SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
DOI : 10.5121/ijma.2017.9303 25
A MULTIMEDIA DATA MINING FRAMEWORK FOR
MONITORING E-EXAMINATION ENVIRONMENT
Adetoba, B. T., Awodele, O. and Kuyoro, S. O.
Department of Computer Science, Babcock University, Ilishan, Ogun State
ABSTRACT
Academic dishonesty has been a growing concern in e-learning environment due to the fact that e-
examination takes place under supervised and unsupervised learning environment despite its huge
advantages. The e-examination environment has faced various security breaches such as academic
dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of
inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the e-
examination is needed. This paper reviews the process of mining multimedia data and propose a
framework for monitoring the e-examination environment in order to extract images and audio features.
The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the
mining phase does the classification and clustering of these features, the association does pattern matching
while the post processing carries out the knowledge interpretation and reporting. The approach presented
in this study will allow for efficient and accurate monitoring of e-examination environment which will help
provide adequate security and reduce unethical behaviour in e-examination environment.
KEYWORDS
Data mining, E-examination, E-examination environment, Multimedia Data, Security
1. INTRODUCTION
Student assessment in an e-learning environment has not been without challenges. Studies have
shown that academic dishonesty is prominent at all levels of education in developing and
developed countries [1]. Many studies reported that cheating is common in education. Studies
have also been conducted showing the rate of cheating in an online learning environment
compare to the traditional face to face environment [2,3,4]. Result from some of these studies
indicates that cheating occurs more in online test or examination compare to the traditional face to
face system i.e. Students receive help or assistance during online quiz/examination [5]. One
crucial problem existing in an e-learning platform is the issue of security. Also, there is the
inefficiency of the method employed in monitoring e-examination environment which have not
been able to properly detect individuals with the same identical facial structure e.g. identical
twins. For instance, if only the image is considered, it implies that the two individuals are seen as
one by the monitoring system. Also, the problem of integrity especially in an unsupervised
environment that occur as a result of weak identity control measure [6].
Past researches have also shown that employing biometrics features provides the most effective
and accurate identification method that cannot be stolen or shared. Also, several studies have
been conducted showing that using a single biometric alone for monitoring an environment is
insufficient. Multiple biometrics combines many human traits such as fingerprint, image or face,
eye, voice etc. to identify an unknown individual. Multimedia Data Mining (MDM) is a subfield
of data mining which is used in extracting interesting information from multimedia data sets and
combination of several types of data set which are all converted from different formats into digital
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
26
media [7, 8]. Multimedia data are either semi structured or unstructured and needs to be converted
to structured data. These data are stored in multimedia database. One of the most promising areas
of MDM is in biometric for identity verification and monitoring the e-examination environment.
Multimodal mining differs in many aspects from single modality mining in the ways it combines
different features or in generating more semantically meaningful features.
This paper review the process of mining multimedia data and propose a framework that can be
used in monitoring participants in an e-examination environment. This study is not meant to
discuss the design or technical issues of the multimedia data mining but to discuss how the
concept can be applied to e-examination environment.
2. RELATED WORKS
Several research works have been conducted in the area of multimedia data mining by various
researchers which have been employed in several domains. So also, some research works have
been carried out in e-assessment domain that has to do with the ensuring of integrity. The use of
MDM for monitoring e-assessment environment or maintaining integrity is yet to be delved in
this area of research.
Amigud et al. [9] proposed an integrated approach to enhance academic integrity of e-
assessments which was based on biometrics and machine learning. Naive Bayes classifier and
word n-gram based feature set were employed in presenting a preliminary result. The approach
was based on modeling and not observation. This approach was able to provide continuous
identity and assurance of authorship throughout the learning activities. It was also able to measure
the collaboration of learners within peer content. The work was limited in that no performance
baseline was established and it was not field tested.
Vijayarani and Sikila [8] provided the basic concepts of multimedia mining and its essential
characteristics as well as its architectures for structures and unstructured data. They also looked at
the research issues that take place in the field of research. This aided providing knowledge in
multimedia mining research. It also gave in-depth discussion on the application of multimedia
data mining. The work only did not discuss the usage of multimedia data mining for monitoring
environments. There was also no practical case study in the discussion.
Pesare et al. [10] designed learning dashboards for the representation of the most interesting
learning analytics with the aim of providing teachers and learners with understandable view of
learning data which was easy in a virtual learning environment. The approach provided clear
vision for student to know their learning gap. Also, the analysis did not require an online access.
The e-assessment aspect was not considered in the work and the use of multimedia data for
monitoring was neglected.
Dhakar and Tiwani [11] proposed a novel hybrid model for intrusion detection which utilizes data
mining classification algorithms. The framework was effective and adaptive. Also, the accuracy
of the system showed an effective detection rate and less false alarm rate. The framework was not
just based on multimedia data but instead on network communication.
Banda et al. [12] introduced a framework which they called Image FARMER which allowed the
retrieval of information for developing and customizing domain-specific content based image
data by employing data mining concept. The framework proved to have fast and efficient
querying and easier for retrieving images. The deficiency in the work was its sole concentration
on image and that it was not implemented in an e-assessment environment.
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
27
Chen et. al. [13] developed a multimedia data mining framework for mining information from
traffic video sequences. The purpose was to discover hidden knowledge such as vehicle
identification, traffic flow, queue detection, incident detection, and the spatio-temporal relations
of the vehicles at intersections which provide an economic approach for daily traffic monitoring
operations. The proposed MDM framework analyzes the traffic video sequences using
background subtraction, image/video segmentation, vehicle tracking, and modeling with the
multimedia augmented transition network (MATN) model and multimedia input strings, in the
domain of traffic monitoring over traffic intersections. The framework proved to be capable for
traffic video monitoring and was able to provide useful information such as queue detection,
vehicle classification, traffic flow, and incident detection at the intersections. The deficiency in
this work is that it was not implemented in an e-assessment environment.
The research gap showed that several researches that have been conducted have not been able to
utilize multimedia data mining in monitoring e-examination environment. Also, the past security
measure employed in the area of e-assessment was mostly based on single factor such as facial
recognition, fingerprint recognition, e.t.c. which have been insufficient. So also, it can be deduced
that in this domain, more consideration have been put in the aspect of authentication than in
monitoring. This research proposes a framework therefore as a first step towards filling this gap.
3. E-EXAMINATION ENVIRONMENT
Today, many higher institutions of learning are creating virtual learning environment where
learning can take place anytime, anywhere. Their aim was to support education with modern
learning and teaching tools and to ensure that everyone have access to education. Therefore, the
e-learning systems and emerging technologies suffer from vulnerability to different types of
attacks such as unauthorized access to sensitive information, viruses, spyware, etc. They also lack
effective mechanism for preventing and detecting cheating, impersonation and monitoring the e-
