期刊文献+
共找到1,345篇文章
< 1 2 68 >
每页显示 20 50 100
Reducing Test Anxiety while Increasing Learning Efficiency:by Using Cheat Sheet in the College English Exam
1
作者 夏英姿 项敏 《海外英语》 2011年第5X期61-62,共2页
Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a... Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a cheat sheet for the exam helps structure this study time and deepens learning.The crib sheet is well defined:one double-sided page of A4.An award for the best and most creative cheat sheet allows the instructor to appreciate the students' efforts.Using the cheat sheet can not only reduces student anxiety during testing but also incease student learning efficiency. 展开更多
关键词 assessment cheat SHEET student ANXIETY college EXAM
在线阅读 下载PDF
Cheating or Coincidence? Statistical Method Employing the Principle of Maximum Entropy for Judging Whether a Student Has Committed Plagiarism 被引量:2
2
作者 M. P. Silverman 《Open Journal of Statistics》 2015年第2期143-157,共15页
Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work f... Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work from an illicit source. Plagiarism of this kind, which occurs primarily in fields such as the natural sciences, engineering, and mathematics, is often difficult to establish. This paper derives an expression for the probability that alleged coincidences in a student’s paper could be attributable to pure chance. The analysis employs the Principle of Maximum Entropy (PME), which, mathematically, is a variational procedure requiring maximization of the Shannon-Jaynes entropy function augmented by the completeness relation for probabilities and known information in the form of expectation values. The virtue of the PME as a general method of inferential reasoning is that it generates the most objective (i.e. least biased) probability distribution consistent with the given information. Numerical examination of test cases for a range of plausible conditions can yield outcomes that tend to exonerate a student who otherwise might be wrongfully judged guilty of cheating by adjudicators unfamiliar with the surprising properties of random processes. 展开更多
关键词 PLAGIARISM cheatING COINCIDENCE Information Entropy
暂未订购
Novel Solution Based on Face Recognition to Address Identity Theft and Cheating in Online Examination Systems 被引量:1
3
作者 Ayham Fayyoumi Anis Zarrad 《Advances in Internet of Things》 2014年第2期5-12,共8页
The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with sho... The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment. 展开更多
关键词 Online EXAM FACE Recognition AUTHENTICATION EXAM cheatING
暂未订购
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
4
