SlideShare une entreprise Scribd logo
1  sur  21
KIET SCHOOL OF ENGINEERING &
TECHNOLOGY
DEPARTMENT OF COMPUTER APPICATIONS
PRESENTATION ON
Plagiarism-Detection-Technique
SUBMITTED BY
ROLL NO. :- 1102914084
NAME :- Rishabh Dixit
SEMESTER :- 6th sem
SECTION :- B
1
 Introduction
 Describing Plagiarism
 Plagiarism Detection
 Software Aided Detection
 Approaches
 Disadvantage of the Plagiarism
 Conclusion
 References
2
 Plagiarism is a significant problem on almost every
college and university campus. The problems of
plagiarism go beyond the campus, and have become an
issue in industry, journalism, and government activities.
 Plagiarism refers to “the act of copying materials
without actually acknowledging the original source”.
3
Plagiarism can be described as:
 Turning in someone else's work as your own.
 Copying words or ideas from someone else without
giving credit.
 Giving incorrect information about the source of a
quotation.
 Changing words but copying the sentence structure of a
source without giving
credit.
4
5
 collection stage may be defined as the process of
electronically collecting and pre-processing student
submissions into a suitable format.
 Analysis is defined as “where the submissions are
compared with each other and with Documents
obtained from the Web and the list of those submissions,
or pairs, the list of those submissions, or pairs,
that require further investigation is produced.”
6
 Verification (confirmation) is required to ensure that
those pairs reported as being suspicious are worth
investigating with a view to possible disciplinary action
(this is a task normally undertaken by humans, since
value judgements May be involved).
 The final stage, investigation, will determine the extent
of the alleged misconduct and will “also involve the
process of deciding culpability and possible penalties.”
7
8
 Computer-assisted plagiarism detection (CaPD) is an
Information retrieval (IR) task supported by
specialized IR systems, referred to as plagiarism
detection systems (PDS).
9
10
Fingerprinting:-
 Fingerprinting is currently the most widely applied
approach to plagiarism detection.
 The sets represent the fingerprints and their elements
are called minutiae.
 A suspicious document is checked for plagiarism by
computing its fingerprint and querying minutiae with a
precomputed index of fingerprints for all documents of
a reference collection.
11
String matching :-
 String matching is a prevalent approach used in
computer science.
 Checking a suspicious document in this setting requires
the computation and storage of efficiently comparable
representations for all documents in the reference
collection to compare them pairwise.
12
Bag of words:-
 Bag of words analysis represent the adoption of vector
space retrieval, a traditional IR concept, to the domain
of plagiarism detection.
 Documents are represented as one or multiple
vectors, e.g. for different document parts, which are
used for pair wise similarity computations.
13
TurnItIn:
 Four UC Berkeley graduate students designed a peer
review application to use for their classes — thus,
TurnItIn was born. Eventually, that prototype
developed into one of the most recognizable names in
plagiarism detection.
 Students can use TurnItIn's WriteCheck service to
maintain proper citations and to access various
writing tools. Teachers can ask students to submit
their papers through the service as a first measure.
14
Viper:
 Viper calls itself the "Free TurnItIn
Alternative." It scans a large database of
academic essays and other online sources,
offering side-by-side comparisons for
plagiarism.
15
Plagiarism Detection systems are built based on a few
languages. To check for plagiarism with the Same
software can be difficult.
 Most of the detection software checking is done with
some repository situated in an organization .Other people
are unable to access it and verify for plagiarism.
 As the number of digital copies are going up the repository
size should be large and the plagiarism Detection software
should be able to handle it.
16
 There is some plagiarism detection software available
which ask us to load a file to their link. Once done the
file is copied to their database and then checked for
plagiarism. This also comes with an inherent
chance of our data being leaked or hacked for other
purposes.
17
18
 Plagiarism is rampant now. With most of the data
available to us in digital format the venues for
plagiarism is opening up.
 To avoid this kind of cheating and to acknowledge
the originality of the author new detection techniques
are to be created.
 To protect the intellectual property source code new
techniques are to be developed and implemented.
19
[1] Steven Burrows 1, Seyed M. M. Tahaghoghi 1 &
Justin Zobel , Proceedings of the Second Australian
Undergraduate Students' Computing Conference, 2004
http://citeseerx.ist.psu.edu/viewdoc/download?doi=
10.1.1.69.4500&rep=rep1&type=pdf
[2] Georgina Cosma , Mike Joy, Daniel White and Jane
Yau, 9th August 2007 ,ICS University of Ulster.
http://www.ics.heacademy.ac.uk/resources/assessment/p
lagiarism/
[3] Plagiarism detection software, How effective it is?,
20
CSHE,
http://www.cshe.unimelb.edu.au/assessinglearning/docs/
PlagSoftware.pdf
[4] Maeve Paris, School of Computing & Intelligent
Systems, University of Ulster
http://www.ics.heacademy.ac.uk/Events/conf2003/
maeve.htm
[5] S.A.F.E,
http://www.safe-corp.biz/products_codesuite.htm
21