examination environment to avoid illegal assistance.
In many e-learning environments, e-examination plays an important role in e-learning assessment
and a critical asset in determining learner’s performance. Previous research in e-learning
assessment shows that student authentication in an e-examination setting face several security
challenges [14]. Academic dishonesty has been a growing concern in e- learning environment due
to the fact that e-examination takes place under supervised and unsupervised learning
environment despite its huge advantages. For e-examination to take place student identification is
very important and this relies on a secured authentication approach due to inherent anonymity of
users on the e-learning platform. Also, the integrity of the examination and the examination
environment is another important factor. The environment must be free from all forms of cheating
especially in an unsupervised environment [15].
Online assessment is very important to ascertain students’ progress [16]. Previous research has
shown that 73.6% of students think that cheating in an online environment is easier than in
traditional classroom setting [17]. Therefore, improving the security of E-learning and its
environment will improve the security of online assessments, and this should not be neglected.
Some models have been proposed to secure the e-examination but did not take into consideration
the environment in which the e-examination is taken place. Thus, the proposed system is an
improvement on the existing models using combination of multimodal (fingerprint, face and
voice recognition system) biometric authentication and multimedia data mining for extracting
and analysing massive set of multimedia data (image, audio and video) in order to discover and
obtain useful knowledge regarding all forms of academic dishonesty. This will help provide
adequate security and reduce unethical behaviour in an e-examination environment.
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
28
4. RESEARCH METHODOLOGY
This research work proposes a methodology that is based on the multimedia data mining
processes. The environment here is a state whereby an examination candidate carries out a pre-
examination registration by providing the monitoring features (i.e. webcam for images and audio
for voice recording) that will be utilized in the monitoring of the environment. The metadata is
then extracted from these devices and stored in the multimedia database. The multimedia
database contains unstructured data which is then converted to structured data and data mining
tools are applied on the structured data. This procedure is based on the fact that every individual
who engages in e-examination has these features.
4.1. PROPOSED FRAMEWORK
The proposed framework will be employing the multimedia data mining techniques. The several
phases of the multimedia data mining will be employed which comprises of the pre-processing,
feature extraction, Data mining (i.e. classification, clustering, and association) and post
processing. The proposed framework shown in Figure 1 will be explicitly explained in this
section. It is a prototype representing how the entire system would work and operate.
Figure 1: Proposed multimedia data mining framework for monitoring e-examination environment.
4.1.1. MULTIMEDIA DATA INPUT (MDI)
Every data that must be mined must first be stored and made available in a storage before being
mined. The two multimedia data type being considered in this work are the image and voice
which will be collected as a raw data from participants who intend to take an e-examination. This
data will be collected at registration so as to make use of it in monitoring the environment. The
Multimedia Data Input (MDI) phase deals majorly with the capturing of image and voice of the
participants which will be inculcated into the registration page of the e-examination platform.
This process will require hardware devices that will get the capture of the faces and voices of the
intending examination participants. The capture will therefore require the inclusion of drivers that
will make the software work with the device.
Algorithm for Multimedia Data Input
INPUT: Frontal Image (FI), Voice Recording (VR)
OUTPUT: FI, VR
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
29
PROCESS:
1: Start
2: for j = 1 to M of all e-examinee
3: capture FI[j]
4: capture VR[j]
5: return FI[j], VR[j]
6: end for
7: end process.
The algorithm from lines 2-6 shows that the operation will run for the number of times the set of
multimedia data of all aspiring examinee captured during registaration. Assuming the number of
inputs are n, the algorithm has a time complexity of O(n).
4.1.2. PRE-PROCESSING PHASE
As a means to carry out proper verification of data which is being used in the system, it is
necessary to preprocess the multimedia data. It is scientifically necessary since not every feature
is considered in the verification, the needed features need to be identified which makes pre-
processing necessary. These section is carried out after the registration of the candidate is
completed. It comprises of two sub phases which are the features extraction and the features
transformation.
4.1.2.1. FEATURES EXTRACTION (FE)
Feature extraction has to do with the reduction of resources necessary for the description of a
large set of data, in this case the image, video and audio collected. Performing the analysis of
complex data has a major problem which stems from the variables number involved. Analysing
with a large number of variables requires generally large amount of memory and computation
power which may lead to the over fitting of a classification algorithm for the training of samples.
Feature extraction is a construction process which combines variables to get around these
problems with data description that has sufficient accuracy.
Algorithm for feature extraction
INPUT: FI, VR
OUTPUT: Image feature (ImF), Voice feature (VoF).
PROCESS:
1: Start
2: for i = 1 to N of all examinee
3: Input FI[i], VR[i]
4: initialize ShD
5: extract shape descriptor, ShD from FI[i]
6: ImF = ShD
7: initialize ImgF[]
8: for k = 1 to M
9: extract image features, ImgF[k]
10: end for
11: initialize FrS
12: extract frequency spectrum, FrS from VR
13: VoF = FrS
14: end for
15: return ImF, VoF
16: end process
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
30
The algorithm from lines 2-5 shows that the operation will run for the number of aspiring
examinee which gives it a time complexity of O(n) at that instance. For the presence of another
loop from lines 8 – 10, the time complexity is O(n2
). This makes the entire algorithm have a time
complexity of O(n2
).
4.1.2.2. FEATURES TRANSFORMATION (FT)
Here, the extracted features are being transformed into a unit that will be storable in terms of a
data type which will be storable so as to be used for matching and verification. Therefore, each
feature that was given as input in FE will be tagged one after the other for a single examinee
based on each individual feature. For example, if an examinee A has a voice and image collected,
the image feature extracted could be labelled as Img_A_Feat1, the audio feature as and
Aud_A_Feat1. Therefore, the features have been transformed by renaming.
4.1.3. DATA MINING PHASE
This phase has to do with the classification of the multimedia data features that have been pre-
processed and clustering them.
4.1.3.1. DATA MINING CLASSIFICATION (DMC)
The transformed features is hereby classified as a group belonging to a class of file for a
particular entity in this case, the examinee. Any of the features with same data file and name for a
particular entity is classified as that file type for the entity. The video classification is done and
collections of image features in it are kept in a class so as to be matched with any of same file for
monitoring. The image feature of the examinee is also classified as an image file that will be used
to check in future. This also applies to the audio file. The Bayesian classifier technique will be
employed. It is a classification technique based on Bayes' Theorem with an assumption of
independence among predictors. It assumes that the presence of a particular feature in a class is
unrelated to the presence of any other feature.
Algorithm for the Data Mining Classification
INPUT: All multimedia features MmF[]
OUTPUT: Image_Class (Img_C), Audio_Class (Aud_C)
PROCESS:
1: Start
2: for i = 1 to N of all multimedia features
3: input MmF[i]
4: if MmF[i] is audio feature
5: classify into Aud_C
6: end if
7: else
8: if MmF[i] is image feature
9: classify into Img_C
10: end if
11: end for
12: Return Aud_C, Img_C
13: end process
The algorithm from lines 2-11 shows that the operation will run for the number of multimedia
data features in the database. Each of the conditional section in lines 4-6, 7-10 have a time
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
31
complexity of O(1). Assuming the number of inputs are n, the algorithm has a time complexity of
O(n) which is the outer loop which controls the algorithm.
4.1.3.2. DATA MINING CLUSTERING (DMCL)
The data mining clustering creates a branch of the classified information which represents
