<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Study of AI-based architectures for remote monitoring using Machine Learning</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Moustapha DER</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ahmed D. KORA</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Samba NDIAYE</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Digital Sciences and Technologies (STN) - Doctoral School of Computer Mathematics (EDMI) University Cheikh Anta DIOP UCAD - Research Laboratory (E-INOV LAB) at the Multinational Higher School of Telecommunications (ESMT) - Dakar</institution>
          ,
          <country country="SN">SENEGAL</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Digital Sciences and Technologies (STN) - Doctoral School of Computer Mathematics (EDMI) University Cheikh Anta DIOP UCAD - Research Laboratory (E-INOV LAB) at the Multinational Higher School of Telecommunications (ESMT) - Dakar</institution>
          ,
          <country country="SN">SENEGAL</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Faculty of Science and Technology of Cheikh Anta DIOP University (UCAD) - DOCTORAL SCHOOL OF MATHEMATHIC COMPUTER (EDMI) - University Cheikh Anta DIOP (UCAD) - Dakar</institution>
          ,
          <country country="SN">SENEGAL</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Article reviews the challenges education administrators and teachers face when turning to online exam proctoring. However, we suggest a use case involving human monitoring with cutting-edge technology, paving the way for test administration for greater ease of administration while maintaining stability. Given the growing trend of distance learning in universities, training schools, distance learning platforms, it is necessary to put in place some sort of appropriate control to avoid cheating and to have a fair evaluation. Indeed, human monitors therefore play a vital role, i.e., they can watch live feeds and identify any potentially harmful activity that automated algorithms might miss. In conclusion, the results show that the humansurveillance-technology combination is more effective in detecting fraud than using an addition of one or the other type only.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;surveillance</kwd>
        <kwd>proctoring</kwd>
        <kwd>machine learning</kwd>
        <kwd>supervisor</kwd>
        <kwd>reliability</kwd>
        <kwd>stability</kwd>
        <kwd>examination</kwd>
        <kwd>evaluation</kwd>
        <kwd>score</kwd>
        <kwd>confidence</kwd>
        <kwd>fraud</kwd>
        <kwd>cheating</kwd>
        <kwd>remote monitoring 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Firstly, artificial intelligence (AI) and machine learning (ML)
have revolutionized many sectors including education [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Indeed, traditional surveillance methods requiring the
physical presence of supervisors are not adapted to the
virtual environment, hence the need for advanced
technological solutions. However, remote monitoring [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] of
exams has emerged as an innovative solution to ensure the
integrity of remote assessments. Remote proctoring, or
proctoring, consists of supervising exams remotely to
ensure their integrity and prevent cheating. However,
remote monitoring of assessments poses considerable
challenges in terms of detecting fraud [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], ensuring
reliability, stability [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] of assessments to ensure integrity,
fairness and credibility of assessments.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Online examination monitoring</title>
      <p>
        Initially with the development of online learning [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ],
monitoring of online exams has become an essential aspect
in the evaluation process. Indeed, many studies are being
done to find innovative solutions to combat cheating during
online exams. However, these solutions seek to cover all
possible aspects, notably the authentication system, as
indicated by the authors, Wang et al. have [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] proposed a
continuous authentication system for online exams based
on machine learning algorithms and rules [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Obviously,
this detects any inappropriate behavior to limit and prevent
fraud.
      </p>
      <p>
        Therefore, this continuous approach uses machine learning
algorithms
to
multivariate
sequential
monitoring
procedures to detect questionable behavior during testing,
to automated online monitoring systems using audio and
visual tracking components, to the implementation of 'a
microservices architecture [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] for fault-tolerant online exam
proctoring systems. Additionally, behavioral biometrics and
smart exam
proctoring tools help
analyze student
interactions during
exams. These
machine learning
techniques detect cheating behavior [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] with high accuracy.
