期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
1
作者 Samantha Gorton Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第6期105-114,共10页
Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam... Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest. 展开更多
关键词 Video Games CONFIDENTIALITY Virtual World Cheat Code Bots PROGRAMMING
下载PDF
Cheating or Coincidence? Statistical Method Employing the Principle of Maximum Entropy for Judging Whether a Student Has Committed Plagiarism 被引量:1
2
作者 M. P. Silverman 《Open Journal of Statistics》 2015年第2期143-157,共15页
Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work f... Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work from an illicit source. Plagiarism of this kind, which occurs primarily in fields such as the natural sciences, engineering, and mathematics, is often difficult to establish. This paper derives an expression for the probability that alleged coincidences in a student’s paper could be attributable to pure chance. The analysis employs the Principle of Maximum Entropy (PME), which, mathematically, is a variational procedure requiring maximization of the Shannon-Jaynes entropy function augmented by the completeness relation for probabilities and known information in the form of expectation values. The virtue of the PME as a general method of inferential reasoning is that it generates the most objective (i.e. least biased) probability distribution consistent with the given information. Numerical examination of test cases for a range of plausible conditions can yield outcomes that tend to exonerate a student who otherwise might be wrongfully judged guilty of cheating by adjudicators unfamiliar with the surprising properties of random processes. 展开更多
关键词 PLAGIARISM cheating COINCIDENCE Information Entropy
下载PDF
Novel Solution Based on Face Recognition to Address Identity Theft and Cheating in Online Examination Systems 被引量:1
3
作者 Ayham Fayyoumi Anis Zarrad 《Advances in Internet of Things》 2014年第2期5-12,共8页
The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with sho... The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment. 展开更多
关键词 Online EXAM FACE Recognition AUTHENTICATION EXAM cheating
下载PDF
Further Results of Cheating Immune Secret Sharing 被引量:3
4
作者 ZHANGJie CHANGZu-ling WENQiao-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期26-28,共3页
Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater tha... Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater than 5.Further-more,the obtained defining functions have good cryptographic properties.The nonlinearity of them is 2^(n-1)-2^(n/2+1) whenn≡0(mod 4)and 2^(n-1)-2^((?)n/2」+2) otherwise.And thedegree is「n/4(?). 展开更多
关键词 propagation characteristics correlation immunity cheating immune secret sharing
原文传递
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
5
作者 Xin WANG Bo YANG +1 位作者 Zhe XIA Hong-xia HOU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第6期787-800,共14页
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity ... With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the ChaumPedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud. 展开更多
关键词 Data SHARING Chaum- Pedersen PROOF cheating det ection CLOUD storage
原文传递
Do Pay-for-Grades Programs Encourage Student Academic Cheating?Evidence from a Randomized Experiment
6
作者 Tao LI Yisu ZHOU 《Frontiers of Education in China》 2019年第1期117-137,共21页
Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could ... Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could skew student learning motivation and lead to academic cheating.Using a randomized control trial in 11 Chinese primary schools,we studied the effects of pay-for-grades programs on academic cheating.We randomly assigned 82 classrooms into treatment or control conditions,and used a statistical algorithm to determine the occurrence of cheating.While our data indicates a concerning level of cheating overall,our experiment did not find any relationship between academic cheating and the pay-for-grades program.Finally,we discuss the feasibility of such policies in improving learning outcomes and its policy implications. 展开更多
关键词 pay-for-grades cheating randomized control trial China primary school
原文传递
A theoretical analysis of how user fee on healthcare can waste economic resources
7
作者 Eugenia Amporfu 《Health》 2014年第1期128-136,共9页
The difficulty of assessing funds to directly fund healthcare for the poor makes governments adopt user fee in the health system. Many studies have shown how user fee can cause the poor to under utilize healthcare but... The difficulty of assessing funds to directly fund healthcare for the poor makes governments adopt user fee in the health system. Many studies have shown how user fee can cause the poor to under utilize healthcare but not on how it can lead to the waste of resources. The current study is theoretical and it examines the efficiency of regulated user fee and the factors affecting the efficiency. Efficiency focused mainly on the extent to which resources are wasted as a result of regulated user fee. The results show that the asymmetric information between the provider of healthcare and the patient combined with the costliness of investigation by the government as well as the costliness of revenue collection caused three sources of waste: excessive treatment of the rich or the non-poor, investigation and revenue collection. Comparative statics were done to examine the effect of various factors on the level of waste. The study then examined the conditions under with regulated user fee is more efficient than direct financing of healthcare by the government. Some recommendations were made to reduce wastes. 展开更多
关键词 Regulated USER FEE WASTE ASYMMETRIC Information cheating Investigation
下载PDF
Reducing Test Anxiety while Increasing Learning Efficiency:by Using Cheat Sheet in the College English Exam
8
作者 夏英姿 项敏 《海外英语》 2011年第5X期61-62,共2页
Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a... Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a cheat sheet for the exam helps structure this study time and deepens learning.The crib sheet is well defined:one double-sided page of A4.An award for the best and most creative cheat sheet allows the instructor to appreciate the students' efforts.Using the cheat sheet can not only reduces student anxiety during testing but also incease student learning efficiency. 展开更多
关键词 assessment CHEAT SHEET student ANXIETY college EXAM
下载PDF
An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters 被引量:1
9
作者 XIEShu-cui ZHANGJian-zhong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第3期17-21,共5页
In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid sha... In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others. 展开更多
关键词 secret sharing authentication codes threshold scheme cheating
原文传递
Fewer Cambodia Pupils Cheat on Final Exams
10
作者 夏露涟 《当代外语研究》 2001年第9期18-19,共2页
我曾经在柬埔寨大使馆工作过,深知该国“高考”作弊现象之猖獗。政府终于下了决心,下了猛药:动用警察和宪兵,使用监视器!也许是神经过敏了,一场骚乱差点发生。因为,在一家书店发现了今年高考试题的答案!】
关键词 柬埔寨 监视器 Fewer Cambodia Pupils Cheat on Final Exams
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部