Process Management System. It includes sections on project initiation and scheduling, diagrams of the system, a project cost estimation, designing the user interface, and plans for testing. The system will automate the currently manual paper-based admission process to make it faster and easier to use. It will store and process student personal, academic, and fee information using a web interface and backend database. Testing will include white box, black box, unit, integration, and system testing to ensure quality.
This document discusses enhancing SIEM correlation rules through baselining. It proposes using baselining to identify anomalous events in addition to rule-based correlation. Three approaches are suggested for updating baselines: 1) using a static window baseline, 2) using an extended window to dynamically update the baseline, and 3) using a fixed sliding time window to dynamically prune historical data effects. The goal is to reduce false positive alerts by investigating different baseline training techniques and lifecycle updating approaches.
Enhancing SIEM Correlation Rules Through BaseliningErtugrul Akbas
Enterprise grade software has been updated with a capability that identifies anomalous events based on baselines as well as rule based correlation engine, and alerts administrators when such events are identified. To reduce the number of false positive alerts we have investigated the use of different baseline training techniques and introduce the use of 3 different training approaches for baseline detection and updating lifecycle
Similar to REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA NETWORK ENVIRONMENT (20)
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
A review on techniques and modelling methodologies used for checking electrom...
REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA NETWORK ENVIRONMENT
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
DOI: 10.5121/ijcsit.2018.10607 69
REMOTELY VIEW USER ACTIVITIES AND IMPOSE
RULES AND PENALTIES IN A LOCAL AREA
NETWORK ENVIRONMENT
Marisa Buctuanon, Roldan Debalucos and John Glenn Villalon
University of San Jose – Recoletos, Cebu City, Philippines
ABSTRACT
Monitoring whether a student is opening other files other than the allowed file/s during an examination
period is really a challenging task. The art of cheating in a written examination is also pertinent to a
computer-based examination. Since the proctor is not at all time looking at the student’s computer
activities, students still have the chance to open restricted applications. In this hurdle, developing a system
that will send to the proctor’s machine the list and screenshots of the classified computer programs
accessed in every student machine in real-time is beneficial. This system will detect the deceitful act
through a warning message. If the act is not discontinued, the student machine will be penalized by either
be locked, restarted, shutdown, sleep, or hibernate depending on the penalty set by the proctor.
Furthermore, this system also records the student attendance during digital exams or as the students log-on
to their machine.
KEYWORDS
Impose penalties to Machine, Monitor Restricted Files or Documents, LAN, Remote access, Computer
Activities, Cheating Detection
1. INTRODUCTION
E-assessment is already widely used to evaluate the student learning in which acquiring rich
source of data to design a formative intervention to improve student learning is feasible [1].
However, digital cheating is also common to all, where students find ways to cheat using
computer technology [2]. This kind of cheating could be done by accessing other websites,
communicating with others via instant messaging tools or email during an exam, seeding test
computers with answers, and bringing in non-exam disks containing solutions to the exam [3].
Additionally, since the students are already using digital assessment, it will be favorable to
integrate attendance monitoring to the same system. Students who incurred a lot of truancies have
fewer opportunities to learn the materials provided by the proctor and achieve better scores in
exams [4]. Unfortunately, using conventional method of taking attendance is tedious, and
cumbersome process since the proctor still needs to call the names of students and record them in
paper or input them on their machines [5]. Thus, developing a system where monitoring the user
activities in the machine and managing student’s attendance in one system is advisable.
There are already studies related to monitoring and controlling network activities in real-time.
