Translate this page into:
Statistical probability prediction model for E-Learning and realtime proctoring using IoT devices
*Corresponding authorE-mail address: nayyar@su.edu.sa (N. Khan)
-
Received: ,
Accepted: ,
Abstract
Video processing and surveillance are becoming an integral part of everyday life. The existence of intelligent surveillance systems worldwide is growing day by day. Data collected by Internet of Things (IoT) devices streams over the internet and is analyzed for security purposes. Several systems can make decisions based on intelligent monitoring. This study focuses on the meticulous statistical validation of the prescribed model, which is analyzed using explainable artificial intelligence techniques to distinguish between suspicious activities at higher education institutions during the proctoring process. The framework proposed in this study is further trained and analyzed using a new probabilistic prediction function based on Markov Chain and probability analysis. An open-source dataset is considered for testing and training the model to detect any suspicious activity by students during cheating in the exam room. This model utilizes IoT devices to offer a powerful approach to instructor-free proctoring. The model proposes utilizing artificial intelligence to analyze data streamed from the IoT-enabled devices. The model is trained using popular models to ensure a high level of performance. The probability analysis for statistical data extracted from various video frames is compiled at the server end to ensure real-time proctoring with safety. The proposed model was tested and yielded a considerable outcome for real-time proctoring prediction.
Keywords
Assessment
Education
IoT
ML
Probability
1. Introduction
The global education system places a strong emphasis on examinations throughout the educational cycle. Examinations are a proper means of assessment for delivering knowledge and acquiring information by students. Several techniques are used to conduct examinations. Following the COVID-19 pandemic, several new methods have been introduced in the examination policies (Alsulami et al., 2021; Khan 2022). The online examination has experienced growth during this phase. Technology for monitoring examinations enables teachers and organizations to conduct multiple examinations in a fraction of a second (Alin et al., 2023). The evaluation of the student results is very fast, and so is the deliver. The administrative handling of the examination at the institutional level ensures that human intervention is used during the proctoring of the exam. The traditional teaching and examining mode includes proctors and invigilators for conducting examinations within local boundaries. In this methodology, no proctors are involved in calculating these examinations, and reporting is done directly at the administrative level. Human beings have acquired comprehensive information and skills during proctoring. The invigilators observe the use of information retrieved from movements, such as body parts, to identify appropriate means of examining and answering the exam. Several researchers have identified this problem and reported that the Academy is cheating on a broader level. Since it is not feasible for an individual invigilator to manage all the proctoring by themselves, artificial intelligence and the use of technology can be one solution for administering examinations at the academic level (Clark 2023). The Internet of Things (IoT) has found significant applications in artificial intelligence to examine students (Shrivastava et al., 2023) properly. It reduces the burden on the individual to manage and monitor the proctoring. (Miller et al., 2017) have addressed several cases related to academic cheating at different levels. Gesture recognition is one of the most essential aspects of this model.
(Feng et al., 2017) reported several gesture recognition systems for smart homes where the output is generated based on human gestures. However, in the case of a university examination environment, gesture recognition is important but has a limited scope. To enhance the quality of working and living at individual homes (Ternes et al., 2019) suggested an interesting model. Several applications indicated by (Ternes et al., 2019) contain the detection of human beings involved based on their specific gestures and body movements. Detecting humans in well-known places is one of the most important tasks that an artificial intelligence system performs (Khan et al., 2023). Places like airports, worship centers, cafeterias, metro stations, bus stands, malls, cinemas, universities, and schools are equipped with intelligence software to ensure smooth operations and conduct of events (El-kenawy et al., 2021; Khan et al., 2021; Gašević et al., 2023). The post-COVID-19 era began with an increase in online student examinations. The activities performed to ensure safe installation and protect student privacy were indeed one of the most essential parts of the system operations. Various worldwide organizations proposed several solutions to ensure safe examinations. However, the students used digital techniques to bypass the examination in intelligent ways. Several gestures like watching sideways, using mobile phones, looking at the front for answers, referring to notes secretly, using smartwatches, and asking a friend nearby are some of the use cases (Cotton et al., 2023) recorded as inappropriate means. Since the beginning of these sessions, post-COVID-19, e-learning has become an integral part of the teaching system (Segbenya and MensahMinadzi 2023). The activities performed by students and teachers on one-learning platforms give rise to several problems associated with examinations. There is a significant need for a reliable model that can identify and track inappropriate cheating practices.
There is considerable scope for developing a comprehensive solution for a technique that involves proctoring using artificial intelligence and machine learning (ML) (Singh 2018). Immediately after COVID-19 ended, the routine of universities and schools returned to normal. However, a new learning era has been established, known as blended learning (Truss and Anderson 2023). The applicability of blended learning is an amalgamation of online and offline learning, as examined in (Imran et al., 2023). Several courses have found the applicability of learning online and taking examinations at institutional premises (Xu et al., 2023). Blended learning is beneficial for courses that require two-way communication and a straightforward teaching approach. However, examination remains a problem at the final level. Various researchers have developed independent models to ensure the examination is conducted safely and securely. A deep learning model can process the video and images of a student to identify and detect anomalous behavior. Several activities can be compared and securely managed by these devices simultaneously to prevent illegal practices during the examination. There are several ways in which students try to misbehave during the examination. It includes gestures such as watching in front of the student sheet, watching sidewise, whispering sounds to ask for answers, similarity of uniform for detection, problems with lighting, blurred images due to low camera quality, and several technical issues related to seamless data flowing across the network for proctoring online students. Several factors may contribute to the model’s failure in some instances. It includes excessive lighting, different sizes of objects, obstacles in between vision, variable clothes and addresses of the students, a computational time during the monitoring done with the help of the model, and exchange of objects like pen and calculator in the classroom during examination etc. to overcome the associative problems, with the target to design and develop a self-sufficient model which makes use of deep learning extraction methods to identify any irregular activity by the students during the compromise proctoring.
The architecture proposed for deep learning is a convolutional neural network (CNN)-based system. The architecture’s multiple layers facilitate feature acquisition for deep learning as shown in Fig. 1. The model is trained using several datasets to ensure its efficacy (Keresztury and Cser 2013; Topîrceanu 2017; Khan et al., 2025). Datasets are used to classify and create a new dataset for the testing and training of the model. The model utilizes a CNN network trained with the help of the above datasets to recognize illegal or suspicious activities that may be occurring in the examination hall. The feature selection and sub-selection are done with the help of the entropy and coded Ant Colony System (ACS) System proposed by Saba et al., 2021. The proposed work corresponds to several sections that are written in this manuscript. The initial section of the introduction and literature review comprises the crucial aspects that led to the design and development of the system proposed in this architecture (Khan et al., 2024). The methods and materials section focuses entirely on developing the system under consideration in this study. Furthermore, the results and discussion section focus on the output of the testing and training for the model proposed in this paper. The paper’s conclusion comprises a summary of the complete work and its emphasis, including future work. Since this model is in its infant stages, we are undergoing pilot development. The future work also includes the testing of the system under ethical considerations from the entire stakeholders to ensure its legitimacy and address privacy issues. The impact of technology-driven proctoring might lead to a consequence on the students mind (Lee and Fanguy 2022). The future work responds to all these privacy and ethical concerns.

