2. INTRODUCTION
o Plagiarism: The representation of another’s work as
one’s own.
o It is serious problem for academics now a days.
o In computing courses, students often plagiarize
various assignments, source code.
o Usually they may copy it from their friends or web.
o Manual comparison is rather impractical or difficult
too.
3. What is Plagiarism?
o “Copying the language, structure, ideas and/or
thoughts of another and adopting the same as
one’s own original work.”
o Taking over the ideas, methods, or written words of
another, without acknowledgement and with the
intention that they be taken as the work of the
deceiver.
4. Why is plagiarism strongly
discouraged?
o Plagiarism is dishonest because one uses another’s
work as one’s own.
o If one plagiarize, they are cheating themselves.
o Plagiarism violates intellectual property rights,
leading to damages or fines.
5. How to avoid plagiarism
o Use your own words and ideas.
o Give proper credit for copied, adapted or
paraphrased materials.
o Avoid using others work with minor cosmetic
changes. Examples: using synonyms such as
therefore and thus, reversing sentence order or
changing format or layout of a text.
o If you use another’s exact words, you must use
quotation marks (“..”) or (‘..’).
7. PLAGIARISM
DETECTION
How It Works
o A number of approaches have been proposed to
detect plagiarism
o In my program I have used 8 length, 7 length, 6
length comparison technique. This technique
attempts to compute the degree of similarity
between the selected file and all the available files
in a system. These files include text.
o The overall method works in two stages, with the first
being to convert both the source and target files
into token strings.
8. PLAGIARISM
DETECTION
o This involves in each case ,
• Removing comments and string-constants.
• Translating upper case letters into lower case.
o The next phase is the comparison phase in which
we compare every token of both source and target
files in the length of 8, 7 or 6.
o If the length of string gets compared we calculate
the no of words matched within the matched file
and then find the plagiarism of the source file.
9. FEATURES
o Find files (used as a system crawler)
o Check files (text)
o Detect Plagiarism within text files
o Easy To Use
o Free File Check
o Multiple String Lengths (6,7,8 length)
o Save output in your system
o Decreased time complexity ( O(mn))
10. STOP
SELECT FILE FOR PLAGUE DETECTION
SEARCH ALL FILES ON SYSTEM (system
crawler)
COMPARE THE TEXT OF .TXT FILES
WITH THE GIVEN FILE
CALCULATE THE PERCENTAGE MATCH
AND DISPLAY THE RESULT
START
FLOW
CHART
Detailed Flow Chart
11. Limitation
o Integration of web crawler within the Software
(due to longer execution time taken for extracting
the files from internet)
o Execution Time (due to checking all the available
files within the system)
12. Examples of penalty for
plagiarism:
o In 2002, Prof. David Monash, rector of
Monash University(Australia), was caught citing
some paragraphs without sources in his books
published in 1970s. He then resigned to maintain his
institution’s reputation.
o In 2004, Prof. Sultan, professor of Immunology of
Harvard University, was accused of plagiarizing from
four papers. Consequently, he was banned from
reviewing papers for 3years
13. Literature Survey
• Juwah, C., Lal, D. and Beloucif, A.
(2006) Overcoming the cultural associated with
plagiarism for International students
• Turnitin.com and plagiarism.org for educators to
prevent plagiarism, engage students.
• Article: “Actions Do Speak Louder Than Words:
Deterring Plagiarism with the use of Plagiarism
Detection Software” by Bear F. Braumoeller, Brian J.
Gaines
• greenplagiarism.pdf
• Plagiarism_ a misplaced emphasis.pdf
14. References
• University of California, Davis. Avoiding plagiarism
±Mastering the Art of scholarship. 2006 [cited 2010 June
14]. Available from:
www.sja.ucdavis.edu/files/plagiarism.pdf
• The Weissman Centre for Leadership and Liberal Arts.
How to paraphrase to avoid plagiarism. 2007 [cited 2010
June 14]. Available from: www.mtholyoke.edu/go/saw
• Roige, M. Examples of paraphrasing: good and bad.
2006[cited 2010 June 14]. Available from:
http://facpub.stjohns.edu/~roigm/plagiarism/
• Lester, James D. Writing Research Papers. 2nd ed. (1976)
15. Conclusion
In the age of information technologies plagiarism has become
more actual and turned into a serious problem. In this ways how
to reduce plagiarism are discussed. Plagiarism prevention
methods which are based on society’s change of attitude
against plagiarism without any doubt are the most significant
means to fight against plagiarism, but implementation of these
methods is a challenge for society as a whole. At the present
such abilities are not available for plagiarism detection software
tools. But nevertheless computer based plagiarism detection
tools can considerably help to find plagiarized documents.
16. FUTURE SCOPE
• Project can further be made for .pdf and .docx files.
• Can make this application available for internet i.e
a web application of plagiarism can be made.
• Time complexity can be reduced to nlog(n)