Preview

Biometrics

Powerful Essays
Open Document
Open Document
3053 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometrics
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 4, 120-124, 2012

A Biometric Model for Examination Screening and Attendance Monitoring in Yaba College of Technology
Rufai M.M, Adigun J. O, N. A. Yekini
Department of Computer Technology, Yaba College of Technology

Abstract —Examination malpractices have consistently remained a bane of Nigerian educational system. A common form of examination malpractices is the deliberate impersonation of the applicant. Part of the requirement of a credible examination is that the real applicants wrote the exams. Several steps have been taken to check this crime unabated. Some of the methods adopted are: the use of Identity card; the presence of invigilators to identify fake students; the allocation of sitting arrangement number that determines the hall where the student will write exam and the need to sign in and out on the attendance sheets. This research work proffers solution to the problem of student impersonation during exams. A biometric model is designed to identify every applicant at the point of entry into the examination hall. A biometric verification exercise is also conducted while the examination is going and at the point of submission of examination papers. The students’ attendance is captured automatically as their identity is verified on the biometric systems. The Biometric Access Control Techniques is explained. A model describing its application to examination screening and attendance monitoring is designed using denotational mathematics. Keywords- Biometrics; Examination Malpractices; Attendance Monitoring.

I. INTRODUCTION Examination can be defined as an instrument for testing assessment, evaluation and accreditation (Ike, 1996). It is a potent instrument for judging knowledge and competence. An exam is credible if it possess the following key elements: free and fair; devoid of partiality, cheating and all forms of examination malpractices. Candidate

You May Also Find These Documents Helpful

  • Best Essays

    Turban, E., Rainer, R.K., & Potter, R.E. (2003). Introduction to Information Technology, 8th ed. New York: John Wiley & Sons, Inc.…

    • 2278 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Technology Perks

    • 1344 Words
    • 6 Pages

    Reynolds, G. W., Stair, R. M. (2006). Fundamental of Information Systems (3rd ed.). Boston, MS: Thomson Learning, Inc.…

    • 1344 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Dissertation Review

    • 988 Words
    • 4 Pages

    Institution & School or Department: Graduate School of Computer and Information Sciences, Nova Southeastern University…

    • 988 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    Makerere University, Faculty of Computing and Information Technology, P.O. Box 7062, Kampala, Uganda, East Africa jlubeg@cit.mak.ac.ug 2 Department of Computer Science, University of Reading, P.O. Box 225, Whiteknights, Reading, Berkshire, RG6 6AY, United Kingdom shirley.williams@reading.ac.uk…

    • 4910 Words
    • 20 Pages
    Best Essays
  • Powerful Essays

    Due March 2, 2007 Submitted by: SUDEEPTHI MOGALLA DEPARTMENT OF COMPUTER SCIENCE NORTH CAROLINA STATE UNIVERISTY Email: smogall@ncsu.edu…

    • 4024 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems.…

    • 264 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Turban, E., Rainer, R.K., & Potter, R.E. (2003). Introduction to Information Technology, 8e. New York: John Wiley & Sons, Inc.…

    • 1840 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Information System

    • 323 Words
    • 2 Pages

    Bibliography: Rainer, R. K., & Cegielski, C. G. (2011). Introduction to Information Systems (3rd ed.). : John Wiley & Sons Inc..…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Biometrics is a science. It is a science that measures individuals¡¦ physical characteristic properties that are unique. With world changing of every second of everyday; human beings is still the cause of security breaching. On just about every website you need a password or pin number. Passwords and ID cards have been used to control access to restricted systems. However, security can be easily breached in these systems when a password is disclosed to an unauthorized user or a card is stolen by an impostor. We as humans forget password and pin numbers because we have so much to protect and access. Furthermore, simple passwords are easy to guess and difficult passwords may be hard to remember. The coming out of biometrics has addressed the problems that occur in traditional verification methods. Biometrics in this case would be best. With biometrics it¡¦s uniqueness of physical characteristics can never be lost, stolen, shared or forgotten.…

    • 2060 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Biometric Identification

    • 1157 Words
    • 5 Pages

    Shanker, Thom. Biometric Scans Help U.S Track Militants. 15 July 2011. 24 Oct. 2012 <http://sks.sirs.com/cgi-bin/hst-article-display?id=SGA1017-0-7305&artno=0000315989&type=ART&shfilter=U&key=Biometric%20identification&title=Biometric%20Scans%20Help%20U%2ES%2E%20Track%20Militants&res=Y&ren=N&gov=N&lnk=Y&ic=N>.…

    • 1157 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometrics

    • 774 Words
    • 2 Pages

    With the overwhelming growth of technologies today, it is understandable why there is also such a growing concern of maintaining individual privacy and how it is being invaded by certain forms of biometrics. The intent of biometrics is not necessarily to purposely invade individual privacy and use the information for purposes other than intended, but rather to aid in confirming an individual’s identity, or authenticate that person’s identity. However, there are certainly threats that come with using biometrics by individuals who are interested in obtaining another individuals private and confidential information for their personal use and/or gain. It is important for organizations to ensure that the information collect by their chosen method of biometrics only collects the necessary information on individuals.…

    • 774 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The system will only be activated using a username with its corresponding password for confidentiality. The effective use of Entrance Exam System, many Educational Institute can be use it to develop their strategy for putting the exams, and for getting better results in less time.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nice to Share

    • 2301 Words
    • 10 Pages

    to 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) © (2011) IACSIT Press, Singapore…

    • 2301 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Murray Turoff Department of Computer and Information Science New Jersey Institute of Technology, Newark NJ, 07102, USA murray@eies.njit.edu…

    • 3455 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Academics in the United States are to introduce a monitoring system to check when students attend or miss class. Sensors will detect student’s identification card, when they enter the lecture theatres. Warton classes for example, makes use of software that automatically determined if the student didn’t attend their classes and this will be reflected in their grades and seen by their parents.…

    • 675 Words
    • 3 Pages
    Satisfactory Essays

Related Topics