作者 Samantha Gorton Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第6期105-114,共10页
Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam... Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest. 展开更多
关键词 Video Games CONFIDENTIALITY Virtual World cheat Code Bots PROGRAMMING
在线阅读 下载PDF
Research on Common Cheating Methods and Countermeasures of Electronic Pricing Scale
5
作者 WANGLigang 《外文科技期刊数据库(文摘版)工程技术》 2022年第8期164-167,共4页
In the relationship between electronic pricing and the market and consumers in daily life, this paper analyzes the fraud of electronic pricing, and studies the ways to deal with the fraud. We started to cooperate with... In the relationship between electronic pricing and the market and consumers in daily life, this paper analyzes the fraud of electronic pricing, and studies the ways to deal with the fraud. We started to cooperate with effective production sources to avoid the serious consequences of electronic fraud. 展开更多
关键词 electronic pricing scale cheatING national standards national metrological verification regulatio
原文传递
Am I Cheating? An Analysis of Online Students' Perceptions of Their Behaviors and Attitudes
6
作者 Irma S. Jones 《Psychology Research》 2013年第5期261-269,共9页
关键词 在线学习 作弊行为 学生 学术活动 教育工作者 美国大学 网上考试 传统
在线阅读 下载PDF
远程办公中员工欺骗行为的产生机制
7
作者 杨洋 颜锐 +1 位作者 邹明阳 孟炎 《管理评论》 北大核心 2025年第5期157-167,共11页
剧烈的环境变化正在增加组织面临的道德挑战。尤其在远程办公中,组织时刻面临着被员工欺骗的挑战。似乎远程办公对工作环境的改变,为员工产生欺骗行为提供了更广阔的空间。为此,本研究试图运用扎根理论的方法,解释远程办公中不断增加的... 剧烈的环境变化正在增加组织面临的道德挑战。尤其在远程办公中,组织时刻面临着被员工欺骗的挑战。似乎远程办公对工作环境的改变,为员工产生欺骗行为提供了更广阔的空间。为此,本研究试图运用扎根理论的方法,解释远程办公中不断增加的员工欺骗行为。通过分析100名员工的在线问答材料,本研究发现远程办公中的欺骗行为具有怠工和退缩行为的新内涵,以及保护生活和团队利益的新动机。同时,本研究还借鉴个人-环境匹配理论构建了解释远程办公中欺骗行为产生的理论框架,从“需求-供给”和“要求-能力”不匹配的角度,揭示了自我需求和组织要求通过工作状态影响欺骗行为的机制,并探讨了组织公平氛围的边界作用。本研究将有助于管理者更好理解员工在远程办公中为何以及何时会产生欺骗行为,对组织改善远程办公中的管理具有借鉴意义。 展开更多
关键词 远程办公 欺骗行为 个人-环境匹配 扎根理论方法
原文传递
基于困惑度计算的AIGC生成内容检测与应用
8
作者 赖永明 洪毅强 《龙岩学院学报》 2025年第2期14-19,共6页
AIGC已被广泛用于生成文章、故事、作业与其他类型的书面内容,在带来便利性的同时,也引发了人们对于学术文章和学生作业存在作弊可能性的担忧。为了应对这一风险,探索针对AIGC生成内容的技术检测方法,提出了一种基于已开放获取的GPT-2... AIGC已被广泛用于生成文章、故事、作业与其他类型的书面内容,在带来便利性的同时,也引发了人们对于学术文章和学生作业存在作弊可能性的担忧。为了应对这一风险,探索针对AIGC生成内容的技术检测方法,提出了一种基于已开放获取的GPT-2预训练模型权重,在自主构建的数据集上,以滑动窗口方式计算上下文文本困惑度值,用以检测输入文本是否属于AIGC生成内容,并将其应用至学生作业检测。结果显示,该方法有效地区分了AIGC生成内容与学生编写内容,以低成本、高效率的方式解决了AIGC引发的抄袭作弊问题。 展开更多
关键词 AIGC GPT 困惑度 作弊检测 分类
在线阅读 下载PDF
Further Results of Cheating Immune Secret Sharing 被引量:3
9
作者 ZHANGJie CHANGZu-ling WENQiao-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期26-28,共3页
Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater tha... Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater than 5.Further-more,the obtained defining functions have good cryptographic properties.The nonlinearity of them is 2^(n-1)-2^(n/2+1) whenn≡0(mod 4)and 2^(n-1)-2^((?)n/2」+2) otherwise.And thedegree is「n/4(?). 展开更多
