Tamil Tej Sarguru Project
Tamil Tej Sarguru Project
MONITORING SYSTEM
A PROJECT REPORT
Submitted by
SARGURURAMAN - 212621104055
TAMILSELVAN M - 212621104067
TEJ SABAREESH V - 212621104068
BACHELOR OF ENGINEERING
IN
MAY 2025
AUTOMATED EXAMINATION INTEGRITY
MONITORING SYSTEM
A PROJECT REPORT
Submitted by
SARGURURAMAN - 212621104055
TAMILSELVAN M - 212621104067
TEJ SABAREESH V - 212621104068
BACHELOR OF ENGINEERING
IN
MAY 2025
i
BONAFIDE CERTIFICATE
SIGNATURE SIGNATURE
Dr.D.RAJINIGIRINATH,M.Tech.,Ph.D. Dr.B.ASRAF YASMIN,MCA,M.Phil,Ph.D
HEAD OF THE DEPARTMENT SUPERVISOR
Professor Assistant Professor
Department of Computer Science Department of Computer Science and
and Engineering Engineering
Sri Muthukumaran Institute of Sri Muthukumaran Institute of
Technology, Technology,
Chikkarayapuram, Chennai-600 069 Chikkarayapuram, Chennai-600 069
Submitted for the Anna University Project Viva Voice held on ______________
ii
ACKNOWLEDGEMENT
Finally, we thank all the teaching and non-teaching staff members of the
Department of Computer Science and Engineering of our college who helped us to
complete this project.
Above all we thank our parents and our family members for their constant
support and encouragement for completing this project.
iii
ABSTRACT
With the growing prevalence of online education and remote assessments,
ensuring the integrity of examinations has become a significant challenge for
educational institutions, certification bodies, and training organizations. Traditional
proctoring methods are often resource-intensive, prone to human error, and difficult
to scale across large candidate pools. To address these limitations, this paper
proposes an Automated Examination Integrity Monitoring System (AEIMS) a
comprehensive solution that combines artificial intelligence (AI), computer vision,
and behavioral analytics to monitor and safeguard the credibility of examinations in
real time.The AEIMS architecture integrates multiple monitoring layers including
webcam surveillance, screen activity tracking, biometric verification, and audio
analysis. Facial recognition and liveness detection ensure the authenticated
candidate remains present throughout the examination. Eye-tracking algorithms
monitor focus and detect off-screen glances, while microphone input is analyzed to
identify unauthorized speech or background noise indicative of collusion. Screen
recording and keystroke logging further help in detecting the use of external
software, internet searches, or file access during the test session.To enhance
adaptability, the system employs machine learning techniques that continuously
train on new behavioral data, improving the accuracy of anomaly detection and
reducing false positives. The solution also includes a centralized dashboard for
administrators, providing real-time alerts, risk scores, and post-exam audit logs for
detailed review and action.Extensive testing in controlled environments and real-
world examination scenarios shows that AEIMS significantly improves the
reliability and security of digital assessments. It reduces reliance on human
invigilation, lowers operational costs, and supports large-scale deployment across
multiple locations. Furthermore, the system is designed to comply with privacy
regulations, incorporating data encryption, anonymization, and secure storage
practices.