One of them is the study of [6] where network activities represented in packets, such as URLs
accessed, chat rooms visited, e-mails sent and received, instant messaging (IM) sessions, and
among others are monitored. In this study, these network activities are monitored and controlled
via Internet and these activities can be blocked or not based on the predefined rule set by the
controlling mobile communications device(s). A similar system is also speculated which does not
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
70
only monitor and capture network activities but also produces network activity reports at
predetermined time [7]. Another computer activity monitoring and recording system is also
conscripted where the computer user activities are being recorded and monitored by a supervisor
[8]. There is a digital certificate that will allow the monitoring machine to monitor and record the
activities according to the policies comprised in the certificate. Additionally, a system solely for
monitoring an activity is also made available [9]. This system measures the activity rate and
warns the machine that the activity reaches the predetermined level. An automatic method for
cheating detection in online exams is also developed where different images of students are
recorded. The images are processed and analyzed to compare with students’ images at different
times of exam [10]. With regards to the checking of attendance, there is a proposed framework
where managing the students’ attendance is done with the use of RFID technology [11]. Radio
Frequency Identification (RFID) technology is equipped with circuits that gain power from radio
waves emitted by readers in an environment and can be used as an information to a variety of
purpose [12].
All the related studies have their own unique features and purposes. To enumerate them, the two
systems designed in [6] and [7] allow the communication of network activities through internet.
However in this paper, any communication during an examination should not be permitted. Also,
in [8], it focuses on creating a digital trust between two computer machines used by the user and
the supervisor which is not the focus of this paper. Furthermore, the third system is different from
this paper since it checks only the time spent on an activity in the machine. Though a method for
cheating detection is developed, it takes time to detect the dishonesty done by the students since
the images retrieved still needs to be processed and analyzed only after the exam. The proposed
framework of [11] only checks the students’ attendance with the use of RFID.
In this paper, a system that enables the proctor to view the list of restricted files or apps accessed
by the students during an examination period or a controlled session is made possible. The
number of attempts in accessing these files or apps is recorded and will have corresponding points
for deduction. The proctor sets first the number of warnings that determines the number of
allowable attempts. If the student reaches the final warning, the student machine will be
penalized. The penalty could either be lock, restart, shutdown, sleep, or hibernate depending on
the value set by the proctor. Additionally, the system will not just check the apps accessed by the
student but also, the students’ presence. In this way, the proctor will no longer manually check
their attendance.
2. REVIEW OF RELATED LITERATURE
Simple network management (SNMP) is a network management protocol that is used to collect
status information and/or configuration information from devices connected to a network such as
an intranet [13]. This information or data that is available on a device is defined in an abstract
data structure known as a Management Information Base (MIB) [14]. This information can be
parsed and filtered and be sent to the database server. It is now up to the server on what to do with
the information. Additionally, it is necessary to have an ease in monitoring the different
applications running in every client machine without manually initiating it. To do this, a task
scheduler is required. This will initiate the running of scrips or programs to run in the background
[15] Furthermore, to interact automatically to an operating system, a command line tool is
needed. One of which is PowerShell. It performs administrative tasks on a machine just like
having an administrative account where restrictions are nothing [16]. There are a lot of scripting
languages that can work as a backend to access the database and connect to the browser. To name
one is PHP. PHP or PHP: Hypertext Processor is a widely-used open source general-purpose
scripting language that is suitable for web development [17].
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
71
2.1. Architectural Design
Figure 1. LookOut Architectural Design
LookOut is the name of the application introduced in this paper. Figure 1 depicts the interaction
of the different modules in the LookOut system, from the client machine to the monitoring
machine. These modules are installed in both entities where client has to have five modules which
include the task scheduler, VB script, bat files, PHP script, and PowerShell. The task scheduler
should be configured first to create an event or initiate the prerequisite scripts to trigger the next
needed scripts. A one minute is set to execute the created event. The created event triggers the VB
Script to generate bat files. These bat files are responsible for running the PowerShell and PHP
scripts automatically. The PowerShell is designed to get the logon account, personal computer
(PC), and the running apps that the user opened at the present moment. These data will be saved
to a text file. The text file generated by the PowerShell will now be parsed by the PHP script.
This script contains cURL that will pass the parsed data to the server. Furthermore, the server side
has a Curl Controller module that checks the incoming data from the client side. These data will
then be saved to the database to be consumed by the web application of the system.
3. METHODOLOGY
The system utilizes Apache HTTP Server to run the web services of system. This is run via
XAMPP. These web services are developed using PHP. With the use of Laravel 5.3, the
development follows a model view controller (MVC) architectural pattern. The web application
is also developed using PHP. To implement the dynamic retrieval and display of data in the web
application, JavaScript is used. On the other hand, the client side uses task scheduler to trigger the
launching of the first scripts that will automatically call the other scripts in the client side.