Indeed, the advancements aim to improve the integrity,
reliability and security [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] of online exams by effectively
monitoring candidates and preventing fraudulent activities
      </p>
    </sec>
    <sec id="sec-3">
      <title>Assessing confidence in surveillance</title>
      <sec id="sec-3-1">
        <title>Meaning of Notations Used in the Following</title>
        <p>Mean</p>
      </sec>
      <sec id="sec-3-2">
        <title>Evaluation of the confidence of the surveillance of candidate i by supervisor j in a context c</title>
        <p>∆</p>
      </sec>
      <sec id="sec-3-3">
        <title>Time difference between the times of an interaction k and an interaction q</title>
      </sec>
      <sec id="sec-3-4">
        <title>The forgetting factor</title>
        <p>
          , =&lt; 
 ,  _
  &gt; (1)
Assessing the trustworthiness of online exams [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] is crucial
to ensuring honesty [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], fairness, reliability and even quality
of learning in assessment processes. The level of confidence
in exam success varies according to the measures used in
our model. The aim of advanced monitoring is to guarantee
the integrity of the exam and prevent any fraud or cheating.
Having an experienced invigilator when invigilating an exam
is essential to guarantee the integrity [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] and smooth
running of the tests.
        </p>
        <p>
          So that an experienced supervisor [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] can quickly identify
suspicious behavior and effectively manage unforeseen
situations. Thanks to their knowledge [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] of the
regulations, they can intervene appropriately to prevent
cheating while maintaining a calm environment conducive
to the concentration of candidates. Additionally, their
experience [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] allows them to reassure students by
answering their questions with confidence and clarity,
helping to reduce exam-related stress and anxiety. In short,
their expertise is a major asset in ensuring the justice and
fairness of the evaluation. Since this monitor's confidence
can be strengthened by using reliable and effective
monitoring tools [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] that reduce uncertainty and errors in
[
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
3.
        </p>
        <p>Code</p>
        <p>,
 ℎ ,
  ,
 
 ,
 ,




−  ,</p>
      </sec>
      <sec id="sec-3-5">
        <title>Memory of the supervisor in a context c</title>
        <p>judgment.</p>
      </sec>
      <sec id="sec-3-6">
        <title>Behavior of a candidate i during an interaction k in a context c</title>
      </sec>
      <sec id="sec-3-7">
        <title>The interactions between candidate i and the supervisor in a context c</title>
      </sec>
      <sec id="sec-3-8">
        <title>User i i.e. candidate i</title>
      </sec>
      <sec id="sec-3-9">
        <title>Context c</title>
      </sec>
      <sec id="sec-3-10">
        <title>The degree of anomaly of candidate i in an interaction k</title>
      </sec>
      <sec id="sec-3-11">
        <title>The gap in an interaction k between a supervisor and a candidate i</title>
      </sec>
      <sec id="sec-3-12">
        <title>Reliability of candidate i in context c</title>
      </sec>
      <sec id="sec-3-13">
        <title>Stability of candidate i in a context c</title>
      </sec>
      <sec id="sec-3-14">
        <title>Local profile of user i in context c</title>
      </sec>
      <sec id="sec-3-15">
        <title>The degree of confidence of candidate i during an interaction k in a context c</title>
      </sec>
      <sec id="sec-3-16">
        <title>The waiting time factor</title>
      </sec>
      <sec id="sec-3-17">
        <title>The anomaly factor</title>
      </sec>
      <sec id="sec-3-18">
        <title>Time to the interaction q</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Trust Model</title>
      <p>
        For example, the evaluation of confidence [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] to follow up
on the surveillance of a candidate i by a supervisor j in a
context c is expressed in the form of a tuple in (1) composed
of the abilities of the supervisor formulated by 
 in (2),
which is a register or memory which stores all the
information of the entire session and the attitudes of the

candidates denoted by their local trust [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] profile  _ 
in (4) to emerge the reliability and stability of candidates.

