THE APPLICATION OF FINGERPRINTS AUTHENTICATION IN DISTANCE EDUCATION
Article Sidebar
Open full text
Issue Vol. 15 No. 3 (2019)
-
UAVS FLIGHT ROUTES OPTIMIZATION IN CHANGING WEATHER CONDITIONS – CONSTRAINT PROGRAMMING APPROACH
Grzegorz RADZKI, Amila THIBBOTUWAWA, Grzegorz BOCEWICZ5-20
-
USING GA FOR EVOLVING WEIGHTS IN NEURAL NETWORKS
Wafaa Mustafa HAMEED, Asan Baker KANBAR21-33
-
DIAGNOSTIC FACTORS FOR OPENED AND CLOSED KINEMATIC CHAIN OF VIBROARTHROGRAPHY SIGNALS
Anna MACHROWSKA, Robert KARPIŃSKI, Przemysław KRAKOWSKI, Józef JONAK34-44
-
FUZZY ASSESSMENT OF MANUFACTURABILITY DESIGN FOR MACHINING
Józef MATUSZEK, Tomasz SENETA, Aleksander MOCZAŁA45-55
-
THE APPLICATION OF FINGERPRINTS AUTHENTICATION IN DISTANCE EDUCATION
Hamid JAN, Beena HAMID56-64
-
USEFULNESS OF RAPID PROTOTYPING IN PLANNING COMPLEX TRAUMA SURGERIES
Przemysław KRAKOWSKI, Józef JONAK, Robert KARPIŃSKI, Łukasz JAWORSKI65-72
-
INEFFICIENCY OF DATA MINING ALGORITHMS AND ITS ARCHITECTURE: WITH EMPHASIS TO THE SHORTCOMING OF DATA MINING ALGORITHMS ON THE OUTPUT OF THE RESEARCHES
Workineh TESEMA73-86
-
APPLICATION OF IMAGE ANALYSIS TO THE IDENTIFICATION OF MASS INERTIA MOMENTUM IN ELECTROMECHANICAL SYSTEM WITH CHANGEABLE BACKLASH ZONE
Marcin TOMCZYK, Anna PLICHTA, Mariusz MIKULSKI87-102
Archives
-
Vol. 17 No. 4
2021-12-30 8
-
Vol. 17 No. 3
2021-09-30 8
-
Vol. 17 No. 2
2021-06-30 8
-
Vol. 17 No. 1
2021-03-30 8
-
Vol. 16 No. 4
2020-12-30 8
-
Vol. 16 No. 3
2020-09-30 8
-
Vol. 16 No. 2
2020-06-30 8
-
Vol. 16 No. 1
2020-03-30 8
-
Vol. 15 No. 4
2019-12-30 8
-
Vol. 15 No. 3
2019-09-30 8
-
Vol. 15 No. 2
2019-06-30 8
-
Vol. 15 No. 1
2019-03-30 8
-
Vol. 14 No. 4
2018-12-30 8
-
Vol. 14 No. 3
2018-09-30 8
-
Vol. 14 No. 2
2018-06-30 8
-
Vol. 14 No. 1
2018-03-30 7
-
Vol. 13 No. 4
2017-12-30 8
-
Vol. 13 No. 3
2017-09-30 8
-
Vol. 13 No. 2
2017-06-30 8
-
Vol. 13 No. 1
2017-03-30 8
Main Article Content
DOI
Authors
Abstract
Currently the distance education has obtained a wider ever acceptance. One of the main tasks of distance education is the process of checking student’s knowledge by online examination. To conduct a fair examination and prevent unauthorized users to appear in the examination, different biometric technologies are used; we in this paper implement a fingerprint biometric system for distance education students and found by survey that the students are comfortable with fingerprint biometric system.