Furthermore, the PowerShell is used to retrieve the data needed by the system from the computer
unit itself. These data will then be processed and passed to the server via PHP cURL.
3.1. Getting and Passing Installed Programs From an Active Machine to the Server
The system needs to get the installed programs of all the computer units connected to a distributed
network environment to know which applications to allow during a certain exam session. The
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
72
student machine should have the scripts such as the VB and PHP scripts. Running these scripts
automatically is initiated by the Task Scheduler. The student machines should be turned on to be
able to send data to the server. In retrieving the installed programs in each machine, the
PowerShell is configured to run the task list script every 1 minute. This script will retrieve all the
installed programs of that machine and generates a text file to save the names of these
applications. This file will then be parsed by PHP cURL and will be passed to the database server.
3.2. Recording the Student Attendance and Status
With the information retrieved after knowing the programs installed in every student machine, the
sever in the proctor machine will also check which accounts have sent information. This
determines the attendance of the student, whether they are absent, present, or late. Assigning an
account in each student is already set by the proctor beforehand. It is not just the attendance of
the student that can be generated out from the retrieved information, but also the number of
violations committed with their corresponding screenshots. The proctor also sees the number of
remaining warnings the student has and/or the penalty incurred by the student.
3.3. Getting and Checking Violations with Screenshots
The same with the retrieval of installed apps, the system uses PowerShell ISE to get the running
applications in every workstation. Using the get-process script in PowerShell, the system retrieves
the running applications and uses out-file script to generate a text file. Additionally, a screenshot
is made to show proof that the said running applications are accessed by the students. This
information will then be saved to the database server. After sending the data to the server, the
system checks what applications are allowed at the current exam session. The exam session is set
beforehand by the proctor. If there are running applications that are prohibited, the system
increments the violations taken by the student. Applications that are already recorded during the
last check and are still opened during the next round of checking will be considered as another
violation.
3.4. Activating Warnings and Penalties
If the number of violations reaches the number of warnings, then penalties will be imposed.
Penalties can be lock, restart, shutdown, sleep, or hibernate. This automatically happens after the
script in the student machine has match the account logged on to it and the one warned or
penalized by the server. The server writes the user account of the student to the warn script and
the script in the student workstation checks whether the log in account exist in the warn script. If
it exists, the warning message script installed in the student workstation will automatically
execute. Just like in the implementation of executing a warning script, the penalty script in the
student workstation will also check whether the log in account exist in the specific script in the
server side. The server posts the user account of the student who reaches the limit of warning to
the penalty script which will then be retrieved by the penalty script in the student workstation.
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No
4. RESULTS AND DISCUSSION
4.1. User Interface
Figure 2 is the interface where the proctor can upload a csv file with the list of students enrolled
in a certain class with their assigned user account. The proctor can create multiple classes with
their respective laboratory and the system
laboratory. The proctor can also manage the accounts of the students here whether to add, edit, or
delete them.
Figure 3 shows the list of unique applications retrieved from all the student workstations in a
certain class or laboratory. In this paper, a class is associated to one laboratory. This is to retrench
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, Decem
ISCUSSION
Figure 2. Proctor’s Landing Page
Figure 2 is the interface where the proctor can upload a csv file with the list of students enrolled
in a certain class with their assigned user account. The proctor can create multiple classes with
their respective laboratory and the system identifies which student machine belongs to a certain
laboratory. The proctor can also manage the accounts of the students here whether to add, edit, or
Figure 3. Manage Application Page
Figure 3 shows the list of unique applications retrieved from all the student workstations in a
certain class or laboratory. In this paper, a class is associated to one laboratory. This is to retrench
6, December 2018
73
Figure 2 is the interface where the proctor can upload a csv file with the list of students enrolled
in a certain class with their assigned user account. The proctor can create multiple classes with
identifies which student machine belongs to a certain
laboratory. The proctor can also manage the accounts of the students here whether to add, edit, or
Figure 3 shows the list of unique applications retrieved from all the student workstations in a
certain class or laboratory. In this paper, a class is associated to one laboratory. This is to retrench
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No
the chance of students accessing a computer in another
attendance.
