Keywords: Adaptive, Artificial Neural Network, Fuzzy, Performance


Electronic examination system was introduced into the examination system to overcome the stress and the time consumption factors commonly experienced in the traditional paper-based examination system. In both the traditional and the e-examination system, eligible students are allowed to write examination only after they have been manually authenticated by invigilators. However, impersonation problem persist owing to human or examiner error which occur when examiners cannot distinctively distinguish each student (e.g. in the case of twins). This paper attempts to address the problem by proposing fingerprint biometric authentication technologies to curb unethical conduct during electronic examination. The fingerprint biometric device has the ability of identifying unique biological characteristics of student. The e-examination system is made up of four phases; Registration, Verification, Examination and Submission phases. Two categories of software were used: the system software and the application software. The system software consists of the operating system which is Windows XP professional Service Pack 2 and the application software architecture is C# programming language. C# is a multi-paradigm programming language encompassing strong typing, imperative, declarative, functional, procedural, generic, object-oriented (class-based) and component-oriented programming disciplines. C# was used to implement the design because of its interactiveness and good functionalities in graphical outputs. Testing the new design with data, the result shows a system that can administer examination effectively.


Keywords: ,, ,



Ayo C. K., Akinyemi I. O., Adebiyi A. A. and Ekong U. O. 2007. “The prospects of e-examination implementation in Nigeria.” Turkish Online Journal of Distance Education-TOJDE, 8(4): 126

Awosiyan, K. 2010. Stress and success of NOUN examination. Nigerian Tribune, July 1, p.10.

Coventry, L., De Angeli, A., and Johnson, G. 2003. Usability of large scale public systems: Usability and biometric verification at the ATM interface. Proceedings of the Conference on Human Factors in Computing Systems. Florida, USA, 153-160.

Ikuomola A. J. and Olayanju T. A. (2010). N-Types Electronic Examination System : An Effective Approach for Combating Examination Malpractice. Journal of Natural Sciences, Engineering and Technology, 9(2): 2010

Jain, A., Hong, L., and Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2): 91–98.

McGinity, M. (2005). Staying connected: Let your fingers do the talking. Communications of the ACM, 48(1): 21-23.

Pons, A. P. (2006). Biometric marketing :targeting the online consumer. Communications of the ACM, 49(8): 60-65.
Tabitha J., Pirim, T., Boswell, K., Reithel, B, and Barkhi, R. (2006). Determining the intention to use biometric devices: an application and extension of the technology acceptance model. Journal of Organizational and End User Computing, 18(3): 1-25.

Williams, J. M. (2002). New security paradigms. Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, Virginia, Pp. 97-107.

Yang, S., & Verbauwhede, I. M. (2003). A secure fingerprint matching technique. Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, California, USA 89-94.