- Technical architecture for the proposed system.
2. Literature Review
Following the COVID-19 pandemic, almost all educational institutions transitioned from offline to online operations. Blended learning became a new trend in the academic field since then. Various researchers and organizations have developed several systems to conduct successful student examinations (Alshahrani et al., 2023). These systems can examine candidates without requiring online observation. The use of such systems was introduced with the advent of e-learning by organizations. These factors were evaluated, and it has been observed that this type of evaluation was temporary. The review did not perform an exclusive and thorough evaluation of the students. The systems developed made use of online assessment without observing the candidate.
2.1 E-Learning
According to (Güllü et al., 2014; Liu and Yu 2023), e-learning is “the use of information and communication technologies to improve the quality of learning by enabling access to resources and services, as well as remote exchange and collaboration.” Additionally, it is defined as a range of platforms and applications used to deliver training and educational processes to students (Alqahtani and Rajkhan 2020). There is a rapid development in e-learning platforms, which leads to changes in education methods and the transfer of resources to students (Kong et al., 2023). Consequently, innovative technologies have been utilized in e-learning platforms to enhance learning effectiveness (Gamalel-Din 2010; Udupi et al., 2016; Hsu et al., 2018; Tsipianitis et al., 2025). E-learning is a brilliant innovation that enables students to access numerous resources under the guidance of instructors (Ghashim and Arshad 2023; Adel 2024). It has been confirmed that e-learning plays a key role in educational activities because it uses modern technologies in teaching (Maatuk et al., 2022). Some advantages of e-learning for students or universities include saving time and effort, enabling them to manage educational activities more easily, and accessing resources quickly (Ms and Toro 2013; Gautam 2020; Mukhtar et al., 2020). Additionally, it can reach all audiences, offering flexibility, functionality, and accessibility (Ghashim and Arshad 2023). E-learning enables institutions to accurately evaluate their students’ progress and ensure their skills and knowledge (Chang 2016). It has been confirmed that e-learning enhances traditional learning by making students’ resources and materials more accessible (Haryono et al., 2023).
Smart Homes, Healthcare 5.0, Blockchain, IoMT, IDS and other technologies are spreading across the globe (Khan et al., 2024). IoT is a set of devices using the Internet to communicate and locate each other (Ghashim and Arshad 2023). IoT is considered one of the innovative technologies that contribute to enhancing society (Wang et al., 2023). There are several key characteristics of the IoT, including dynamic changes, intelligence, interaction, heterogeneity, connectivity, enormous scale and sensing (Al-Taai et al., 2023). IoT can transform classic education paradigms by enabling the development and management of educational activities within institutions through the creation of materials and the facilitation of student participation (Ghashim and Arshad 2023). IoT has three components: hardware (actuators, embedded communication tools and sensors), Middleware (devices to process that store the data), and interpretation and visualization devices (Gubbi et al., 2013). The essential work of IoT is to sense the data through tags and sensors and send it to the cloud system. There are several types of IoT interactions that involve objects, including object-to-machine, object-to-object, and machine-to-machine interactions. There are three layers of IoT structures in education: application, network, and perception layers (Fig. 2) (Gubbi et al., 2013).

- Steps in feature extraction and classification on third party data set (Gubbi et al., 2013).
Internet of Educational Things (IoET) is defined as IoT devices that are used by institutions to enhance infrastructure, teaching, and academics, as in Fig. 3.

- IoET adapted from (Desk 2018).
Now, classrooms in educational institutions utilize IoT tools in academic activities, such as cameras, Radio Frequency Identification devices (RFID), and sensors. (Shaqrah and Almars 2022). Utilizing IoT in educational activities offers several advantages, including enhanced communication between students and instructors, effective management of the educational process, and improved learning outcomes (Ali et al., 2023). Academic institutions use IoT to create an innovative campus, enhance and develop educational systems, and expand on-campus services, including transportation, security, and energy consumption (Sneesl et al., 2022; Din et al., 2023; Fernández-Batanero et al., 2024; Rao and Elias-Medina 2024). It has been asserted that IoT is essential, providing a bright object in e-Learning systems shown in Fig. 4 and proposed by (Bayani et al., 2017).

- IoT services architecture in education (Bayani et al., 2017).
2.2 Technical architecture
The ideology used in this study tends to converge the use of IoT Devices by E-Learning and Examination systems. Modern computational units such as Raspberry PI and Arduino play a significant role in this architecture. CNNs are the fundamental backbone of deep learning. Various applications utilize CNNs to yield value-added output and impressive results (Alangari and Khan 2021). Multiple applications, such as text mining, image information extraction, handwriting text mining, and optical character recognition from old manuscripts, utilize the CNN architecture. Several layers are introduced and added to the existing layers in various CNN architectures. One of the studies suggested by George and Prakash 2018 focuses on enhancing the existing CNN values with new layers. Several datasets contain CNN applications for identifying human faces and recognizing faces from blurred images. Several researchers have been working to detect the appearance of human figures using trained networks. These networks make use of comparisons with the existing pictures within the training dataset. These datasets are used to test the accuracy of the trained model. A nearly 73.1% accuracy is achieved by various trained models suggested by (Mabrouk and Zagrouba 2018). (Mabrouk and Zagrouba 2018) The model’s accuracy was enhanced up to 75% when a neural network was applied to it. Several additional studies are working in a similar dimension. (Booranawong et al., 2018) suggested that various use cases use deep learning to ensure better results under several circumstances. The author’s experiments reveal various groupings in which adjustments can lead to proper results based on the previous inputs into the neural network layer.
Various algorithms and new techniques have been designed in the block to classify the images and video files. Detection of objects and the classification of multiple scenes are widespread in all the models proposed (Feng et al., 2017). The most commonly used descriptors in identification and classification were presented by (Ternes et al., 2019). The main idea behind the classification was to identify several features and commonly track anything found suspicious. The semantic ideas used to identify these images use image classification (Hsu et al., 2018). These classifiers are determined based on the adaptation of the neural network model. Frames and videos are identified in the model, which are challenging to understand in real life. The models prescribed in the previous cases utilize human intervention and object identification based on human-defined features. The data set comprising the objects was of limited size and did not cover all the aspects. Various researchers propose several low-level feature extraction models for object detection and its classification. The methodology used for detecting and recognizing students appearing in the examination in the real world comprises all the above-stated possible solutions. Identifying human activity in the classroom, recognizing its nature and significance, and categorizing it using various methods are integral to this study.
Cheating in examinations is a widespread phenomenon observed at several educational levels. Various researchers suggest that the availability of exam-related datasets and information is crucial for identifying inappropriate cheating methods. However, most research presented and published comprises static datasets not under computer vision techniques. There is a broad scope for introducing the identification of human activities in the classroom using computer vision recognition frameworks. Therefore, the real-time installation technique model presented in this study investigates a robust model that is helpful for the comprehensive diagnosis of Procter with minimal invasiveness. The unlawful exam attempts for students across any university in the world prohibit a student from appearing in the examination after he has been found cheating. We examined the code of conduct for the students appearing in an examination as outlined in the National Quality Framework of Saudi Arabia, along with the code of conduct for the invigilator. To ensure that the invigilator conducts the investigation properly, we aim to design a system that follows all the codes of conduct prescribed by the Ministry of Education of Saudi Arabia. Various features are considered before designing this model to ensure the applicability of the code of conduct. The entire room is regarded as the workspace for deploying the IOT devices, which is part of this architecture. Recent research has been done to provide and identify a complete model for detecting human activities across any domain.