 = &lt;  ℎ , &gt; i ɛ [1, M] k ɛ [1,   , ]
      </p>
      <p>
        (2)
In other words, the candidate's behavior is monitored
throughout the exam phase as well as the various
interactions made during the session [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In short,
everything saved in the memory 
 of the supervisor
which records all interactions with the candidate   in
context c.
      </p>
      <p>
        ℎ , =&lt;   ,  , 
 , , 
 , &gt;
(3)
 ℎ , denotes the behavior of the candidate materialized by
a quadruplet in (3) involving the users, the context, the
degree of anomaly noted during the session [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], and the
deviation noted in an interaction between the proctor and
the candidate. The memory size symbolizes lgi,c through the
interactions of the recorded 
 session.
      </p>
      <p>In (3) 
[</p>
      <p>
        , reveals the degree of anomaly noted following
an interaction [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] "k" so that 
 , tends towards zero (0)
 , →0] if the behavior is too questionable and one (1)
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Trust Evaluation Method</title>
      <p>
        As this waiting time can significantly affect the effectiveness
and efficiency of online proctoring [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Therefore the
register used is the memory of the monitor which
memorizes the past responses or behavior of the user to
adjust the monitoring strategy to respond to new threats
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] or tactics used by fraudsters. Based on 

 , the
monitor   can determine the user's local profile in
terms of reliability (  ) and stability (   ). The local profile
 _
  can be written in the form:
  = (  ,  ,   ,    ) (Eq 4)
  = {
      </p>
      <p>
        , | ɛ [1,   , ]} (Eq 5)
Reliability is a crucial aspect that ensures that the results
obtained are accurate, fair and representative of the skills
and knowledge of the candidates. So, the monitor's
memory, that is, their ability to remember past incidents
and detect suspicious patterns [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] of behavior, can
improve the reliability of online monitoring.
      </p>
      <p>or   , =</p>
      <p>
        1
1+ −  ,


 , (Eq 6)
In addition, the degree of confidence of candidate i during
an interaction k in a context c in online monitoring considers
the measure of credibility and reliability that the online
monitoring system grants to candidates. However, this
degree of confidence [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] will be determined by the
following factors: the candidate's past behavior, the
consistency of their responses, the authenticity of their
actions and compliance with predefined rules.
      </p>
      <p>
        But the anomalous element of surveillance is essential for
detecting suspicious activity, identifying potential threats,
preventing fraud, improving accountability [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and
analyzing emerging trends. By integrating anomaly
detection mechanisms into our model, we strengthen
security and effectively protect our digital assets and their
users against surveillance threats. For the abnormal factor
refers to the ability of our model to detect and report
behavior or activity that deviates from the norm or he is
considered unusual or suspicious. Indeed, a calm and
organized atmosphere builds confidence, while a chaotic or
stressful environment can undermine confidence [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The

abnormal factor   , is given in (7).
      </p>
      <p>, = 1 −  − ∑ =1(</p>
      <p>,   ∆ ) (Eq 7)
θ is a factor of forgetting. The forgetfulness factor refers to
the ability of the monitoring system to consider the time
elapsed since the collection of a certain piece of data took
place. As a result, it is essential to understand that not all
information maintains the same relevance or value over
time. Thus, the forgetting factor comes into play to
determine when and how data should be forgotten,
updated or archived in our monitoring system.
[acc →1] if the behavior is normal. 
ɛ [O,1],
 , determines the gap in an interaction between the
∆ =  −  
interaction.</p>
      <p>
        (Eq 8) where   is the time of the   è
Let's mention the latency factor in online monitoring refers
to the period between the detection of a suspicious event
or activity and the intervention or decision-making of the
monitor or automated system. Thus, this waiting time can
have a significant impact on the effectiveness and efficiency
of online proctoring. The latency [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] factor in online
monitoring refers to the amount of time between the
detection of a suspicious event or activity and the
intervention or decision-making of the
monitor or
automated system [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Adequate wait time allows the
supervisor to make informed and accurate decisions with
sufficient information to assess the situation. Therefore, a
hasty reaction [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] due to too short a waiting time can lead
to hasty decisions or errors in judgment. The waiting time
factor is evaluated using the following formula in (9).
