Treffer: Recognizing Suspicious Activities in Examination Scenario Using Machine Learning Techniques.

Title:
Recognizing Suspicious Activities in Examination Scenario Using Machine Learning Techniques.
Authors:
Celestine, Agwi Uche1 ucheworld2015@gmail.com, N., Ogwueleka Francisca2 Ogwuelekafn@gmail.com, Ekata, Irhebhude Martins3 hyelmart4lyf@gmail.com
Source:
IUP Journal of Telecommunications. Nov2021, Vol. 13 Issue 4, p40-54. 15p.
Database:
Business Source Premier

Weitere Informationen

Monitoring the activities of examinees during examination is very challenging. The paper recognizes and classifies activities of examinees as suspicious or normal during examination using machine learning techniques. The processing and analysis of image data follows a typical sequence of distinct steps referred to as the vision pipeline. Data was acquired with a surveillance camera and frames extracted from the videos. Preprocessing activities include selecting the required frames from frame sequences, and cropping and segmenting foreground/background object. Video conversion to frame was accomplished with MATLAB scripts, while segmentation of image frames was achieved with GrabCut algorithm. Shape/pose features were extracted from objects using Histogram of Oriented Gradient (HOG) and Regionprop algorithms, and represented in feature vectors that were fed into Support Vector Machine (SVM) classifier. Holdout validation technique was used for the classifier training and tested from the given datasets. 70% of the dataset was used for training, while 30% was used for testing. The model gave an accuracy of 98.1% and 100%, respectively, for each examination scenario. The model accuracy was visualized in confusion matrix and the Receiver Operating Characteristic (ROC). MATLAB software was used as the simulation environment. The model demonstrated excellent performance, indicating that the system can adequately complement the efforts of invigilators in examination invigilation. [ABSTRACT FROM AUTHOR]

Copyright of IUP Journal of Telecommunications is the property of IUP Publications and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)