Human activity identification is done by Hsu et al., 2018, which uses bargain detection. Several models incorporate useful features. These models cannot account for all possible situations in which information and accuracy can be lost during proctoring. Booranawong et al., 2018 suggested the two-dimensional CNN model. Noah et al., 2018; Agarwal et al., 2019; Du et al., 2019; Jalal et al., 2019 use CNNs to identify human activity and predict the possible situation. The object detection in these studies ensures the use of CNN to provide accurate prediction values. Human detection, as suggested by Noah et al., 2018; Al-Taai et al., 2023; Truss and Anderson 2023; Xu et al., 2023, utilizes new techniques that integrate areas with features such as size and human indicators. In several CNN models reported by various authors, a very high level of information is captured in every frame instance. The technique for fusion is applied in this case, including early and late detection. Some researchers have also investigated the use of temporal information for human detection (Jalal et al., 2019). Several enhanced authors, those who utilize 3-D classification of images from videos, also create advanced-level models. The supervised training of the model proposed by the researchers ensures that around 25% to 55% annotations can be achieved. For fully supervised architectures, the performance is enhanced abruptly (Kong et al., 2023). New features like identification of text from the images and videos, cognitive abilities like speech, identification of natural language from the photo and video frames, and the analysis of the labelling for the images are introduced with the help of a fully supervised architecture (Agarwal et al., 2019).
3. Materials and Methods
3.1 System setup
The general setup for creating an environment to test the identification of individual behavior during suspicious performance is made with the help of the Raspberry PI 4B model, which can connect to the wireless network. The integration of several circuits from four dimensions collects the video feed for the proctoring. The proposed model connects the circuit with the help of a high-definition camera and captures continuous motion. The video frames are passed to a training dataset for testing of posture detection. The prediction of suspicious activity from various students’ postures is possible with the help of the data collected by these cameras. The small computational unit can process the data collected by the high-definition camera in real-time.
The complete set is collected with the help of a wireless network to a centralized server system. As shown in Fig. 5, the dataset is used to detect any suspicious activity across the complete frames received.

- Experimental setup for the proposed model.
The experimental setup relies on the use of edge devices and their integration with a computational unit for processing the input collected from the video sources. Since the project is related to its initial considerations, system integration with the devices is handled using the latest hardware. We have provided a computational unit, Raspberry Pi 4B, integrated with a high-end device for competition. 32 GB RAM, 8 GB graphics card, and an i7 Processing unit with 512 GB of SSD Memory enable fast execution to provide the least latency issues under processing. Since the surveillance cameras are installed at variable locations in the surveillance room, they are integrated with the edge computing device using wireless communication techniques. It ensures that the information flow is seamless and that minimal resistance is offered during the transfer of data through cable connections. Due to the wireless nature of the entire setup, the maintenance and logistics are well-suited to the requirements. The real deployment of the system can conduct surveillance and proctoring with minimal delay in the processing. However, the institute’s infrastructure remains a constraint. Once the product is successfully deployed, it is expected that the organization will provide funds for achieving technologically driven proctoring. The maintenance issue for the complete experimental model requires minimal effort, and the hardware involved in the experiment is relatively inexpensive. This ensures that the model is more likely to be adopted on financial grounds as well.
3.2 Data collection
The data sets used for training the model are third-party datasets passed to the entire logical code, as suggested by (Gupta and Agarwal 2023). EfficientNet, SPNASNet, EfficientNet, and MobileNet datasets were studied for the eligibility of the proposed model. The progression of modern classification involves categorizing data sets into two distinct categories: suspicious and non-suspicious. All the images trained with the dataset contain suspicious activities that the students can perform during the examination. The data used in this model training is labelled with the help of a data labelling technique. In this case, we have labelled the data for the input and output services. The prediction behavior for the future is facilitated with the help of data enablement, ensuring that both the input and output data sets are examined. The entire data set was classified into two classes, and 15 features were extracted during the training process. A predefined ImageNet dataset was used to train the complete model. Among all the selected ones, the most essential features are considered for training the complete model. These features are classified to identify the best methods required for detecting suspicious activity in the classroom.
Predicting behavior for any specific person typically involves several computational techniques using CNN and computer vision. The preprocessing of video content involves several elements, including frame extraction, resizing, and normalization. With the help of the preprocessing stage, the computational unit can receive the image. Feature extraction for the predicted system comprises object detection, pose estimation, and action recognition models. In our case, object detection is performed using the Faster R-CNN technique to locate various objects within the video frame received from the computational unit. In this case, we offer an algorithm that utilizes OpenPose and media points to analyze human body points and poses. A pre-trained model is used to recognize the complete actions performed by humans. ResNet is used to identify various patterns across the availability of multiple frames captured by the high-definition camera.
Since we are proposing an analytical reasoning approach for a predictive model of posture detection for suspicious activity, proctoring is facilitated with the help of IoT devices. The behavior is assumed to be a function related to time sequences of image frames in the form of a video. Temporal analysis utilizes the curriculum network to capture the dependencies between frames concerning the predictive behavior as prescribed in the neural network. This model enables supervised learning, where the data is labelled with various features and classified into suspicious or nonsuspicious activity. This classification model using CNN explained how to identify a student’s behavior for further prediction based on their posture. Since the video frames are collected for a large data set, annotation of the video is required to identify the trained patterns. The data labelling and training, in this case, are done with the help of the ResNet model, which contains several postures related to anomalous behavior by a student. To develop the model, this study makes use of OpenCV for processing the review and extracting the frames, PyTorch for building the model and training, OpenPose for the estimation of the pose acquired by the student during the examination, and MediaPipe as the backbone of posture detection and prediction.
3.3 Feasibility study
In the feasibility study, the implementation of an IoT-enabled proctoring environment is evaluated. Edge computing devices are integrated with ML algorithms to ensure that decision-making is automated and predictions are provided, facilitating the proctoring of real-time examinations in a university environment. The integration of the system deployed for surveillance, along with the existing infrastructure, will be helpful for handling digital proctoring and managing the prediction of words during assessment execution. The primary objective of the entire study is to identify the security, privacy, scalability, and assessment of examinations with the help of IoT devices and ML models.
3.3.1 Technical feasibility
The proposed input for this system comprises IP-enabled cameras, a microphone unit, and a computational system. The processing takes place at the edge-level device, the Raspberry Pi 4B, which can handle all the frames captured from the camera in the form of video. The ML models are responsible for recognizing the behavior and suspected action of the aspirant appearing in the assessment. Secure protocols are used for transmitting the video from the proctoring unit to the centralized computational unit, where processing takes place. The use of edge computing devices ensures low latency in the system, along with decentralized processing. That eliminates any dependency on cloud-based services that require a high-speed connection to the centralized server. IoT devices still have an area to be explored to run heavy models on the edge device. The learning management system provides plug-ins for integrating APIs to communicate with IoT devices and enables secure data storage units. It again reduces the complexity of cloud-based architecture integration.