iv
TABLE OF CONTENT
CHAPTE PAGE
TITLE
R NO
ABSTRACT iv
LIST OF FIGURES viii
LIST OF TABLES ix
LIST OF ABBRIVATIONS x
1. INTRODUCTION 2
1.1 BACKGROUND AND MOTIVATION 2
1.2 PROBLEM STATEMENT 3
1.3 OBJECTIVES OF THE STUDY 4
1.4 SIGNIFICANCE AND SCOPE OF THE PROJECT 4
2. EXISTING SYSTEM 7
2.1 OVERVIEW OF CURRENTLY EXISTING SYSTEM 7
2.2 LIMITATIONS OF EXISTING PLATFORMS 8
2.3 USER FEEDBACK AND MARKET GAPS 9
2.4 LITERATURE REVIEW 10
2.4.1 TECHNOLOGICAL APPROACHES AND
10
EFFICENCY
2.4.2 ETHICAL AND PRIVACY CONCERNS 11
2.4.3 STUDENT EXPERIENCE AND
11
PSYCHOLOGICAL IMPACT
3 PROPOSED SYSTEM 14
3.1 SYSTEM OVERVIEW 14
3.1.1 PROJECT SUMMARY AND CONCEPT 15
3.1.2 KEY FEATURES AND FUNCTIONALITIES 16
v
3.1.3 BENEFITS OVER EXISTING SYSTEMS 18
3.1.4 USE CASE SCENARIOS AND APPLICATIONS 19
3.2 SYSTEM ARCHITECTURE 20
3.2.1 LAYERED ARCHITECTURE DESCRIPTION 21
3.2.2 COMPONENT INTERACTION DIAGRAM 21
3.2.3 USE CASE DIAGRAM 22
3.2.4 CLASS DIAGRAM 23
3.2.5 BACKEND SERVICES AND DATA FLOW 24
3.2.6 SECURITY, STORAGE AND COMPLIANCE
25
MEASURES
3.3 SYSTEM TESTING AND VALIDATION 26
3.3.1 TEST CASES AND TESTING STRATEGIES 26
3.32 PERFORMANCE AND RESULTS 27
3.3.3 ACCURACY , SPEED AND PRECISION 27
3.3.4 USER EXPERIENCE TESTING 27
3.4 RESULTS AND ANALYSIS 28
CONCLUSION 33
FUTURE ENHANCEMENT 34
APPENDICES 35
vi
CODE SNIPPETS 35
REFERENCES 41
PUBLICATIONS 43
LIST OF FIGURES
FIGURE TITLE PAGE
NO
vii
3.2 ARCHITECTURE DIAGRAM 20
3.4.1.1 DASHBOARD 28
LIST OF TABLES
viii
NO
3.4.2 COMPARATIVE ANALYSIS 32
LIST OF ABBRIVATIONS
ACRONYM ABBRIVATION
AI Artificial Intelligence
ix
GUI Graphical User Interface
UI User Interface
CV Computer Vision
ML Machine Learning
JS JavaScript
x
SMIT
CHAPTER 1
1
SMIT
1. INTRODUCTION
In an era characterized by rapid technological evolution and digital transformation,
the demand for innovative, efficient, and intelligent systems has grown exponentially
across all sectors. As organizations and individuals strive to optimize performance,
manage data, and automate processes, the limitations of traditional methods have become
increasingly apparent. These limitations often manifest in the form of inefficiencies, lack
of adaptability, poor scalability, and insufficient integration with emerging technologies.
Addressing such challenges requires not only a deep understanding of existing systems
but also the capacity to envision and implement forward-thinking solutions.
2
SMIT
To tackle this problem effectively, the project focuses on bridging the gap between user
needs and system capabilities through an integrated, modular, and future-ready design.
This involves not only enhancing performance and efficiency but also ensuring that the
system is intuitive, adaptable, and resilient against evolving challenges. The proposed
solution is intended to provide a clear advancement over existing technologies, backed by
empirical testing, critical evaluation, and practical deployment considerations.
3
SMIT
The primary objective of this study is to design and develop a robust, scalable, and
user-oriented system that addresses the limitations identified in existing solutions. The
project aims to analyze current methodologies, identify their shortcomings, and formulate
a framework that enhances performance, adaptability, and usability. Specifically, it seeks
to streamline system architecture, improve operational efficiency, and ensure seamless
integration with emerging technologies. A significant focus is placed on meeting both
functional and non-functional requirements, such as responsiveness, scalability, security,
and ease of use. Additionally, the study intends to develop a prototype that demonstrates
the feasibility of the proposed solution and validate its effectiveness through rigorous
testing and evaluation. By leveraging contemporary tools and techniques, the project also
aspires to contribute new insights to the academic and technical community. Beyond the
development process, the study emphasizes thorough documentation, usability
assessment, and future scalability, laying the groundwork for ongoing improvements and
potential real-world deployment.
This project holds significant value both in academic and practical contexts. From an
academic perspective, it contributes to the growing body of knowledge in system design,
implementation, and evaluation by offering a structured approach to solving real-world
problems through technological innovation. The project serves as a case study in applying
4
SMIT
theoretical models to practical challenges, thus bridging the gap between research and
real-world applications. Practically, the significance of the project lies in its potential to
address persistent inefficiencies, improve user experience, and support more intelligent
decision-making in the target domain. The solution proposed in this project is designed
not only to solve immediate issues but also to provide a scalable and adaptable framework
that can evolve alongside changing technological and user needs.
The scope of the project is intentionally focused and well-defined to ensure depth and
quality in execution. It encompasses the complete lifecycle of system development—from
requirements gathering, system design, and prototype development to testing, evaluation,
and documentation. It includes the implementation of core functionalities that directly
address the identified problem, while excluding large-scale deployment, third-party
integrations not directly relevant to the current objectives, and long-term maintenance
beyond the prototype phase.
