Development of quantum computing algorithm of technology for monitoring learning results

Authors

DOI:

https://doi.org/10.15587/1729-4061.2024.306968

Keywords:

quantum algorithm, qubit, entanglement, facial recognition technology, proctoring, educational environment

Abstract

The present publication considers implementing an online control proctoring system, with the possibility of using methods and models of pattern recognition using algorithmic quantum computing to conduct online exams. The study's object is the protection method within infrastructure proctoring systems in education. The study aims to create a security system for proctoring technology infrastructure in education. The article proposes an alternative approach to building protection systems with an effective recognition model using algorithmic quantum computing in proctoring platforms. This study addresses these issues and proposes a novel approach to generating a random cryptographic key using multimodal biometric technology. A presented quantum algorithm method for computer simulation of the data processing quantum principles allows studying and analysing how the created model for transforming a classical image into a quantum state works. This method also shows the possibilities of quantum information theory in interpreting classical problems or how to optimise the same, taking into account the development of methods for the functioning of models and algorithms for quantum computing, data protection and security of online video communications in a proctoring system in an educational environment. The novelty of this research is expressed primarily in the constant updating and addition of authentication systems using quantum computing in various aspects, including the proctoring system in the educational environment. Also, scientific novelty is associated with insufficient similar research in the information space. The practical significance is due to the need in the current situation to attract attention to existing problems in structuring the infrastructure of a monitoring system within planning and coordinating the protection, thereby enhancing learning outcomes by eliminating security flaws using a quantum computing algorithm for pattern recognition