Contenu connexe

Tendances (20)

Plagiarism lecture
Plagiarism lecturePlagiarism lecture
Plagiarism lecture
 
Understanding Plagiarism
Understanding PlagiarismUnderstanding Plagiarism
Understanding Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
What Is Plagiarism?
What Is Plagiarism?What Is Plagiarism?
What Is Plagiarism?
 
PLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITINPLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
 
Ict workshop 2018 urkund
Ict workshop 2018 urkundIct workshop 2018 urkund
Ict workshop 2018 urkund
 
Unit 5
Unit  5Unit  5
Unit 5
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Avoiding Plagiarism 1
Avoiding Plagiarism 1Avoiding Plagiarism 1
Avoiding Plagiarism 1
 
Altmetrics
Altmetrics Altmetrics
Altmetrics
 
Thesis plagiarism checker
Thesis plagiarism checkerThesis plagiarism checker
Thesis plagiarism checker
 
Plagiarism Issues
Plagiarism Issues Plagiarism Issues
Plagiarism Issues
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagarismbykamlesh.pptx
Plagarismbykamlesh.pptxPlagarismbykamlesh.pptx
Plagarismbykamlesh.pptx
 
Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarism
 
Research Methodology-03: Plagiarism
Research Methodology-03: PlagiarismResearch Methodology-03: Plagiarism
Research Methodology-03: Plagiarism
 
What Is Plagiarism
What Is PlagiarismWhat Is Plagiarism
What Is Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

En vedette

Using Technology To Detect Plagiarism
Using Technology To Detect PlagiarismUsing Technology To Detect Plagiarism
Using Technology To Detect Plagiarismguestf17a2e
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationSteve Nelson
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt TeachersTedine Soule
 
Plagiarism Detection Tools
Plagiarism Detection ToolsPlagiarism Detection Tools
Plagiarism Detection ToolsKristen T
 
Choosing The Right Tool For The Job; How Maastricht University Is Selecting...
Choosing The Right Tool For The Job; How  Maastricht  University Is Selecting...Choosing The Right Tool For The Job; How  Maastricht  University Is Selecting...
Choosing The Right Tool For The Job; How Maastricht University Is Selecting...Maarten van Wesel
 
My Graduation Project Documentation: Plagiarism Detection System for English ...
My Graduation Project Documentation: Plagiarism Detection System for English ...My Graduation Project Documentation: Plagiarism Detection System for English ...
My Graduation Project Documentation: Plagiarism Detection System for English ...Ahmed Mater
 
Authorship attribution
Authorship attributionAuthorship attribution
Authorship attributionReza Ramezani
 
Automatic plagiarism detection system for specialized corpora
Automatic plagiarism detection system for specialized corporaAutomatic plagiarism detection system for specialized corpora
Automatic plagiarism detection system for specialized corporaTraian Rebedea
 
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...PyData
 
Google searching techniques
Google searching techniquesGoogle searching techniques
Google searching techniquesabbas mohd
 
The routledge handbook of forensic linguistics routledge handbooks in applied...
The routledge handbook of forensic linguistics routledge handbooks in applied...The routledge handbook of forensic linguistics routledge handbooks in applied...
The routledge handbook of forensic linguistics routledge handbooks in applied...yosra Yassora
 
Authorship analysis using function words forensic linguistics
Authorship analysis using function words forensic linguisticsAuthorship analysis using function words forensic linguistics
Authorship analysis using function words forensic linguisticsVlad Mackevic
 
NLP & Machine Learning - An Introductory Talk
NLP & Machine Learning - An Introductory Talk NLP & Machine Learning - An Introductory Talk
NLP & Machine Learning - An Introductory Talk Vijay Ganti
 