      </p>
      <p>, = 1 −  − ∑ =1(</p>
      <p>
        ,   ∆ ) (Eq 9)
In other words, stability in (10) refers to the ability of a
monitoring system to maintain consistent and reliable
performance [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] under varying and changing conditions.
Thus, it is crucial to ensure consistent, reliable and secure
system performance, as well as to ensure the accuracy and
reliability of monitoring measurements over time.
A strong proctor memory can also help detect anomalies or
unusual behavior that could indicate
malicious or
fraudulent activity by questioning the proctor's experience.
Based on these, the monitor can more quickly identify alarm
signals and take preventive measures to maintain the
stability of the system affiliated with reliability by impacting
the confidence level factor [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The stability in (10) is
calculated based on the following formula:
   = 1 −  =1
∑
  ,
(|
  , −1
 , +1−   , |) (Eq 10)

This is why the evaluation of the local confidence of the
supervisor is evaluated in (11) which requires the histories
concerning the expertise of the stakeholders (monitoring
and supervisor) combined with current and historical [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]
factors to assess the level of confidence. A confident
supervisor will intervene appropriately and proportionately
if suspicious behavior occurs.
      </p>
      <p>_   ( ) =  
, . 
_   ( ) +  ℎ , . ℎ
_   ( )
(Eq 11)
ℎ _   ( ) = ∑
  , ( 
 =1
 ,</p>
      <p>
        ∑
  ,
 =1  
) (Eq 12)
The history is evaluated against a series of data relating the
reliability standardized to the factor of waiting time or
forgetting throughout the session. In our context [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] the
defined time interval is 0.5.
  = 2−( −  , ) (Eq 13)
_   ( ) = ( . 5 +  (ℎ , ). (  ,  , − 0.5)) .  (Eq 14)

Although the invigilator may detect abnormal or suspicious
behavior [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] and intervene or monitor candidates more
closely. Therefore, the behavior of a supervisor, fluid and
respectful communication with candidates indicate mutual
trust, while a tense or conflicting conversation can be a sign
of a lack of trust. So, the latter can lead to increased anxiety
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] or suspicion and create tense dynamics between
stakeholders.
      </p>
      <p>
        The latter can become nervous, which can paradoxically
lead to even more suspicious behavior [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] or to involuntary
errors, reinforcing the impression of abnormality. Since
many detected deviations may force the monitor to apply
more severe corrective or disciplinary measures, thereby
increasing the difference in stakeholder behavior. Although
this may include more interrogations, identity checks or
trips to the examination room, or even sanctions [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
 (ℎ , ) = {
 = {
1,  
0, 
⋋ ℎ2,  0 ≤ ℎ ≤ 2√2⋋
      </p>
      <p>1
1, 

 ,  , &gt; 0.5</p>
      <p>
        (Eq 16)
That is why the memory [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] of the supervisor plays a key
role in the reliability and stability of the monitoring control
work, which facilitates the detection of deviations [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], the
ability to adapt to changes, consistency decisions and the
development of supervisor skills. Strong memory can
improve the overall performance of the system and
increase its ability to meet the ever-changing challenges
[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] of surveillance. The memory will allow:
- Recognize the faces and voices of students authorized to
take the exam. Because this can help detect any
unauthorized presence or identify suspicious behavior.
- Detect unusual behaviors in students, such as constant
head movements, frequent glances at another screen, or
suspicious [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] facial expressions, which could indicate an
attempt at cheating.
