12 research outputs found

    A Framework for Verification in Contactless Secure Physical Access Control and Authentication Systems

    Get PDF
    Biometrics is one of the very popular techniques in user identification for accessing institutions and logging into attendance systems. Currently, some of the existing biometric techniques such as the use of fingerprints are unpopular due to COVID-19 challenges. This paper identifies the components of a framework for secure contactless access authentication. The researcher selected 50 journals from Google scholar which were used to analyze the various components used in a secure contactless access authentication framework. The methodology used for research was based on the scientific approach of research methodology that mainly includes data collection from the 50 selected journals, analysis of the data and assessment of results. The following components were identified: database, sensor camera, feature extraction methods, matching and decision algorithm. Out of the considered journals the most used is CASIA database at 40%, CCD Sensor camera with 56%, Gabor feature extraction method at 44%, Hamming distance for matching at 100% and PCA at 100% was used for decision making. These findings will assist the researcher in providing a guide on the best suitable components. Various researchers have proposed an improvement in the current security systems due to integrity and security problems

    An embedded approach to plagiarism detection using the TeSLA e-authentication system

    Get PDF
    Plagiarism continues to remain an ever-present issue throughout academia. It is an anathema to scholarly enterprise, where the proper attribution of the work of others is of fundamental importance. Teaching students the importance of citing and referencing the work of others, and how to correctly do so, is therefore an important role for academic institutions. It is insufficient to teach these things without assessing students’ learning. Effective and accessible tools that can assist in teaching and assessment are sought and are increasingly being developed. This paper describes a new tool designed to assess levels of plagiarism in students’ submitted work and considers its affordances alongside other established tools. TeSLA is an EU funded project that brings eighteen partners together for the development of an embedded suite of tools to deliver the seamless e-authentication of students as they complete online assessments. Within the suite is a plagiarism detection tool that analyses documents and text on submission and provides immediate output. We show that the TeSLA plagiarism detection tool highlights potential collusion, a form of plagiarism. Also, we discuss whether the embedded nature of the TeSLA system could be used to improve constructive alignment between teaching and assessment within modules

    Acceptability of the e-authentication in higher education studies: views of students with special educational needs and disabilities

    Get PDF
    Trust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature indicates a growing number of studies about e-authentication and authorship verification for quality assurance with more flexible modes of assessment. Yet understanding the acceptability of e-authentication systems among SEND students is underexplored. This study examines SEND students’ views about the use of e-authentication systems, including perceived advantages and disadvantages of new technology-enhanced assessment. This study aims to shed light on this area by examining the attitudes of 267 SEND students who used, or were aware of, an authentication system known as adaptive trust-based e-assessment system for learning (TeSLA). The results suggest a broadly positive acceptability of these e-authentication technologies by SEND students. In the view of these students, the key advantages are the ability of proving the originality of their work, and trust-based e-assessment results; the key disadvantages are the possibility that the technology might not work or present wrong outputs in terms of cheating
    corecore