multimedia belonging to a particular entity as one cluster so as to identify the examinee if he/she
is present in an examination environment. The root description serves as the label for any feature
that is found to be similar with the monitoring data. These information are then being stored in
the system database for future use.
Algorithm for DMCl
INPUT: All multimedia data features
OUTPUT: cluster roots (clust[])
PROCESS:
1: Start
2: for i = 1 to N of all media features
3: for j = 1 to M of all examinee
4: if img[i] belong to j
5: or
6: aud[i] belongs to j
7: or
8: vid[i] belongs to j
9: link img[i] || aud[i] || vid[i] to clust[j]
10: end if
11: end for
12: return clust[j]
13: end for
14: end process
The algorithm from lines 2-13 shows that the operation will run for the number of media features
which gives it a time complexity of O(n) at that instance. For the presence of another loop from
lines 3-11, the time complexity is O(n2
). This makes the entire algorithm have a time complexity
of O(n2
).
4.1.4. EXAMINATION ENVIRONMENT MONITORING
This phase of the work comprises of the video streaming phase and feature transformation.
Videos are media that are made up of images and audio sounds. The monitoring camera get time
to time instance of captured images from a video shot in an e-examination environment as well as
audio sound from a central microphone that will be utilized. The feature extraction and
transformation technique employed in section 4.1.2 is also being adopted here so as to use it for
matching the pattern of the stored features.
4.1.5. DATA MINING ASSOCIATION (DMA)
This phase carries out the matching of data features in an e-examination environment. Each media
data features that are of the same type are compared with the stored features to determine if the
image captured at monitoring is present in the database or voice captured is present with any in
the system database.
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
32
Algorithm for DMA
INPUT: monitoring image features (m_img), monitoring audio (m_aud), all database features
(db_feat[])
OUTPUT: cluster root (clust) OR invalid response
PROCESS:
1: Start
2: for i = 1 to N of all video shots in e-examination environment
3: capture m_imag[i]
4: capture m_aud[i]
5: for j = 1 to P of all data features in database
6: if db_feature[j] is an image class
7: if m_img[i] = db_feature[j]
8: return clust[j]
9: end if
10: end if
11: else
12: if db_feature[j] is an audio class
13: if m_aud[i] = db_feature[j]
14: return clust[j]
15: end if
16: end if
17: else
18: return “invalid”
19: end process.
The algorithm from lines 2-20 shows that the operation will run for the number of video shots
which gives it a time complexity of O(n) at that instance. For the presence of another loop from
lines 5-19, the time complexity is O(n2
). Each of the conditional statements in lines 6-10, 7-9, 12-
16, 13-14 are each having a time complexity of O(1). This makes the entire algorithm have a time
complexity of O(n2
).
4.1.6. POST PROCESSING
The post processing phase is centered on displaying the necessary output that the data mining
association phase have carried out in human understandable form. As the cluster cannot be clear
for the user to comprehend, so the knowledge need to be interpreted and reported for user’s
understanding. The feature that was transformed is hereby reversed back to the original label
while in the reporting phase, the name of the candidate is being represented if his/her feature is
present. If such feature is not present in the database, the system gives a notification report that an
unregistered individual is present in the examination environment. This will hereby call for the
action of the examination coordinators concerning the unauthorized individual.
5. CONCLUSION
The study presented a framework for monitoring e-examination environment using multimedia
data mining which can be employed in detecting the presence of an unauthorized candidate in an
e-examination arena. It was discovered from research that this approach has not been employed in
the monitoring of e-examination activities which have led to various breeches of rules. The
monitoring is based on the employing of image and audio files in the monitoring of the
environment. The image if not sufficient is being complimented by the audio input. The idea
placed in this study is rather generic and at the early stage. This therefore necessitates for further
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
33
research in the implementation of this proposal in a real environment which will make the
evaluation of this work to be done. Beyond employing this framework in an e-assessment
environment, it can also be used in monitoring work environments such as the banking industry.
ACKNOWLEDGEMENTS
We like to acknowledge and appreciate all lecturers and Postgraduate students of Computer
Science Department, Babcock University for their moral support and encouragement during this
research. Thank you and God bless.
REFERENCES
[1] Amie, R and McKibban, C.A.B. (2013). Academic Dishonesty: An In-Depth Investigation of
Assessing Measurable Constructs and a Call for Consistency in Scholarship. Journal of Academic
Ethics, 11(3): pp. 185-197.
[2] King, C., Guyette, R., & Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of
business students ‘views. The Journal of Educators Online, 6(1), pp. 1–11.
[3] Watson, G. and Sottile, J. (2010). “Cheating in the Digital Age: Do Students Cheat More in Online
Courses”. Online Journal of Distance Learning Administration, 13(1), ISSN pp. 1556-3847.
[4] Jun-Ming, S., Shian-Shyong, T., Wei, W., Jui-Feng, W., Jin-Tan, D. and Wen-Nung, T. (2006).
[5] Watters, M. P., Robertson, P. J. and Clarke, R. K. (2011). “Student perceptions of cheating in online
business courses”. Journal of Instructional Pedagogies, pp 1-7
[6] Northcutt, C. G., Ho, A. D., and Chuang, I. L. (2015) “Detecting and preventing multiple-account
cheating in massive open online courses,”arXiv preprint arXiv: 1508.05699.
[7] Manjunath, R. and Balaji, S. (2014). “Review and Analysis of Multimedia Data Mining Tasks
and Models,” IJIRCCE , Bengaluru, India , vol. 2, pp. 124-130.
[8] Vijayarani, S., & Sakila, A. (2015). Multimedia Mining Research-An Overview. International Journal
of Computer Graphics & Animation, 5(1), pp. 69.
[9] Amigud, A., Arnedo-Moreno, J., Daradoumis, T., & Guerrero-Roldan, A. E. (2016). A Behavioral
Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment.
In Intelligent Networking and Collaborative Systems (INCoS), 2016 International Conference on (pp.
255-262). IEEE.
[10] Pesare, E., Roselli, T., Rossano, V., & Di Bitonto, P. (2015). Digitally enhanced assessment in virtual
learning environments. Journal of Visual Languages & Computing, 31, 252-259.
[11] Dhakar, M., & Tiwari, A. (2014). A novel data mining based hybrid intrusion detection framework.
Journal of Information and Computing Science, 9(1), pp. 037-048.
[12] Banda, J. M., Angryk, R. A., & Martens, P. C. (2013). Imagefarmer: Introducing a data mining
ramework for the creation of large-scale content-based image retrieval systems. International Journal
of Computer Applications, vol. 13 pp. 79.
[13] Chen S., Shyu, S., Zhang C., Strickrott J. (2002). Multimedia Data Mining for Traffic Video
Sequences. Journal of Intelligent Information Systems. Vol. 19(1), pp 61–77
[14] Gathuri, J. W., Luvanda, A. Matende, S. and Kamundi, S. (2014). Impersonation Challenges
Associated With E-Assessment of University Students. Journal of Information Engineering and
Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online), Vol. 4(7).
[15] Northcutt, C.G., Ho, A.D., & Chuang, I. L. (2015). Detecting and preventing "multiple-account"
cheating in Massive Open Online Courses. arXiv:1508.05699 [cs.CY].
[16] Meyer, J.P., & Zhu, S. (2013). Fair and equitable measurement of student learning in MOOCs: An
introduction to item response theory, scale linking, and score equating. Research & Practice in
Assessment, Vol. 8(1), pp. 26-39.
[17] Guyette, R. W. and Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of
business students‘views, The Journal of Educators Online, Vol. 6(1), pp. 1-11.
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017
34
AUTHORS
Mrs. B. T. Adetoba is a Postgraduate student at Babcock University, Ilishan, Ogun State, Nigeria. She
has Bachelor of Science and Master of Science in Computer Science from Obafemi Awolowo University
and University of Lagos, Nigeria, respectively. She is a member of Computer Professionals of Nigeria
(CPN) and Nigeria Computer Society (NCS).
Prof. O. Awodele is the Dean of School, Babcock University, Ilishan-Remo, Ogun State; Nigeria. He holds a Ph.D. in
Computer Science and his research Interests are in the area of Artificial Intelligence and E-learning. He is a fellow of
Nigeria Computer Society (NCS) and Computer Professionals of Nigeria (CPN).
Dr. Kuyoro, S. O. is a Senior Lecturer in Computer Science Department, Babcock University, Ilishan-Remo, Ogun
State; Nigeria. She holds a Ph.D. in Computer Science and her research interest is in machine learning. She is a
member of Nigeria Computer Society (NCS) and Computer Professionals of Nigeria (CPN).