3.3.2 Operational feasibility
Several scenarios can be considered for operational feasibility in this case. In our deployment, we have chosen to use multiple devices in the examination hall, which are set up with the help of a centralized monitoring unit located at the exact site. The handling done with the help of a manual support system includes the reduction of radio threshold values during validation of the project, the scoring of the alerts with a confidence level, prediction of suspicious movements by the student, alerts sent to the human proctors depending upon the behavior and running several audits for the post-assessment once the examination is completed, the off-line report regarding his insured to provide any failsafe mechanism. We deployed the edge computing device with a larger memory size to ensure complete video recording if the network fails. There is no inference of cloud-based integration to avoid the crashing of applications under abnormal circumstances of connectivity.
3.3.3 Legal and ethical feasibility
The privacy of data, in compliance with various local student data laws, is expected to be integrated into the system once a complete deployment is ensured. Since the system is in the early stages of development, the pre-consent form and opt-out protocol are expected to be integrated after complete testing and training of the model under consideration. To avoid any legal and ethical issues related to the bias in the AI model, future work will integrate a regular audit depending on the ethnicity or gender before the execution of technology-driven proctoring.
3.3.4 Risk analysis metrics
It is possible to integrate IoT-enabled devices for proctoring without human intervention in a university environment with the help of ML and artificial intelligence. As per the feasibility study shown in Table 1, the edge computing devices have good real-time performance that can be integrated with a university Learning Management System (LMS) system with the help of an Application Programming Interface (API). The prediction model proposed in this study and the shortstop accuracy and eligibility of the model to be integrated. Ethical considerations are indeed one of the most important parts to be addressed, and the compliance of this issue refers to the integration of consent forms and ethical clearance at the university level. A pilot implementation for a selective department will be considered for the initial processing of the proposed architecture. The use of such technology-driven proctoring ensures a cost-efficient and scalable solution for Martin’s examination with security and privacy concerns.
| Epochs | Training loss | Validation accuracy | Testing accuracy |
|---|---|---|---|
| Network latency | High | Low | Use local video buffer |
| ML model inaccuracy | High | Low | Re-Training the model on regular time interval |
| Student privacy | Low | High | Consent form/Ethical approvals (Future Work) |
| Integration delay | Low | Low | IT coordination for LMS integration |
| Hardware failures | High | Low | Redundant devices, failover protocols |
4. Analytical Treatment of Proposed Model
Several mathematical models are used to predict human behavior. To ensure that higher-level representations of temporal and spatial patterns are accurately recognized, mathematical tools are used. The entire process comprises several steps. Initially, the high-definition camera captures the video in real time. The computational unit is responsible for capturing and processing this video for further analysis. Several frames represent the video, and each frame is considered an image. Each frame is subjected to a matrix of variable pixel intensities marked in every frame. To reduce the complexity of the video analysis, these videos are converted to grayscale using Canny edge detection. The grayscale videos are modelled as a form of two-dimensional metrics represented with the help of various resolutions in the frame. For color-oriented videos, two-dimensional tensors are used to handle the RGB channel.
The video is a sequence of frames. Each frame is represented as a matrix of pixel intensities:
-
For grayscale videos, each frame is a 2D matrix where t denotes the frame number.
-
For color videos, each frame is a 3D tensor , where the third dimension represents the RGB color channels.
4.1 Feature extraction using analytical technique
Once the video is captured, it is necessary to split the video into individual characters and frames for further analysis using mathematical tools. The use of feature extraction from the images and the frames is required to predict the behavior of the concern. Various tools and techniques are helpful for the prediction of behavior from the video frames acquired in the previous stage.
a. Optical flow
Feature extraction is required after the video is captured as a grayscale. To perform the feature extraction, meaningful frames must be extracted from the role video data, which is collected using a high-definition camera in the computational device. The optical flow of the motion should be analyzed to extract the information. The optical flow is separately considered as the object’s motion across the frames. Analytically, it can be concluded that the velocity of different pixel intensities must be consistent with the optical flow vectors to generate proper results of the images extracted from the previous step. The temporal derivative of the complete video frames is presented with the help of the brightness consistency creation as:
Optical flow represents the apparent motion of objects in the video. It calculates how pixel intensities shift between consecutive frames.
Here:
: Rate of change in pixel intensity (Temporal Change).
and : Spatial changes in the actual pixel intensity.
: Components of the optical flow vector in vertical and horizontal direction.
b. Pose estimation
At this stage, pose estimation is identified through the detection of key points on the human body. With the help of OpenPoses API, which uses ControlNet, it is possible to determine the diffusion of the text image models. It is helpful to identify the key points in the human body, thereby converting valuable information with the help of the skeleton which represents a person. Once the key points are identified, the poses related to the skeletons are managed with the help of the OpenPoses APIs.
Detecting key points (e.g., joints) on the human body to capture pose information.
A set of 2D or 3D coordinates for key points:
c. Temporal analysis
The frames captured with computational devices and high-definition cameras help contain various features extracted from the previous steps. These features are used to analyse behavior with the help of temporal analysis. Temporal analysis represents the behavior influenced by the sequences that have taken place over time. The dependency of various frames is calculated with the help of temporal analysis. Several authors have developed multiple models for temporal analysis. This analysis is most suited to the Markov model. The model represents the activity from probabilistic reasoning and moves forward towards the prediction of the later stage. The former stage is responsible for providing the transition state from one time frame to the next time frame. Sequences of actions over time influence behavior. Temporal analysis captures this dependency. With the help of the Markov model, it is possible to predict the behavior of the frame according to the previous sequence received in the subsequent frames in the past. The equation representing the model is:
This represents the probability of transitioning from state Si to Sj
Several more accurate models were designed to ensure the compelling nature of the temporal analysis. These were the extensions to the Markov model. The Hidden Markov models, referred to as HMMs, comprise several components that can be used for temporal analysis. These components refer to the transition probabilities, emissive probabilities, and initial probabilities of all the frames extracted from the previous timestamps.
d. Hidden Markov models
The transition probabilities refer to all the probabilities responsible for the movement between the hidden states of the Markov model. The probability calculation references the frames’ transition nature from one state to another. The input from one state is responsible for the behavioral probabilistic determination of the other state. The prediction depends upon the behavior of the states. The equation referring to transition probability is:
-
Transition probabilities: Probability of moving between hidden states.
Unlike the transition probabilities, there are several more cases in which the commission probabilities are considered. These probabilities are acquired by identifying a particular frame from the complete set of inputs. The frame under consideration is taken as the reference rate, and based on it, the full frames are searched. The probability of motion between various states is observed with the help of a specific frame of all the possible hidden states. The emission probabilities are accountable for identifying spatial items across all the frames. It is most suitable for predicting behavior because any suspicious behavior can serve as a reference value and be used to identify all the frames in which the suspicion is expected to occur.
-
Emission probabilities: Observing a specific frame given a hidden state is probable.
