close
test_template

The Suspicious Activity Detection System

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 724 |

Pages: 2|

4 min read

Published: Oct 2, 2018

Words: 724|Pages: 2|4 min read

Published: Oct 2, 2018

Table of contents

  1. Abstract
  2. Introduction
  3. Conclusion

Abstract

The Suspicious activity detection system aims to serve a reliable online examination system which is based on strict online security and true candidate authentication. The main aim of the project is to detect the human who is cheating during the examination. Human face and human behavioral pattern play an important role in person identification. The proposed system aims to identify abnormal head motions, thus identifying copying. It will also identify a student moving out of his/her exam seat or swapping his position with another student or looking into another student's computer.

Introduction

Online Examination has become very much popular in today’s IT enabled world. It has replaced all the inconveniences of Offline Examination. But still now there is a big question regarding the security of online examination. Student’s authentication during the online exam is a great problem. The major drawback of online examinations is that a candidate can easily use of any unauthorized methods. The system consists of the software developed running on the computer on which online examination is to be conducted. The Webcam is connected to the same computer. The software that is designed runs in the background along with the online examination running on the frontline. For the online examination, the computers used are placed at an appropriate distance from each other such that during normal situation, only one student (who is expected) comes in front of the webcam.

In the proposed system, the student need to have a webcam equipped computer system and it should be placed in a way that his face can be clearly visible from the front view. As an initial checking process, the student will be asked to show the whole room in which the online exam is going to happen. The first part of proctoring is face detection. After detecting the face, video input , audio is also captured to detect whether there is any unwanted, specifically if there is anybody talking inside the room. There is a possibility of student user trying copy from a file with in the computer. Then all these are given as input to the heuristic based inference system. By analyzing all these inputs the inference system is deciding whether there is any malpractice or not.

Literature survey provided us various papers and technique which will be useful for development of the project. These papers have used various image processing techniques for face detection and face tracking which can be explained as follows: Heuristic-based Automatic Online Proctoring System[1] 2015 IEEE 15th International Conference on Advanced Learning Technologies

This paper proposes a novel multi-modal method for automatic online proctoring using a combination of image processing, audio processing and pc monitoring techniques. In the proposed system the remote proctor only has to inspect the examination room. The proposed system based on Heuristic based automatic online proctoring combining image processing ,audio processing and pc monitoring techniques that removes the necessity to have a remote proctor throughout the examination to control cheating.

Automated Video Surveillance to Detect Suspicious Human Activity[2]International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) The proposed system aims to identify abnormal head motions, thereby prohibiting copying. It will also identify a student moving out of his place or swapping his position with another student or looking into another student's computer . We aim to develop a system that will identify the students who indulge in malpractices/suspicious activities during the course of an online examination. The system automatically detects suspicious activities and alerts administration.

The Viola-Jones algorithm typically gives multiple detections, a post-processing steps. Viola-Jones algorithm, the first ever real-time face detection system. There are three ingredients working in concert to enable a fast and accurate detection: the integral image for feature computation, Adaboost for feature. The Viola-Jones algorithm typically gives multiple detections, a post- processing step.[2]

Get a custom paper now from our expert writers.

Conclusion

With the help of this application examiner will detect the cheating behavior of the students during examination. This system will also alarm the cheating operations detected so that student will be aware of an activity. The Suspicious Activity Detection system would require less resources for it to work as expected because of the motion detection. System has advantage over the other applications as it doesn’t involve the use of any existing database for suspicious activity detection. System is affordable and convenient and ensures more security.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

The Suspicious Activity Detection System. (2018, September 27). GradesFixer. Retrieved November 19, 2024, from https://gradesfixer.com/free-essay-examples/the-suspicious-activity-detection-system/
“The Suspicious Activity Detection System.” GradesFixer, 27 Sept. 2018, gradesfixer.com/free-essay-examples/the-suspicious-activity-detection-system/
The Suspicious Activity Detection System. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-suspicious-activity-detection-system/> [Accessed 19 Nov. 2024].
The Suspicious Activity Detection System [Internet]. GradesFixer. 2018 Sept 27 [cited 2024 Nov 19]. Available from: https://gradesfixer.com/free-essay-examples/the-suspicious-activity-detection-system/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now