期刊文献+
共找到1,335篇文章
< 1 2 67 >
每页显示 20 50 100
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
1
作者 Samantha Gorton Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第6期105-114,共10页
Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam... Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest. 展开更多
关键词 Video Games CONFIDENTIALITY Virtual World cheat Code Bots PROGRAMMING
下载PDF
Reducing Test Anxiety while Increasing Learning Efficiency:by Using Cheat Sheet in the College English Exam
2
作者 夏英姿 项敏 《海外英语》 2011年第5X期61-62,共2页
Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a... Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a cheat sheet for the exam helps structure this study time and deepens learning.The crib sheet is well defined:one double-sided page of A4.An award for the best and most creative cheat sheet allows the instructor to appreciate the students' efforts.Using the cheat sheet can not only reduces student anxiety during testing but also incease student learning efficiency. 展开更多
关键词 assessment cheat SHEET student ANXIETY college EXAM
下载PDF
Cheating or Coincidence? Statistical Method Employing the Principle of Maximum Entropy for Judging Whether a Student Has Committed Plagiarism 被引量:1
3
作者 M. P. Silverman 《Open Journal of Statistics》 2015年第2期143-157,共15页
Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work f... Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work from an illicit source. Plagiarism of this kind, which occurs primarily in fields such as the natural sciences, engineering, and mathematics, is often difficult to establish. This paper derives an expression for the probability that alleged coincidences in a student’s paper could be attributable to pure chance. The analysis employs the Principle of Maximum Entropy (PME), which, mathematically, is a variational procedure requiring maximization of the Shannon-Jaynes entropy function augmented by the completeness relation for probabilities and known information in the form of expectation values. The virtue of the PME as a general method of inferential reasoning is that it generates the most objective (i.e. least biased) probability distribution consistent with the given information. Numerical examination of test cases for a range of plausible conditions can yield outcomes that tend to exonerate a student who otherwise might be wrongfully judged guilty of cheating by adjudicators unfamiliar with the surprising properties of random processes. 展开更多
关键词 PLAGIARISM cheatING COINCIDENCE Information Entropy
下载PDF
Novel Solution Based on Face Recognition to Address Identity Theft and Cheating in Online Examination Systems 被引量:1