Mais conteúdo relacionado

Mais procurados

Assesssment of internet service quality and customers’ satisfaction in univer...
Assesssment of internet service quality and customers’ satisfaction in univer...Assesssment of internet service quality and customers’ satisfaction in univer...
Assesssment of internet service quality and customers’ satisfaction in univer...Alexander Decker
 
Time management of internet dependency among university students and its impa...
Time management of internet dependency among university students and its impa...Time management of internet dependency among university students and its impa...
Time management of internet dependency among university students and its impa...Alexander Decker
 
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...eraser Juan José Calderón
 
Barriers of using internet resources in higher learning institutions a case o...
Barriers of using internet resources in higher learning institutions a case o...Barriers of using internet resources in higher learning institutions a case o...
Barriers of using internet resources in higher learning institutions a case o...Alexander Decker
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidijwmn
 
Ubiquitous learning website scaffolding learners by mobile devices with info ...
Ubiquitous learning website scaffolding learners by mobile devices with info ...Ubiquitous learning website scaffolding learners by mobile devices with info ...
Ubiquitous learning website scaffolding learners by mobile devices with info ...Seid Yesuf Ali
 
Pact Analysis Report for a Student Attendance System
Pact Analysis Report for a Student Attendance SystemPact Analysis Report for a Student Attendance System
Pact Analysis Report for a Student Attendance SystemUpekha Vandebona
 
TAMEx framework as an alternative for e-exam implementation in wireless network
TAMEx framework as an alternative for e-exam implementation in wireless networkTAMEx framework as an alternative for e-exam implementation in wireless network
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
 
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
 
The case for ubuntu linux operating system performance and usabil
The case for ubuntu linux operating system performance and usabilThe case for ubuntu linux operating system performance and usabil
The case for ubuntu linux operating system performance and usabilMaurice Dawson
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 
Egypt e government portal for better services
Egypt e government portal for better services  Egypt e government portal for better services
Egypt e government portal for better services hmsalam
 
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...IJERA Editor
 
Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
Ai proposal
Ai proposalAi proposal
Ai proposalzoniG
 
Use of information Systems in Yemeni Universities Future Vision
Use of information Systems in Yemeni Universities Future Vision Use of information Systems in Yemeni Universities Future Vision
Use of information Systems in Yemeni Universities Future Vision EECJOURNAL
 
Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...journalBEEI
 
Ai project-report
Ai project-reportAi project-report
Ai project-reportzoniG
 
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experien...
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION;  The Lived Experien...THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION;  The Lived Experien...
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experien...African Virtual University
 

Mais procurados (20)

Assesssment of internet service quality and customers’ satisfaction in univer...
Assesssment of internet service quality and customers’ satisfaction in univer...Assesssment of internet service quality and customers’ satisfaction in univer...
Assesssment of internet service quality and customers’ satisfaction in univer...
 
Time management of internet dependency among university students and its impa...
Time management of internet dependency among university students and its impa...Time management of internet dependency among university students and its impa...
Time management of internet dependency among university students and its impa...
 
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
 
Barriers of using internet resources in higher learning institutions a case o...
Barriers of using internet resources in higher learning institutions a case o...Barriers of using internet resources in higher learning institutions a case o...
Barriers of using internet resources in higher learning institutions a case o...
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
 
Ubiquitous learning website scaffolding learners by mobile devices with info ...
Ubiquitous learning website scaffolding learners by mobile devices with info ...Ubiquitous learning website scaffolding learners by mobile devices with info ...
Ubiquitous learning website scaffolding learners by mobile devices with info ...
 
Pact Analysis Report for a Student Attendance System
Pact Analysis Report for a Student Attendance SystemPact Analysis Report for a Student Attendance System
Pact Analysis Report for a Student Attendance System
 
TAMEx framework as an alternative for e-exam implementation in wireless network
TAMEx framework as an alternative for e-exam implementation in wireless networkTAMEx framework as an alternative for e-exam implementation in wireless network
TAMEx framework as an alternative for e-exam implementation in wireless network
 
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...
 