Probability determination and prediction are achieved using initial probabilities in the distribution of various states. The frames considered for identifying specialized probabilities are checked with the help of the initial inputs given. It resembles the supervised training data set mode in which predefined rules are given for determining the trained model. The state under consideration provides the initial probabilities. These estates offer the raw input based on which the prediction can be made from the upcoming frames in the video.
-
Initial probabilities: Probability distribution of the starting states.
Probabilistic determination is one of the most potent techniques, and it is likely to identify specific behavior from the given input. The features extracted in the previous stage contain all the possible frames that can be taken as input, and with the help of the Markov model, they can provide substantial results, thereby predicting the behavior of a particular human inside the video frames.
e. Recurrent neural networks
Using recurrent neural networks (RNNs) makes it possible to identify the utilization of previous state inputs in relation to a weight factor that can be added as an additional point. Generally, the current state depends on the last time’s hidden states. To identify the behavior of often expected input, RNNs can provide a more stable prediction, as the prediction depends upon past inputs with additional weight. This type of prediction technique is mostly used in real-time prediction systems. In our case, RNN helps identify suspicious activity behavior depending on the previous states’ input.
: Stealth state of the system at time t.
Stealth state of the system at the past time.
: Input feature vector (e.g., pose key points).
: Weight value matrices.
: Value of the Bias vector term.
: Activation function.
The activation function helps identify and activate the previous layers of the RNN, which are responsible for determining the initial input and predicting the behavior of the activity. Several activation functions can be used for this purpose. However, in our case, we are trying to use the activation function, which depends on the previous states and predicts the following states.
f. Long short-term memory
Long short-term memory (LSTM) is gaining popularity because its adaptability is increasing in prediction models that require first-order processing. These models are crucial and can enable the flow of information from one node to another. Using LSTM will likely provide a powerful approach to identifying the prediction model. The control flow can be maintained and managed depending on the different layers of the previous estates. It enables a complete setup to identify the output based on fewer layers of the input. It is also a very important factor that the applicability of this model can help determine the behavior of suspicious activity.
Adds gates to control the flow of information:
In this scenario, we attempt to utilize the activation function for the LSTM model, leveraging the forget gate. The output gate explicitly values the input from the previous stages. This indicates the next stage, in which the activation can be performed depending on the gate’s value, which controls the flow of information.
4.2 Behavior classification
After identifying the features extracted from the previous stage, these features must be classified into several different classifiers. The classifiers are generated using various techniques such as logistic classification, support vector machines (SVMs), or neural networks. Once the classifiers are set, the features generated from the previous stage can be used to identify the activity and predict the behavior.
a. Linear classification
A simple logistic regression model predicts behavior classes:
Here:
x: Input feature vector.
y: Predicted behavior.
w: Weight vector.
b: Bias term.
Linear classification is a technique that can be used in the logistic regression model. This model depends upon the input vectors generated from the previous stage of the optical flow features, which vary from model to model and can be generated.
b. Support vector machine
Finds a hyperplane to separate behavior classes:
SVMs are also gaining popularity because they can separate several input classes. A classification can generally be any finite set comprising several different classes. Switching between separate classes is one of the most challenging tasks. SVMs provide a facility for managing the hyperplane using biased values.
c. Deep neural networks
Predict behavior by stacking multiple layers:
Various deep learning models can be applied to identify behavior and extract features from the video frames to generate a behavioral model. CNNs for RNN can be used with the help of weight metrics and nonlinear activation functions, which depend on the creation of the model under consideration.
4.3 Model optimization
After reducing the features and classification, a model can be trained to identify and predict a specific behavior that requires optimization techniques (Abdelhamid et al., 2023). The main feature of this optimization is to ensure that there is the least loss for any cross-entropy that might occur (Akram et al., 2024; El-Kenawy et al., 2024). There are several algorithms to identify and minimize the loss with the help of various features as per the equation below:
To train a predictive model, minimize a loss function:
Here:
W: Value of parameter for the model at any step (t).
: Rate of model learning.
: Loss function gradient in contrast with .
The current value of any specific parameter and the model’s learning rate (LR) can yield a gradient of loss for the parameters under consideration. The prediction function represented in this study is elaborated to identify the behavior of suspicious activity with the help of the patient, as given below. Integrating past probabilities with reference from the features selected and behavioral classification can determine the future predictive probability. There are several cases in which no specific irregular misconduct activity has been identified. In this case, the probability cannot be defined and remains unaltered.
4.4 Analytical treatment for the proposed model in prediction:
Case I: If t = 0
Case II: if t = t > 1
Complete value is the Summation of the results:
However,
Case I: for at t > 0
Case II: for t = 0
Case III: for t =1
Split Probability Approach for the proposed architecture:
The integration of complete probability analysis is split into several consecutive integrals. The complete response of the probability is achieved after the summation of the individual integral values.
The individual probability may vary for any section; however, for multiple sub-sections, it becomes easy to manage the probability analysis. The time sections can be split into various intervals where the sum of the intervals is achieved by successive addition.
Consider, total probability function P (X) is defined over the interval t such as:
Case I: 0 < t < n
For any n that belongs to the interval [0, n], we can expect the value to be distributed over the interval. However, if we can split the interval, the accuracy of the probability for tracking any strange behavior during proctoring will be more accurately observed.
Case II: t > 1
For any value of t, more than 1, it is possible that the proctoring has started, and the analysis has to be conducted. But the same rule for case 1 applies to this situation also.
Case III: [a < t < d]
In this case, the probability analysis can split the integral value over spread intervals for t as:
The split intervals can be created as per the analysis of the sections under consideration,
The analytical treatment for probability behavioral prediction refers to identifying the probability function P(X) that can be used to predict suspicious activity. The model is trained for various timestamp values ranging from [0 < t < n]. In Fig. 5, it is explained that the determination of probability for the inappropriate posture is done in a single direction. However, with the use of the split probability function, determination becomes more appropriate, and accuracy is increased.
5. Results
The main goal of this experiment is to identify and predict the suspicious behavior of any student during the examination. Surveillance, aided by video-enabled IoT devices, is conducted in the examination room. The prediction of suspicious behavior is made with the help of sophisticated techniques. The data set used in this study was able to identify and produce suitable results under different scenarios, including iris detection, hand movements, body movements, head movements, and the posture of the student. Differences are extracted from the videos that are analyzed using movement tracking. In this study, we experimented with the detection of movement with the help of two different techniques. OpenPose and Mediapipe are Python libraries that are useful for detecting body movements to identify suspicious behavior. We have tested the complete module using various types of prediction models. CNN and LSTM are used to identify temporal patterns that aid in predicting suspicious activity. The experiment performed utilizes three different techniques for predictive analysis. In the first stage, the video is processed by extracting the frames and detecting various faces and poses. In the next stage, the detection of mobile phones, unwanted papers, or any other gadgets, such as smartwatches, is identified. The behavior of the student is predicted using behavior tracking with the help of an LSTM and a CNN model. We performed real-time monitoring of the system by deploying it with the help of an IoT device in the proctoring room.