5
SMIT
CHAPTER 2
6
SMIT
2 EXISTING SYSTEM
In most traditional implementations, the current systems addressing the targeted
domain rely heavily on manual processes or legacy technologies that are often rigid,
inefficient, and difficult to scale. These systems typically lack real-time responsiveness,
automated decision-making capabilities, and integration with modern technologies such
as cloud computing, mobile platforms, or intelligent analytics. Data is often stored in
isolated silos with minimal interoperability, leading to duplication of effort, reduced data
accuracy, and limited accessibility. Moreover, many of these systems fail to offer user-
friendly interfaces or personalized features, which can significantly impact usability and
adoption, especially among non-technical users
Maintenance and updates in existing systems are also resource-intensive and error-
prone due to the absence of modular or scalable architectures. Security features are often
basic or outdated, exposing the system to vulnerabilities such as unauthorized access and
data breaches. While some organizations attempt to augment legacy systems with
patchwork solutions or third-party tools, these efforts typically lack coherence and long-
term viability. Overall, the limitations of existing systems underscore the pressing need
for a modern, robust, and adaptable solution that can meet the growing demands of users,
integrate emerging technologies, and ensure long-term sustainability.
faces in the camera frame. Tools like Respondus LockDown Browser and Safe Exam
Browser (SEB) focus on restricting the test-taker’s device, preventing access to other
websites, applications, or system functions during the exam.
8
SMIT
date browsers, which creates accessibility issues for students in remote or under-resourced
areas.
Privacy remains a major issue, as constant video and audio surveillance raises
concerns around data protection, consent, and potential misuse of sensitive information,
despite GDPR or FERPA compliance claims. Moreover, tech-savvy users can bypass
some restrictions through secondary devices, VPNs, or screen-mirroring techniques—
exposing gaps in detection mechanisms. There's also the risk of over-reliance on
automation, where human oversight is minimal or absent, potentially undermining the
fairness of evaluations when AI makes flawed judgments. Finally, many platforms offer
limited support for open-book or alternative exam formats, making them less suitable for
modern pedagogical approaches that emphasize application over memorization
2.3 USER FEEDBACK AND MARKET GAPS
User feedback on automated examination integrity monitoring systems reveals a mix of
appreciation for convenience and criticism over reliability, fairness, and user experience.
Many students report feeling uncomfortable or anxious under constant surveillance, often
citing the systems as overly intrusive or dehumanizing. Common complaints include false
flagging of non-cheating behaviors—such as looking away to think, ambient noise, or
minor head movements—as suspicious, which can erode trust and negatively impact
performance. Students and educators alike often find the systems technically demanding,
requiring strong internet connectivity, modern hardware, and specific software
environments, which poses challenges in areas with limited digital infrastructure.
Educators have also expressed frustration with the high volume of false positives
generated by AI-driven flagging systems, which creates an extra burden of manually
reviewing flagged sessions, especially in large cohorts. On the administrative side,
institutions face challenges in scalability, integration with Learning Management Systems
(LMSs), and concerns about data privacy and compliance, particularly when dealing with
international students under different legal jurisdictions. In terms of market gaps, current
9
SMIT
systems still lack adaptive intelligence that can distinguish context and intent in student
behavior.
Demerits
10
SMIT
Scholars have raised strong concerns about privacy and data protection. Olt (2018) and
Nagel (2021) argue that automated proctoring can be perceived as intrusive, often
violating students’ sense of autonomy and digital rights. The literature consistently
recommends the need for transparency, informed consent, and privacy-by-design
frameworks to ensure ethical deployment. As educational institutions increasingly adopt
automated proctoring tools, a growing body of research and public discourse has raised
serious ethical and privacy concerns. These concerns span from data protection and
informed consent to equity, digital autonomy, and the overall student-institution
relationship.
Demerits
Violation of Student Privacy
Lack of Informed Consent
Risk of Data Breaches
Algorithmic Bias and Discrimination
Research by Reedy et al. (2021) and Selwyn et al. (2020) indicates that surveillance
systems may induce test anxiety, reduce student confidence, and lead to perceptions of
mistrust between institutions and learners. These psychological factors can negatively
impact performance and skew assessment outcomes. Qualitative studies have found that
students frequently report feeling "watched" and "judged" unfairly by non-human
proctoring agents
Automated surveillance increases pressure by making students feel they are being
constantly watched and judged—not only by humans but by unforgiving algorithms. Even
11
SMIT
natural behaviors like looking away to think or adjusting posture can trigger anxiety,
worrying that these will be misinterpreted as cheating.
