排序方式: 共有185条查询结果,搜索用时 78 毫秒
1.
Yohannes Eneyew Ayalew 《Information & Communications Technology Law》2019,28(2):208-224
Freedom of expression is a foundational stone for democracy and embraces a number of other rights, including – freedom to seek, receive, and impart information using any medium. Around 16 million Ethiopians, comprising 15.4% of the total population, use the Internet. The Ethiopian Internet shutdown saga has been marked by competing narratives. On one hand, the government has been using two governing narratives, i.e. national security narrative and ‘economic growth’ narrative to justify shutdowns of the Internet. But, the individuals’ self-expressions on social media find itself as competing narrative. Since 2016, the Internet has been closed more than six times under the cloak of national security, quelling rising protests, controlling strikes, and exam cheating. As such, freedom of expression of millions has been muzzled. The article argues blanket Internet shutdowns do not meet the caveats of human rights law. 相似文献
2.
简要介绍了基于压缩感知理论,对重构随机出现的考试作弊信号进行了仿真实验,理论实验表明,基于压缩感知理论的信号重构算法可以快速有效的发现随机出现的作弊信号,为后续的阻断工作奠定了基础。 相似文献
3.
4.
大学生考试作弊心理干预研究 总被引:1,自引:0,他引:1
牛青杨 《平顶山工学院学报》2009,18(1)
大学生考试作弊被考务人员发现并形成事实是大学校园客观存在的一种现象,极易引发学生产生严重的心理危机.在总结考试作弊被发现后大学生心理危机特点的基础上,根据心理危机干预原理,提出了考试作弊后心理危机干预的方法和措施. 相似文献
5.
大学生考试作弊行为作为考试行为中的一种特殊行为现象,它是由一定的心理动机支配的。结合心理学相关原理,从气质、性格、道德感、兴趣和价值观等方面来分析大学生考试作弊的心理原因,对抵制、消除大学生作弊行为具有积极的能动效应。 相似文献
6.
通过分析一种多重密钥共享认证改进方案,指出其中存在的漏洞和防止成员欺骗中存在的问题,提出了自己的完善方案,使其在共享多个密钥、子密钥可以重复使用、防止管理者欺骗及参与成员欺骗等方面更加完善. 相似文献
7.
8.
从大学生作弊与否的行为来考察其学习动机的差异,并力求使学生通过努力归因形成掌握目标并从根本上减少学生的作弊行为。 相似文献
9.
Jean Georgiades 《Journal of Cryptology》1992,5(2):133-137
We present in this paper an idea of how to reduce the number of possible permutations when trying to solve the permuted kernels problem. We refer to the identification scheme of Shamir [2] and we also show how a dishonest prover can maximize his prospects to pass the test. 相似文献
10.
—We proposed a verifiable multi-secret shar-ing scheme without a dealer. We use cellular automata, having the properties of linear computations and parallel computations, to construct our scheme. The linear com-putational property makes it possible to build a scheme without the assistance of a trusted dealer, and the parallel computational property contributes to the high efficiency of the scheme. Hash function is used to realize the verifica-tion of shares, which also makes our scheme more efficient. The security of the scheme is also analyzed. 相似文献