SlideShare una empresa de Scribd logo
1 de 17
PLAGIARISM
AND ITS
DETECTION
Rahul Chopra ( 9910103494 )
INTRODUCTION
o Plagiarism: The representation of another’s work as
one’s own.
o It is serious problem for academics now a days.
o In computing courses, students often plagiarize
various assignments, source code.
o Usually they may copy it from their friends or web.
o Manual comparison is rather impractical or difficult
too.
What is Plagiarism?
o “Copying the language, structure, ideas and/or
thoughts of another and adopting the same as
one’s own original work.”
o Taking over the ideas, methods, or written words of
another, without acknowledgement and with the
intention that they be taken as the work of the
deceiver.
Why is plagiarism strongly
discouraged?
o Plagiarism is dishonest because one uses another’s
work as one’s own.
o If one plagiarize, they are cheating themselves.
o Plagiarism violates intellectual property rights,
leading to damages or fines.
How to avoid plagiarism
o Use your own words and ideas.
o Give proper credit for copied, adapted or
paraphrased materials.
o Avoid using others work with minor cosmetic
changes. Examples: using synonyms such as
therefore and thus, reversing sentence order or
changing format or layout of a text.
o If you use another’s exact words, you must use
quotation marks (“..”) or (‘..’).
Its Simple
PLAGIARISM
DETECTION
How It Works
o A number of approaches have been proposed to
detect plagiarism
o In my program I have used 8 length, 7 length, 6
length comparison technique. This technique
attempts to compute the degree of similarity
between the selected file and all the available files
in a system. These files include text.
o The overall method works in two stages, with the first
being to convert both the source and target files
into token strings.
PLAGIARISM
DETECTION
o This involves in each case ,
• Removing comments and string-constants.
• Translating upper case letters into lower case.
o The next phase is the comparison phase in which
we compare every token of both source and target
files in the length of 8, 7 or 6.
o If the length of string gets compared we calculate
the no of words matched within the matched file
and then find the plagiarism of the source file.
FEATURES
o Find files (used as a system crawler)
o Check files (text)
o Detect Plagiarism within text files
o Easy To Use
o Free File Check
o Multiple String Lengths (6,7,8 length)
o Save output in your system
o Decreased time complexity ( O(mn))
STOP
SELECT FILE FOR PLAGUE DETECTION
SEARCH ALL FILES ON SYSTEM (system
crawler)
COMPARE THE TEXT OF .TXT FILES
WITH THE GIVEN FILE
CALCULATE THE PERCENTAGE MATCH
AND DISPLAY THE RESULT
START
FLOW
CHART
Detailed Flow Chart
Limitation
o Integration of web crawler within the Software
(due to longer execution time taken for extracting
the files from internet)
o Execution Time (due to checking all the available
files within the system)
Examples of penalty for
plagiarism:
o In 2002, Prof. David Monash, rector of
Monash University(Australia), was caught citing
some paragraphs without sources in his books
published in 1970s. He then resigned to maintain his
institution’s reputation.
o In 2004, Prof. Sultan, professor of Immunology of
Harvard University, was accused of plagiarizing from
four papers. Consequently, he was banned from
reviewing papers for 3years
Literature Survey
• Juwah, C., Lal, D. and Beloucif, A.
(2006) Overcoming the cultural associated with
plagiarism for International students
• Turnitin.com and plagiarism.org for educators to
prevent plagiarism, engage students.
• Article: “Actions Do Speak Louder Than Words:
Deterring Plagiarism with the use of Plagiarism
Detection Software” by Bear F. Braumoeller, Brian J.
Gaines
• greenplagiarism.pdf
• Plagiarism_ a misplaced emphasis.pdf
References
• University of California, Davis. Avoiding plagiarism
±Mastering the Art of scholarship. 2006 [cited 2010 June
14]. Available from:
www.sja.ucdavis.edu/files/plagiarism.pdf
• The Weissman Centre for Leadership and Liberal Arts.
How to paraphrase to avoid plagiarism. 2007 [cited 2010
June 14]. Available from: www.mtholyoke.edu/go/saw
• Roige, M. Examples of paraphrasing: good and bad.
2006[cited 2010 June 14]. Available from:
http://facpub.stjohns.edu/~roigm/plagiarism/
• Lester, James D. Writing Research Papers. 2nd ed. (1976)
Conclusion
In the age of information technologies plagiarism has become
more actual and turned into a serious problem. In this ways how
to reduce plagiarism are discussed. Plagiarism prevention
methods which are based on society’s change of attitude
against plagiarism without any doubt are the most significant
means to fight against plagiarism, but implementation of these
methods is a challenge for society as a whole. At the present
such abilities are not available for plagiarism detection software
tools. But nevertheless computer based plagiarism detection
tools can considerably help to find plagiarized documents.
FUTURE SCOPE
• Project can further be made for .pdf and .docx files.
• Can make this application available for internet i.e
a web application of plagiarism can be made.
• Time complexity can be reduced to nlog(n)
Thanks for your attention