- Know the exam instructions such as rules on the use of
allowed resources, deadlines for completing each section,
etc. This can help them quickly identify any violations of the
exam rules [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Monitor the
communications
of students
who
communicate with each other during the exam, whether by
chat, video conference [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] or other means. This memory
can facilitate the detection of unauthorized collaborations.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Numerical experiments</title>
      <p>Experimental Result
number of interactions.</p>
      <p>Scenario 1: Variation in reliability as a function of the
Case 1: Number of attempts = 100, memory length = 50,
number of interactions = 10
(Eq 15)
7.</p>
      <p>Note 1: Following the simulation carried out after
scenario 1, we note that the reliability tends towards
100% when the number of interactions increases.
From 50, we are already 100% confident. Which means
that the cheating rate is almost zero when supervision
is more rigorous.</p>
      <p>The point is that reliability stabilizes as a function of the
number of iterations. As a result, it tends towards
99.99999%. The error rate has become too low:
0.000000008.</p>
      <p>Scenario 2: Variation in reliability as a function of the
number of interactions.</p>
      <p>Case 2: Number of attempts = 100,
memory length = 250, number of interactions = 100
Variation in stability as a function of memory size
Scenario 3: Variation in reliability as a function of the
number of interactions.</p>
      <p>Case 2: Number of attempts = 100, memory length = 50,
number of interactions = 10</p>
    </sec>
    <sec id="sec-7">
      <title>8. Conclusion and future work</title>
      <p>
        Ultimately, the delicacy [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] of exam monitoring no longer
needs to be demonstrated, especially since it strongly
influences the future of learners [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In other words, the
scourge of cheating partly innates to human beings in a
tendency to seek ease leads to a poor reflection of
competence [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Thus, it introduces a biased assessment of
the results of the candidates' performances. In addition, it
is important to succeed in formalizing the level of
confidence or reliability [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] of exam monitoring.
First, online consultation of exams has multiple benefits,
such as increased flexibility and accessibility for students.
However, it also raises major challenges regarding data
privacy, fairness and security. In addition, it is essential to
put in place clear protocols to ensure the integrity [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] of
exams while preserving the rights of candidates, to use
reliable technologies and to raise participants' awareness of
ethical [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] issues. To conclude, by taking these elements
into account, online monitoring [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] can be transformed
into an effective and fair tool for remote assessment [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>C. de La Higuera</surname>
            and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Pauly Harquevaux</surname>
          </string-name>
          , “
          <article-title>GTnum LS2N ”The impact of Artificial Intelligence through Open Education” #IA_EO - Methodology of the digital thematic group #IA_EO - Digital thematic groups of the Directorate digital technology for education (Ministry of National Education</article-title>
          and Youth)
          <fpage>2020</fpage>
          -
          <lpage>2022</lpage>
          ”.
          <source>February</source>
          <year>2023</year>
          . Available at: https://hal.science/hal-04002890.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y. S.</given-names>
            <surname>Baso</surname>
          </string-name>
          et al.,
          <article-title>« Reducing Cheating in Online Exams Through the Proctor Test Model »</article-title>
          ,
          <source>Int. J. Adv. Comput. Sci. Appl</source>
          ., vol.
          <volume>14</volume>
          , no 1,
          <year>2023</year>
          , doi: 10.14569/IJACSA.
          <year>2023</year>
          .
          <volume>0140139</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Chabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.-F.</given-names>
            <surname>Bercher</surname>
          </string-name>
          , “
          <article-title>Analysis and prediction of multivariate time series for monitoring the health of engineering structures”</article-title>
          ,
          <source>in GRETSI 2023, XXIX Francophone Treatment Conference du Signal et des Images</source>
          , Grenoble, France,
          <year>August 2023</year>
          . Available at: https://hal.science/hal-04174436.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Allen</surname>
          </string-name>
          et J. Seaman, « Grade Change:
          <article-title>Tracking Online Education in the United States »</article-title>
          , Babson Survey Research Group, janv.