4
作者 Ayham Fayyoumi Anis Zarrad 《Advances in Internet of Things》 2014年第2期5-12,共8页
The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with sho... The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment. 展开更多
关键词 Online EXAM FACE Recognition AUTHENTICATION EXAM cheatING
下载PDF
Am I Cheating? An Analysis of Online Students' Perceptions of Their Behaviors and Attitudes
5
作者 Irma S. Jones 《Psychology Research》 2013年第5期261-269,共9页
关键词 在线学习 作弊行为 学生 学术活动 教育工作者 美国大学 网上考试 传统
下载PDF
一种带作弊识别的动态(t,n)门限量子秘密共享方案
6
作者 郭建胜 关飞婷 李志慧 《信息网络安全》 CSCD 北大核心 2024年第5期745-755,共11页
文章基于齐次线性反馈移位寄存器(Linear Feedback Shift Register,LFSR)序列和d维单量子态提出了一种带作弊识别的动态(t,n)门限量子秘密共享方案。在该方案中,可信的分发者确定共享的秘密,并为参与者分配份额,参与者对传输中的粒子执... 文章基于齐次线性反馈移位寄存器(Linear Feedback Shift Register,LFSR)序列和d维单量子态提出了一种带作弊识别的动态(t,n)门限量子秘密共享方案。在该方案中,可信的分发者确定共享的秘密,并为参与者分配份额,参与者对传输中的粒子执行相应的酉操作来恢复秘密。在秘密重建阶段,通过执行量子态数字签名,不仅可以检测到作弊行为,还可以识别具体的作弊者并将其删除,最终参与者可以验证恢复秘密的正确性。该方案可以在不更改旧参与者份额的前提下,无需其他参与者的帮助便可实现参与者的动态更新。安全性分析表明,该方案能够抵抗常见的外部攻击和内部攻击。 展开更多
关键词 量子秘密共享 动态更新 作弊识别 量子态数字签名
下载PDF
有限公司股权对外转让行为的效力研究——以侵害股东优先购买权为视角
7
作者 胡灵 沈子程 《榆林学院学报》 2024年第3期50-56,共7页
2023年《公司法》第84条就优先购买权作出规定,用以保护有限公司的人合性特征,但对侵害股东优先购买权具体情形仍未予言明,致使司法裁判和理论学说已有争议仍存在。亟待2023年《公司法》在其司法解释中对股权对外转让行为进行体系化完... 2023年《公司法》第84条就优先购买权作出规定,用以保护有限公司的人合性特征,但对侵害股东优先购买权具体情形仍未予言明,致使司法裁判和理论学说已有争议仍存在。亟待2023年《公司法》在其司法解释中对股权对外转让行为进行体系化完善。在股权转让行为方面,应采用区分原则明确股权转让行为系债权行为;在优先购买权性质认定方面,应采用公司组织法上的特殊权利说保障其他股东的顺位优势;在以侵害优先购买权主张股权转让合同无效时,应根据《民法典》规定分别对欺诈、通谋行为等情形的转让合同效力进行认定。 展开更多
关键词 股权对外转让 区分原则 特殊权利说 欺诈 通谋行为
下载PDF
人工智能方法在探究小学生作业作弊行为及其关键预测因子中的应用
8
作者 赵立 郑怡 +4 位作者 赵均榜 张芮 方方 傅根跃 李康 《心理学报》 CSCD 北大核心 2024年第2期239-254,共16页
小学生作业作弊是心理学领域忽略已久的研究重点,机器学习是数智时代新兴的人工智能科学。笔者对2,098名2至6年级小学生进行问卷调查,采用机器学习法,考察个体认知、道德判断、同伴行为,及性别、年级、成绩等因素对小学生作业作弊行为... 小学生作业作弊是心理学领域忽略已久的研究重点,机器学习是数智时代新兴的人工智能科学。笔者对2,098名2至6年级小学生进行问卷调查,采用机器学习法,考察个体认知、道德判断、同伴行为,及性别、年级、成绩等因素对小学生作业作弊行为的影响。结果表明:集成机器学习模型对小学生作业作弊预测准确率(AUC均值)达80.46%;对作业作弊预测效应最强的4个因素依次为个体对作业作弊的接受程度、观察到同伴作弊的普遍性和频率,及其自身成绩。 展开更多
关键词 小学生 诚信 学业作弊 作业作弊 机器学习 预测 同伴行为
下载PDF
Further Results of Cheating Immune Secret Sharing 被引量:3
9
作者 ZHANGJie CHANGZu-ling WENQiao-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期26-28,共3页
Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater tha... Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater than 5.Further-more,the obtained defining functions have good cryptographic properties.The nonlinearity of them is 2^(n-1)-2^(n/2+1) whenn≡0(mod 4)and 2^(n-1)-2^((?)n/2」+2) otherwise.And thedegree is「n/4(?). 展开更多
关键词 propagation characteristics correlation immunity cheating immune secret sharing
原文传递
An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters 被引量:1