Más contenido relacionado

La actualidad más candente (20)

What Is Plagiarism?
What Is Plagiarism?What Is Plagiarism?
What Is Plagiarism?
 
Unit 5
Unit  5Unit  5
Unit 5
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Selective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of DataSelective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of Data
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism ppt
Plagiarism pptPlagiarism ppt
Plagiarism ppt
 
What is plagiarism?
What is plagiarism?What is plagiarism?
What is plagiarism?
 
REDUNDANT PUBLICATION IN RESEARCH
REDUNDANT PUBLICATION IN RESEARCHREDUNDANT PUBLICATION IN RESEARCH
REDUNDANT PUBLICATION IN RESEARCH
 
Predatory publishers and journals
Predatory publishers and journalsPredatory publishers and journals
Predatory publishers and journals
 
Plagiarism and Techniques to Avoid Plagiarism
Plagiarism and Techniques to Avoid PlagiarismPlagiarism and Techniques to Avoid Plagiarism
Plagiarism and Techniques to Avoid Plagiarism
 
Academic Integrity Overview
Academic Integrity OverviewAcademic Integrity Overview
Academic Integrity Overview
 
Research Metrics
Research MetricsResearch Metrics
Research Metrics
 
Authorship Issues
Authorship IssuesAuthorship Issues
Authorship Issues
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint Presentation
 
Publication ethics
Publication ethicsPublication ethics
Publication ethics
 
Predatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for IdentificationPredatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for Identification
 
Open Access Initiatives
Open Access Initiatives Open Access Initiatives
Open Access Initiatives
 
Research Methodology-03: Plagiarism
Research Methodology-03: PlagiarismResearch Methodology-03: Plagiarism
Research Methodology-03: Plagiarism
 
Redundant Publications.pptx
Redundant Publications.pptxRedundant Publications.pptx
Redundant Publications.pptx
 
Thesis plagiarism checker
Thesis plagiarism checkerThesis plagiarism checker
Thesis plagiarism checker
 

Similar a Plagiarism and its detection

Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesTurnitin User Experience Team
 
Types of plagiarism law
Types of plagiarism law Types of plagiarism law
Types of plagiarism law Sarah George
 
Preventing & detecting plagiarism
Preventing & detecting plagiarismPreventing & detecting plagiarism
Preventing & detecting plagiarismLCCeszymanski
 
A & S Plagiarism Presentation
A & S Plagiarism PresentationA & S Plagiarism Presentation
A & S Plagiarism PresentationDonnaGunter
 
Online plagarism
Online plagarismOnline plagarism
Online plagarismKyancey
 
Online plagarism
Online plagarismOnline plagarism
Online plagarismKyancey
 
seminar on how to write research papers without being called plagiarist
seminar on how to write research papers without  being called  plagiaristseminar on how to write research papers without  being called  plagiarist
seminar on how to write research papers without being called plagiaristAboul Ella Hassanien
 
Plagiarism: Detect and Prevent
Plagiarism: Detect and PreventPlagiarism: Detect and Prevent
Plagiarism: Detect and PreventNur Ahammad
 