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Romero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Aloui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Heiser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Galindo</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Lepage</surname>
          </string-name>
          , “
          <article-title>A brief overview of resources, practices and actors in AI and education</article-title>
          ”,
          <source>Université Côte d'Azur, Research Report, Apr</source>
          .
          <year>2021</year>
          . Available at: https://hal.science/hal-03190014
          <source>[</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Rabiha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. H.</given-names>
            <surname>Kartowisastro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Setiawan</surname>
          </string-name>
          , et W. Budiharto, «
          <article-title>Survey of Online Exam Proctoring Model to Detect Cheating Behavior based on Face Recognition »</article-title>
          ,
          <source>in 2022 8th International Conference on Systems and Informatics (ICSAI)</source>
          ,
          <year>déc</year>
          .
          <year>2022</year>
          , p.
          <fpage>1</fpage>
          ‑
          <lpage>7</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICSAI57119.
          <year>2022</year>
          .
          <volume>10005488</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>I. Y.</given-names>
            <surname>Jung</surname>
          </string-name>
          et H. Y. Yeom, «
          <article-title>Enhanced Security for Online Exams Using Group Cryptography »</article-title>
          ,
          <source>IEEE Trans. Educ.</source>
          , vol.
          <volume>52</volume>
          , no 3, p.
          <fpage>340</fpage>
          ‑
          <lpage>349</lpage>
          , août
          <year>2009</year>
          , doi: 10.1109/TE.
          <year>2008</year>
          .
          <volume>928909</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y. K.</given-names>
            <surname>Aini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Saleh</surname>
          </string-name>
          , et H. A. Darwito, «
          <article-title>Implementation of Background Subtraction Method to Detect Movement of Examination Participants »</article-title>
          ,
          <source>in 2020 International Electronics Symposium (IES)</source>
          ,
          <year>sept</year>
          .
          <year>2020</year>
          , p.
          <fpage>494</fpage>
          ‑
          <lpage>500</lpage>
          . doi:
          <volume>10</volume>
          .1109/IES50839.
          <year>2020</year>
          .
          <volume>9231922</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Abdulrahman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Tout</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ould-Slimane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mourad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Talhi</surname>
          </string-name>
          , et M.
          <article-title>Guizani, « A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond »</article-title>
          , IEEE Internet Things J., vol.
          <volume>8</volume>
          , no 7, p.
          <fpage>5476</fpage>
          ‑
          <lpage>5497</lpage>
          , avr.
          <year>2021</year>
          , doi: 10.1109/JIOT.
          <year>2020</year>
          .
          <volume>3030072</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <article-title>Associate Professor of Counselor Education, St</article-title>
          . John's University, Utopia Parkway, Queens, New York. et G. Cicco, «
          <article-title>Building Effective Supervisory Relationships in the Online Counseling Course: Faculty And Student Responsibilities », -</article-title>
          <string-name>
            <given-names>Manag. J.</given-names>
            <surname>Sch</surname>
          </string-name>
          . Educ. Technol., vol.
          <volume>10</volume>
          , no 2, p.
          <fpage>1</fpage>
          ‑
          <lpage>8</lpage>
          , nov.
          <year>2014</year>
          , doi: 10.26634/jsch.10.2.2968.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. N.</given-names>
            <surname>Haitaamar</surname>
          </string-name>
          , et A. Benkrid, «
          <article-title>Baseline Estimation in Face Detection for AI Proctored Examinations through Convoluted Neural Networks »</article-title>
          , in 2023 International Conference on IT Innovation and
          <article-title>Knowledge Discovery (ITIKD)</article-title>
          ,
          <source>mars 2023</source>
          , p.
          <fpage>1</fpage>
          ‑
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/ITIKD56332.
          <year>2023</year>
          .