5.1 Experiment setup
We have tested the system on an Intel i7 machine with 32GB of RAM and an 8GB graphics card integrated on the motherboard. The video frames are collected in real-time using a Raspberry PI 4B model in the examination room and processed simultaneously with the MediaPipe and OpenPose libraries in Python on the IoT device. The results are submitted to the prediction-enabled machine for further analysis using the predictive equations represented in Section 4 above. The complete statistical model is developed in terms of temporal analysis for behavioral predictions. In this model, we conducted the study using two different techniques in real-time. Initially, the collection of data frames is done with the help of real-time monitoring using IoT devices. We used OpenCV libraries to detect any suspicious motion activity in real-time. After collecting the video frames from the IoT devices, the data is submitted to the prediction system. The predictive behavior of humans and the temporal analysis are performed with the help of Mediapipe and OpenPose.
5.2 Evaluation metrics
In this approach, we have used supervised learning for the training of the datasets. The supervised learning data sets were evaluated for the accuracy, precision and recall, F1 score, and the confusion matrix for the analysis of the performance of the model trade. For further analysis and training of the model, we took 500 frame samples. Out of the total frames, 300 were considered for the division related to the training, testing, and validation. We have implemented the three models, EfficientNet, MobileNet, and SPNASNET, respectively, for experimental purposes. The results for the evaluation are represented with the help of the graphs below:
Table 2. and Fig. 6 refer to the preparation of the dataset based on the extracted frame from the experimental input. The training and testing input files are categorized as "Clear" and "Suspicious". In both cases, validation is performed using the minimum values extracted from the input frames of the video during proctoring from the source input.
| Dataset | Training | Testing | Validation |
|---|---|---|---|
| Clear | 98 | 72 | 18 |
| Suspicious | 70 | 30 | 12 |

- Dataset training and analysis frame split.
In Table 3, the EfficientNet model performance has been reported. The complete set of input data is used to perform experiments, where Training loss, Validation Accuracy, and testing accuracy are calculated for epochs of variable size. The greater or smaller size of epochs might yield some inappropriate results. Thus, the size is considerable instead of the higher-end or lower-end.
| Epochs | Training loss | Validation accuracy | Testing accuracy |
|---|---|---|---|
| 80 | 1.96 | 0.51 | 48.1 |
| 90 | 10.8 | 0.59 | 47 |
| 100 | 12 | 0.55 | 48.1 |
Fig. 7 above represents the performance of the EfficientNet model on the prescribed architecture for the probability of expression to identify inappropriate behavior of the student during an examination. We considered four major factors in the performance evaluation of the complete task. The dataset is split into three series to experiment with the multiple-interval probability analysis.

- EfficientNet model performance – I (LR = 0.15).
Table 4 and Fig. 8 represent the performance of the prescribed probabilistic approach in architecture. The model performance is evaluated on the dataset with the variable value of LR (0.0025) in this case.
| Epochs | Training loss | Validation accuracy | Testing accuracy |
|---|---|---|---|
| 80 | 0.8 | 0.8 | 79 |
| 90 | 0.1 | 0.81 | 81 |
| 100 | 0.077 | 0.6 | 78 |

- EfficientNet model performance – II (LR = 0.0025).
A similar experiment for the proposed model is conducted using the MobileNet dataset model, and its performance is evaluated based on the training loss, validation accuracy, and testing accuracy, as shown in Table 5. The complete experiment was conducted in two phases with the split probability determination algorithm as per the equations proposed above.
| Epochs | Training loss | Validation accuracy | Testing accuracy |
|---|---|---|---|
| 80 | 2.9 | 0.85 | 65.1 |
| 90 | 2.4 | 0.7 | 66.02 |
| 100 | 81 | 0.61 | 63.7 |
Fig. 9 illustrates the model characteristics of the MobileNet model applied to the proposed architecture in this study. A comparative evaluation of the EfficientNet and MobileNet models proposes the idea of integrating different models and evaluating the proposed architecture.

- MobileNet model performance – I (LR = 0.148).
Table 6 and Fig. 10 show the variable performance of the MobileNet model based on the LR value of 0.0031. The results achieved on this level are more significant compared to the EfficientNet model.
| Epochs | Training loss | Validation accuracy | Testing accuracy |
|---|---|---|---|
| 80 | 4.9 | 0.85 | 69.22 |
| 90 | 3.2 | 0.71 | 68.2 |
| 100 | 7.1 | 0.69 | 70.1 |

- MobileNet model performance – II (LR = 0.0031).
Table 7 and Fig. 11 represent the SPNASNET model performance evaluation with an LR value of 0.0006 and Table 8 with Fig. 12 represents the SPNASNET model performance with LR value of 2E-13. The results are almost identical or slightly variant compared to the EfficientNet and MobileNet models.
| Epochs | Training loss | Validation accuracy | Testing accuracy |
|---|---|---|---|
| 80 | 0.6 | 0.598 | 60 |
| 90 | 0.31 | 0.598 | 61 |
| 100 | 0.4 | 0.519 | 63 |

- SPNASNET Model Performance – I (LR = 0.0006).
| Epochs | Training loss | Validation accuracy | Testing accuracy |
|---|---|---|---|
| 80 | 0.61 | 0.75 | 61 |
| 90 | 0.28 | 0.667 | 58 |
| 100 | 0.24 | 0.61 | 57 |

- SPNASNET model performance – II (LR = 2E-13).
After the complete training of the model from the total of 500 frames, we used the remaining 200 frames for testing. In this case, the model reported false and true values depending on the eligibility of model to identify any suspicious activity.
The efficiency of the proposed framework was measured using the true positive rate (TPR), true negative rate (TNR), positive prediction value (PPV), and negative prediction value (NPV). These values are calculate as per the equations below and represented in Table 9:
| False | True | |
|---|---|---|
| FALSE | 32 | 51 |
| TRUE | 0 | 113 |
With the help of the equations stated above, we calculated the factors as shown in Table 10, to evaluate the performance of the model trained in this study. The complete model results in an accuracy level of 0.88 which recommends that the model is very helpful for further processing. Due to the limitation of computational capacity, the testing was performed with the help of only 90 frames extracted from the videos that were collected by the IoT devices. These frames were traded and tested with the F1 score of 0.86 which is sufficient for less amount of tested data. It is further worth mentioning that the precision of the model received post 0.73 which suggests that there is a high scope of acceptance for this model.
| Parameter | Value |
|---|---|
| Accuracy | 0.89 |
| Recall | 0.997 |
| Precision | 0.78 |
| F1 Score | 0.83 |
We calculated the parameters such as accuracy, recall, precision and F1 score for the model suggested in this study based on the observations of the confusion matrix values. The results have been represented in Table 10. They correspond to good output from the existing computational resources input.
6. Conclusion
The identification of any suspicious activity is indeed a significantly broader area of research. The study identifies suspicious activity and predicts human behavior based on temporal analysis. The detection of automated suspicious activity will soon be helpful for Education 5.0-enabled applications. The model presented in this study involves developing several suspicious activities, training the model, testing it with a dataset, and ultimately identifying the optimal LR of the model. The use of CNNs and LSTMs in this study enables a more comprehensive behavioral analysis. In our experimental setup, due to computational inefficiencies, the accuracy was less. Also, the amount of data available for testing was insufficient in large quantities. However, the results obtained from the existing experimental setup are fair to be accepted as a strong tool for predicting suspicious activity with the help of IoT devices in academia.