10
作者 XIEShu-cui ZHANGJian-zhong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第3期17-21,共5页
In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid sha... In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others. 展开更多
关键词 secret sharing authentication codes threshold scheme cheatING
原文传递
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
11
作者 Xin WANG Bo YANG +1 位作者 Zhe XIA Hong-xia HOU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第6期787-800,共14页
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity ... With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the ChaumPedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud. 展开更多
关键词 Data SHARING Chaum- Pedersen PROOF cheatING det ection CLOUD storage
原文传递
基于油气集输半实物仿真平台的工控网络安全测试研究
12
作者 何戡 陈金喆 +2 位作者 宗学军 齐济 孙永超 《化工自动化及仪表》 CAS 2024年第2期274-283,共10页
由于无法在实际环境中对工业控制网络进行安全测试,提出一种基于油气集输半实物仿真平台的网络安全测试方法。该方法通过分析真实环境中工业控制网络的结构和脆弱性,构建网络安全测试模型,分别采用DoS攻击、重放攻击和虚假数据注入攻击... 由于无法在实际环境中对工业控制网络进行安全测试,提出一种基于油气集输半实物仿真平台的网络安全测试方法。该方法通过分析真实环境中工业控制网络的结构和脆弱性,构建网络安全测试模型,分别采用DoS攻击、重放攻击和虚假数据注入攻击方式对仿真平台进行网络攻击测试,并通过组态操作界面和沙盘模型对攻击效果进行验证;同时,对测试过程中出现的网络安全问题进行总结并提出了防御措施,可为工业控制网络安全防护提供重要参考。 展开更多
关键词 工业控制网络 半实物平台 工控协议 网络安全测试 ARP欺骗
下载PDF
Do Pay-for-Grades Programs Encourage Student Academic Cheating?Evidence from a Randomized Experiment
13
作者 Tao LI Yisu ZHOU 《Frontiers of Education in China》 2019年第1期117-137,共21页
Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could ... Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could skew student learning motivation and lead to academic cheating.Using a randomized control trial in 11 Chinese primary schools,we studied the effects of pay-for-grades programs on academic cheating.We randomly assigned 82 classrooms into treatment or control conditions,and used a statistical algorithm to determine the occurrence of cheating.While our data indicates a concerning level of cheating overall,our experiment did not find any relationship between academic cheating and the pay-for-grades program.Finally,we discuss the feasibility of such policies in improving learning outcomes and its policy implications. 展开更多
关键词 pay-for-grades cheatING randomized control trial China primary school
原文传递
集贸市场电子秤作弊方式识别及解决对策
14
作者 冯建斌 《品牌与标准化》 2024年第1期152-154,共3页
在对集贸市场电子秤开展强制检定工作中,发现一些不法商家利用作弊电子秤进行贸易结算过程屡禁不止,不仅侵害消费者权益,更严重影响公平公正的消费环境。本文探究电子秤惯用作弊方式,剖析其产生的客观原因,有针对性地提出加强集贸市场... 在对集贸市场电子秤开展强制检定工作中,发现一些不法商家利用作弊电子秤进行贸易结算过程屡禁不止,不仅侵害消费者权益,更严重影响公平公正的消费环境。本文探究电子秤惯用作弊方式,剖析其产生的客观原因,有针对性地提出加强集贸市场电子秤管理的有效措施,防止和避免作弊行为的发生。 展开更多
关键词 集贸市场 电子秤 作弊方式 作弊原因 解决对策
下载PDF
基于深度学习的电子考场作弊行为识别技术
15
作者 郭继盛 《移动信息》 2024年第6期212-214,共3页