          <volume>10100328</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Hadjipavlou</surname>
          </string-name>
          , «
          <article-title>Big data, surveillance et confiance : la question de la traçabilité dans le milieu aéroportuaire », phdthesis</article-title>
          ,
          <source>Université Côte d'Azur</source>
          ,
          <year>2016</year>
          . Consulté le: 14 mai
          <year>2024</year>
          . [En ligne]. Disponible sur: https://theses.hal.science/tel-01592865
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>« Qu'est-ce que l'examen en ligne : une vue d'ensemble | Constructor »</article-title>
          .
          <source>Consulté le: 14</source>
          mai
          <year>2024</year>
          . [En ligne]. Disponible sur: https://constructor.tech/fr/blog/what-is-aiproctoring
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>D. P. D. Dayananda</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Vasanthapriyan</surname>
            ,
            <given-names>K. G. L.</given-names>
          </string-name>
          <string-name>
            <surname>Chathumini</surname>
          </string-name>
          , et M. A.
          <string-name>
            <surname>C. S</surname>
            . S. Fernando, «
            <given-names>A Systematic</given-names>
          </string-name>
          <string-name>
            <surname>Literature</surname>
          </string-name>
          <article-title>Review on Online Exams in COVID-19 Pandemic: Assessment Methods, Students' Preferences, Dishonest Behaviors and Challenges in Online Exams », in 2021 From Innovation To Impact (FITI), déc</article-title>
          .
          <year>2021</year>
          , p.
          <fpage>1</fpage>
          ‑
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/FITI54902.
          <year>2021</year>
          .
          <volume>9833059</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Maniar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sukhani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Shah</surname>
          </string-name>
          , et S. Dhage, «
          <source>Automated Proctoring System using Computer Vision</source>
          Techniques », in 2021 International Conference on System,
          <article-title>Computation, Automation and Networking (ICSCAN), juill</article-title>
          .
          <year>2021</year>
          , p.
          <fpage>1</fpage>
          ‑
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICSCAN53069.
          <year>2021</year>
          .
          <volume>9526411</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Coghlan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Miller</surname>
          </string-name>
          , et J. Paterson, « Good proctor or “Big Brother”?
          <source>AI Ethics and Online Exam Supervision Technologies », 15 novembre</source>
          <year>2020</year>
          , arXiv: arXiv:
          <year>2011</year>
          .07647. Disponible sur: http://arxiv.org/abs/
          <year>2011</year>
          .07647
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Qureshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. S.</given-names>
            <surname>Chaudhery</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Patil</surname>
          </string-name>
          , et S. Correia, «
          <article-title>Honest Grade - An Online Education Platform », in 2021 Smart Technologies, Communication and Robotics (STCR), oct</article-title>
          .
          <year>2021</year>
          , p.
          <fpage>1</fpage>
          ‑
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/STCR51658.
          <year>2021</year>
          .
          <volume>9589013</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Aziz</surname>
          </string-name>
          et F. Meyer, « Étude de l'impact de l'usage de l'
          <article-title>intelligence artificielle dans une plateforme de formation en ligne »</article-title>
          ,
          <source>Solidar. Numér. En Éducation Une Cult. En Émerg.</source>
          , vol.
          <volume>31</volume>
          . Disponible sur: https://www.academia.edu/download/89653706/Ac tes_du_Colloque_ROC2021.pdf#page=
          <fpage>42</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Nugroho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abdurohman</surname>
          </string-name>
          , et B. Erfianto, «
          <article-title>Increasing Automatic Proctoring System Performance using Distributed Round-Robin Load Balancer »</article-title>
          ,
          <source>in 2023 IEEE International Conference on Industry 4</source>
          .0,
          <string-name>
            <given-names>Artificial</given-names>
            <surname>Intelligence</surname>
          </string-name>
          , and Communications Technology (IAICT),
          <year>juill</year>
          .
          <year>2023</year>
          , p.
          <fpage>377</fpage>
          ‑
          <lpage>382</lpage>
          . doi:
          <volume>10</volume>
          .1109/IAICT59002.