关键词 propagation characteristics correlation immunity cheating immune secret sharing
原文传递
利用改进的三值主观逻辑模型检测网页作弊
10
作者 赵迅冕 苑康松 +2 位作者 刘桂冰 牛小飞 王泽贤 《计算机工程与设计》 北大核心 2025年第11期3157-3166,共10页
为了有效检测恶化搜索引擎排序结果的网页作弊技术,针对已有非信任传播算法只使用一个实数值来表示网页不可信度的问题,提出利用改进的三值主观逻辑模型检测网页作弊的Anti-OpinionRank算法。该算法使用网页出入邻居结点的质量和数量来... 为了有效检测恶化搜索引擎排序结果的网页作弊技术,针对已有非信任传播算法只使用一个实数值来表示网页不可信度的问题,提出利用改进的三值主观逻辑模型检测网页作弊的Anti-OpinionRank算法。该算法使用网页出入邻居结点的质量和数量来表示每个网页的观点,利用作弊观点矩阵表示网页之间的关系,通过非信任传播与组合操作迭代地计算所有网页的观点向量,以检测出更多的作弊网页。公开数据集WEBSPAM-UK2006上的实验结果表明,当种子数量为200时,在排名前2000的网站中,Anti-OpinionRank作弊网站的识别率比Anti-TrustRank高5.7%,比BadRank高11.5%。 展开更多
关键词 作弊种子 三值主观逻辑模型 非信任传播 传播算法 作弊观点矩阵 观点向量 网页作弊技术
在线阅读 下载PDF
An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters 被引量:1
11
作者 XIEShu-cui ZHANGJian-zhong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第3期17-21,共5页
In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid sha... In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others. 展开更多
关键词 secret sharing authentication codes threshold scheme cheatING
原文传递
煤炭无人值守计量智能发运自动防作弊技术研究 被引量:3
12
作者 李自杰 《自动化技术与应用》 2025年第1期28-31,88,共5页
煤炭无人值守计量智能发运平台中容易出现作弊漏洞,为解决上述问题,研究智能发运自动防作弊技术。详细分析无人值守智能快速发运平台结构框架,在发运现场安装语音信号盒,在煤炭缓冲仓中安装汽车衡、电子计量秤上配备传感器,通过电阻应... 煤炭无人值守计量智能发运平台中容易出现作弊漏洞,为解决上述问题,研究智能发运自动防作弊技术。详细分析无人值守智能快速发运平台结构框架,在发运现场安装语音信号盒,在煤炭缓冲仓中安装汽车衡、电子计量秤上配备传感器,通过电阻应变器转换信号,实现精确化远程计量。利用PLC控制给煤机和皮带运转,在汽车衡上安装成对红外线对射装置,感应车辆称重情况,并抓拍识别驾驶人员面部图像。利用射频远距离识别卡读取车辆电子号牌,实现载重比对、路径检查以及号牌确定。若发现计量或识别异常,将作弊结果记录保存并发出告警信息,防止作弊。经过实验证明,该技术能及时监测到作弊行为并实施防御警报动作,鲁棒性较好。 展开更多
关键词 煤炭运销 智能管控 煤炭计量 无人值守 电子称重器 防作弊
在线阅读 下载PDF
基于云平台的电子秤防作弊控制模组设计 被引量:1
13
作者 何开宇 江浩 李鹏飞 《自动化与仪表》 2025年第4期153-156,161,共5页
针对现有普通电子秤作弊手段层出不穷、监管难度大的特点,设计了一种防作弊电子计价秤,即在原有电子秤的基础上,增加了高安全IoT计量模组,使原有的计量设备具备安全认证功能,且可实现防作弊和监测异常响应.采用了相关的环境检测传感器(... 针对现有普通电子秤作弊手段层出不穷、监管难度大的特点,设计了一种防作弊电子计价秤,即在原有电子秤的基础上,增加了高安全IoT计量模组,使原有的计量设备具备安全认证功能,且可实现防作弊和监测异常响应.采用了相关的环境检测传感器(如温湿度、水平度等)的数据信息采集,保证计量准确;内含RFID感应模块,通过读取电子秤装置上电子铅封标签内的唯一身份代码来判断是否有拆机行为;通过WIFI或有线网等方式,通过MQTT协议连接到云平台,通过特定的安全策略进行双向安全认证,通过消息发布和订阅等方式,完成电子秤的称重管理、合格管理、监测报警等功能。实践表明,该防作弊电子计价秤具有防拆、防篡改和便于追溯的优势,有利于市场监管。 展开更多
关键词 防作弊 IOT 监测 MQTT 安全
在线阅读 下载PDF
基于人工智能的无纸化考试作弊行为检测研究 被引量:1
14
作者 薛志禹 《长江信息通信》 2025年第1期159-161,共3页
随着人工智能技术的不断发展,无纸化考试逐渐成为一种趋势,然而,也引发了考试作弊行为的增加。因此,文章提出了基于人工智能的无纸化考试作弊行为检测系统,以提高考试的公平性和可靠性。首先,对无纸化考试环境中的作弊行为进行了深入分... 随着人工智能技术的不断发展,无纸化考试逐渐成为一种趋势,然而,也引发了考试作弊行为的增加。因此,文章提出了基于人工智能的无纸化考试作弊行为检测系统,以提高考试的公平性和可靠性。首先,对无纸化考试环境中的作弊行为进行了深入分析,并总结了目前常见的作弊方式和特征。其次,设计了基于物联网的无纸化考场管控平台。然后,采用了深度学习算法,通过对大量考试数据进行训练,构建了一个作弊动作检测模型。该模型能够自动地对考生的作答过程进行监测和分析,准确地识别出潜在的作弊行为。最后,为了验证模型的准确性和有效性,该研究设计了一系列实验。实验结果表明,该作弊行为检测系统在无纸化考试场景中具有较高的准确率。 展开更多