The case for ubuntu linux operating system performance and usabil
The case for ubuntu linux operating system performance and usabilThe case for ubuntu linux operating system performance and usabil
The case for ubuntu linux operating system performance and usabil
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Egypt e government portal for better services
Egypt e government portal for better services  Egypt e government portal for better services
Egypt e government portal for better services
 
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
 
Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
Ai proposal
Ai proposalAi proposal
Ai proposal
 
Use of information Systems in Yemeni Universities Future Vision
Use of information Systems in Yemeni Universities Future Vision Use of information Systems in Yemeni Universities Future Vision
Use of information Systems in Yemeni Universities Future Vision
 
Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...
 
Ai project-report
Ai project-reportAi project-report
Ai project-report
 
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experien...
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION;  The Lived Experien...THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION;  The Lived Experien...
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experien...
 

Semelhante a A Multimedia Data Mining Framework for Monitoring E-Examination Environment

INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...ijmnct
 
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...ijmnct
 
Investigation of new approach to detect and track fraud in virtual learning
Investigation of new approach to detect and track fraud in virtual learningInvestigation of new approach to detect and track fraud in virtual learning
Investigation of new approach to detect and track fraud in virtual learningijmnct
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesIIRindia
 
Privacy-Preserving On-Screen Activity Tracking and Classification in E-Learni...
Privacy-Preserving On-Screen Activity Tracking and Classification in E-Learni...Privacy-Preserving On-Screen Activity Tracking and Classification in E-Learni...
Privacy-Preserving On-Screen Activity Tracking and Classification in E-Learni...Shakas Technologies
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersDesigning a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersIJITE
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners IJITE
 
Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring IJECEIAES
 
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...ijseajournal
 
Multiple educational data mining approaches to discover patterns in universit...
Multiple educational data mining approaches to discover patterns in universit...Multiple educational data mining approaches to discover patterns in universit...
Multiple educational data mining approaches to discover patterns in universit...IJICTJOURNAL
 
AUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEMAUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEMIRJET Journal
 
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUESTUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUEIJDKP
 
Blockchain and machine learning in education: a literature review
Blockchain and machine learning in education: a literature reviewBlockchain and machine learning in education: a literature review
Blockchain and machine learning in education: a literature reviewIAESIJAI
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGIRJET Journal
 
Intrusion detection using incremental
Intrusion detection using incrementalIntrusion detection using incremental
Intrusion detection using incrementalijmpict
 
Face Recognition Attendance System
Face Recognition Attendance System Face Recognition Attendance System
Face Recognition Attendance System Shreya Dandavate
 
Educational Data Mining & Students Performance Prediction using SVM Techniques
Educational Data Mining & Students Performance Prediction using SVM TechniquesEducational Data Mining & Students Performance Prediction using SVM Techniques
Educational Data Mining & Students Performance Prediction using SVM TechniquesIRJET Journal
 
The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...Alexander Decker
 
INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...
INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...
INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...IAEME Publication
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
 

Semelhante a A Multimedia Data Mining Framework for Monitoring E-Examination Environment (20)

INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
 
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
 
Investigation of new approach to detect and track fraud in virtual learning
Investigation of new approach to detect and track fraud in virtual learningInvestigation of new approach to detect and track fraud in virtual learning
Investigation of new approach to detect and track fraud in virtual learning
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining Techniques
 
Privacy-Preserving On-Screen Activity Tracking and Classification in E-Learni...
Privacy-Preserving On-Screen Activity Tracking and Classification in E-Learni...Privacy-Preserving On-Screen Activity Tracking and Classification in E-Learni...
Privacy-Preserving On-Screen Activity Tracking and Classification in E-Learni...
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersDesigning a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
 
Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring
 
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
 
Multiple educational data mining approaches to discover patterns in universit...
Multiple educational data mining approaches to discover patterns in universit...Multiple educational data mining approaches to discover patterns in universit...
Multiple educational data mining approaches to discover patterns in universit...
 
AUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEMAUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEM
 
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUESTUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
 
Blockchain and machine learning in education: a literature review
Blockchain and machine learning in education: a literature reviewBlockchain and machine learning in education: a literature review
Blockchain and machine learning in education: a literature review
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
 
Intrusion detection using incremental
Intrusion detection using incrementalIntrusion detection using incremental
Intrusion detection using incremental
 
Face Recognition Attendance System
Face Recognition Attendance System Face Recognition Attendance System
Face Recognition Attendance System
 
Educational Data Mining & Students Performance Prediction using SVM Techniques
Educational Data Mining & Students Performance Prediction using SVM TechniquesEducational Data Mining & Students Performance Prediction using SVM Techniques
Educational Data Mining & Students Performance Prediction using SVM Techniques
 
The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...
 
INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...
INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...
INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 

Último

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Último (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