Students often report feeling like suspects instead of learners. The implicit assumption
that everyone might cheat unless proven otherwise creates a climate of suspicion, which
damages the trust and respect foundational to a positive educational experience.
Demerits
Incresed Test Anxiety and Stress
Feeling of Mistrust and Dehumanization
Discomfort in Home Environments
Lack of Transparancy and Control
Negative Impact on Mental Health
12
SMIT
CHAPTER 3
13
SMIT
3 PROPOSED SYSTEM
academic integrity in remote and online examinations. With the rapid expansion of
digital learning environments the proposed system is an innovative solution designed to
address the growing challenges of maintaining, traditional proctoring methods have
proven to be insufficient, invasive, or inefficient. This system introduces an intelligent,
AI-powered framework that ensures secure, non-intrusive, and reliable supervision during
online tests while balancing privacy, usability, and accuracy.
At its core, the system integrates artificial intelligence, computer vision, and
behavioral analytics to monitor examinees during assessments. Unlike legacy systems that
rely solely on manual invigilation or rigid software locks, this platform combines real-
time face tracking, eye movement detection, screen activity logging, and browser/tab
monitoring to build a multi-layered approach to cheating prevention.
At its core, the system is built to simulate the surveillance capability of an in-person
exam room by using technologies such as real-time facial recognition, gaze tracking,
keyboard and mouse activity monitoring, system-level access control, and AI-powered
behavior analysis. Rather than relying solely on human intervention, the system uses
algorithms to continuously assess candidate behavior during an examination.
15
SMIT
informed about the monitoring methods, and their data is stored securely for a
limited duration strictly for review purposes.
The project does not merely aim to prevent cheating—it also aspires to restore trust in
online evaluations, enhance user confidence in remote learning platforms, and encourage
a more equitable and accessible assessment ecosystem. By offering a modular design, the
system can be tailored to different academic levels, exam types, and institutional policies,
providing a flexible and future-ready solution for online examination integrity.
Function Logs active window titles, detects screen captures, and monitors app
launches or system command inputs. Technology Used OS-level hooks and
background services. Benefit Prevents access to calculators, messaging apps,
notes, or other unauthorized resources during the exam.
16
SMIT
Function Tracks typing patterns, speed, and mouse activity to detect anomalies like
bot usage or pre-typed content. Technology Used Input event listeners and
behavioral biometrics. Benefit Enhances behavioral profiling to differentiate
between genuine and suspicious input behavior.
17
SMIT
Function Maintains detailed logs of system events, user actions, and violations
with time-stamped entries. Technology Used Encrypted logging systems and
database storage. Benefit Facilitates post-exam analysis and provides proof for
academic misconduct inquiries.
Function Displays only necessary pop-ups (login, settings, alerts) while running
silently in the background. Technology Used React-based frontend or minimal
GUI toolkit. Benefit Enhances user experience by reducing distractions and
maintaining focus during the test.
These features collectively form a holistic exam security system that not only detects
and prevents dishonest behavior but also supports fair evaluations through ethical and
context-aware proctoring.
agencies conducting civil service exams or public recruitment processes can benefit from
its secure and auditable infrastructure.
Each of these scenarios is supported by the system’s configurable policies,
multilingual support, and cross-platform compatibility, allowing it to meet the diverse
needs of users across geographies and disciplines
3.2 SYSTEM ARCHITECTURE
At the Client Layer, users interact through a responsive web-based interface that
facilitates login, exam participation, and real-time communication with the monitoring
system. This layer is lightweight, optimized for cross-platform compatibility, and
designed for low latency. The Frontend Layer acts as the interaction manager, handling
the Exam Interface which orchestrates visual inputs from webcam feeds, screen activity,
keyboard and mouse behavior, and ambient audio. It triggers appropriate system events
and sends them to the backend for processing. The Backend Layer is the core of the
system, housing modules for Exam Management, Proctoring Control, AI-based Violation
Detection, and Alert Processing. It uses robust encryption protocols, access control
policies, and scheduled purging to comply with privacy standards like GDPR and
FERPA.
