[HTML][HTML] Academic integrity in online assessment: A research review

OL Holden, ME Norris, VA Kuhlmeier - Frontiers in Education, 2021 - frontiersin.org
This paper provides a review of current research on academic integrity in higher education,
with a focus on its application to assessment practices in online courses. Understanding the …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

大数据系统综述

李学龙, 龚海刚 - 中国科学: 信息科学, 2015 - cqvip.com
随着科学, 技术和工程的迅猛发展, 近20 年来, 许多领域(如光学观测, 光学监控, 健康医护,
传感器, 用户数据, 互联网和金融公司以及供应链系统) 都产生了海量的数据(更恰当的描述或许 …

[PDF][PDF] 基于虹膜识别的身份鉴别

王蕴红, 朱勇, 谭铁牛 - 2002 - cbsr.ia.ac.cn
本文描述了基于虹膜识别的身份鉴别系统. 该系统包括虹膜图像摄取, 图像预处理,
特征提取和匹配四个部分. 虹膜图像摄取采用了自主开发研制的装置, 特征提取采用Gabor …

Remote assessment in higher education during COVID-19 pandemic

S Şenel, HC Şenel - International Journal of Assessment Tools in …, 2021 - dergipark.org.tr
Universities have made a compulsory shift to distance education due to the Covid-19
pandemic. All of the higher education instutitions in Turkey have completed 2019-2020 …

Toward scalable systems for big data analytics: A technology tutorial

H Hu, Y Wen, TS Chua, X Li - IEEE access, 2014 - ieeexplore.ieee.org
Recent technological advancements have led to a deluge of data from distinctive domains
(eg, health care and scientific sensors, user-generated data, Internet and financial …

Deep representations for iris, face, and fingerprint spoofing detection

D Menotti, G Chiachia, A Pinto… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Biometrics systems have significantly improved person identification and authentication,
playing an important role in personal, national, and global security. However, these systems …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - IEEE Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Ear recognition: More than a survey

Ž Emeršič, V Štruc, P Peer - Neurocomputing, 2017 - Elsevier
Automatic identity recognition from ear images represents an active field of research within
the biometric community. The ability to capture ear images from a distance and in a covert …