Ebenezer's FYP - Edited
Ebenezer's FYP - Edited
Ebenezer's FYP - Edited
By
17010301021
2021
DECLARATION
I hereby declare that this project has been written by me is a record of my own
research work. It has not been presented in any previous application for a higher
degree of this or any other University. All citations and sources of information are
____________________________
____________________________
Date
ii
CERTIFICATION
This project titled, ‘A Secure Online Computer Based Test System Using Facial
original research work was carried out by him under by supervision and is hereby
accepted.
(Supervisor)
iii
DEDICATION
iv
ACKNOWLEDGEMENTS
I owe my profound gratitude to God Almighty for the strength, wisdom, divine help,
and provision he granted me throughout this work. Also, to my parents for their
undying support, motivation, prayers, and unsolicited support throughout this work. I
would also love to appreciate my cousin O.J Austine for her immense impact on this
work.
completion of this research. God bless you Ma. My heartfelt gratitude goes to the
Acting Dean, College of Basic and Applied Sciences – Dr. Ofudje, the Head of
Adewole, and all other members of staff of the Department of Computer Science and
v
TABLE OF CONTENTS
DECLARATION ...........................................................................................................ii
CERTIFICATION ........................................................................................................iii
DEDICATION .............................................................................................................. iv
ACKNOWLEDGEMENTS ........................................................................................... v
6
2.3 RELATED WORKS .............................................................................................. 19
7
5.1 SUMMARY ........................................................................................................... 45
References .................................................................................................................... 47
LIST OF FIGURES
8
Figures
Page
3.1: Use case diagram for the user (student) in the system 29
ABSTRACT
9
Computer Based Test (CBT) has grown to become recognized all over the world and
is now being implemented by various institutions. With the evident growth in CBT,
examination malpractice has found a way to nullify the advantages of CBT. Hence,
there is a need to ensure that there are more secure CBT systems. In the recent rimes
for instance, some students have been caught writing CBT examination for others
despite the security measures. The above-mentioned prevailing challenge inspired the
proposed study.
therefore highly essential especially at the Mountain Top University. Html and CSS
are used to develop the front-end part of the Computer Based Test system. While PHP
was used to design the backend and MySQL was the database that was utilized. The
performance of the system when compared to the current system in use was found to
10
CHAPTER ONE
INTRODUCTION
An examination is one of the best methods used to evaluate student’s knowledge and
ascertain that the student understands what he/she was taught in the classroom
(Ajinaja, 2017). Over the years, there have been several methods used in evaluating
oral examinations. Technology has come a long way in transforming different aspects
of people's lives and assisting in human productivity and accuracy. There is an ever-
increasing need for educators and sponsors to explore other cost-effective, foolproof,
through question papers where students are expected to write out their answers on a
used to restrict communications between examination candidates and prohibit the use
of notes or other materials. The manual method which involves pen and paper has
been in use for a very long time, the appeal however has reduced due to issues such as
delays in the release of results, examination malpractices, printing costs, and human
error. Recently, the worldwide pandemic showed another disadvantage to the use of
the manual method, begging the need for the automation of the examination system.
The advancement of technology in the education sector has ensured that there is now
an avenue for the automation of the examination process. Today, the number of
11
admissions, placement, and certification examinations that are administered on
Over time, the Computer Based Test has become susceptible to some of the issues
that affected traditional Paper Based Tests. There have been known situations where
the students have their exams written by other individuals and the likes. Examination
malpractices, leading to the need for more secure CBT to uphold the integrity of the
This project aims to design a computer-based test system that implements the facial
process.
12
Design a CBT system that makes use of the facial recognition biometric.
This project aims at developing a system that allows examiners to set their
examination/test questions and allows students to take the examinations and check
their results. This system will help the school to minimize examination malpractice.
There will be a module for the administrator where he/she can edit, add or remove
questions as may be required. The system would also mandate the examination
supposed to be writing that particular exam with the identification number provided
The Software Development Life Cycle (SDLC) model for this system is the
are HTML, CSS, PHP, JavaScript, and Firebase. HTML, CSS, PHP, and JavaScript
are web-based programs while Firebase is good for databases because of its security
This study covers the design and implementation of an online computer-based test
system with a facial recognition biometric system using Mountain Top University as a
case study.
