Design and implementation of a web-based replacement for the manual system of moderating exams
Moderation of exam paper/coursework is an important process that provides a framework for ensuring that examinable materials are designed in accordance with the learning outcome of the program description. Performing this process using paper-based method creates delay in transferring the printed mod...
| Main Author: | Oladokun, Adeola Asiat |
|---|---|
| Format: | Dissertation (University of Nottingham only) |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/30786/ |
Similar Items
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Moderation of Assessment in Transnational Higher Education
by: Wallace, M., et al.
Published: (2010)
by: Wallace, M., et al.
Published: (2010)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Assessment moderation in large transnational units: a case study
by: Goldacre, Lisa, et al.
Published: (2008)
by: Goldacre, Lisa, et al.
Published: (2008)
Collaborative Approaches to Moderation of Assessment in Transnational Education
by: Mahmud, S., et al.
Published: (2009)
by: Mahmud, S., et al.
Published: (2009)
An Activity Theory Approach to Moderation for Fair Assessment in Transnational Education
by: Thuraisingam, T., et al.
Published: (2010)
by: Thuraisingam, T., et al.
Published: (2010)
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
by: Ahmad, Miza Mumtaz
Published: (2011)
by: Ahmad, Miza Mumtaz
Published: (2011)
Record of assessment moderation practice (RAMP): survey software as a mechanism of continuous quality improvement
by: Johnson, Genevieve
Published: (2014)
by: Johnson, Genevieve
Published: (2014)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
An activity theory approach to fair assessment moderation in transnational education
by: Thuraisingam, Thavamalar, et al.
Published: (2012)
by: Thuraisingam, Thavamalar, et al.
Published: (2012)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Developing a Moderation Community of Practice
by: Von Konsky, Brian, et al.
Published: (2012)
by: Von Konsky, Brian, et al.
Published: (2012)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Topological comparison-based wormhole detection for MANET
by: Chan, King-Sun, et al.
Published: (2014)
by: Chan, King-Sun, et al.
Published: (2014)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Similar Items
-
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011) -
Moderation of Assessment in Transnational Higher Education
by: Wallace, M., et al.
Published: (2010) -
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023) -
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012) -
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)