
Providing questions with unique sequence helps to encourage participants integrity in an examination. In this study, Secure Hash Algorithm (SHA) 2 and 3 have been proposed and evaluated in a question shuffling problem for computer based test. Two strategies were tested to use the hash algorithms. The first utilized a few of the most significant digits of the hash value and the second treated all digits of the hash value as equally important. Entropy analysis and running time analysis were performed to assess the proposed method in terms of randomness and computational efficiency. SHA-2 implemented with the first strategy is superior with entropy of 3.88792 bits and real execution time of 1.76585 seconds. The evaluation result demonstrates no significant difference between the randomness of the sequences generated by SHA-2 and SHA-3. In terms of computational efficiency, SHA-2 demonstrated faster execution time than SHA-3.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 6 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