A Multimedia Data Mining Framework for Monitoring E-Examination Environment

  • 1. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 DOI : 10.5121/ijma.2017.9303 25 A MULTIMEDIA DATA MINING FRAMEWORK FOR MONITORING E-EXAMINATION ENVIRONMENT Adetoba, B. T., Awodele, O. and Kuyoro, S. O. Department of Computer Science, Babcock University, Ilishan, Ogun State ABSTRACT Academic dishonesty has been a growing concern in e-learning environment due to the fact that e- examination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the e- examination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment. KEYWORDS Data mining, E-examination, E-examination environment, Multimedia Data, Security 1. INTRODUCTION Student assessment in an e-learning environment has not been without challenges. Studies have shown that academic dishonesty is prominent at all levels of education in developing and developed countries [1]. Many studies reported that cheating is common in education. Studies have also been conducted showing the rate of cheating in an online learning environment compare to the traditional face to face environment [2,3,4]. Result from some of these studies indicates that cheating occurs more in online test or examination compare to the traditional face to face system i.e. Students receive help or assistance during online quiz/examination [5]. One crucial problem existing in an e-learning platform is the issue of security. Also, there is the inefficiency of the method employed in monitoring e-examination environment which have not been able to properly detect individuals with the same identical facial structure e.g. identical twins. For instance, if only the image is considered, it implies that the two individuals are seen as one by the monitoring system. Also, the problem of integrity especially in an unsupervised environment that occur as a result of weak identity control measure [6]. Past researches have also shown that employing biometrics features provides the most effective and accurate identification method that cannot be stolen or shared. Also, several studies have been conducted showing that using a single biometric alone for monitoring an environment is insufficient. Multiple biometrics combines many human traits such as fingerprint, image or face, eye, voice etc. to identify an unknown individual. Multimedia Data Mining (MDM) is a subfield of data mining which is used in extracting interesting information from multimedia data sets and combination of several types of data set which are all converted from different formats into digital
  • 2. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 26 media [7, 8]. Multimedia data are either semi structured or unstructured and needs to be converted to structured data. These data are stored in multimedia database. One of the most promising areas of MDM is in biometric for identity verification and monitoring the e-examination environment. Multimodal mining differs in many aspects from single modality mining in the ways it combines different features or in generating more semantically meaningful features. This paper review the process of mining multimedia data and propose a framework that can be used in monitoring participants in an e-examination environment. This study is not meant to discuss the design or technical issues of the multimedia data mining but to discuss how the concept can be applied to e-examination environment. 2. RELATED WORKS Several research works have been conducted in the area of multimedia data mining by various researchers which have been employed in several domains. So also, some research works have been carried out in e-assessment domain that has to do with the ensuring of integrity. The use of MDM for monitoring e-assessment environment or maintaining integrity is yet to be delved in this area of research. Amigud et al. [9] proposed an integrated approach to enhance academic integrity of e- assessments which was based on biometrics and machine learning. Naive Bayes classifier and word n-gram based feature set were employed in presenting a preliminary result. The approach was based on modeling and not observation. This approach was able to provide continuous identity and assurance of authorship throughout the learning activities. It was also able to measure the collaboration of learners within peer content. The work was limited in that no performance baseline was established and it was not field tested. Vijayarani and Sikila [8] provided the basic concepts of multimedia mining and its essential characteristics as well as its architectures for structures and unstructured data. They also looked at the research issues that take place in the field of research. This aided providing knowledge in multimedia mining research. It also gave in-depth discussion on the application of multimedia data mining. The work only did not discuss the usage of multimedia data mining for monitoring environments. There was also no practical case study in the discussion. Pesare et al. [10] designed learning dashboards for the representation of the most interesting learning analytics with the aim of providing teachers and learners with understandable view of learning data which was easy in a virtual learning environment. The approach provided clear vision for student to know their learning gap. Also, the analysis did not require an online access. The e-assessment aspect was not considered in the work and the use of multimedia data for monitoring was neglected. Dhakar and Tiwani [11] proposed a novel hybrid model for intrusion detection which utilizes data mining classification algorithms. The framework was effective and adaptive. Also, the accuracy of the system showed an effective detection rate and less false alarm rate. The framework was not just based on multimedia data but instead on network communication. Banda et al. [12] introduced a framework which they called Image FARMER which allowed the retrieval of information for developing and customizing domain-specific content based image data by employing data mining concept. The framework proved to have fast and efficient querying and easier for retrieving images. The deficiency in the work was its sole concentration on image and that it was not implemented in an e-assessment environment.
  • 3. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 27 Chen et. al. [13] developed a multimedia data mining framework for mining information from traffic video sequences. The purpose was to discover hidden knowledge such as vehicle identification, traffic flow, queue detection, incident detection, and the spatio-temporal relations of the vehicles at intersections which provide an economic approach for daily traffic monitoring operations. The proposed MDM framework analyzes the traffic video sequences using background subtraction, image/video segmentation, vehicle tracking, and modeling with the multimedia augmented transition network (MATN) model and multimedia input strings, in the domain of traffic monitoring over traffic intersections. The framework proved to be capable for traffic video monitoring and was able to provide useful information such as queue detection, vehicle classification, traffic flow, and incident detection at the intersections. The deficiency in this work is that it was not implemented in an e-assessment environment. The research gap showed that several researches that have been conducted have not been able to utilize multimedia data mining in monitoring e-examination environment. Also, the past security measure employed in the area of e-assessment was mostly based on single factor such as facial recognition, fingerprint recognition, e.t.c. which have been insufficient. So also, it can be deduced that in this domain, more consideration have been put in the aspect of authentication than in monitoring. This research proposes a framework therefore as a first step towards filling this gap. 3. E-EXAMINATION ENVIRONMENT Today, many higher institutions of learning are creating virtual learning environment where learning can take place anytime, anywhere. Their aim was to support education with modern learning and teaching tools and to ensure that everyone have access to education. Therefore, the e-learning systems and emerging technologies suffer from vulnerability to different types of attacks such as unauthorized access to sensitive information, viruses, spyware, etc. They also lack effective mechanism for preventing and detecting cheating, impersonation and monitoring the e- examination environment to avoid illegal assistance. In many e-learning environments, e-examination plays an important role in e-learning assessment and a critical asset in determining learner’s performance. Previous research in e-learning assessment shows that student authentication in an e-examination setting face several security challenges [14]. Academic dishonesty has been a growing concern in e- learning environment due to the fact that e-examination