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...osify
 
Machine Learning for NLP
Machine Learning for NLPMachine Learning for NLP
Machine Learning for NLPbutest
 
Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningSujit Pal
 
Forensic linguistics
Forensic linguisticsForensic linguistics
Forensic linguisticsAbbou Zohra
 

En vedette (20)

Using Technology To Detect Plagiarism
Using Technology To Detect PlagiarismUsing Technology To Detect Plagiarism
Using Technology To Detect Plagiarism
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint Presentation
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt Teachers
 
Plagiarism Detection Tools
Plagiarism Detection ToolsPlagiarism Detection Tools
Plagiarism Detection Tools
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Choosing The Right Tool For The Job; How Maastricht University Is Selecting...
Choosing The Right Tool For The Job; How  Maastricht  University Is Selecting...Choosing The Right Tool For The Job; How  Maastricht  University Is Selecting...
Choosing The Right Tool For The Job; How Maastricht University Is Selecting...
 
My Graduation Project Documentation: Plagiarism Detection System for English ...
My Graduation Project Documentation: Plagiarism Detection System for English ...My Graduation Project Documentation: Plagiarism Detection System for English ...
My Graduation Project Documentation: Plagiarism Detection System for English ...
 
Authorship attribution
Authorship attributionAuthorship attribution
Authorship attribution
 
Automatic plagiarism detection system for specialized corpora
Automatic plagiarism detection system for specialized corporaAutomatic plagiarism detection system for specialized corpora
Automatic plagiarism detection system for specialized corpora
 
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
 
Google searching techniques
Google searching techniquesGoogle searching techniques
Google searching techniques
 
Searching techniques
Searching techniquesSearching techniques
Searching techniques
 
The routledge handbook of forensic linguistics routledge handbooks in applied...
The routledge handbook of forensic linguistics routledge handbooks in applied...The routledge handbook of forensic linguistics routledge handbooks in applied...
The routledge handbook of forensic linguistics routledge handbooks in applied...
 
Authorship analysis using function words forensic linguistics
Authorship analysis using function words forensic linguisticsAuthorship analysis using function words forensic linguistics
Authorship analysis using function words forensic linguistics
 
NLP & Machine Learning - An Introductory Talk
NLP & Machine Learning - An Introductory Talk NLP & Machine Learning - An Introductory Talk
NLP & Machine Learning - An Introductory Talk
 
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
 
Machine Learning for NLP
Machine Learning for NLPMachine Learning for NLP
Machine Learning for NLP
 
Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep Learning
 
Plagiarism Powerpoint
Plagiarism PowerpointPlagiarism Powerpoint
Plagiarism Powerpoint
 
Forensic linguistics
Forensic linguisticsForensic linguistics
Forensic linguistics
 

Similaire à Plag detection

The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...ijseajournal
 
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic ApproachA Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic ApproachCourtney Esco
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueDr. Amarjeet Singh
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docxAliAgral2
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
A Survey On Plagiarism Detection
A Survey On Plagiarism DetectionA Survey On Plagiarism Detection
A Survey On Plagiarism DetectionKarla Adamson
 
A framework for plagiarism
A framework for plagiarismA framework for plagiarism
A framework for plagiarismcsandit
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricsMayank Diwakar
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics IJNSA Journal
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxrakhicse
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensicsIJNSA Journal
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxOlusegun Mosugu
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxcarlibradley31429
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Reviewtheijes
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 

Similaire à Plag detection (20)

The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
 
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic ApproachA Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docx
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
A Survey On Plagiarism Detection
A Survey On Plagiarism DetectionA Survey On Plagiarism Detection
A Survey On Plagiarism Detection
 
A framework for plagiarism
A framework for plagiarismA framework for plagiarism
A framework for plagiarism
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 

Dernier

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Dernier (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Plag detection