Author Biographies

Galiya Yesmagambetova, Kokshetau University named after Sh. Ualikhanov

Master of Technical Sciences

Department of Information and Communication Technologies

Alimbubi Aktayeva, Abay Myrzakhmetov Kokshetau University

PhD

Department of Information Systems and Informatics

Akky Kubigenova, S. Seifullin Kazakh Agrotechnical Research University

Master of Technical Sciences

Department of Information Systems and Informatics

Aigerim Ismukanova, Kokshetau University named after Sh. Ualikhanov

Master of Technical Sciences

Department of Information and Communication Technologies

Tatyana Fomichyova, Kokshetau University named after Sh. Ualikhanov

Master of Technical Sciences

Department of Information and Communication Technologies

Seilkhan Zhartanov, Abay Myrzakhmetov Kokshetau University

Master of Technical Sciences

Department of Information Systems and Informatics

Aidyn Daurenova, Abay Myrzakhmetov Kokshetau University

Master of Technical Sciences

Department of Information Systems and Informatics

References

  1. Tajane, K., Gomsale, A., Gomsale, A., Yadav, A., Walzade, S. (2023). Online Exam Proctoring System. International Journal of Advanced Research in Science, Communication and Technology, 3 (1), 202–207. https://doi.org/10.48175/ijarsct-9027
  2. Ganar, E. S., Mohammad, S., Zohair, K., Shaikh, R. (2023). Online Exam Proctoring System. International Journal of Advanced Research in Science, Communication and Technology, 3 (5), 138–142. https://doi.org/10.48175/ijarsct-9334
  3. Felsinger, D. N., Halloluwa, T., Fonseka, C. L. I. (2023). Experiences of conducting online exam proctoring in low-resource settings: a Sri Lankan case study. Information Technologies and Learning Tools, 93 (1), 163–177. https://doi.org/10.33407/itlt.v93i1.5094
  4. Sharma, P. (2023). Proctoring and Monitoring-Based Examination System. International Journal for Research in Applied Science and Engineering Technology, 11 (6), 73–79. https://doi.org/10.22214/ijraset.2023.51899
  5. Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D. et al. (2021). The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Systematic Reviews, 10 (1). https://doi.org/10.1186/s13643-021-01626-4
  6. Kitchenham, B., Brereton, P. (2013). A systematic review of systematic review process research in software engineering. Information and Software Technology, 55 (12), 2049–2075. https://doi.org/10.1016/j.infsof.2013.07.010
  7. Barrio, F. (2022). Legal and Pedagogical Issues with Online Exam Proctoring. European Journal of Law and Technology, 13 (1). Available at: https://ejlt.org/index.php/ejlt/article/view/886
  8. Baso, Y. S. (2022). Proctoring and Non-proctoring Systems. International Journal of Advanced Computer Science and Applications, 13 (6). https://doi.org/10.14569/ijacsa.2022.0130610
  9. Hussein, M. J., Yusuf, J., Deb, A. S., Fong, L., Naidu, S. (2020). An Evaluation of Online Proctoring Tools. Open Praxis, 12 (4), 509. https://doi.org/10.5944/openpraxis.12.4.1113
  10. Alessio, H. M., Malay, N. J., Maurer, K., Bailer, A. J., Rubin, B. (2017). Examining the Effect of Proctoring on Online Test Scores. Online Learning, 21 (1). https://doi.org/10.24059/olj.v21i1.885
  11. Kolski, T., Weible, J. L. (2019). Do Community College Students Demonstrate Different Behaviors from Four-Year University Students on Virtual Proctored Exams? Community College Journal of Research and Practice, 43 (10-11), 690–701. https://doi.org/10.1080/10668926.2019.1600615
  12. Conijn, R., Kleingeld, A., Matzat, U., Snijders, C. (2022). The fear of big brother: The potential negative side‐effects of proctored exams. Journal of Computer Assisted Learning, 38 (6), 1521–1534. https://doi.org/10.1111/jcal.12651
  13. Han, S., Nikou, S., Yilma Ayele, W. (2023). Digital proctoring in higher education: a systematic literature review. International Journal of Educational Management, 38 (1), 265–285. https://doi.org/10.1108/ijem-12-2022-0522
  14. Nurpeisova, A., Shaushenova, A., Mutalova, Z., Ongarbayeva, M., Niyazbekova, S., Bekenova, A. et al. (2023). Research on the Development of a Proctoring System for Conducting Online Exams in Kazakhstan. Computation, 11 (6), 120. https://doi.org/10.3390/computation11060120
  15. Hernandez-de-Menendez, M., Morales-Menendez, R., Escobar, C. A., Arinez, J. (2021). Biometric applications in education. International Journal on Interactive Design and Manufacturing (IJIDeM), 15 (2-3), 365–380. https://doi.org/10.1007/s12008-021-00760-6
  16. A model of training in information security technologies in the context of globalization (2022). Certificate of entry of information into the State register of rights to objects protected by copyright of the Republic of Kazakhstan, No. 29025.
  17. Deutsch, D. (1985). Quantum theory, the Church-Turing principle and the universal quantum computer. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 400 (1818), 97–117. https://doi.org/10.1098/rspa.1985.0070
  18. Nielsen, M. A., Chuang, I. L. (2010). Quantum Computation and Quantum Information. Cambridge: Cambridge University Press. https://doi.org/10.1017/cbo9780511976667
  19. Shor, P. W. (1994). Algorithms for quantum computation: discrete logarithms and factoring. Proceedings 35th Annual Symposium on Foundations of Computer Science. https://doi.org/10.1109/sfcs.1994.365700
  20. Easttom, W. (2021). Quantum Computing and Cryptography. Modern Cryptography, 385–390. https://doi.org/10.1007/978-3-030-63115-4_19
  21. Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68 (21), 3121–3124. https://doi.org/10.1103/physrevlett.68.3121
  22. Bennink, R. S., Bentley, S. J., Boyd, R. W., Howell, J. C. (2004). Quantum and Classical Coincidence Imaging. Physical Review Letters, 92 (3). https://doi.org/10.1103/physrevlett.92.033601
  23. Al-Khalid, R. I., Al-Dallah, R. A., Al-Anani, A. M., Barham, R. M., Hajir, S. I. (2017). A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes. Journal of Software Engineering and Applications, 10 (01), 1–10. https://doi.org/10.4236/jsea.2017.101001
  24. Cao, Y., Li, J., Chakraborty, C., Qin, L., Tao, L., Shao, X. (2023). Temporal Segment Neural Networks-Enabled Dynamic Hand-Gesture Recognition for Industrial Cyber-Physical Authentication Systems. IEEE Systems Journal, 17 (4), 5315–5326. https://doi.org/10.1109/jsyst.2023.3306380
  25. Li, M., Yang, X., Zhu, H., Wang, F., Li, Q. (2020). Efficient and privacy-preserving online face authentication scheme. Tongxin Xuebao Journal on Communications, 41 (5), 205–214. https://doi.org/10.11959/j.issn.1000-436x.2020087
  26. Zhang, X., Gonnot, T., Saniie, J. (2017). Real-Time Face Detection and Recognition in Complex Background. Journal of Signal and Information Processing, 08 (02), 99–112. https://doi.org/10.4236/jsip.2017.82007
  27. Easttom, C., Ibrahim, A., Chefranov, A., Alsmadi, I., Hansen, R. (2020). Towards A Deeper NTRU Analysis: A Multi Modal Analysis. International Journal on Cryptography and Information Security, 10 (2), 11–22. https://doi.org/10.5121/ijcis.2020.10202
  28. Shaller, A., Zamir, L., Nojoumian, M. (2023). Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures. Information and Computation, 295, 105112. https://doi.org/10.1016/j.ic.2023.105112
  29. ISO/IEC 19989-2:2020. Information security – Criteria and methodology for security evaluation of biometric systems. Part 2: Biometric recognition performance. Available at: https://www.iso.org/standard/72403.html
  30. Kim, B. G., Wong, D., Yang, Y. S. (2023). Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Function with NTRU Linkable Ring Signature. International Journal on Cryptography and Information Security, 13 (4), 01–25. https://doi.org/10.5121/ijcis.2023.13401
Development of quantum computing algorithm of technology for monitoring learning results

Downloads

Published

2024-06-28

How to Cite

Yesmagambetova, G., Aktayeva, A., Kubigenova, A., Ismukanova, A., Fomichyova, T., Zhartanov, S., & Daurenova, A. (2024). Development of quantum computing algorithm of technology for monitoring learning results. Eastern-European Journal of Enterprise Technologies, 3(2 (129), 69–82. https://doi.org/10.15587/1729-4061.2024.306968