Figure 4 is where the proctor can set configurations on the type of files restricted for a certain
duration of time with their corresponding allowable attempts and penalties.
needs to fill out the session info such as session name, date to be activated, start time and end
time. This means that the checking will only happen during the set schedule. The next thing to do
is to select the set of allowable applic
ones, they are all restricted. The third step is to input the file names or URL of their allowed
application. This is to ensure that even if the student is accessing the same type of application it
should have the same name or URL as instructed. It is still a violation if student is accessing
different file name or URL. The last step is to provide the number of warnings or allowable
attempts, equivalent deduction for each warning and the penalty to be
final warning.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, Decem
the chance of students accessing a computer in another laboratory and be able to have an
Figure 4. Create Session Page
Figure 4 is where the proctor can set configurations on the type of files restricted for a certain
duration of time with their corresponding allowable attempts and penalties. First, the proctor
needs to fill out the session info such as session name, date to be activated, start time and end
time. This means that the checking will only happen during the set schedule. The next thing to do
is to select the set of allowable applications, and this would mean that other than the selected
ones, they are all restricted. The third step is to input the file names or URL of their allowed
application. This is to ensure that even if the student is accessing the same type of application it
hould have the same name or URL as instructed. It is still a violation if student is accessing
different file name or URL. The last step is to provide the number of warnings or allowable
attempts, equivalent deduction for each warning and the penalty to be taken after reaching the
Figure 5. Seat Plan Page
6, December 2018
74
laboratory and be able to have an
Figure 4 is where the proctor can set configurations on the type of files restricted for a certain
First, the proctor
needs to fill out the session info such as session name, date to be activated, start time and end
time. This means that the checking will only happen during the set schedule. The next thing to do
ations, and this would mean that other than the selected
ones, they are all restricted. The third step is to input the file names or URL of their allowed
application. This is to ensure that even if the student is accessing the same type of application it
hould have the same name or URL as instructed. It is still a violation if student is accessing
different file name or URL. The last step is to provide the number of warnings or allowable
taken after reaching the
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No
Figure 5 is where the proctor can visually see a laboratory setup where the student is physically
seated. This seat plan can be changed by dragging and dropping the individual square o
This means that this setup can be modified in all other laboratories. However, this can also be
used as a template in other laboratories. Visual cues are also shown to determine who is present,
absent, late, committed a violation and/or penaliz
indicates that the workstation is active and this means that the student who is log on to the
account is present. The color gray indicates that no one is using the workstation. The orange color
highlights the number of violations committed by the student. And lastly, the red color indicates
that the student is already penalized.
Figure 6. Student Machine Activity Log
When the proctor clicks any of the squares which represents a student in the seat plan, Figure
will be shown. This is where the proctor can see the log of all the violations done by the student
during an exam. Each violation has a corresponding screenshot which can be shown upon
clicking the rightmost part of the table.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, Decem
Figure 5 is where the proctor can visually see a laboratory setup where the student is physically
seated. This seat plan can be changed by dragging and dropping the individual square o
This means that this setup can be modified in all other laboratories. However, this can also be
used as a template in other laboratories. Visual cues are also shown to determine who is present,
absent, late, committed a violation and/or penalized. As shown in Figure 5, the color green
indicates that the workstation is active and this means that the student who is log on to the
account is present. The color gray indicates that no one is using the workstation. The orange color
r of violations committed by the student. And lastly, the red color indicates
that the student is already penalized.
Figure 6. Student Machine Activity Log
When the proctor clicks any of the squares which represents a student in the seat plan, Figure
will be shown. This is where the proctor can see the log of all the violations done by the student
during an exam. Each violation has a corresponding screenshot which can be shown upon
clicking the rightmost part of the table.
Figure 7. Session Report
6, December 2018
75
Figure 5 is where the proctor can visually see a laboratory setup where the student is physically
seated. This seat plan can be changed by dragging and dropping the individual square on the grid.
