Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

April Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the April 2021 Edition of the journal. The last date of research paper submission is March 15, 2021.

Plagiarism Index Estimation Algorithm: A Quantitative Approach

Monday O. Eze, Shakeel A. Kamboh Published in Algorithms

International Journal of Applied Information Systems
Year of Publication: 2015
© 2013 by IJAIS Journal
10.5120/ijais15-451307
Download full text
  1. Monday O Eze and Shakeel A Kamboh. Article: Plagiarism Index Estimation Algorithm: A Quantitative Approach. International Journal of Applied Information Systems 8(4):36-46, February 2015. BibTeX

    @article{key:article,
    	author = "Monday O. Eze and Shakeel A. Kamboh",
    	title = "Article: Plagiarism Index Estimation Algorithm: A Quantitative Approach",
    	journal = "International Journal of Applied Information Systems",
    	year = 2015,
    	volume = 8,
    	number = 4,
    	pages = "36-46",
    	month = "February",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Plagiarism has remained a serious setback especially in the academia. It is a major source of intellectual theft since it gives credits for scientific innovations to those who do not merit them. A number of efforts have been made by researchers to tackle plagiarism. However, one perceived research gap is the need to evolve verifiable computational techniques for detecting and quantifying the degree of plagiarism in digitized documents. This current research tackles this problem through a specialized plagiarism detection and quantification algorithm. It begins with a bi-partitioned search operation known as F-Search. This is followed by a purge operation which excludes the plagiarized sections discovered during the initial pass, thus giving rise to a fresh search space. The resulting search space is passed through a more thorough search operation known as T-Search. At this stage, the algorithm deals with specific plagiarism hiding tricks termed as whitespace flooding. The final output is a statistic known as the Plagiarism Index, which is a numeric value in the range [0, 1] for estimating the degree of plagiarism. The scope of this research covers the text domain. Each experimental dataset is made up of a set of two documents designed in such a way that one is assumed as the original document, while the second as a plagiarized copy. The system is designed and implemented in MATLAB.