Keywords:
References
Aggarwaltt, G., Rathat, N. K., Jeat, T. Y., & Bollet, R. M. (2008). Gradient based Textural Characterization of Fingerprints. In 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems (pp. 1–5). Arlington, VA. https://doi.org/10.1109/BTAS.2008.4699383 DOI: https://doi.org/10.1109/BTAS.2008.4699383
Agulla, E. G., Rifón, L. A., Castro, J. L. A., & Mateo, C. G. (2008). Is my student at the other side? Applying Biome tric Web Authentication to E-Learning Environments. In 2008 Eighth IEEE International Conference on Advanced Learning Technologies (pp. 551–553). Santander, Cantabria. https://doi.org/10.1109/ICALT.2008.184 DOI: https://doi.org/10.1109/ICALT.2008.184
Alavi, M., & Leidner, D. (2016). Research commentary: Technology mediated learning-a call for greater depth and breadth of research. Information Systems Research, 12(1), 1–10. doi:10.1287/isre.12.1.1.9720 DOI: https://doi.org/10.1287/isre.12.1.1.9720
Ali, I., Ali, U., Shahzad, M. I., & Malik, A. W. (2006). Face and fingerprint biometrics integration model for person identification using gabor filter. In IEEE International Conference on Computer Systems and Applications (pp. 140–143). Dubai, UAE. https://doi.org/10.1109/AICCSA.2006.205081 DOI: https://doi.org/10.1109/AICCSA.2006.205081
Althaff, I., Syusaku, N., Karim, O., &Yoshimi, F. (2009). Face-based Access Control and Invigilation Tool for e-Learning Systems. In 2009 International Conference on Biometrics and Kansei Engineering (pp. 40–44). Cieszyn. https://doi.org/10.1109/ICBAKE.2009.43 DOI: https://doi.org/10.1109/ICBAKE.2009.43
Apampa, K. M., Wills, G., & Argles, D. (2010). An approach to presence verification in summative e-assessment security. In 2010 International Conference on Information Society (pp. 647–651). London. DOI: https://doi.org/10.1109/i-Society16502.2010.6018836
Ayodele, T., Shoniregun, C. A., & Akmayeva, G. (2011). Toward e-learning security: A machine learning approach. In International Conference on Information Society (i-Society 2011) (pp. 490–492). London. DOI: https://doi.org/10.1109/i-Society18435.2011.5978544
Frischholz, R. W., & Dieckmann, U. (2000). Bioid: A Multimodal Biometric Identification System. Computer, 33(2), 64–68. DOI: https://doi.org/10.1109/2.820041
Green, N., & Romney, G. W. (2005). Establishing Public Confidence in the Security of Fingerprint Biometrics. In 005 6th International Conference on Information Technology Based Higher Education and Training (pp. S3C/15-S3C/18). Santo Domingo. https://doi.org/10.1109/ITHET.2005.1560332 DOI: https://doi.org/10.1109/ITHET.2005.1560332
Hsieh, W., & Leu, J. (2011). Design of a time and location based One-Time Password authentication scheme. In 2011 7th International Wireless Communications and Mobile Computing Conference (pp. 201–206). Istanbul. https://doi.org/10.1109/IWCMC.2011.5982418 DOI: https://doi.org/10.1109/IWCMC.2011.5982418
King, C. G., Guyette, R. W., & Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of business students ’views’. The Journal of Educators Online, 6(1), 1–11. DOI: https://doi.org/10.9743/JEO.2009.1.5
Maltoni, D., Maio, D., Jain, A. K., & Prabhakar, S. (2003). Handbook of Fingerprint Recognition. London: Springer.
Modiri, N., Farahi, A., & Ketabi, S. (2011). Providing security framework for holding electronic examination in virtual universities. In The 7th International Conference on Networked Computing and Advanced Information Management (pp. 73–79). Gyeongju.
Ratha, N. K., Connell, J. H., & Bolle, R. (2001). An analysis of minutiae matching strength. In: J.Bigun & F. Smeraldi (Eds.), Audio- and Video-Based Biometric Person Authentication. AVBPA 2001. Lecture Notes in Computer Science (vol. 2091). Berlin, Heidelberg: Springer. https://doi.org/10.1007/3-540-45344-X_32 DOI: https://doi.org/10.1007/3-540-45344-X_32
Takahashi, Y., Abiko, T., & Negishi, E. (2006). An Ontology-based System for Network Security. In 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers) (pp. 197–202 vol.1). Taipei, Taiwan. https://doi.org/10.1109/AINA.2005.116 DOI: https://doi.org/10.1109/AINA.2005.116
Williams, J. W. (2002). Biometrics or ... biohazards? In Proceedings of the 2002 Workshop on New Security Paradigms NSPW '02 (pp. 97–107). https://doi.org/10.1145/844118.844120 DOI: https://doi.org/10.1145/844102.844120
Article Details
Abstract views: 264
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