21
SMIT
22
SMIT
The User (represented by a stick figure) is the primary actor interacting with the
system.The Online Exam Proctoring System is shown at the center in a blue oval,
encapsulating the system's capabilities
23
SMIT
A. Security Measures
The examination monitoring system incorporates multiple security measures to ensure
integrity, confidentiality, and reliability throughout the assessment process. Examinees
must authenticate through a secure client interface, with role-based access control
restricting functionality based on user roles. All data transmitted between the client,
frontend, and backend is encrypted using secure protocols like HTTPS to prevent
unauthorized access. The system actively monitors system events such as tab switching or
inactivity, which are analyzed in real time by the proctoring server to detect suspicious
behavior.
B. Storage Measures
The examination monitoring system employs robust storage measures to safeguard
examinee data and exam records. All data collected during the exam, including personal
information, system activity logs, and proctoring footage, is securely stored in an
encrypted database to prevent unauthorized access and tampering. Data integrity is
25
SMIT
ensured through the use of checksums and backup strategies, allowing for reliable
recovery in the event of system failure or data corruption.
System testing and validation are critical phases in the development of the
Automated Examination Integrity Monitoring System, as they ensure that the system
functions correctly under expected (and unexpected) conditions and adheres to
performance, security, and usability standards. This phase also validates the integrity of
proctoring features and confirms that the system is ready for real-world deployment in
educational environments.
27
SMIT
28
SMIT
Live Video Monitoring Panels: Captured and streamed student activities in real-
time with embedded timestamps and violation overlays.
Violation Alert Dashboard: Highlighted rule infractions like unauthorized face
presence, speaking, screen switching, or tab navigation with severity ratings.
29
SMIT
Example Output: A student looking away for more than 10 seconds triggered a “gaze
drift” alert. This event was logged with a heatmap of eye movement and a clip extract.
30
SMIT
The system uses structured data models to organize and retrieve information efficiently,
supporting accurate alert processing and post-exam audits. Access to stored data is strictly
controlled through role-based permissions, ensuring that only authorized personnel such
as administrators and proctors can view or modify sensitive records. Additionally, data
retention policies are enforced to automatically manage the lifecycle of stored
information, complying with institutional and legal guidelines on privacy and data
protection.
31
SMIT
A comparative analysis was conducted between this proposed system and leading existing
platforms (e.g., ProctorU, Respondus, and Examity). The comparison focused on multiple
performance metrics
CONCLUSION
33
SMIT
The system is equipped with features such as real-time face tracking, gaze monitoring,
audio anomaly detection, browser activity restrictions, and intelligent alert generation.
These are supported by a modular layered architecture, ensuring flexibility, scalability,
and ease of integration with Learning Management Systems (LMS). The platform
emphasizes usability, data privacy, and ethical compliance, offering a balanced approach
to proctoring that respects student autonomy while preventing cheating.
FUTURE ENHANCEMENT
34
SMIT
Future versions of the system can benefit from training AI models on larger and more
diverse datasets, encompassing different ethnicities, age groups, lighting conditions, and
device types, which will significantly improve accuracy and reduce bias in gaze tracking,
facial recognition, and voice detection. Adding biometric features such as keystroke
dynamics or fingerprint or iris scanning can enhance identity verification before and
during the exam session, reducing the risk of impersonation and improving overall
security. A lightweight offline version that records exam sessions locally to be uploaded
post-exam when internet is available would extend the system’s usability in rural or low-
bandwidth areas, making it more inclusive. Future releases can include AI algorithms that
adjust their sensitivity based on environmental conditions and user profiles, for instance,
reducing false alerts for students with specific behavioral or medical conditions such as
ADHD or anxiety. A richer admin dashboard could feature predictive insights such as risk
scoring, behavioral heatmaps across exams, or patterns in attempted violations over time,
assisting institutions in long-term decision-making.