为确保考试的公正性,并解决现有电子监考系统无法自动解析监控视频、人工审查视频劳动强度过高的问题,文中提出了一种基于深度学习的考生作弊行为识别方法。该方法构建了一个用于深度学习训练的数据集,结合物体识别算法YOLO和人体姿态... 为确保考试的公正性,并解决现有电子监考系统无法自动解析监控视频、人工审查视频劳动强度过高的问题,文中提出了一种基于深度学习的考生作弊行为识别方法。该方法构建了一个用于深度学习训练的数据集,结合物体识别算法YOLO和人体姿态估计工具OpenPose,使用帧间差分技术快速提取关键帧,通过分析视频帧来定位和标记可疑考生,提高了检测的准确率和速度。 展开更多
关键词 深度学习 电子化考场 监控 作弊识别
下载PDF
思想政治教育对于杜绝大学生考试作弊现象的路径探析
16
作者 张媛媛 李银霞 荣秀娟 《科教文汇》 2024年第11期47-50,共4页
高校历来重视诚信教育,但随着科技的发展和网络的普及,大学生考试作弊现象呈现出新的特征。该文试图通过对当前大学生考试作弊现象的分析,指出大学生考试作弊行为给高校思想政治教育工作带来的巨大挑战和思考,阐述思想政治教育在杜绝大... 高校历来重视诚信教育,但随着科技的发展和网络的普及,大学生考试作弊现象呈现出新的特征。该文试图通过对当前大学生考试作弊现象的分析,指出大学生考试作弊行为给高校思想政治教育工作带来的巨大挑战和思考,阐述思想政治教育在杜绝大学生考试作弊行为中应发挥的重要作用,探讨通过加强社会主义核心价值观教育、强化高校思想政治理论课程教育和学生自我实践教育、加强大学生心理健康教育和法制教育、创设良好的校园诚信环境、加强大学生网络思想政治教育等途径,对大学生进行思想政治教育,以杜绝大学生考试作弊现象的发生。 展开更多
关键词 杜绝考试作弊 思想政治教育 大学生考试作弊
下载PDF
Fewer Cambodia Pupils Cheat on Final Exams
17
作者 夏露涟 《当代外语研究》 2001年第9期18-19,共2页
我曾经在柬埔寨大使馆工作过,深知该国“高考”作弊现象之猖獗。政府终于下了决心,下了猛药:动用警察和宪兵,使用监视器!也许是神经过敏了,一场骚乱差点发生。因为,在一家书店发现了今年高考试题的答案!】
关键词 柬埔寨 监视器 Fewer Cambodia Pupils cheat on Final Exams
原文传递
面向考场视频中作弊行为的层次式检测方法 被引量:2
18
作者 骆祖莹 万桢洪 李玉顺 《中国考试》 北大核心 2023年第5期45-52,共8页
针对当前考场视频作弊行为检测精度低、难以实际应用的问题,本文提出一种高效的作弊行为层次式检测方法。该方法首先使用帧间差分,快速筛选出包含异常行为的关键帧图像;随后采用ResNet50作为分类器进行基于骨骼图像的行为识别,检测出疑... 针对当前考场视频作弊行为检测精度低、难以实际应用的问题,本文提出一种高效的作弊行为层次式检测方法。该方法首先使用帧间差分,快速筛选出包含异常行为的关键帧图像;随后采用ResNet50作为分类器进行基于骨骼图像的行为识别,检测出疑似作弊行为;最后使用改进的三维卷积(3D-CNN,简称C3D)网络作为主干网络,融合时空注意力机制,构建C3D+attention动作识别网络,使用包括疑似作弊行为在内的单人图像序列单元,精确检测出作弊行为。实验结果表明:本方法融合二维卷积(C2D)网络速度快和C3D网络精度高的优点,能够高效地检测出数量稀少的作弊行为视频片段,对光照变化和低分辨率视频具有强鲁棒性,使智能监考成为可能。 展开更多
关键词 作弊行为 智能监考 行为识别 人体姿态估计 卷积神经网络
下载PDF
闭环供应链中再制品价格欺骗的均衡路径分析 被引量:1
19
作者 杨明歌 盛鑫 梁小珍 《运筹与管理》 CSCD 北大核心 2023年第4期61-70,共10页
由于市场监管缺乏和企业诚信缺失,再制品市场的价格欺骗事件层出不穷,严重损害了消费者的利益和市场配置的有效性。本文研究闭环供应链中的再制品价格欺骗问题。首先,构建一个由销售商和消费者组成的双方演化博弈模型,通过Jacobi矩阵分... 由于市场监管缺乏和企业诚信缺失,再制品市场的价格欺骗事件层出不穷,严重损害了消费者的利益和市场配置的有效性。本文研究闭环供应链中的再制品价格欺骗问题。首先,构建一个由销售商和消费者组成的双方演化博弈模型,通过Jacobi矩阵分析混合策略的演化稳定性。结果表明:当再制品伪装之后的销售价格与伪装成本的差小于再制品不伪装的销售价格时,销售商选择不伪装,消费者选择购买,再制品市场是有效的。其次,考虑政府对销售商奖励或惩罚的措施,构建一个由销售商、消费者和政府组成的三方演化博弈模型,通过Jacobi矩阵分析混合策略的演化稳定性。结果表明:政府积极检查再制品市场,加大奖励和惩罚力度,均能促使销售商选择不伪装且消费者选择购买,市场达到有效配置。最后,通过数值分析验证相关结论的正确性。 展开更多
关键词 再制品 价格欺骗 演化博弈 复制动态方程 JACOBI矩阵
下载PDF
学位撤销事由要件反思及其完善 被引量:2
20
作者 林华 《政治与法律》 北大核心 2023年第8期124-136,共13页
事由要件是学位撤销构成要件的实质要素,也是学位撤销法律争议的焦点内容。基于对现行《学位条例》第十七条的解读,舞弊作伪在实质层面上构成了学位撤销的事由要件。通过对法律文本和司法案例的统合性分析,舞弊作伪作为一个不确定的法... 事由要件是学位撤销构成要件的实质要素,也是学位撤销法律争议的焦点内容。基于对现行《学位条例》第十七条的解读,舞弊作伪在实质层面上构成了学位撤销的事由要件。通过对法律文本和司法案例的统合性分析,舞弊作伪作为一个不确定的法律概念,可区分为学术层面的舞弊作伪和非学术层面的舞弊作伪。相应地,学位撤销事由也可分为学位撤销的学术事由和学位撤销的非学术事由。当前,学位授予单位和法院对学位撤销事由的判断标准经常呈现不一致的情形,需要通过立法和司法的双重路径去完善学位撤销的事由要件,进而实质性化解学位撤销法律争议,有效推进教育法治。 展开更多
关键词 学位撤销 事由要件 舞弊作伪 学术不端
下载PDF
上一页 1 2 67 下一页 到第
使用帮助 返回顶部