Student And Invigilator Authentication Through Mobile Application
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
In present day the management of examination is done manually. The main problem with manual system is it takes more effort and physical space to keep track of paper documents like hall tickets, to find information and to keep details secure. For all the competitive examinations like JEE Mains, RBI, SBI Aadhaar Card is all set to become one of the essential identification document. The twelve digit unique identification number has been made mandatory to check fraud and impersonation. Aadhaar Card could become the base for all the key examinations in a move. Candidates will need to submit their 12-digit UID number while filling up forms. During the examination, their QR code can be collected and matched with the one stored with the Aadhaar server. It takes just a few minutes to verify whether he or she is the right candidate or not. It’s easy and safe. This will avoid fake enrollment and impersonation and thus reduce malpractice.
Authors and Affiliations
Girish Saunshi, Akshata. G Shiralkar, Deepa. S Hosamani
Diabetes Mellitus Estimation Risk Using Association rule Mining
Diabetes is part of the growing epidemic of non communicable diseases. Early detection of patients with elevated risk of developing diabetes mellitus is critical to the improved prevention and overall clinical managemen...
An Efficient Approach towards Duplicate Detection System
Information on the web is very huge in size and the tasks of search engines have become more and more complex as a single entity on the web have two or more representations in databases. The duplicate detection is the p...
Secure and Attribute-Based Keyword Search with Fine-Grained Owner-Authorization in the Cloud with Time Server
Search over scrambled information is a basically critical empowering system in distributed computing, where encryption-before outsourcing is a principal answer for securing client information protection in the untrusted...
Analysis of Helical Spring of Two-Wheeler Suspension System Using Ansys Workbench 16.2
a helical spring is a mechanical device which is typically used to store energy and subsequently release it, to absorb shock, or to maintain a force between contracting surface. They are made of an elastic material form...
Social Engineering: Attack, Prevention and Framework
Social Engineering is the act of breaking security by manipulating users/individuals into divulging confidential information. It uses psychological tricks to gain trust, rather than technical cracking techniques. Social...