We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Authentication of Individuals in E-exams - Essay Example

Comments (0)
In the paper “Authentication of Individuals in E-exams” the author analyzes a secure environment of E-learning environments to their students and teachers, especially while conducting e-exams, as well as the authentication process of these systems.
Download full paper
Authentication of Individuals in E-exams
Read TextPreview

Extract of sample
Authentication of Individuals in E-exams

Download file to see previous pages... Fingerprint recognition systems are considered to be the most commonly deployed biometric systems, due to their precision, ease and performance [10]. Arista Knowledge Systems(TM) and DigitalPersona(TM) claim to develop the first e-Learning management system to verify students by their fingerprints [14]. Arges et al proposed a hybrid approach in which an electronic token or e-card was used along with the fingerprint verification to increase the authentication performance of the e-exam security system [11]. The system involved a process of enrolment- to capture the user’s fingerprint for the database and generate a specific e-token for the user. Authenticated users were provided access by verifying their fingerprints and e-tokens with the stored database.
            Hand geometry recognition systems require a small sized data to uniquely identify a user from its stored database or templates [12]. A system is proposed by Jain et al. [13] in which there exist processes of image acquisition, enrolment and verification. One commendable approach in this system to enhance the accuracy of the acquired hand geometry image is that two samples are taken from the user. Average is taken for these samples so that an accurate image can then be compared with stored database of enrolled users. This system can easily be deployed for e-learning environments because of its ease and accuracy.
ProAccess FaceOK developed a system for the recognition of human face image [15]. They claim it to be the first system with the face learning capability. ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Biometric Authentication
However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have therefore designed several technology software which authenticate or grant an individual access to an account by virtue of a physical character such as a fingerprint.
7 Pages(1750 words)Essay
Biometric Authentication
This discussion talks that according to Jain et al (1996), a number of factors underscore the inevitability of a DBS. First, DBS requires that a recognition trait must be universal. In addition, this implies that all people must possess a chosen biometric, with each person having a distinctive one.
7 Pages(1750 words)Essay
The Primary Goal of the Military
From this paper, it is clear that the use of human features, biometrics comes in handy in the identification of individuals while keeping their privacy intact. These features may be physical or biological and may include characteristics such as skin color, height, eye color and weight. These features are unique to individuals and readily available.
8 Pages(2000 words)Essay
In the current times, contemporary organisations acknowledge the strategic potential benefits of recruitment, selection and appraisal to improve organisational performance1. A lot of emphasis is placed getting the ‘right person’ for the job. Selecting the ‘right person’ for the job means that the process of personnel selection is characterised by formalisation, reliability and validity.
3 Pages(750 words)Term Paper
Remarking Public Exams
"One of the principal concerns of any examining body is to ensure that its examinations are marked reliably. It is essential that each examiner is applying the same standard from one script to the next, just as it is essential that each examiner is marking to the same standard as every other examiner," Newton (1996, p.405).
8 Pages(2000 words)Essay
Exit Exams
There are two sides to every coin, and the issue of whether or not to continue mandating high school exit exams is no exception. Hence, this essay is designed to examine the current data regarding these exams, especially in correlation to high school dropout rates.
5 Pages(1250 words)Essay
California Exit Exams Litigation
One of the widely accepted reasons why few high school students progress to college is the high cost of college education. However, Greene & Winters (2004), suggest that the real reason for this is the generally poor quality of high school graduates in the entire USA.
9 Pages(2250 words)Essay
Exams questions
In the eight years since its inception, it has become clear that further participation in the War on Terror would only worsen the security situation in and around Australia. An indication of what is in store can be learnt from the Bali bombing of October 2002, which
10 Pages(2500 words)Essay
Biometric Authentication
However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have
7 Pages(1750 words)Essay
Biometric Authentication
11). Unlike password and signatures which are easily stolen by third parties, biometric authentication relies on the actual data from the actual users, leaving minimal chances. Biometric
2 Pages(500 words)Essay
Let us find you another Essay on topic Authentication of Individuals in E-exams for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us