Acknowledgement
The authors would like to thank the Deanship of Scientific Research at Shaqra University for supporting this work.
CRediT authorship contribution statement
Nayyar Ahmed Khan: Writing – original draft, Writing - review, Methodology, Experimental design, Investigation, Data curation, Validation. Raed Alotaibi: Writing – review, Writing – original draft, Formal analysis, Conceptualization , Funding acquisition. Md. Mobin Akhtar: Experimentation, Writing – review & editing, Validation, Conceptualization.
Declaration of competing interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Declaration of Generative AI and AI-assisted technologies in the writing process
The authors confirm that there was no use of artificial intelligence (AI)-assisted technology for assisting in the writing or editing of the manuscript and no images were manipulated using AI.
References
- Waterwheel plant algorithm: A novel metaheuristic optimization method. Processes. 2023;11:1502. https://doi.org/10.3390/pr11051502
- [Google Scholar]
- The convergence of intelligent tutoring, robotics, and IoT in smart education for the transition from industry 4.0 to 5.0. Smart Cities. 2024;7:325-369. https://doi.org/10.3390/smartcities7010014
- [Google Scholar]
- Automatic Attendance system using face recognition technique. In: Advances in Intelligent Systems and Computing","Proceedings of the 2nd International Conference on Data Engineering and Communication Technology Advances in Intelligent Systems and Computing","Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Singapore: Springer Singapore; p. :525-533. https://doi.org/10.1007/978-981-13-1610-4_53
- [Google Scholar]
- Integrating artificial bee colony algorithms for deep learning model optimization: a comprehensive review. In: Springer Tracts in Nature-Inspired Computing","Solving with Bees Springer Tracts in Nature-Inspired Computing","Solving with Bees. Singapore: Springer Nature Singapore; p. :73-102. https://doi.org/10.1007/978-981-97-7344-2_5
- [Google Scholar]
- The importance of using the internet of things in education. International Journal of Emerging Technologies in Learning (Online). 2023;18:19. https://doi.org/10.3991/ijet.v18i01.35999
- [Google Scholar]
- Artificially intelligent warehouse management system. AJBSR. 2021;03:16-24. https://doi.org/10.38177/ajbsr.2021.3302
- [Google Scholar]
- IoT adoption model for E-learning in higher education institutes: A case study in Saudi Arabia. Sustainability. 2023;15:9748. https://doi.org/10.3390/su15129748
- [Google Scholar]
- Addressing cheating in virtual proctored examinations: Toward a framework of relevant mitigation strategies. Assess & Eval Higher Educ. 2023;48:262-275. https://doi.org/10.1080/02602938.2022.2075317
- [Google Scholar]
- E-learning critical success factors during the COVID-19 pandemic: A comprehensive analysis of E-learning managerial perspectives. Educ Sci. 2020;10:216. https://doi.org/10.3390/educsci10090216
- [Google Scholar]
- Systematic survey on big data analytics and artificial intelligence for COVID-19 containment. Computer Syst Sci Eng. 2023;47:1793-1817. https://doi.org/10.32604/csse.2023.039648
- [Google Scholar]
- ZigBee technology to provide elderly people with well-being at home. SWCC. 2021;11:921-927. https://doi.org/10.2174/2210327911666210201105206
- [Google Scholar]
- Internet of things (IoT) advantages on E-learning in the smart cities. Int J Dev Res. 2017;7:17747-17753.
- [Google Scholar]
- A system for detection and tracking of human movements using RSSI signals. IEEE Sensors J.. 2018;18:2531-2544. https://doi.org/10.1109/jsen.2018.2795747
- [Google Scholar]
- Review and discussion: E-learning for academia and industry. Int J Inf Manag Manage. 2016;36:476-485. https://doi.org/10.1016/j.ijinfomgt.2015.12.007
- [Google Scholar]
- Investigating the use of an artificial intelligence chatbot with general chemistry exam questions. J Chem Educ. 2023;100:1905-1916. https://doi.org/10.1021/acs.jchemed.3c00027
- [Google Scholar]
- Chatting and cheating: Ensuring academic integrity in the era of ChatGPT. Innovations in Education and Teaching International. 2024;61:228-239. https://doi.org/10.1080/14703297.2023.2190148
- [Google Scholar]
- Internet of educational things tech enhances learning for children. from https://www.theweek.in/news/sci-tech/2018/08/17/Internet-of-Educational-Things-tech-enhances-learning-for-children.html.
- Swarmtrust: A swarm optimization-based approach to enhance trustworthiness in smart homes. Physical Communication. 2023;58:102064. https://doi.org/10.1016/j.phycom.2023.102064
- [Google Scholar]
- A novel human activity recognition and prediction in smart home based on interaction. Sensors (Basel). 2019;19:4474. https://doi.org/10.3390/s19204474
- [Google Scholar]
- Advance artificial intelligence technique for designing double T-shaped monopole antenna. Computers, Materials Continua. 2021;69:2983-2995. https://doi.org/10.32604/cmc.2021.019114
- [Google Scholar]
- Greylag goose optimization: Nature-inspired optimization algorithm. Expert Syst with Applications. 2024;238:122147. https://doi.org/10.1016/j.eswa.2023.122147
- [Google Scholar]
- Smart home: Cognitive interactive people-centric internet of things. IEEE Commun Mag. 2017;55:34-39. https://doi.org/10.1109/mcom.2017.1600682cm
- [Google Scholar]
- Adoption of the internet of things in higher education: Opportunities and challenges. ITSE. 2024;21:292-307. https://doi.org/10.1108/itse-01-2023-0025
- [Google Scholar]
- Smart e-Learning: A greater perspective; From the fourth to the fifth generation e-learning. Egypt Inform J. 2010;11:39-48. https://doi.org/10.1016/j.eij.2010.06.006
- [Google Scholar]
- Empowering learners for the age of artificial intelligence. Comput Education: Artif Intell. 2023;4:100130. https://doi.org/10.1016/j.caeai.2023.100130
- [Google Scholar]
- Advantages and disadvantages of online learning. E-learning Industry; 2020.
- Real-time human detection and tracking using quadcopter. In: Lecture Notes in Electrical Engineering","Intelligent Embedded Systems Lecture Notes in Electrical Engineering","Intelligent Embedded Systems. Singapore: Springer Singapore; p. :301-312. https://doi.org/10.1007/978-981-10-8575-8_29
- [Google Scholar]
- Internet of things (IoT)-based teaching and learning: Modern trends and open challenges. Sustainability. 2023;15:15656. https://doi.org/10.3390/su152115656
- [Google Scholar]
- Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Syst. 2013;29:1645-1660. https://doi.org/10.1016/j.future.2013.01.010
- [Google Scholar]
- Comparing implementation patterns of e-learning for higher education in Turkey and Estonia. European Conference on e-Learning, Academic Conferences International Limited; 2014.