This means that this setup can be modified in all other laboratories. However, this can also be
used as a template in other laboratories. Visual cues are also shown to determine who is present,
ed. As shown in Figure 5, the color green
indicates that the workstation is active and this means that the student who is log on to the
account is present. The color gray indicates that no one is using the workstation. The orange color
r of violations committed by the student. And lastly, the red color indicates
When the proctor clicks any of the squares which represents a student in the seat plan, Figure 6
will be shown. This is where the proctor can see the log of all the violations done by the student
during an exam. Each violation has a corresponding screenshot which can be shown upon
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
76
Figure 7 shows an example of a session report where the proctor can see examination date, start
time, end time, number of warnings, and equivalent point for deduction, penalty, and the allowed
applications. The proctor can also see the list of students with their total points to be deducted
from their examination score by clicking the view button (blue) just before the edit button
(orange).
Figure 8. Student Machine Warning Message
Figure 8 is an example of a warning message taken from a student machine where the student
committed a violation by opening a restricted file. It shows here that the student has 2 remaining
attempts and if he will not close the restricted file or stop accessing this file he will eventually be
penalized.
4.2. Performance Testing
Table 1. Generate files from the student machine.
Test Case 1: Generate files from the
student machine
Average Time
Retrieved current logged-in account 30.48 seconds
Retrieved computer name 1.03 seconds
Retrieved all the installed programs 1.04 seconds
Retrieved the accessed URL 1.1 seconds
Retrieved the running applications 1.05 seconds
Generate screenshot image 1.03 seconds
Total average time: 5.96 seconds
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
77
The system is dry run first to check whether it can be deployed to multiple laboratories or not. In
this case, one laboratory is identified to dry run the system. The processes in Table 1 only happen
at the student machine. All the retrieved information are saved in a text file except for the
screenshot. After saving, these files are then sent to the server. With the list of average time
shown in Table 1, it tells that all the scripts responsible for each operation are running efficiently.
Only the retrieval of the current logged-in account seems to be slow. This happens since the
machine has just get started and there are some background processes done by the operating
system.
Table 2. Script execution.
Test Case 2: Script Execution Average Time
Execute scripts using Task Scheduler 10 seconds
Sending files from the student machine to the
server
13.33 seconds
Elapsed time in prompting warning message 10 seconds
Elapsed time in penalizing the student
machine
10 seconds
Total Average Time 10.83 seconds
Table 2 shows the result of the execution of task schedule, which happens at the very start before
the processes in generating files are done, and all other scripts interacting with the server
machine. The total average in executing these scripts are slower than generating files in Table 1
since these processes still need to transfer the data from one machine to another. Unlike these
results, the processes in Table 1 are just retrieved and saved temporarily in the same machine.
4.3. Summary of Findings
In developing the LookOut system, there are interferences that need to have a workaround or a
solution in order to deliver the system’s requirements and purpose. One of these is the use of
PowerShell ISE. This tool will make the accessing of information in the machine automated. By
default, it has many restrictions. The first time executing a PowerShell script in the student
machine gives a “Set-Execution Policy” error. To solve this, the “Set-Execution Policy
Unrestricted” cmdlet code was run first in order to give authority to any script to run
automatically in the machine, and which should be run as administrator. All the scripts created
should be made directly from the PowerShell ISE. Otherwise, they will not be read. Additionally,
the text files generated by the PowerShell have unnecessary binary codes or hex encoded string
that needs to be parsed, and removed or replaced first before passing them to the server. To do
this, php preg_replace was used. Furthermore, there are some incompatibility issues in some
browsers in which the system has a problem retrieving the URL accessed by the student.