takes place under supervised and unsupervised learning environment despite its huge advantages. For e-examination to take place student identification is very important and this relies on a secured authentication approach due to inherent anonymity of users on the e-learning platform. Also, the integrity of the examination and the examination environment is another important factor. The environment must be free from all forms of cheating especially in an unsupervised environment [15]. Online assessment is very important to ascertain students’ progress [16]. Previous research has shown that 73.6% of students think that cheating in an online environment is easier than in traditional classroom setting [17]. Therefore, improving the security of E-learning and its environment will improve the security of online assessments, and this should not be neglected. Some models have been proposed to secure the e-examination but did not take into consideration the environment in which the e-examination is taken place. Thus, the proposed system is an improvement on the existing models using combination of multimodal (fingerprint, face and voice recognition system) biometric authentication and multimedia data mining for extracting and analysing massive set of multimedia data (image, audio and video) in order to discover and obtain useful knowledge regarding all forms of academic dishonesty. This will help provide adequate security and reduce unethical behaviour in an e-examination environment.
  • 4. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 28 4. RESEARCH METHODOLOGY This research work proposes a methodology that is based on the multimedia data mining processes. The environment here is a state whereby an examination candidate carries out a pre- examination registration by providing the monitoring features (i.e. webcam for images and audio for voice recording) that will be utilized in the monitoring of the environment. The metadata is then extracted from these devices and stored in the multimedia database. The multimedia database contains unstructured data which is then converted to structured data and data mining tools are applied on the structured data. This procedure is based on the fact that every individual who engages in e-examination has these features. 4.1. PROPOSED FRAMEWORK The proposed framework will be employing the multimedia data mining techniques. The several phases of the multimedia data mining will be employed which comprises of the pre-processing, feature extraction, Data mining (i.e. classification, clustering, and association) and post processing. The proposed framework shown in Figure 1 will be explicitly explained in this section. It is a prototype representing how the entire system would work and operate. Figure 1: Proposed multimedia data mining framework for monitoring e-examination environment. 4.1.1. MULTIMEDIA DATA INPUT (MDI) Every data that must be mined must first be stored and made available in a storage before being mined. The two multimedia data type being considered in this work are the image and voice which will be collected as a raw data from participants who intend to take an e-examination. This data will be collected at registration so as to make use of it in monitoring the environment. The Multimedia Data Input (MDI) phase deals majorly with the capturing of image and voice of the participants which will be inculcated into the registration page of the e-examination platform. This process will require hardware devices that will get the capture of the faces and voices of the intending examination participants. The capture will therefore require the inclusion of drivers that will make the software work with the device. Algorithm for Multimedia Data Input INPUT: Frontal Image (FI), Voice Recording (VR) OUTPUT: FI, VR
  • 5. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 29 PROCESS: 1: Start 2: for j = 1 to M of all e-examinee 3: capture FI[j] 4: capture VR[j] 5: return FI[j], VR[j] 6: end for 7: end process. The algorithm from lines 2-6 shows that the operation will run for the number of times the set of multimedia data of all aspiring examinee captured during registaration. Assuming the number of inputs are n, the algorithm has a time complexity of O(n). 4.1.2. PRE-PROCESSING PHASE As a means to carry out proper verification of data which is being used in the system, it is necessary to preprocess the multimedia data. It is scientifically necessary since not every feature is considered in the verification, the needed features need to be identified which makes pre- processing necessary. These section is carried out after the registration of the candidate is completed. It comprises of two sub phases which are the features extraction and the features transformation. 4.1.2.1. FEATURES EXTRACTION (FE) Feature extraction has to do with the reduction of resources necessary for the description of a large set of data, in this case the image, video and audio collected. Performing the analysis of complex data has a major problem which stems from the variables number involved. Analysing with a large number of variables requires generally large amount of memory and computation power which may lead to the over fitting of a classification algorithm for the training of samples. Feature extraction is a construction process which combines variables to get around these problems with data description that has sufficient accuracy. Algorithm for feature extraction INPUT: FI, VR OUTPUT: Image feature (ImF), Voice feature (VoF). PROCESS: 1: Start 2: for i = 1 to N of all examinee 3: Input FI[i], VR[i] 4: initialize ShD 5: extract shape descriptor, ShD from FI[i] 6: ImF = ShD 7: initialize ImgF[] 8: for k = 1 to M 9: extract image features, ImgF[k] 10: end for 11: initialize FrS 12: extract frequency spectrum, FrS from VR 13: VoF = FrS 14: end for 15: return ImF, VoF 16: end process
  • 6. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 30 The algorithm from lines 2-5 shows that the operation will run for the number of aspiring examinee which gives it a time complexity of O(n) at that instance. For the presence of another loop from lines 8 – 10, the time complexity is O(n2 ). This makes the entire algorithm have a time complexity of O(n2 ). 4.1.2.2. FEATURES TRANSFORMATION (FT) Here, the extracted features are being transformed into a unit that will be storable in terms of a data type which will be storable so as to be used for matching and verification. Therefore, each feature that was given as input in FE will be tagged one after the other for a single examinee based on each individual feature. For example, if an examinee A has a voice and image collected, the image feature extracted could be labelled as Img_A_Feat1, the audio feature as and Aud_A_Feat1. Therefore, the features have been transformed by renaming. 4.1.3. DATA MINING PHASE This phase has to do with the classification of the multimedia data features that have been pre- processed and clustering them. 4.1.3.1. DATA MINING CLASSIFICATION (DMC) The transformed features is hereby classified as a group belonging to a class of file for a particular entity in this case, the examinee. Any of the features with same data file and name for a particular entity is classified as that file type for the entity. The video classification is done and collections of image features in it are kept in a class so as to be matched with any of same file for monitoring. The image feature of the examinee is also classified as an image file that will be used to check in future. This also applies to the audio file. The Bayesian classifier technique will be employed. It is a classification technique based on Bayes' Theorem with an assumption of independence among predictors. It assumes that the presence of a particular feature in a class is unrelated to the presence of any other feature. Algorithm for the Data Mining Classification INPUT: All multimedia features MmF[] OUTPUT: Image_Class (Img_C), Audio_Class (Aud_C) PROCESS: 1: Start 2: for i = 1 to N of all multimedia features 3: input MmF[i] 4: if MmF[i] is audio feature 5: classify into Aud_C 6: end if 7: else 8: if MmF[i] is image feature 9: classify into Img_C 10: end if 11: end for 12: Return Aud_C, Img_C 13: end process The algorithm from lines 2-11 shows that the operation will run for the number of multimedia data features in the database. Each of the conditional section in lines 4-6, 7-10 have a time
