scholarly journals A Robust User Authentication Technique in Online Examination

2021 ◽  
pp. 535-542
Author(s):  
Nader Abdel Karim ◽  
Hasan Kanaker ◽  
Shadi Almasadeh ◽  
Jamal Zarqou

User authentication in the online environment is promoting a hugely challenging issue. This has contributed to the realization of a user authentication where the exams can be performed over the Internet at any time and from any place and by using any digital device. Consequently, further investigations are required to focus on improving user authentication methods to enhance online security mechanisms, especially in the field of e-exams. This research proposes a new user authentication technique based on the user interface (UI). The novel idea is created based on the design preferences of candidates who are taking the e-exams. Several design features are used to design a special user interface for e-exams, for example, the font attributes, back colour, number of questions per page, group categories for questions based on difficulties, and timer setting. The introduced technique can be used to support the user authentication process in the e-exams environment. Furthermore, the proposed technique provides the ability to login to the e-exam without the need to remember the login information, but to select what the student prefers according to his/her personal information. Based on the literature review, a primary evaluation claiming that the students have differences in their preferences and that each user has stable design preferences within different sessions is revealed. In regard to these facts, they become the resource and essence of this research. The security performance of the proposed method is evaluated. The results of the experiments show a false positive (FP) rate of 0.416% and a false negative (FN) rate of 0%.

2012 ◽  
Vol 460 ◽  
pp. 210-213
Author(s):  
Shu Zhou

Research and development of embedded systems is the hot information technology and the graphical user interface (GUI) is the most important part of human-computer interaction interface. These embedded GUI system has been widely used because of its strong and powerful functionality. But many times , it is necessary to sacrifice performance for its versatility. In this paper, the embedded GUI systems based on the message mechanism is study considering the short of current embedded GUI systems. The novel method of a message-driven application framework is suggested to solve the problem of the current message mechanisms for the implementation. Meanwhile, a circular queue algorithm is given in order to achieve messaging unit. Then, the message has been classified considering of efficiency. In the end, the design example of personal assistant is given.


2021 ◽  
Vol 2129 (1) ◽  
pp. 012041
Author(s):  
Siti Malihah Mohd Yusof ◽  
Munirah Mohd Yusof ◽  
Hanayanti Hafit

Abstract Smartphone Application Control is a project designed to block other phone applications that have excessive use by users. Excessive phone use is often experienced by children aged 7-18 years old. At the same time, many parents nowadays do not have time all day long to monitor and limit the use of their children’s phone due to work. The efforts of the mass media to advise on the use of phone do not give much positive impact on these children. Therefore, a robust alternative such as Smartphone Application Control is essential to curb these issues. To develop this application, a methodological approach has been used namely the Evolutionary Prototyping model. Android Studio version 3.6.2 is used to develop this application while SQLite Database acts as a database for storing all application usage statistics and Google-Cloud Firebase is used to store user-related information for user authentication purposes. To create an attractive user interface, Adobe Photoshop CS6 is used to design background and interface buttons. This app is able to track usage hours of other apps and block them if they exceed their daily usage limits. The time limit for such use can only be set by parents. Additionally, notification of excess usage will be sent to parents via email as a notification. A pop-up alert notification will be issued when user has reached his or her application limit. Smartphone Application Control is very important in helping user to control their phone usage behaviour.


Circulation ◽  
2020 ◽  
Vol 141 (Suppl_1) ◽  
Author(s):  
Åke Olsson ◽  
Magnus Samulesson

Background: Automatic ECG algorithms using only RR-variability in ECG to detect AF have shown high false positive rates. By including P-wave presence in the algorithm, research has shown that it can increase detection accuracy for AF. Methods: A novel RR- and P-wave based automatic detection algorithm implemented in the Coala Heart Monitor ("Coala", Coala Life AB, Sweden) was evaluated for detection accuracy by the comparison to blinded manual ECG interpretation based on real-world data. Evaluation was conducted on 100 consecutive anonymous printouts of chest- and thumb-ECG waveforms, where the algorithm had detected both irregular RR-rhythms and strong P-waves in either chest or thumb recording (non-AF episodes classified by algorithm as Category 12).The recordings, without exclusions, were generated from 5,512 real-world data recordings from actual Coala users in Sweden (both OTC and Rx users) during the period of March 5 to March 22, 2019, with no control or influence by the researchers or any other organization or individual. The prevalence of cardiac conditions in the user population was unknown.The blinded recordings were each manually interpreted by a trained cardiologist. The manual interpretation was compared with the automatic analysis performed by the detection algorithm to determine the number of additional false negative indications for AF as presented to the user. Results: The trained cardiologist manually interpreted 0 of the 100 recordings as AF. Manual interpretation showed that the novel automatic AF algorithm yielded 0 % False Negative error and 100 % Negative Predictive Value (NPV) for detection of AF. Irregular RR-rhythms were detected in 569 recordings (10 % of a total of 5,512 recordings). The 100 non-AF recordings containing both irregular RR-rhythms and strong P-waves constituted 18% of all recordings with irregular RR-rhythms. Respiratory sinus arrhythmia was the single most prevalent condition and was found in 47% of irregular RR-rhythms with strong P-waves. Conclusion: The novel, P-wave based automatic ECG algorithm used in the Coala, showed a zero percent False Negative error rate for AF detection in ECG recordings with RR-variability but presence of P-waves, as compared to manual interpretation by a cardiologist.


