Essays about: "Cheating"
Showing result 1 - 5 of 22 essays containing the word Cheating.
-
1. Radio signal detection and localisation for uncovering unauthorised signals in an examination environment
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Examination is a fundamental part of education, both for students and institutions. Cheating on exams is something educational institutions are trying to reduce. One form of cheating is the use of a mobile phone to live-stream the exam to pass the test. READ MORE
-
2. A Dirigible Bowling Ball : Controlling a bowling ball to hit a strike every time
University essay from KTH/Mekatronik; KTH/MekatronikAbstract : The purpose of this bachelor’s thesis is to investigate the uses of spherical robots and on a prototype basis construct and control a dirigible bowling ball. The robot is able to steer left and right after being thrown by the user. READ MORE
-
3. Keystroke dynamics for student authentication in online examinations
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Biometrics are distinctive for each person, and can not be given away or hacked like a password. Keystroke dynamics is a behavioral biometric characteristic that can be used as a complementary authentication step [1]. In online examinations it is difficult to make sure that each student write their own work. READ MORE
-
4. A cheat detection system for an educational pentesting cyber range: an intrusion deficit approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In academic courses, effort is given to detect and deal with plagiarism. Examplesof traditional plagiarism detection techniques include comparison of submittedhomework or supervised exams. Such techniques, however, are limitedin application to traditional teaching methods. READ MORE
-
5. Secret Sharing with Threshold Schemes
University essay from Linnéuniversitetet/Institutionen för matematik (MA)Abstract : In this thesis, four different methods for secret sharing with threshold schemes will be investigated. We will discuss theory, implementation and security aspects. For example, we show how some known attacks are implemented.The methods considered in this thesis, are the schemes by Shamir, Blakley, Mignotte and Asmuth-Bloom. READ MORE