Responsible scholarship.part1
Responsible scholarship.part1Responsible scholarship.part1
Responsible scholarship.part1Susanne Noll
 
How to be better scholars 2014
How to be better scholars 2014How to be better scholars 2014
How to be better scholars 2014al127
 
Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing
Ethical and Unethical Methods of Plagiarism Prevention in Academic WritingEthical and Unethical Methods of Plagiarism Prevention in Academic Writing
Ethical and Unethical Methods of Plagiarism Prevention in Academic WritingNader Ale Ebrahim
 
Avoid plagiarism may 2011
Avoid plagiarism may 2011Avoid plagiarism may 2011
Avoid plagiarism may 2011karlenerob
 
Avoid plagiarism may 2011
Avoid plagiarism may 2011Avoid plagiarism may 2011
Avoid plagiarism may 2011weirnelson
 
Types of plagiarism harvard
Types of plagiarism harvardTypes of plagiarism harvard
Types of plagiarism harvardSarah George
 

Similar a Plagiarism and its detection (20)

Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front Lines
 
RM Q1_Q15_Q16_Q17.docx
RM Q1_Q15_Q16_Q17.docxRM Q1_Q15_Q16_Q17.docx
RM Q1_Q15_Q16_Q17.docx
 
Types of plagiarism law
Types of plagiarism law Types of plagiarism law
Types of plagiarism law
 
Preventing & detecting plagiarism
Preventing & detecting plagiarismPreventing & detecting plagiarism
Preventing & detecting plagiarism
 
A & S Plagiarism Presentation
A & S Plagiarism PresentationA & S Plagiarism Presentation
A & S Plagiarism Presentation
 
Online plagarism
Online plagarismOnline plagarism
Online plagarism
 
Online plagarism
Online plagarismOnline plagarism
Online plagarism
 
seminar on how to write research papers without being called plagiarist
seminar on how to write research papers without  being called  plagiaristseminar on how to write research papers without  being called  plagiarist
seminar on how to write research papers without being called plagiarist
 
Plagiarism: Detect and Prevent
Plagiarism: Detect and PreventPlagiarism: Detect and Prevent
Plagiarism: Detect and Prevent
 
Responsible scholarship.part1
Responsible scholarship.part1Responsible scholarship.part1
Responsible scholarship.part1
 
How to be better scholars 2014
How to be better scholars 2014How to be better scholars 2014
How to be better scholars 2014
 
Plagiarism Issues
Plagiarism Issues Plagiarism Issues
Plagiarism Issues
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing
Ethical and Unethical Methods of Plagiarism Prevention in Academic WritingEthical and Unethical Methods of Plagiarism Prevention in Academic Writing
Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing
 
Plagiarism for dummies
Plagiarism for dummiesPlagiarism for dummies
Plagiarism for dummies
 
plagrism pp.pptx
plagrism pp.pptxplagrism pp.pptx
plagrism pp.pptx
 
Avoid plagiarism may 2011
Avoid plagiarism may 2011Avoid plagiarism may 2011
Avoid plagiarism may 2011
 
Avoid plagiarism may 2011
Avoid plagiarism may 2011Avoid plagiarism may 2011
Avoid plagiarism may 2011
 
Academic integrity
Academic integrityAcademic integrity
Academic integrity
 
Types of plagiarism harvard
Types of plagiarism harvardTypes of plagiarism harvard
Types of plagiarism harvard
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Plagiarism and its detection

