The Requirement Analysis of An Offline Automated Invigilation System with Gmail Alert Integration
Examination malpractice remains a major concern for academic institutions, impacting on the fairness and credibility of evaluations. To address this, we analyze and propose an Offline Automated Invigilation System with Gmail Integration that leverages computer vision and machine learning to detect a...
| Main Authors: | A., Eenaja, Ch., Sirivarshini, J., Navya, G., Varshitha, N., Sahithi |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2025
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2146/ http://eprints.intimal.edu.my/2146/1/jods2025_05.pdf http://eprints.intimal.edu.my/2146/2/689 |
Similar Items
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
A Data-Driven Engine Starter System Using ESP32 With Multi-Layer
Authentication and Alerts
by: Parunandhi, Amareshwari, et al.
Published: (2025)
by: Parunandhi, Amareshwari, et al.
Published: (2025)
Invigilator system for UMP examination problem based on Faculty of Computer System & Software Engineering (FSKKP)
by: Noor Khairunnisa, Mat Yusof
Published: (2015)
by: Noor Khairunnisa, Mat Yusof
Published: (2015)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
A semi-automated requirements prioritisation technique for scalable requirements with stakeholder quantification and prioritisation
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)
Offline handwriting recognition using Artificial Neural Network and Hidden Markov Model
by: Tay, Yong Haur
Published: (2002)
by: Tay, Yong Haur
Published: (2002)
Automated Software Tool Support for Checking the Inconsistency of Requirements
by: Kamalrudin, Massila
Published: (2009)
by: Kamalrudin, Massila
Published: (2009)
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015)
by: Norhidayah, Masstor
Published: (2015)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
Development of offline handwritten signature authentication using artificial neural network
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
MaramaAI: Automated and Visual Approach for Inconsistency Checking of
Requirements
by: kamalrudin, massila, et al.
Published: (2010)
by: kamalrudin, massila, et al.
Published: (2010)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
An offline signature verification technique using pixels intensity levels
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Universiti Malaysia Pahang examination timetabling problem: scheduling invigilators
by: M. N. M., Kahar, et al.
Published: (2014)
by: M. N. M., Kahar, et al.
Published: (2014)
Student academic alert system / Lee Foo Yee
by: Lee , Foo Yee
Published: (2003)
by: Lee , Foo Yee
Published: (2003)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
Development of a driver detection system for somnolence and alertness based on image processing techniques
by: Mohd Fauzi, Abu Hassan, et al.
Published: (2024)
by: Mohd Fauzi, Abu Hassan, et al.
Published: (2024)
Geofence alerts application with gps tracking for children monitoring
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
Offline Signature Verification through Biometric Strengthening
by: Ooi, Shih-Yin, et al.
Published: (2007)
by: Ooi, Shih-Yin, et al.
Published: (2007)
Semi - automated software requirement specification (SRS) document generator: The guideline to novice system analyst
by: Siti Nur Fathin Najwa, Mustaffa, et al.
Published: (2021)
by: Siti Nur Fathin Najwa, Mustaffa, et al.
Published: (2021)
Offline handwritten chinese character using convolutional neural network : State-of-the-art methods
by: Zhong, Yingna, et al.
Published: (2023)
by: Zhong, Yingna, et al.
Published: (2023)
Offline handwritten Chinese character using convolutional neural network: State-of-the-art methods
by: Zhong, Yingna, et al.
Published: (2023)
by: Zhong, Yingna, et al.
Published: (2023)
A multi-agent K-means with case-based reasoning for an automated quality assessment of software requirement specification
by: Jubair, Mohammed Ahmed, et al.
Published: (2023)
by: Jubair, Mohammed Ahmed, et al.
Published: (2023)
A preliminary study on biometric watermarking for offline handwritten signature
by: Low, C. Y., et al.
Published: (2007)
by: Low, C. Y., et al.
Published: (2007)
Fusion of LSB and DWT biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
Iot based dust alerting and smartbin system for asthma patient
by: Periasamy, Innarasi, et al.
Published: (2021)
by: Periasamy, Innarasi, et al.
Published: (2021)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011)
by: el-Taj, Homam Reda Kamel
Published: (2011)
Study and Implementation of Internet of Things (IoT) Based Vehicle Safety
Alert and Tracking System
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
Door lock alert system / Norin Azmiah Ahmad
by: Ahmad, Norin Azmiah
Published: (2006)
by: Ahmad, Norin Azmiah
Published: (2006)
Offline EEG-based DC Motor Control for Wheelchair Application
by: Norizam, Sulaiman, et al.
Published: (2019)
by: Norizam, Sulaiman, et al.
Published: (2019)
Health monitoring system using pulse oximeter with remote alert
by: Mahgoub, Mohamed, et al.
Published: (2015)
by: Mahgoub, Mohamed, et al.
Published: (2015)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
Support Vector Machines (SVM)-based biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
Development, Implementation And Analysis Of Direct Integration Offline Method In Wire Bonding
by: Lee, Foo Yeong
Published: (2011)
by: Lee, Foo Yeong
Published: (2011)
The Requirement Analysis of the IoT-Based Vehicular Spatial Allocation System
by: K., Swapna, et al.
Published: (2025)
by: K., Swapna, et al.
Published: (2025)
Invigilation timetabling system using genetic algorithm (GA) / Shahirah Mohamed Hatim
by: Shahirah, Mohamed Hatim
Published: (2011)
by: Shahirah, Mohamed Hatim
Published: (2011)
Preventing requirements defects to improve requirements engineering in information systems development / Mohd Farid Assamani Mohamed Zainon
by: Mohamed Zainon, Mohd Farid Assamani
Published: (2006)
by: Mohamed Zainon, Mohd Farid Assamani
Published: (2006)
Implementation of seat belt monitoring and alert system for car safety
by: Zainah, Md. Zain, et al.
Published: (2018)
by: Zainah, Md. Zain, et al.
Published: (2018)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
Similar Items
-
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018) -
A Data-Driven Engine Starter System Using ESP32 With Multi-Layer
Authentication and Alerts
by: Parunandhi, Amareshwari, et al.
Published: (2025) -
Invigilator system for UMP examination problem based on Faculty of Computer System & Software Engineering (FSKKP)
by: Noor Khairunnisa, Mat Yusof
Published: (2015) -
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013) -
A semi-automated requirements prioritisation technique for scalable requirements with stakeholder quantification and prioritisation
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)