13
There could be a tendency for the system to be bypassed if the examinee is an
identical twin.
These computer-based tests, have also become susceptible to some of the same
challenges facing paper-based tests and this is begging for the need to secure the
This project aims at providing a more secure way to ascertain that the exam is being
written by the appropriate candidate by employing the use of the facial recognition
biometric tool.
Computer Based Test: Computer Based Test (CBT) is the use of computers to carry
knowledge
someone.
14
CHAPTER TWO
LITERATURE REVIEW
2.1 INTRODUCTION
gaps, which may be used to adjust their activities and program offerings and to fine-
tune the curriculum. Academic evaluation has become a practice or exercise that can
already commonly employed in many eLearning settings. For example, anyone that
has engaged in a written driver's test recently, most likely utilized a computer (Bhatia,
2021).
One advantage of computer testing is that tests can be arranged based on their
difficulty level. A software program can be built in stages, starting with the easiest
questions and progressing to the most difficult ones. This saves time, concern, and
money. When the goal is to rank test-takers as a percentile slice of a peer group
15
population, computer testing, and scoring are especially useful. The paradigm is also
tests (Theodore, 2012). Navigation, the method by which the test taker goes through
may be difficult for someone taking a computer test to go back and forth between
questions and issues. On a paper exam, the test taker can read the full section or return
one of the most important things that schools and instructors should consider. These
benefits include the ability to improve and enhance assessment. The fundamental
topic of this study is: What roles may ICT play in supporting assessment in
processes. This document divides its roles into two sections: testing and tasks. ICT
can be used in testing to conduct tests, score tests, analyze results, and help teachers
assess learning outcomes (Marina, 2015). Furthermore, ICT can be used to help
students complete tasks such as portfolio and project-based assessments. Students can
communication technology. ICT can also help pupils finish their projects. Teachers
must understand that the criteria used to evaluate e-portfolios and projects must also
learning institutions has increased learning by leaps and bounds over the last few
16
decades. Technology-enhanced learning in both pre-schools and higher education
knowledge and skill acquisition. Crucial thinking is one of the critical areas where
approach and exploit chances with daring and potential (WU, 2021). Furthermore, the
era of digital learning. ICT has assisted institutions in making more informed
decisions, which has resulted in the adoption of measures responsible for maintaining
the economy's and the environment's integrity. This results in the advancement of a
ICT implementation in schools, learning has become more participatory and learner-
society by utilizing ICT (WU, 2021). Using scientific methodologies, this research
study will investigate the role of ICT in achieving sustainable education by 2030
(WU, 2021). The research question will be determined using data in this study. This
study will begin with a focus on earlier research on technology and education
The authors (Miguel et al., 2015) found that in classifying and securing e-
security. The security properties that are related to e-assessments are first evaluated
through the selection of the most relevant security properties. Once these properties
17
have been selected, a framework is then created to depict how the various e-
assessment types and factors are associated with these properties. Finally, the study
identity based on physiological and behavioral traits such as the face, fingerprints,
hand geometry, iris, keystroke, signature, voice, and so on. The fact that biometrics
need to be clarified. All biometric identifier scans are classified into two categories:
1. Physiological
2. Personality
based on direct measurements of a portion of the human body and include finger-scan,
18
2.2.5 FACE RECOGNITION SYSTEMS
between the eyes or the contour of the chin, are then mathematically represented and
According to (Cahit Gürel & Abdulkadir Erden, 2012), a face recognition system is
one of the biometric information processes, and its applicability and operating range
are greater than those of other biometric information processes, such as fingerprint,
The goal of a research study by (Omorogiuwa & Nwukor, 2017) is to develop a web-
and ties the MAC addresses of all the systems in the center to the program server,
tying the computers to the server through quantum mechanics distribution (QKD) for
the intranet only, to prevent intruders via intranet; and build a MAC address of all the
systems in the center to The CBT authentication software's front-end was built with
Visual Studio, while the product itself was built with Visual Basic.NET. The backend
was designed using the MySQL server program, therefore all of the data for the CBT
authentication software is stored there. In this system, all unauthorized users are
blocked and appropriate warning messages are sent to the client by the server when
Test program are flexible timing flexibility, stand-alone topic module, resilience, and
19