Although, the system can identify the type of browser that is opened, the system needs to get the
URL since the proctor can still let the students accessed URLs which are permitted by them. Only
Google Chrome and Mozilla Firefox are the recommended browsers to use to make the feature
work.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
78
5. CONCLUSIONS
The overall objective of the study is to let the proctor impose rules and regulations on every
student machine during an examination period. To be able to achieve this, different scripts were
created and deployed to the student machine to retrieve computer name, installed programs,
current user logged-in and screenshot. Batch file scripts are also created to be executed by
PowerShell. Furthermore, PHP scripts are successfully coded to read and send generated text files
from the student machine to the server. Action scripts for shut down, lock, restart, hibernate, sleep
and warning message are also implemented properly. The system effectively use the Task
Scheduler to automate the execution of visual basic scripts. The system has used C# language to
retrieve current URLs in the browser. Integrating attendance monitoring to this automated method
for cheating detection is also made possible in this study. Thus, this study will truly make a great
impact to the academe. This system will help the instructors or professors to further boost
productivity and focus on other tasks at hand.
REFERENCES
[1] T. Vendlinksi and R. Stevens, "Assessing Student Problem-Solving Skills With Complex Computer-
Based Tasks," The Journal of Technology, Learning and Assessment, vol. 1, no. 3, 2002.
[2] F. Rogers, "FACULTY PERCEPTIONS ABOUT E-CHEATING DURING," Journal of Computing
Sciences in Colleges, vol. 22, no. 2, pp. 206-212, 2006.
[3] R. Baker and R. Papp, "Academic integrity violation in the digital realm," in Southern Association for
Information Systems 2003 Annual Conference, 2003.
[4] J. L. EPSTEIN and S. B. SHELDON, "Present and Accounted for: Improving Student Attendance
Through Family and Community Involvement," The Journal of Educational Research, vol. 95, no. 5,
pp. 308-318, 2002.
[5] Shailendra, M. Singh, A. Khan, V. Singh, A. Patil and S. Wadar, "Attendance Management System,"
in Electronics and Communication Systems (ICECS), 2015 2nd International Conference on. IEEE,
2015.
[6] S. Chuang Li.United States Patent US 2004/0260801 A1, 2004.
[7] L. A. H. Tsung-Yen Dean Chang, S. Chuang Li and F. Bo Xiong.U.S. Patent 10/366,028, 2004.
[8] C. Zezhen Huang, "TRUSTED COMPUTER ACTIVITY MONITORING AND RECORDING
SYSTEM AND METHOD". United States Patent US 2006/0041760 A1, 23 Feb 2006.
[9] B. J. Gould and S. D. Rudnik, "Computer Activity Monitoring System". United States Patent
US006065138A, 16 May 2000.
[10] K. Jalali1 and F. Noorbehbahani, "An Automatic Method for Cheating Detection in Online Exams by
Processing the Student`s Webcam Images," in 3rd Conference on Electrical and Computer
Engineering Technology (E-Tech 2017), Tehran, Iran, 2017.
[11] P. Rajan, P. Nimisha and G. Mona, "Online Students‘ Attendance Monitoring System in Classroom
Using Radio Frequency Identification Technology: A Proposed System Framework," International
Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 2, pp. 61-66, 2012.
[12] K. Finkenzeller, RFID Handbook: Radio-Frequency Identification Fundamentals and Applications,
New York: Wiley, 2000.
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
79
[13] C. Tetsuro Motoyama and C. V. Avery Fong.United States Patent US 2002/0152292 A1, 2002.
[14] M. Roughan, "A Case Study of the Accuracy of SNMP Measurements," Journal of Electrical and
Computer Engineering, 2010.
[15] T. L. Harris, -J. Peyton, J. R. Howell and J. R. Douceur.United States Patent US 7,716,249 B2, 2010.
[16] R. Siddaway, PowerShell and WMI, Manning, 2012.
[17] The PHP Group, "PHP," The PHP Group. [Online].
Authors
Marisa Buctuanon Is an instructor in University of San Jose – Recoletos, Philippines
teaching Artificial Intelligence, C# Programming, and all courses related to Computer
Science. She is a member of Recoletos Educational Assistance for Deserving Students.
She graduated Bachelor of Science in Computer Science major in Natural Language
Processing, Cum laude. She finished her Master in Computer Science in Cebu Institute of
Technology - University.
Roldan Debalucos Graduated Bachelor of Science in Information Technology in
University of San Jose- Recoletos last March 2018.
John Glenn VillalonGraduated Bachelor of Science in Information Technology in
University of San Jose- Recoletos last March 2018.