  • 1. KIET SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER APPICATIONS PRESENTATION ON Plagiarism-Detection-Technique SUBMITTED BY ROLL NO. :- 1102914084 NAME :- Rishabh Dixit SEMESTER :- 6th sem SECTION :- B 1
  • 2.  Introduction  Describing Plagiarism  Plagiarism Detection  Software Aided Detection  Approaches  Disadvantage of the Plagiarism  Conclusion  References 2
  • 3.  Plagiarism is a significant problem on almost every college and university campus. The problems of plagiarism go beyond the campus, and have become an issue in industry, journalism, and government activities.  Plagiarism refers to “the act of copying materials without actually acknowledging the original source”. 3
  • 4. Plagiarism can be described as:  Turning in someone else's work as your own.  Copying words or ideas from someone else without giving credit.  Giving incorrect information about the source of a quotation.  Changing words but copying the sentence structure of a source without giving credit. 4
  • 5. 5
  • 6.  collection stage may be defined as the process of electronically collecting and pre-processing student submissions into a suitable format.  Analysis is defined as “where the submissions are compared with each other and with Documents obtained from the Web and the list of those submissions, or pairs, the list of those submissions, or pairs, that require further investigation is produced.” 6
  • 7.  Verification (confirmation) is required to ensure that those pairs reported as being suspicious are worth investigating with a view to possible disciplinary action (this is a task normally undertaken by humans, since value judgements May be involved).  The final stage, investigation, will determine the extent of the alleged misconduct and will “also involve the process of deciding culpability and possible penalties.” 7
  • 8. 8
  • 9.  Computer-assisted plagiarism detection (CaPD) is an Information retrieval (IR) task supported by specialized IR systems, referred to as plagiarism detection systems (PDS). 9
  • 10. 10
  • 11. Fingerprinting:-  Fingerprinting is currently the most widely applied approach to plagiarism detection.  The sets represent the fingerprints and their elements are called minutiae.  A suspicious document is checked for plagiarism by computing its fingerprint and querying minutiae with a precomputed index of fingerprints for all documents of a reference collection. 11
  • 12. String matching :-  String matching is a prevalent approach used in computer science.  Checking a suspicious document in this setting requires the computation and storage of efficiently comparable representations for all documents in the reference collection to compare them pairwise. 12
  • 13. Bag of words:-  Bag of words analysis represent the adoption of vector space retrieval, a traditional IR concept, to the domain of plagiarism detection.  Documents are represented as one or multiple vectors, e.g. for different document parts, which are used for pair wise similarity computations. 13
  • 14. TurnItIn:  Four UC Berkeley graduate students designed a peer review application to use for their classes — thus, TurnItIn was born. Eventually, that prototype developed into one of the most recognizable names in plagiarism detection.  Students can use TurnItIn's WriteCheck service to maintain proper citations and to access various writing tools. Teachers can ask students to submit their papers through the service as a first measure. 14
  • 15. Viper:  Viper calls itself the "Free TurnItIn Alternative." It scans a large database of academic essays and other online sources, offering side-by-side comparisons for plagiarism. 15
  • 16. Plagiarism Detection systems are built based on a few languages. To check for plagiarism with the Same software can be difficult.  Most of the detection software checking is done with some repository situated in an organization .Other people are unable to access it and verify for plagiarism.  As the number of digital copies are going up the repository size should be large and the plagiarism Detection software should be able to handle it. 16
  • 17.  There is some plagiarism detection software available which ask us to load a file to their link. Once done the file is copied to their database and then checked for plagiarism. This also comes with an inherent chance of our data being leaked or hacked for other purposes. 17
  • 18. 18
  • 19.  Plagiarism is rampant now. With most of the data available to us in digital format the venues for plagiarism is opening up.  To avoid this kind of cheating and to acknowledge the originality of the author new detection techniques are to be created.  To protect the intellectual property source code new techniques are to be developed and implemented. 19
  • 20. [1] Steven Burrows 1, Seyed M. M. Tahaghoghi 1 & Justin Zobel , Proceedings of the Second Australian Undergraduate Students' Computing Conference, 2004 http://citeseerx.ist.psu.edu/viewdoc/download?doi= 10.1.1.69.4500&rep=rep1&type=pdf [2] Georgina Cosma , Mike Joy, Daniel White and Jane Yau, 9th August 2007 ,ICS University of Ulster. http://www.ics.heacademy.ac.uk/resources/assessment/p lagiarism/ [3] Plagiarism detection software, How effective it is?, 20
  • 21. CSHE, http://www.cshe.unimelb.edu.au/assessinglearning/docs/ PlagSoftware.pdf [4] Maeve Paris, School of Computing & Intelligent Systems, University of Ulster http://www.ics.heacademy.ac.uk/Events/conf2003/ maeve.htm [5] S.A.F.E, http://www.safe-corp.biz/products_codesuite.htm 21