scalability. His CBT system was built utilizing both the Waterfall Model and Reuse-
template design, he used Source-Based technologies such as the XAMP server, PHP,
MySQL, JavaScript, Hypertext Markup Language, and Cascading Style Sheet. Based
on what was provided, the system was able to provide timely notification of the
student's final score as well as a report. It also had provision for diagrammatic
questions as well as mathematical symbols in all subjects. His work focused on using
software, that is, the reuse of a single-core component of the software over and over
are the same but all (sub-component) follow the template component. The limitation
to this work, however, is the fact that an unauthorized student could have access to
In the paper written by (Chinedum, 2017), she ascertained that by making use of
remembers(e.g. a password). She was motivated by the wide variety of systems that
ensure that the rendered services are accessed only by a legitimate user, and not
anyone else. The methodology that has confirmed this project is by the questionnaire
robust personal recognition scheme, these systems are vulnerable to the wile of an
based on their physiological and or behavioral characteristics. With this, the results of
20
using a biometric system as security access for any access to any systems or
that the need for such a system had become necessary due to the increasing number of
impersonation. The study was carried out on the state of computer-based tests in the
University of Jos, Nigeria, it was implemented and used to get observations, findings,
and relevant information on how the system can address impersonation. The
implementation of the mobile application was done with Flutter (a framework of dart
programming language). Python (python facial recognition package server) was used
to handle face recognition. The backend used a database known as Firebase (Firebase
collections/real-time database) which was used to store all data and carry out other
related user validation functions. The work presented has rebounded to solving the
In a paper by (Saleh M. Al-Saleem, 2014) some security issues that were faced with
the computer-based testing systems were outlined. One of the security considerations
mentioned was the identification and authentication of the examinee. It was stated that
21
a range of authentication could be used and some methods for authenticating the CBT
system were recommended amongst which was the multimodal biometric approach.
22
2.4 SUMMARY OF RELATED WORK
The table below summarizes findings from other similar papers on computer-based
test systems using facial recognition biometrics, as well as the various verification and
1 Agnes 2018 Computer Based Test This research was part of research
study.
Steganography
Techniques
23
Ananda Ayu Moodle Platform for a computer-based test design (CBT)
and Evaluation).
application.
24
CHAPTER THREE
RESEARCH METHODOLOGY
The existing CBT system being used in Mountain Top University has been
found to have a few security issues which could prove to allow for examination
malpractice. Students who haven't used the CBT system before are expected to
create a new profile with their matriculation number and other details and are to
create a password that would be used to log in to the system to permit them to
take part in the examination. At the end of the exam, the results aren't shown so
The analysis of the existing system was looked into and the following merits
2. Marking accuracy
The existing CBT system, though it promises to be void of any form of malpractice, is
not without its defects. After analyzing the current system, the following are the
observations that call for a modification in the way in which the examination process
is carried out:
25
1. There is an avenue for impersonation as an ineligible student/examine only
needs access to the username and password of the eligible candidate to be able
The proposed system is expected to improve on some of the flaws that have been
experienced in the existing system. The student would be expected to register on the
system for the first time with his matriculation number and other information and
would need to create a password as well. The next step would be for the student to
register his or her face via the facial recognition tool. Once the registration process
has been completed, the student would need to input his or her user-id (matriculation
number) and password and then pass through the facial recognition tool before he or
she can be permitted by the system to take the exam. Also, once the student is done
with the examination and has submitted the system would compute and display the
student's result for that course so that the student would be able to view his or her
score.
26
3.2.1 REQUIREMENT ANALYSIS
The creation of a clear explanation, frequently in simple language, of what the system
is intended to provide for its users is part of requirement analysis and specification.
The system's functioning and evolution will be governed by several limitations. This
document, the suggested system that would be constructed in this project will be
referred to as MTU E-exam. The User and System needs will be clarified and
represented using use case diagrams in this section, as well as the functional and non-
tool to explain the interactions between the system's elements in greater detail.
comparable publications.