2015 ◽  
Vol 23 (4) ◽  
pp. 370-381 ◽  
Author(s):  
André Lötter ◽  
Lynn Futcher

Purpose – The purpose of this paper is to propose a framework to address the problem that email users are not well-informed or assisted by their email clients in identifying possible phishing attacks, thereby putting their personal information at risk. This paper therefore addresses the human weakness (i.e. the user’s lack of knowledge of phishing attacks which causes them to fall victim to such attacks) as well as the software related issue of email clients not visually assisting and guiding the users through the user interface. Design/methodology/approach – A literature study was conducted in the main field of information security with a specific focus on understanding phishing attacks and a modelling technique was used to represent the proposed framework. This paper argues that the framework can be suitably implemented for email clients to raise awareness about phishing attacks. To validate the framework as a plausible mechanism, it was reviewed by a focus group within the School of Information and Communication Technology (ICT) at the Nelson Mandela Metropolitan University (NMMU). The focus group consisted of academics and research students in the field of information security. Findings – This paper argues that email clients should make use of feedback mechanisms to present security related aspects to their users, so as to make them aware of the characteristics pertaining to phishing attacks. To support this argument, it presents a framework to assist email users in the identification of phishing attacks. Research limitations/implications – Future research would yield interesting results if the proposed framework were implemented into an existing email client to determine the effect of the framework on the user’s level of awareness of phishing attacks. Furthermore, the list of characteristics could be expanded to include all phishing types (such as clone phishing, smishing, vishing and pharming). This would make the framework more dynamic in that it could then address all forms of phishing attacks. Practical implications – The proposed framework could enable email clients to provide assistance through the user interface. Visibly relaying the security level to the users of the email client, and providing short descriptions as to why a certain email is considered suspicious, could result in raising the awareness of the average email user with regard to phishing attacks. Originality/value – This research presents a framework that email clients can use to identify common forms of normal and spear phishing attacks. The proposed framework addresses the problem that the average Internet user lacks a baseline level of online security awareness. It argues that the email client is the ideal place to raise the awareness of users regarding phishing attacks.


2021 ◽  
Author(s):  
Gabriel Sousa Silva Costa ◽  
Anselmo C. Paiva ◽  
Geraldo Braz Júnior ◽  
Marco Melo Ferreira

Even though vaccines are already in use worldwide, the COVID-19 pandemic is far from over, with some countries re-establishing the lockdown state, the virus has taken over 2 million lives until today, being a serious health issue. Although real-time reverse transcription-polymerase chain reaction (RTPCR) is the first tool for COVID-19 diagnosis, its high false-negative rate and low sensitivity might delay accurate diagnosis. Therefore, fast COVID-19 diagnosis and quarantine, combined with effective vaccination plans, is crucial for the pandemic to be over as soon as possible. To that end, we propose an intelligent system to classify computed tomography (CT) of lung images between a normal, pneumonia caused by something other than the coronavirus or pneumonia caused by the coronavirus. This paper aims to evaluate a complete selfattention mechanism with a Transformer network to capture COVID-19 pattern over CT images. This approach has reached the state-of-the-art in multiple NLP problems and just recently is being applied for computer vision tasks. We combine vision transformer and performer (linear attention transformers), and also a modified vision transformer, reaching 96.00% accuracy.


2021 ◽  
Author(s):  
Nobuyuki Takahashi ◽  
Shozo Saeki ◽  
Minoru Kawahara ◽  
Hirohisa Aman ◽  
Eri Nakano ◽  
...  

We developed a novel scotoma detection system using time required for fixation to the random targets, or the "eye-guided scotoma detection method". In order to verify the "eye-guided scotoma detection method", we measured 78 eyes of 40 subjects, and examined the measurement results in comparison with the results of measurement by Humphrey perimetry. The results were as follows: (1) Mariotte scotomas were detected in 100\% of the eyes tested; (2) The false-negative rate (the percentage of cases where a scotoma was evaluated as a non-scotoma) was less than 10\%; (3) The positive point distribution in the low-sensitivity eyes was well matched. These findings suggested that the novel scotoma detection method in the current study will pave the way for the realization of mass screening to detect pathological scotoma earlier.


Pneumologia ◽  
2020 ◽  
Vol 69 (2) ◽  
pp. 107-114
Author(s):  
William Suriady ◽  
Andika Chandra Putra ◽  
Wiwien Heru Wiyono ◽  
Mohammad Fahmi Alatas ◽  
Bettia Bermawi ◽  
...  

Abstract The novel coronavirus disease-2019 (COVID-19), caused by the severe acute respiratory syndrome-coronavirus-2 (SARS-CoV-2), has become a public health emergency of international concern. The first confirmed COVID-19 case in Indonesia was announced on 2 March 2020, and later on, 11,192 confirmed cases were reported as of 3 May. The World Health Organization has stated that performing a real-time reverse transcription–polymerase chain reaction (RT-PCR) specific for SARS-CoV-2 on specimens from the upper and the lower respiratory tracts, especially nasopharyngeal and oropharyngeal swabs, is the standard diagnostic procedure for COVID-19. In Indonesia, we also use other diagnostic tests, such as rapid antibody tests specific for SARS-CoV-2. Herein, we report an atypical case of COVID-19 and describe the diagnostic process, the clinical course, with progression to severe pneumonia on Week 3 of illness and the case management. We also try to highlight the possibility of false-negative RT-PCR tests.


Sign in / Sign up

Export Citation Format

Share Document