关键词 人工智能 无纸化考试 作弊行为检测 无纸化考场管控平台 Video Swin Transformer模型
在线阅读 下载PDF
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
15
作者 Xin WANG Bo YANG +1 位作者 Zhe XIA Hong-xia HOU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第6期787-800,共14页
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity ... With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the ChaumPedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud. 展开更多
关键词 Data SHARING Chaum- Pedersen PROOF cheatING det ection CLOUD storage
原文传递
Do Pay-for-Grades Programs Encourage Student Academic Cheating?Evidence from a Randomized Experiment
16
作者 Tao LI Yisu ZHOU 《Frontiers of Education in China》 2019年第1期117-137,共21页
Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could ... Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could skew student learning motivation and lead to academic cheating.Using a randomized control trial in 11 Chinese primary schools,we studied the effects of pay-for-grades programs on academic cheating.We randomly assigned 82 classrooms into treatment or control conditions,and used a statistical algorithm to determine the occurrence of cheating.While our data indicates a concerning level of cheating overall,our experiment did not find any relationship between academic cheating and the pay-for-grades program.Finally,we discuss the feasibility of such policies in improving learning outcomes and its policy implications. 展开更多
关键词 pay-for-grades cheatING randomized control trial China primary school
原文传递
浅析电子秤常见作弊方式及应对措施
17
作者 孙慧 江亮 《计量与测试技术》 2025年第7期135-137,142,共4页
本文通过对电子秤内部结构和工作原理的分析,揭示了不法分子利用技术漏洞进行作弊的手段,并从技术监管、法律法规等方面提出了相应的方法,从而维护公平交易的市场环境。
关键词 电子秤 作弊原理 作弊方式 措施
在线阅读 下载PDF
出租汽车计价器常见作弊方式和防作弊研究
18
作者 李欣 《时代汽车》 2025年第12期133-135,共3页
介绍了出租汽车计价器的组成和工作原理,分析出租汽车计价器常见的几种作弊方式。主要探讨了面对越来越隐蔽的作弊方式,通过采用加密技术和防拆卸设计,增加防作弊模块以及开发新型智能出租汽车计价器等方式,利用技术手段和大数据分析及... 介绍了出租汽车计价器的组成和工作原理,分析出租汽车计价器常见的几种作弊方式。主要探讨了面对越来越隐蔽的作弊方式,通过采用加密技术和防拆卸设计,增加防作弊模块以及开发新型智能出租汽车计价器等方式,利用技术手段和大数据分析及时发现作弊行为,并从技术层面杜绝作弊。通过防作弊研究对计价器的作弊行为进行有力打击,维护消费者的利益,保障出租汽车行业的健康发展。 展开更多
关键词 出租汽车计价器 作弊方式 防作弊措施 新型智能计价器
在线阅读 下载PDF
宋代科场怀挟与监考法述论
19
作者 夏亚飞 《河北大学学报(哲学社会科学版)》 2025年第4期38-47,共10页
宋代科举考试中存在着严重的怀挟作弊问题,以至于怀挟成风。宋代科场怀挟作弊的原因是政治腐败,法令执行不力和作弊手段发展。针对这一严重扰乱科场秩序的舞弊问题,宋代建立了相对完善的科场监考法,主要包括入场搜查法、按榜就坐法、巡... 宋代科举考试中存在着严重的怀挟作弊问题,以至于怀挟成风。宋代科场怀挟作弊的原因是政治腐败,法令执行不力和作弊手段发展。针对这一严重扰乱科场秩序的舞弊问题,宋代建立了相对完善的科场监考法,主要包括入场搜查法、按榜就坐法、巡考法。宋初科场并无入场搜查法,至宋真宗朝形成并调整了入场搜查法,其后宋廷多次重申禁止考生怀挟夹带进入考场。宋代在殿试、省试和发解试中都实行了按榜就坐法。宋代前期,宋廷在科场中设置巡铺官负责巡考工作。宋仁宗时,欧阳修巡考法标志着宋代科场巡考法初步形成,其后巡考法的发展变化多是在此基础上进行的调整和完善。宋代科场监考法不断发展完善,在一定程度上防范、遏制了科举怀挟作弊泛滥成灾的局面,维护了科场的正常秩序和考试的公平公正。 展开更多
关键词 宋代 科举 怀挟 监考
在线阅读 下载PDF
上一页 1 2 68 下一页 到第
使用帮助 返回顶部