plag detection

21
KIET SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER APPICATIONS PRESENTATION ON Plagiarism-Detection-Technique SUBMITTED BY ROLL NO. :- 1102914084 NAME :- Rishabh Dixit SEMESTER :- 6 th sem SECTION :- B 1

Upload: rishabh-dixit

Post on 25-Jan-2015

142 views

Category:

Education


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Plag detection

KIET SCHOOL OF ENGINEERING & TECHNOLOGY

DEPARTMENT OF COMPUTER APPICATIONS

PRESENTATION ONPlagiarism-Detection-Technique

SUBMITTED BY

ROLL NO. :- 1102914084NAME :- Rishabh DixitSEMESTER :- 6th semSECTION :- B

1

Page 2: Plag detection

Introduction Describing Plagiarism Plagiarism Detection Software Aided Detection Approaches Disadvantage of the Plagiarism Conclusion References

2

Page 3: Plag detection

Plagiarism is a significant problem on almost every college and university campus. The problems of plagiarism go beyond the campus, and have become an issue in industry, journalism, and government activities.

Plagiarism refers to “the act of copying materials without actually acknowledging the original source”.

3

Page 4: Plag detection

Plagiarism can be described as: Turning in someone else's work as your own.  Copying words or ideas from someone else without

giving credit.  Giving incorrect information about the source of a

quotation.  Changing words but copying the sentence structure of a

source without giving credit. 

4

Page 5: Plag detection

5

Page 6: Plag detection

collection stage may be defined as the process of

electronically collecting and pre-processing student

submissions into a suitable format. Analysis is defined as “where the submissions are

compared with each other and with Documents

obtained from the Web and the list of those submissions,

or pairs, the list of those submissions, or pairs,

that require further investigation is produced.”

6

Page 7: Plag detection

Verification (confirmation) is required to ensure that

those pairs reported as being suspicious are worth

investigating with a view to possible disciplinary action

(this is a task normally undertaken by humans, since

value judgements May be involved).

The final stage, investigation, will determine the extent

of the alleged misconduct and will “also involve the

process of deciding culpability and possible penalties.”

7

Page 8: Plag detection

8

Page 9: Plag detection

Computer-assisted plagiarism detection (CaPD) is an Information retrieval (IR) task supported by specialized IR systems, referred to as plagiarism detection systems (PDS).

9

Page 10: Plag detection

10

Page 11: Plag detection

Fingerprinting:- Fingerprinting is currently the most widely applied

approach to plagiarism detection. The sets represent the fingerprints and their elements

are called minutiae. A suspicious document is checked for plagiarism by

computing its fingerprint and querying minutiae with a precomputed index of fingerprints for all documents of a reference collection.

11

Page 12: Plag detection

String matching :- String matching is a prevalent approach used in

computer science. Checking a suspicious document in this setting requires

the computation and storage of efficiently comparable representations for all documents in the reference collection to compare them pairwise.

 

12

Page 13: Plag detection

Bag of words:- Bag of words analysis represent the adoption of vector

space retrieval, a traditional IR concept, to the domain of plagiarism detection.

Documents are represented as one or multiple vectors, e.g. for different document parts, which are used for pair wise similarity computations.

13

Page 14: Plag detection

TurnItIn: Four UC Berkeley graduate students designed a peer

review application to use for their classes — thus, TurnItIn was born. Eventually, that prototype developed into one of the most recognizable names in plagiarism detection.

Students can use TurnItIn's WriteCheck service to maintain proper citations and to access various writing tools. Teachers can ask students to submit their papers through the service as a first measure.

14

Page 15: Plag detection

Viper: Viper calls itself the "Free TurnItIn

Alternative." It scans a large database of academic essays and other online sources, offering side-by-side comparisons for plagiarism.

15

Page 16: Plag detection

Plagiarism Detection systems are built based on a few

languages. To check for plagiarism with the Same

software can be difficult. Most of the detection software checking is done with

some repository situated in an organization .Other people

are unable to access it and verify for plagiarism. As the number of digital copies are going up the repository

size should be large and the plagiarism Detection software

should be able to handle it.16

Page 17: Plag detection

There is some plagiarism detection software available

which ask us to load a file to their link. Once done the

file is copied to their database and then checked for

plagiarism. This also comes with an inherent

chance of our data being leaked or hacked for other

purposes.

17

Page 18: Plag detection

18

Page 19: Plag detection

Plagiarism is rampant now. With most of the data

available to us in digital format the venues for

plagiarism is opening up.

To avoid this kind of cheating and to acknowledge

the originality of the author new detection techniques

are to be created.

To protect the intellectual property source code new techniques are to be developed and implemented.

19

Page 20: Plag detection

[1] Steven Burrows 1, Seyed M. M. Tahaghoghi 1 & Justin Zobel , Proceedings of the Second Australian Undergraduate Students' Computing Conference, 2004

http://citeseerx.ist.psu.edu/viewdoc/download?doi=

10.1.1.69.4500&rep=rep1&type=pdf

[2] Georgina Cosma , Mike Joy, Daniel White and Jane Yau, 9th August 2007 ,ICS University of Ulster. http://www.ics.heacademy.ac.uk/resources/assessment/plagiarism/

[3] Plagiarism detection software, How effective it is?,

20

Page 21: Plag detection

CSHE, http://www.cshe.unimelb.edu.au/assessinglearning/docs/

PlagSoftware.pdf[4] Maeve Paris, School of Computing & Intelligent

Systems, University of Ulster http://www.ics.heacademy.ac.uk/Events/conf2003/

maeve.htm[5] S.A.F.E, http://www.safe-corp.biz/products_codesuite.htm

21