  • 2. INTRODUCTION o Plagiarism: The representation of another’s work as one’s own. o It is serious problem for academics now a days. o In computing courses, students often plagiarize various assignments, source code. o Usually they may copy it from their friends or web. o Manual comparison is rather impractical or difficult too.
  • 3. What is Plagiarism? o “Copying the language, structure, ideas and/or thoughts of another and adopting the same as one’s own original work.” o Taking over the ideas, methods, or written words of another, without acknowledgement and with the intention that they be taken as the work of the deceiver.
  • 4. Why is plagiarism strongly discouraged? o Plagiarism is dishonest because one uses another’s work as one’s own. o If one plagiarize, they are cheating themselves. o Plagiarism violates intellectual property rights, leading to damages or fines.
  • 5. How to avoid plagiarism o Use your own words and ideas. o Give proper credit for copied, adapted or paraphrased materials. o Avoid using others work with minor cosmetic changes. Examples: using synonyms such as therefore and thus, reversing sentence order or changing format or layout of a text. o If you use another’s exact words, you must use quotation marks (“..”) or (‘..’).
  • 7. PLAGIARISM DETECTION How It Works o A number of approaches have been proposed to detect plagiarism o In my program I have used 8 length, 7 length, 6 length comparison technique. This technique attempts to compute the degree of similarity between the selected file and all the available files in a system. These files include text. o The overall method works in two stages, with the first being to convert both the source and target files into token strings.
  • 8. PLAGIARISM DETECTION o This involves in each case , • Removing comments and string-constants. • Translating upper case letters into lower case. o The next phase is the comparison phase in which we compare every token of both source and target files in the length of 8, 7 or 6. o If the length of string gets compared we calculate the no of words matched within the matched file and then find the plagiarism of the source file.
  • 9. FEATURES o Find files (used as a system crawler) o Check files (text) o Detect Plagiarism within text files o Easy To Use o Free File Check o Multiple String Lengths (6,7,8 length) o Save output in your system o Decreased time complexity ( O(mn))
  • 10. STOP SELECT FILE FOR PLAGUE DETECTION SEARCH ALL FILES ON SYSTEM (system crawler) COMPARE THE TEXT OF .TXT FILES WITH THE GIVEN FILE CALCULATE THE PERCENTAGE MATCH AND DISPLAY THE RESULT START FLOW CHART Detailed Flow Chart
  • 11. Limitation o Integration of web crawler within the Software (due to longer execution time taken for extracting the files from internet) o Execution Time (due to checking all the available files within the system)
  • 12. Examples of penalty for plagiarism: o In 2002, Prof. David Monash, rector of Monash University(Australia), was caught citing some paragraphs without sources in his books published in 1970s. He then resigned to maintain his institution’s reputation. o In 2004, Prof. Sultan, professor of Immunology of Harvard University, was accused of plagiarizing from four papers. Consequently, he was banned from reviewing papers for 3years
  • 13. Literature Survey • Juwah, C., Lal, D. and Beloucif, A. (2006) Overcoming the cultural associated with plagiarism for International students • Turnitin.com and plagiarism.org for educators to prevent plagiarism, engage students. • Article: “Actions Do Speak Louder Than Words: Deterring Plagiarism with the use of Plagiarism Detection Software” by Bear F. Braumoeller, Brian J. Gaines • greenplagiarism.pdf • Plagiarism_ a misplaced emphasis.pdf
  • 14. References • University of California, Davis. Avoiding plagiarism ±Mastering the Art of scholarship. 2006 [cited 2010 June 14]. Available from: www.sja.ucdavis.edu/files/plagiarism.pdf • The Weissman Centre for Leadership and Liberal Arts. How to paraphrase to avoid plagiarism. 2007 [cited 2010 June 14]. Available from: www.mtholyoke.edu/go/saw • Roige, M. Examples of paraphrasing: good and bad. 2006[cited 2010 June 14]. Available from: http://facpub.stjohns.edu/~roigm/plagiarism/ • Lester, James D. Writing Research Papers. 2nd ed. (1976)
  • 15. Conclusion In the age of information technologies plagiarism has become more actual and turned into a serious problem. In this ways how to reduce plagiarism are discussed. Plagiarism prevention methods which are based on society’s change of attitude against plagiarism without any doubt are the most significant means to fight against plagiarism, but implementation of these methods is a challenge for society as a whole. At the present such abilities are not available for plagiarism detection software tools. But nevertheless computer based plagiarism detection tools can considerably help to find plagiarized documents.
  • 16. FUTURE SCOPE • Project can further be made for .pdf and .docx files. • Can make this application available for internet i.e a web application of plagiarism can be made. • Time complexity can be reduced to nlog(n)
  • 17. Thanks for your attention