Reference

  1. Green, S. P. 2002. Plagiarism, Norms, and the Limits of Theft Law: Some Observations on the Use of Criminal Sanctions in Enforcing Intellectual Property Rights. Hastings Law Journal, Vol. 54, No. 1.
  2. Ashish,M. & Sasmita,M. 2012. Student Plagiarism in Higher Education: An Enigma or An Intellectual Crime, Vol 1, Issue 1, p90-100.
  3. Cambridge Univ. Press. 2008. Cambridge Advanced Learner's Dictionary, Cambridge University Press, The Edinburgh Building, Cambridge UK.
  4. Tri Le, A. C. , Judy, S. , Margot, S. , Michael, D. and Chris, J. 2013. Educating Computer Programming Students about Plagiarism through Use of a Code Similarity Detection Tool. LATICE, 2013, Learning and Teaching in Computing and Engineering (LaTiCE), pp. 98-105.
  5. Poongodi , D. and Tholkkappia, G. A. 2013. An Automatic Method for Statement Level Plagiarism Detection in Source Code Using Abstract Syntax Tree. Int. J. of Adv. Research in Comp. & Comm. Engineering. , Vol. 2, Issue 4, pp 1923-1938
  6. Kashkur, M. , Parshutin,S. & Arkady, B. 2010. Research into Plagiarism Cases and Plagiarism Detection Methods. Scientific Journal of Riga Tech. Univ. , Vol 44, p139-144.
  7. Mason, P. R. 2009. Plagiarism in Scientific Publications, J Infect Developing Countries, Vol. 3(1), p1-4.
  8. Bradley,T. 2010. Student Plagiarism and the Use of Plagiarism Detection Tool by Community College Faculty (a PhD Dissertation), Department of Educational Leadership, Indiana State University, Indiana.
  9. Batane, T. 2010. Turning to Turnitin to Fight Plagiarism among University Students. Educational Technology & Society, 13 (2), p1-12
  10. Howard, R. M. 2007. Understanding Internet plagiarism, Computers and Composition, Vol. 24, p3–15.
  11. Melton, T. D. , and Carmen, L. M. 2008. Plagiarism, Encyclopedia of the Social and Cultural Foundations of Education. Thousand Oaks, CA: SAGE 2008. p590-91
  12. Bin-Habtoor, A. S and Zaher, M. A. 2012. A Survey on Plagiarism Detection Systems. Int. Journal of Comp. Theory and Eng. Vol. 4, No. 2, p185-188
  13. Verco, K. L. and Wise, M. J. 2005. A comparison of automated systems for detecting suspected plagiarism, The Computer Journal.
  14. Efstathios, S. 2011. Plagiarism Detection Based on Structural Information, Dept. of Inf. and Communication Systems Eng. , Univ. of the Aegean, Greece.
  15. Potthast, M. , Barrón-Cedeño, A. , Eiselt, A. , Stein, B. , and Rosso, P. 2010. Overview of the 2nd international competition on plagiarism detection. In Proceedings of the 4th Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse.
  16. Schleimer, S. , Wilkerson, D. S. , and Aiken, A. 2003. Winnowing: Local algorithms for document fingerprinting. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 76-85.
  17. Kupers, R. , & Conrad, S. 2012. A Set-Based Approach to Plagiarism Detection. Notebook for PAN at CLEF 2012
  18. Hage, J. , Rademaker, P. and Vugt, N. 2010. A comparison of plagiarism detection tools. Technical Report UU-CS-2010-015, Department of Information and Computing Sciences Utrecht University, Utrecht, The Netherlands.
  19. Cosma, G. 2008. An Approach to Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis (a PhD Thesis), University of Warwick, Department of Computer Science.
  20. Izzat, A. , and Zakaria, I. S. 2012. Documents Similarities Algorithms for Research Papers Authenticity. Proceedings of Int. Conf. on Com. & Info Tech (ICCIT 2012) Hammamet, Tunisia. June 26-28, 2012, p210-214
  21. Pataki, M. 2003. Plagiarism Detection and Document Chunking Methods. Computer and Automation Research Institute, Hungarian Academy of Sciences
  22. Won, K. J. , Choi, K. , Yo, S. and Kim. J. 2013. A Study of Design and Implementation of Korean Plagiarism Detection System. International Journal of Software Eng. & Its Appl. , Vol. 7, No. 1, p211-220
  23. Mohamed, E. B. M. 2012. Detection of Plagiarism in Arabic Documents, Int. J. Inf Tech & Computer Science, p80-89,
  24. Jeong-II, P. , Sang-Wook, K. and Miyoung, S. 2005. Music Plagiarism Detection Using Melody Databases. , Knowledge- based intelligent info and eng systems lecture notes in comp science, Vol 3683, p684-693
  25. Asako, O. and Hajime, M. 2011. A Two-Step In-Class Source Code Plagiarism Detection Method Utilizing Improved CM Algorithm and SIM. International Journal of Innov. Computing, Info. & Control, Vol 7, No 8, Aug 2011, p4729-4739
  26. Salha, A. , Naomie, S. , and Ajith, A. 2012. Understanding Plagiarism Linguistic Patterns, Textual Features, and Detection Methods. , IEEE Transactions on Systems, Man, and Cybernetics – Part C: Applications and Reviews, Vol. 42, No. 2, p133-149.
  27. Leilei, K. , Zhimao, L. , Haoliang, Q. , and Zhongyuan, H. 2014. Detecting High Obfuscation Plagiarism: Exploring Multi-Features Fusion via Machine Learning. , Int. Journal of U & E-Service, Sc & Tech. , Vol. 7, No. 4. pp. 385-396.

Keywords

Plagiarism Index, Cell Array, Plagiarism Quantification, Bi-Partition.