- Suspicious activity classification in classrooms using deep learning. Eng Technol Appl Sci Res. 2023;13:12226-12230. https://doi.org/10.48084/etasr.6228
- [Google Scholar]
- The Development of E-Learning-Based Collaboration (KABEL) Stud Learn Teach. 2023;4:444-456. https://doi.org/10.46627/silet.v4i3.270
- [Google Scholar]
- A video-based abnormal human behavior detection for psychiatric patient monitoring. 2018 International Workshop on Advanced Image Technology (IWAIT) Chiang Mai 1-4. https://doi.org/10.1109/iwait.2018.8369749
- Teaching and learning delivery modes in higher education: Looking back to move forward post-COVID-19 era. The Int J Manag Manage Educ. 2023;21:100805. https://doi.org/10.1016/j.ijme.2023.100805
- [Google Scholar]
- Multi-features descriptors for Human Activity Tracking and Recognition in Indoor-Outdoor Environments. 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST - 2019) Islamabad, Pakistan 371-376. https://doi.org/10.1109/ibcast.2019.8667145
- New cheating methods in the electronic teaching era. Procedia - Social and Behavioral Sciences. 2013;93:1516-1520. https://doi.org/10.1016/j.sbspro.2013.10.074
- [Google Scholar]
- Development of an artificially intelligent advising system for Saudi medical transcription. IIJSR. 2022;06:26-34. https://doi.org/10.46759/iijsr.2022.6306
- [Google Scholar]
- Development of Medidrone: A drone based emergency service system for Saudi Arabian Healthcare. 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), IEEE.
- Development of intelligent help system for small cities. AJAST. 2024;08:112-119. https://doi.org/10.38177/ajast.2024.8311
- [Google Scholar]
- An IoMT enabled iterative artificial bee colony approach using federated learning for detection of heart disease. In: Springer Tracts in Nature-Inspired Computing","Solving with Bees Springer Tracts in Nature-Inspired Computing","Solving with Bees. Singapore: Springer Nature Singapore; p. :103-116. https://doi.org/10.1007/978-981-97-7344-2_6
- [Google Scholar]
- An empirical study on the future of publication repositories and its adaptability in public universities—A Case Study of Shaqra University, Saudi Arabia. In: Lecture Notes in Electrical Engineering","Computational Intelligence Lecture Notes in Electrical Engineering","Computational Intelligence. Singapore: Springer Nature Singapore; p. :823-829. https://doi.org/10.1007/978-981-19-7346-8_71
- [Google Scholar]
- Development of intelligent student information system. AJBSR. 2025;07:01-09. https://doi.org/10.38177/ajbsr.2025.7101
- [Google Scholar]
- LaserMix for semi-supervised LiDAR semantic segmentation. 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Vancouver, BC, Canada, pp. 21706-21716. https://doi.org/10.1109/cvpr52729.2023.02079
- Online exam proctoring technologies: Educational innovation or deterioration? Brit J Educational Tech. 2022;53:475-490. https://doi.org/10.1111/bjet.13182
- [Google Scholar]
- Towards intelligent E-learning systems. Educ Inf Technol (Dordr) 2022:1-32. https://doi.org/10.1007/s10639-022-11479-6
- [Google Scholar]
- The COVID-19 pandemic and E-learning: Challenges and opportunities from the perspective of students and instructors. J Comput High Educ. 2022;34:21-38. https://doi.org/10.1007/s12528-021-09274-2
- [Google Scholar]
- Abnormal behavior recognition for intelligent video surveillance systems: A review. Expert Systems with Applications. 2018;91:480-491. https://doi.org/10.1016/j.eswa.2017.09.029
- [Google Scholar]
- Addressing academic dishonesty among the highest achievers. Theory Into Practice. 2017;56:121-128. https://doi.org/10.1080/00405841.2017.1283574
- [Google Scholar]
- A review of literature on knowledge management using ICT. Higher Education. 2013;4:62-67.
- [Google Scholar]
- Advantages, Limitations and recommendations for online learning during COVID-19 pandemic era. Pak J Med Sci. 2020;36:S27-S31. https://doi.org/10.12669/pjms.36.COVID19-S4.2785
- [Google Scholar]
- Impact of remote patient monitoring on clinical outcomes: An updated meta-analysis of randomized controlled trials. NPJ Digit Med. 2018;1:20172. https://doi.org/10.1038/s41746-017-0002-4
- [Google Scholar]
- Designing an internet of things laboratory to improve student understanding of secure IoT systems. Internet of Things and Cyber-Physical Systems. 2024;4:154-166. https://doi.org/10.1016/j.iotcps.2023.10.002
- [Google Scholar]
- Suspicious activity recognition using proposed deep L4-branched-actionnet with entropy coded ant colony system optimization. IEEE Access. 2021;9:89181-89197. https://doi.org/10.1109/access.2021.3091081
- [Google Scholar]
- Post-covid lockdown assessment of blended learning approach for distance education in Ghana: Implications for human resource managers and curriculum implementers. Educ Inf Technol (Dordr) 2022:1-19. https://doi.org/10.1007/s10639-022-11516-4
- [Google Scholar]
- Examining the internet of educational things adoption using an extended unified theory of acceptance and use of technology. Internet of Things. 2022;19:100558. https://doi.org/10.1016/j.iot.2022.100558
- [Google Scholar]
- IoT based RFID attendance monitoring system of students using arduino ESP8266 adafruit. io on defined area. Cybernetics and Systems 2023:1-12. https://doi.org/10.1080/01969722.2023.2166243
- [Google Scholar]
- Product managers for artificial intelligence and robotic world. International Journal of Science, Engineering and Computer Technology. 2018;8:68-73.
- [Google Scholar]
- Factors Affecting the Adoption of IoT-Based Smart Campus: An Investigation Using Analytical Hierarchical Process (AHP) Sustainability. 2022;14:8359. https://doi.org/10.3390/su14148359
- [Google Scholar]
- Academic misconduct: An examination of its association with the dark triad and antisocial behavior. Pers Individ Dif. 2019;138:75-78. https://doi.org/10.1016/j.paid.2018.09.031
- [Google Scholar]
- Breaking up friendships in exams: A case study for minimizing student cheating in higher education using social network analysis. Comput & Educ. 2017;115:171-187. https://doi.org/10.1016/j.compedu.2017.08.008
- [Google Scholar]
- The navigational challenges of a blended learning approach to teaching in business and management. Int J Manag Manage Educ. 2023;21:100733. https://doi.org/10.1016/j.ijme.2022.100733
- [Google Scholar]
- Real-time Monitoring of IoT-based Educational Aquatic Microecosystem. Procedia Computer Sci. 2025;257:801-808. https://doi.org/10.1016/j.procs.2025.03.103
- [Google Scholar]
- Big data integration for transition from e-learning to smart learning framework. 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman, 1-4. https://doi.org/10.1109/icbdsc.2016.7460379
- Novel proxy signature from lattice for the post-quantum internet of things. J Ambient Intell Human Comput. 2023;14:9939-9946. https://doi.org/10.1007/s12652-021-03661-4
- [Google Scholar]
- Synthesizing research evidence on self-regulated learning and academic achievement in online and blended learning environments: A scoping review. Educ Res Rev. 2023;39:100510. https://doi.org/10.1016/j.edurev.2023.100510
- [Google Scholar]