          <year>2023</year>
          .
          <volume>10205750</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>A. M. Tripathi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Kasana</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Bhandari</surname>
          </string-name>
          , et N. Vashishtha, «
          <article-title>Online Examination System »</article-title>
          ,
          <source>in Smart Trends in Computing and Communications</source>
          , vol.
          <volume>286</volume>
          ,
          <string-name>
            <surname>Y.-D. Zhang</surname>
            , T. Senjyu,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>So-In</surname>
          </string-name>
          , et A. Joshi, Éd.,
          <source>in Lecture Notes in Networks and Systems</source>
          , vol.
          <volume>286</volume>
          . , Singapore: Springer Singapore,
          <year>2022</year>
          , p.
          <fpage>709</fpage>
          ‑
          <lpage>717</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-4016-2_
          <fpage>67</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>A. M. Al-Nuimi et G. J. Mohammed</surname>
          </string-name>
          , «
          <article-title>Face Direction Estimation based on Mediapipe Landmarks »</article-title>
          ,
          <source>in 2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)</source>
          ,
          <source>août 2021</source>
          , p.
          <fpage>185</fpage>
          ‑
          <lpage>190</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCITM53167.
          <year>2021</year>
          .
          <volume>9677878</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yuan</surname>
          </string-name>
          , et A. Hauptmann, «
          <article-title>Massive Open Online Proctor: Protecting the Credibility of MOOCs certificates »</article-title>
          ,
          <source>in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing, in CSCW '15</source>
          . New York, NY, USA: Association for Computing Machinery, févr.
          <year>2015</year>
          , p.
          <fpage>1129</fpage>
          ‑
          <lpage>1137</lpage>
          . doi:
          <volume>10</volume>
          .1145/2675133.2675245.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J.</given-names>
            <surname>Londoño-Cardozo</surname>
          </string-name>
          , «
          <article-title>The evolution of accounting practice in the age of artificial intelligence: challenges and opportunities for higher education in public accounting », avr</article-title>
          .
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Gumbo</surname>
          </string-name>
          , «
          <article-title>Online or offline supervision? Postgraduate supervisors state their</article-title>
          position at University of South Africa »,
          <string-name>
            <given-names>South</given-names>
            <surname>Afr</surname>
          </string-name>
          .
          <source>J. High. Educ.</source>
          , vol.
          <volume>33</volume>
          , no 1
          <issue>, avr</issue>
          .
          <year>2019</year>
          , doi: 10.20853/33-1-2673.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhu</surname>
          </string-name>
          , et D. Li, «
          <article-title>Blockchain Empowered Reliable Federated Learning by Worker Selection: A Trustworthy Reputation Evaluation Method »</article-title>
          ,
          <source>in 2021 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)</source>
          ,
          <source>mars 2021</source>
          , p.
          <fpage>1</fpage>
          ‑
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/WCNCW49093.
          <year>2021</year>
          .
          <volume>9420026</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>F.</given-names>
            <surname>Castagnino</surname>
          </string-name>
          , «
          <article-title>Critique des surveillances studie s. Éléments pour une sociologie de la surveillance »:, Déviance Société</article-title>
          , vol. Vol.
          <volume>42</volume>
          , no 1, p.
          <fpage>9</fpage>
          ‑
          <lpage>40</lpage>
          , mars
          <year>2018</year>
          , doi: 10.3917/ds.421.0009.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Coghlan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Miller</surname>
          </string-name>
          , et J. Paterson, «
          <article-title>Good Proctor or “Big Brother”? Ethics of Online Exam Supervision Technologies »</article-title>
          , Philos. Technol., vol.
          <volume>34</volume>
          , no 4, p.
          <fpage>1581</fpage>
          ‑
          <lpage>1606</lpage>
          , déc.
          <year>2021</year>
          , doi: 10.1007/s13347-021- 00476-1.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>