Your SlideShare is downloading. ×
0
PLAGIARISM
AND ITS
DETECTION
Rahul Chopra ( 9910103494 )
INTRODUCTION
o Plagiarism: The representation of another’s work as
one’s own.
o It is serious problem for academics now a ...
What is Plagiarism?
o “Copying the language, structure, ideas and/or
thoughts of another and adopting the same as
one’s ow...
Why is plagiarism strongly
discouraged?
o Plagiarism is dishonest because one uses another’s
work as one’s own.
o If one p...
How to avoid plagiarism
o Use your own words and ideas.
o Give proper credit for copied, adapted or
paraphrased materials....
Its Simple
PLAGIARISM
DETECTION
How It Works
o A number of approaches have been proposed to
detect plagiarism
o In my program I have ...
PLAGIARISM
DETECTION
o This involves in each case ,
• Removing comments and string-constants.
• Translating upper case let...
FEATURES
o Find files (used as a system crawler)
o Check files (text)
o Detect Plagiarism within text files
o Easy To Use
...
STOP
SELECT FILE FOR PLAGUE DETECTION
SEARCH ALL FILES ON SYSTEM (system
crawler)
COMPARE THE TEXT OF .TXT FILES
WITH THE ...
Limitation
o Integration of web crawler within the Software
(due to longer execution time taken for extracting
the files f...
Examples of penalty for
plagiarism:
o In 2002, Prof. David Monash, rector of
Monash University(Australia), was caught citi...
Literature Survey
• Juwah, C., Lal, D. and Beloucif, A.
(2006) Overcoming the cultural associated with
plagiarism for Inte...
References
• University of California, Davis. Avoiding plagiarism
±Mastering the Art of scholarship. 2006 [cited 2010 June...
Conclusion
In the age of information technologies plagiarism has become
more actual and turned into a serious problem. In ...
FUTURE SCOPE
• Project can further be made for .pdf and .docx files.
• Can make this application available for internet i....
Thanks for your attention
Upcoming SlideShare
Loading in...5
×

Plagiarism and its detection

326

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
326
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
54
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Plagiarism and its detection"

  1. 1. PLAGIARISM AND ITS DETECTION Rahul Chopra ( 9910103494 )
  2. 2. INTRODUCTION o Plagiarism: The representation of another’s work as one’s own. o It is serious problem for academics now a days. o In computing courses, students often plagiarize various assignments, source code. o Usually they may copy it from their friends or web. o Manual comparison is rather impractical or difficult too.
  3. 3. What is Plagiarism? o “Copying the language, structure, ideas and/or thoughts of another and adopting the same as one’s own original work.” o Taking over the ideas, methods, or written words of another, without acknowledgement and with the intention that they be taken as the work of the deceiver.
  4. 4. Why is plagiarism strongly discouraged? o Plagiarism is dishonest because one uses another’s work as one’s own. o If one plagiarize, they are cheating themselves. o Plagiarism violates intellectual property rights, leading to damages or fines.
  5. 5. How to avoid plagiarism o Use your own words and ideas. o Give proper credit for copied, adapted or paraphrased materials. o Avoid using others work with minor cosmetic changes. Examples: using synonyms such as therefore and thus, reversing sentence order or changing format or layout of a text. o If you use another’s exact words, you must use quotation marks (“..”) or (‘..’).
  6. 6. Its Simple
  7. 7. PLAGIARISM DETECTION How It Works o A number of approaches have been proposed to detect plagiarism o In my program I have used 8 length, 7 length, 6 length comparison technique. This technique attempts to compute the degree of similarity between the selected file and all the available files in a system. These files include text. o The overall method works in two stages, with the first being to convert both the source and target files into token strings.
  8. 8. PLAGIARISM DETECTION o This involves in each case , • Removing comments and string-constants. • Translating upper case letters into lower case. o The next phase is the comparison phase in which we compare every token of both source and target files in the length of 8, 7 or 6. o If the length of string gets compared we calculate the no of words matched within the matched file and then find the plagiarism of the source file.
  9. 9. FEATURES o Find files (used as a system crawler) o Check files (text) o Detect Plagiarism within text files o Easy To Use o Free File Check o Multiple String Lengths (6,7,8 length) o Save output in your system o Decreased time complexity ( O(mn))
  10. 10. STOP SELECT FILE FOR PLAGUE DETECTION SEARCH ALL FILES ON SYSTEM (system crawler) COMPARE THE TEXT OF .TXT FILES WITH THE GIVEN FILE CALCULATE THE PERCENTAGE MATCH AND DISPLAY THE RESULT START FLOW CHART Detailed Flow Chart
  11. 11. Limitation o Integration of web crawler within the Software (due to longer execution time taken for extracting the files from internet) o Execution Time (due to checking all the available files within the system)
  12. 12. Examples of penalty for plagiarism: o In 2002, Prof. David Monash, rector of Monash University(Australia), was caught citing some paragraphs without sources in his books published in 1970s. He then resigned to maintain his institution’s reputation. o In 2004, Prof. Sultan, professor of Immunology of Harvard University, was accused of plagiarizing from four papers. Consequently, he was banned from reviewing papers for 3years
  13. 13. Literature Survey • Juwah, C., Lal, D. and Beloucif, A. (2006) Overcoming the cultural associated with plagiarism for International students • Turnitin.com and plagiarism.org for educators to prevent plagiarism, engage students. • Article: “Actions Do Speak Louder Than Words: Deterring Plagiarism with the use of Plagiarism Detection Software” by Bear F. Braumoeller, Brian J. Gaines • greenplagiarism.pdf • Plagiarism_ a misplaced emphasis.pdf
  14. 14. References • University of California, Davis. Avoiding plagiarism ±Mastering the Art of scholarship. 2006 [cited 2010 June 14]. Available from: www.sja.ucdavis.edu/files/plagiarism.pdf • The Weissman Centre for Leadership and Liberal Arts. How to paraphrase to avoid plagiarism. 2007 [cited 2010 June 14]. Available from: www.mtholyoke.edu/go/saw • Roige, M. Examples of paraphrasing: good and bad. 2006[cited 2010 June 14]. Available from: http://facpub.stjohns.edu/~roigm/plagiarism/ • Lester, James D. Writing Research Papers. 2nd ed. (1976)
  15. 15. Conclusion In the age of information technologies plagiarism has become more actual and turned into a serious problem. In this ways how to reduce plagiarism are discussed. Plagiarism prevention methods which are based on society’s change of attitude against plagiarism without any doubt are the most significant means to fight against plagiarism, but implementation of these methods is a challenge for society as a whole. At the present such abilities are not available for plagiarism detection software tools. But nevertheless computer based plagiarism detection tools can considerably help to find plagiarized documents.
  16. 16. FUTURE SCOPE • Project can further be made for .pdf and .docx files. • Can make this application available for internet i.e a web application of plagiarism can be made. • Time complexity can be reduced to nlog(n)
  17. 17. Thanks for your attention
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×