APPENDICES
35
SMIT
CODE SNIPPETS
app.py
from flask import Flask, render_template, Response
from flask_socketio import SocketIO
import cv2
import eventlet
eventlet.monkey_patch()
app = Flask(_name_)
socketio = SocketIO(app, cors_allowed_origins="*")
socketio = SocketIO(app, cors_allowed_origins="*", async_mode='eventlet') # CORS fix
camera = cv2.VideoCapture(0)
def generate_frames():
while True:
success, frame = camera.read()
if not success:
continue # Skip this frame, don't break the loop
# Mobile Detection
frame, mobile_detected = process_mobile_detection(frame)
print("Mobile:", mobile_detected) # Debug
"eye": gaze_direction,
"head": head_direction,
"mobile": "Detected" if mobile_detected else "Not Detected"
}
socketio.emit('alert_update', alert_data)
socketio.sleep(0) # Allow SocketIO to handle other events
@app.route('/')
def index():
return render_template('index.html')
@app.route('/video_feed')
def video_feed():
return Response(generate_frames(), mimetype='multipart/x-mixed-replace;
boundary=frame')
if _name_ == '_main_':
socketio.run(app, debug=True)
eye movement.py
import cv2
import numpy as np
import mediapipe as mp
mp_face_mesh = mp.solutions.face_mesh
face_mesh = mp_face_mesh.FaceMesh(
static_image_mode=False,
max_num_faces=1,
37
SMIT
refine_landmarks=True,
min_detection_confidence=0.5,
min_tracking_confidence=0.5,
)
def detect_pupil(eye_region):
gray_eye = cv2.cvtColor(eye_region, cv2.COLOR_BGR2GRAY)
blurred_eye = cv2.GaussianBlur(gray_eye, (7, 7), 0)
_, threshold_eye = cv2.threshold(blurred_eye, 50, 255, cv2.THRESH_BINARY_INV)
contours, _ = cv2.findContours(threshold_eye, cv2.RETR_EXTERNAL,
cv2.CHAIN_APPROX_SIMPLE)
if contours:
pupil_contour = max(contours, key=cv2.contourArea)
px, py, pw, ph = cv2.boundingRect(pupil_contour)
return (px + pw // 2, py + ph // 2), (px, py, pw, ph)
return None, None
if landmarks is None:
rgb_frame = cv2.cvtColor(frame, cv2.COLOR_BGR2RGB)
results = face_mesh.process(rgb_frame)
if not results.multi_face_landmarks:
return frame, "No Face Detected", []
landmarks = results.multi_face_landmarks[0].landmark
# Eye landmark indices from MediaPipe Face Mesh (refined iris landmarks)
LEFT_EYE_IDX = [33, 133, 160, 158, 159, 144] # Approximate eye region
RIGHT_EYE_IDX = [263, 362, 387, 385, 386, 373]
l_pupil, _ = detect_pupil(l_eye)
r_pupil, _ = detect_pupil(r_eye)
if l_pupil:
cv2.circle(frame, (l_x + l_pupil[0], l_y + l_pupil[1]), 5, (0, 0, 255), -1)
if r_pupil:
cv2.circle(frame, (r_x + r_pupil[0], r_y + r_pupil[1]), 5, (0, 0, 255), -1)
mp_face_mesh = mp.solutions.face_mesh
def is_valid_frame(frame):
return frame is not None and frame.size != 0
cap = cv2.VideoCapture(0)
face_mesh = mp_face_mesh.FaceMesh(static_image_mode=False,
max_num_faces=1,
refine_landmarks=True,
min_detection_confidence=0.5,
min_tracking_confidence=0.5)
if calibrated_angles is None:
print("[FATAL] Calibration failed. Exiting.")
cap.release()
cv2.destroyAllWindows()
exit()
while True:
ret, frame = cap.read()
if not ret or not is_valid_frame(frame):
40
SMIT
if result.multi_face_landmarks:
landmarks = result.multi_face_landmarks[0].landmark
try:
frame, head_direction = process_head_pose(frame, calibrated_angles, landmarks)
frame, gaze_direction, _ = process_eye_movement(frame, landmarks)
frame, mobile_detected = process_mobile_detection(frame)
REFERENCES
41
SMIT
42
SMIT
11. Li, H., Chao, K. M., and Weng, S. (2018). A blockchain-based data integrity
verification framework for smart education systems. Future Generation Computer
Systems, 93, 327–335.
12. Nguyen, A., Rienties, B., and Toetenel, L. (2017). Review of learner-facing
learning analytics and their impact on student engagement, experience and
achievement. International Journal of Educational Technology in Higher
Education, 14(1), 1–17.
13. Ravichandran, A. and Kellogg, S. (2021). Artificial Intelligence in Online Exams:
Ethical Challenges and Opportunities. Journal of Educational Computing
Research, 59(5), 867–889.
14. Shen, C. and Eltoukhy, M. (2020). Real-time face detection and recognition for
smart proctoring. IEEE Access, 8, 125768–125783.
15. Zhang, K., Zhang, Z., Li, Z., and Qiao, Y. (2016). Joint face detection and
alignment using multitask cascaded convolutional networks. IEEE Signal
Processing Letters, 23(10), 1499–1503.
PUBLICATIONS
43
SMIT
44