This section explains the system's end-user needs. Students and an administrator are
the users of this system. The system's Use Case Diagrams (informal graphical
figures. 3.1 and 3.2. The user requirement specifies the services that the MTU E-exam
system is expected to provide to system users, as well as the restrictions that it must
follow. The following are the user requirements for the MTU E-exam system:
A. Student
27
iii. Take an examination
Fig 3.1 Use case diagram for the User (Student) in the system
28
B. The Administrator
29
3.2.3 SYSTEM REQUIREMENT SPECIFICATIONS
In this section of the project, the system's needs would be broken down into a more
complete description, which would include the system's operations, services, and
operational limits. The following are the system requirements for the MTU E-exam
System:
The descriptions of services the system should deliver, how the system should react to
specific inputs, and how the system should behave in specific situations are referred to
b) Restrict the student to make only one selection of the options to the questions
Rather than specific behaviors, they are the requirements that establish the criteria that
a) Possesses short response time and increased speed in executing user request;
d) Is scalable, that is, does not collapse with additional resources or users;
f) Is maintainable;
30
3.2.3.3 HARDWARE REQUIREMENTS
and productive:
b) 2 GB ram size
c) A working webcam
For efficiency of use and to have system performance in developing of software the
following various software requirement must be met Operating system: Mac OS,
The system was designed based on the requirements specification. The Sequence
diagrams, Data flow diagrams, and architectural design are presented in figures 3.3 to
3.9.
31
Fig 3.3: Architecture of MTU E-exam
32
Fig 3.4: Data Flow Diagram for MTU E-exam
33
Fig 3.5: Sequence Diagram for Admin Login Process
34
Fig 3.6: Sequence Diagram for Admin Processes
35
Fig 3.7: Sequence Diagram for Student Login
36
Fig 3.8: Sequence Diagram for Student Activity
37
Fig 3.9: Activity Diagram of MTU E-exam
The MTU E-exam system was developed using WAMP Server, Hypertext Markup
Language (HTML), JavaScript and Cascading Style Sheet (CSS), PHP, and MySQL.
38
CHAPTER FOUR
4.1 INTRODUCTION
This chapter gives the implementation and testing overview of the application: it starts
with the program implementation specifics of the system and then goes to give a
a) The Index Page - This is the first page that appears when the system is
launched from the web browser. It provides navigation to the other modules of
the system such as the administrator interface and the student's interface.
whose login details (username and password) are authenticated by the system.
Upon successful login, he can change his password via the change password
to the questions are some of the functions which the administrator can perform
c) Student Module – A student is allowed to log in here and has the option to
system, the first question together with its instruction is generated. The
Examination timer is activated and the student is automatically logged off the
system upon expiration of the timer or submission of the completed test by the
student. The system automatically generates the student's score for that
39
particular course upon submission. The figure 4.1 is the first page the student
sees when opening the application, it is the welcome page. Figure 4.2 is the
student registration page. This is where the student registers on the system.
Figure 4.3 is the student login page; it is where the student signs in to write the
examination after already going through the registration process. Figure 4.4 is
the examination page and figure 4.5 is where the results for the examination is
40
Fig 4.2: The Student Registration Page
41
Fig 4.3: The Student Log in Page
42
Fig 4.4: The Examination Page
43
Fig 4.5: The Score Page
44
CHAPTER FIVE
5.1 SUMMARY
After going through the problems being experienced with the current CBT system
being utilized by the school, this proposed system is believed to help eradicate the
problems associated with the already existing system using the facial recognition
biometric tool which will make it near impossible for a student to impersonate another
student and have access to his or her examination portal and it will also make the
5.2 CONCLUSION
This project work presents a Web based CBT system with facial recognition biometric
improve their online examination process. The suggested system's features were
highlighted, leading to the creation of a final system that acts as a proof of concept. In
addition, the research can be regarded to have met its stated goals. It is envisaged that
5.3 CHALLENGES
Some of the challenges encountered while carrying out this project include poor
45
a) Introduction of other forms of question types such as theory-based questions
online;
46
References
Cahit Gürel , & Abdulkadir Erden. (2012). Design of a Face Recognition System. The
15th International Conference on Machine Design and Production, UMTIK
2012.
Miguel et al. (2015). Security in online web learning assessment. TeSLA (An Adaptive
Trust-based e-assessment System for Learning), (p. 18(6)).
47
Theodore, I. (2012). Computer – based vs. Paper – based assessment in Open and
Distance Learning. National Open University of Nigeria (NOUN).
48