  • 7. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 31 complexity of O(1). Assuming the number of inputs are n, the algorithm has a time complexity of O(n) which is the outer loop which controls the algorithm. 4.1.3.2. DATA MINING CLUSTERING (DMCL) The data mining clustering creates a branch of the classified information which represents multimedia belonging to a particular entity as one cluster so as to identify the examinee if he/she is present in an examination environment. The root description serves as the label for any feature that is found to be similar with the monitoring data. These information are then being stored in the system database for future use. Algorithm for DMCl INPUT: All multimedia data features OUTPUT: cluster roots (clust[]) PROCESS: 1: Start 2: for i = 1 to N of all media features 3: for j = 1 to M of all examinee 4: if img[i] belong to j 5: or 6: aud[i] belongs to j 7: or 8: vid[i] belongs to j 9: link img[i] || aud[i] || vid[i] to clust[j] 10: end if 11: end for 12: return clust[j] 13: end for 14: end process The algorithm from lines 2-13 shows that the operation will run for the number of media features which gives it a time complexity of O(n) at that instance. For the presence of another loop from lines 3-11, the time complexity is O(n2 ). This makes the entire algorithm have a time complexity of O(n2 ). 4.1.4. EXAMINATION ENVIRONMENT MONITORING This phase of the work comprises of the video streaming phase and feature transformation. Videos are media that are made up of images and audio sounds. The monitoring camera get time to time instance of captured images from a video shot in an e-examination environment as well as audio sound from a central microphone that will be utilized. The feature extraction and transformation technique employed in section 4.1.2 is also being adopted here so as to use it for matching the pattern of the stored features. 4.1.5. DATA MINING ASSOCIATION (DMA) This phase carries out the matching of data features in an e-examination environment. Each media data features that are of the same type are compared with the stored features to determine if the image captured at monitoring is present in the database or voice captured is present with any in the system database.
  • 8. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 32 Algorithm for DMA INPUT: monitoring image features (m_img), monitoring audio (m_aud), all database features (db_feat[]) OUTPUT: cluster root (clust) OR invalid response PROCESS: 1: Start 2: for i = 1 to N of all video shots in e-examination environment 3: capture m_imag[i] 4: capture m_aud[i] 5: for j = 1 to P of all data features in database 6: if db_feature[j] is an image class 7: if m_img[i] = db_feature[j] 8: return clust[j] 9: end if 10: end if 11: else 12: if db_feature[j] is an audio class 13: if m_aud[i] = db_feature[j] 14: return clust[j] 15: end if 16: end if 17: else 18: return “invalid” 19: end process. The algorithm from lines 2-20 shows that the operation will run for the number of video shots which gives it a time complexity of O(n) at that instance. For the presence of another loop from lines 5-19, the time complexity is O(n2 ). Each of the conditional statements in lines 6-10, 7-9, 12- 16, 13-14 are each having a time complexity of O(1). This makes the entire algorithm have a time complexity of O(n2 ). 4.1.6. POST PROCESSING The post processing phase is centered on displaying the necessary output that the data mining association phase have carried out in human understandable form. As the cluster cannot be clear for the user to comprehend, so the knowledge need to be interpreted and reported for user’s understanding. The feature that was transformed is hereby reversed back to the original label while in the reporting phase, the name of the candidate is being represented if his/her feature is present. If such feature is not present in the database, the system gives a notification report that an unregistered individual is present in the examination environment. This will hereby call for the action of the examination coordinators concerning the unauthorized individual. 5. CONCLUSION The study presented a framework for monitoring e-examination environment using multimedia data mining which can be employed in detecting the presence of an unauthorized candidate in an e-examination arena. It was discovered from research that this approach has not been employed in the monitoring of e-examination activities which have led to various breeches of rules. The monitoring is based on the employing of image and audio files in the monitoring of the environment. The image if not sufficient is being complimented by the audio input. The idea placed in this study is rather generic and at the early stage. This therefore necessitates for further
  • 9. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 33 research in the implementation of this proposal in a real environment which will make the evaluation of this work to be done. Beyond employing this framework in an e-assessment environment, it can also be used in monitoring work environments such as the banking industry. ACKNOWLEDGEMENTS We like to acknowledge and appreciate all lecturers and Postgraduate students of Computer Science Department, Babcock University for their moral support and encouragement during this research. Thank you and God bless. REFERENCES [1] Amie, R and McKibban, C.A.B. (2013). Academic Dishonesty: An In-Depth Investigation of Assessing Measurable Constructs and a Call for Consistency in Scholarship. Journal of Academic Ethics, 11(3): pp. 185-197. [2] King, C., Guyette, R., & Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of business students ‘views. The Journal of Educators Online, 6(1), pp. 1–11. [3] Watson, G. and Sottile, J. (2010). “Cheating in the Digital Age: Do Students Cheat More in Online Courses”. Online Journal of Distance Learning Administration, 13(1), ISSN pp. 1556-3847. [4] Jun-Ming, S., Shian-Shyong, T., Wei, W., Jui-Feng, W., Jin-Tan, D. and Wen-Nung, T. (2006). [5] Watters, M. P., Robertson, P. J. and Clarke, R. K. (2011). “Student perceptions of cheating in online business courses”. Journal of Instructional Pedagogies, pp 1-7 [6] Northcutt, C. G., Ho, A. D., and Chuang, I. L. (2015) “Detecting and preventing multiple-account cheating in massive open online courses,”arXiv preprint arXiv: 1508.05699. [7] Manjunath, R. and Balaji, S. (2014). “Review and Analysis of Multimedia Data Mining Tasks and Models,” IJIRCCE , Bengaluru, India , vol. 2, pp. 124-130. [8] Vijayarani, S., & Sakila, A. (2015). Multimedia Mining Research-An Overview. International Journal of Computer Graphics & Animation, 5(1), pp. 69. [9] Amigud, A., Arnedo-Moreno, J., Daradoumis, T., & Guerrero-Roldan, A. E. (2016). A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment. In Intelligent Networking and Collaborative Systems (INCoS), 2016 International Conference on (pp. 255-262). IEEE. [10] Pesare, E., Roselli, T., Rossano, V., & Di Bitonto, P. (2015). Digitally enhanced assessment in virtual learning environments. Journal of Visual Languages & Computing, 31, 252-259. [11] Dhakar, M., & Tiwari, A. (2014). A novel data mining based hybrid intrusion detection framework. Journal of Information and Computing Science, 9(1), pp. 037-048. [12] Banda, J. M., Angryk, R. A., & Martens, P. C. (2013). Imagefarmer: Introducing a data mining ramework for the creation of large-scale content-based image retrieval systems. International Journal of Computer Applications, vol. 13 pp. 79. [13] Chen S., Shyu, S., Zhang C., Strickrott J. (2002). Multimedia Data Mining for Traffic Video Sequences. Journal of Intelligent Information Systems. Vol. 19(1), pp 61–77 [14] Gathuri, J. W., Luvanda, A. Matende, S. and Kamundi, S. (2014). Impersonation Challenges Associated With E-Assessment of University Students. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online), Vol. 4(7). [15] Northcutt, C.G., Ho, A.D., & Chuang, I. L. (2015). Detecting and preventing "multiple-account" cheating in Massive Open Online Courses. arXiv:1508.05699 [cs.CY]. [16] Meyer, J.P., & Zhu, S. (2013). Fair and equitable measurement of student learning in MOOCs: An introduction to item response theory, scale linking, and score equating. Research & Practice in Assessment, Vol. 8(1), pp. 26-39. [17] Guyette, R. W. and Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of business students‘views, The Journal of Educators Online, Vol. 6(1), pp. 1-11.
  • 10. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.3, June 2017 34 AUTHORS Mrs. B. T. Adetoba is a Postgraduate student at Babcock University, Ilishan, Ogun State, Nigeria. She has Bachelor of Science and Master of Science in Computer Science from Obafemi Awolowo University and University of Lagos, Nigeria, respectively. She is a member of Computer Professionals of Nigeria (CPN) and Nigeria Computer Society (NCS). Prof. O. Awodele is the Dean of School, Babcock University, Ilishan-Remo, Ogun State; Nigeria. He holds a Ph.D. in Computer Science and his research Interests are in the area of Artificial Intelligence and E-learning. He is a fellow of Nigeria Computer Society (NCS) and Computer Professionals of Nigeria (CPN). Dr. Kuyoro, S. O. is a Senior Lecturer in Computer Science Department, Babcock University, Ilishan-Remo, Ogun State; Nigeria. She holds a Ph.D. in Computer Science and her research interest is in machine learning. She is a member of Nigeria Computer Society (NCS) and Computer Professionals of Nigeria (CPN).