CFP last date
20 December 2024
Reseach Article

Plagiarism Detection by using Karp-Rabin and String Matching Algorithm Together

by Sonawane Kiran Shivaji, Prabhudeva S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 23
Year of Publication: 2015
Authors: Sonawane Kiran Shivaji, Prabhudeva S
10.5120/20294-2734

Sonawane Kiran Shivaji, Prabhudeva S . Plagiarism Detection by using Karp-Rabin and String Matching Algorithm Together. International Journal of Computer Applications. 115, 23 ( April 2015), 37-41. DOI=10.5120/20294-2734

@article{ 10.5120/20294-2734,
author = { Sonawane Kiran Shivaji, Prabhudeva S },
title = { Plagiarism Detection by using Karp-Rabin and String Matching Algorithm Together },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 23 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 37-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number23/20294-2734/ },
doi = { 10.5120/20294-2734 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:55:43.368948+05:30
%A Sonawane Kiran Shivaji
%A Prabhudeva S
%T Plagiarism Detection by using Karp-Rabin and String Matching Algorithm Together
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 23
%P 37-41
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today word copying something from other sources and claiming it as an own contribution is a crime. We have also seen it is major problem in academic where students of UG, PG or even at PhD level copying some part of original documents and publishing on own name without taking proper permission from author or developer. Many software tools in exist to find out and assist the monotonous and time consuming task of tracing plagiarism, because identifying the owner of that whole text is practically difficult and impossible for markers. In our presentation we have focused on practical assignments (projects) as well as written document which is to be submitted by students in to college or university. Because of this crucial task and day by day increasing research in different fields, industry, academy people demanding such software to detect whether submitted articles, books, national or international papers are genuine or not. In this paper, our algorithm divides submitted articles in small pieces and scans it to compare with connected databases to the server on internet. Some existing work compares submitted articles with previously submitted articles i. e. with existing database.

References
  1. Manuel Cebrián, Manuel Alfonseca, and Alfonso Ortega "Towards the Validation of Plagiarism Detection Tools by Means of Grammar Evolution" IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 3, JUNE 2009.
  2. Tommy W. S. Chow and M. K. M. Rahman has developed a approach of "Multilayer SOM With Tree-Structured Data for Efficient Document Retrieval and Plagiarism Detection" IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 20, NO. 9, SEPTEMBER 2009
  3. Francisco Rosales, Antonio García, Santiago Rodríguez, José L. Pedraza, Rafael Méndez, and Manuel M. Nieto," Detection of Plagiarism in Programming Assignments" , IEEE Transactions on Education, vol. 51, no. 2, May 2008, pp. 174-183.
  4. Arliadinda D, Yuliuskhris Bintoro, R Denny Prasetyadi Utomo, Pencocokan String dengan Menggunakan Algoritma Karp-Rabin dan Algoritma Shift Or. Jurnal STT Telkom.
  5. Manuel Cebrián, Manuel Alfonseca, and Alfonso Ortega "Towards the Validation of Plagiarism Detection Tools by Means of Grammar Evolution" IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 3, JUNE 2009.
  6. X. Chen, B. Francia, M. Li, B. McKinnon, and A. Seker, "Shared information and program plagiarism detection," IEEE Trans. Inf. Theory, vol. 50, no. 7, pp. 1545–1551, Jul. 2004.
  7. A. Parker and J. O. Hamblen, "Computer algorithm for plagiarism detection," IEEE Trans. Educ. , vol. 32, no. 2, pp. 94–99, May 1989.
  8. S. Schleimer, D. Wilkerson, and A. Aiken, "Winnowing: Local algorithms for document fingerprinting," in Proc. 22nd Association for Computing Machinery Special Interest Group Management of Data Int. Conf. , San Diego, CA, Jun. 2003, pp. 76–85.
  9. Seema Kolkur , Madhavi Naik (Samant) "Program plagiarism detection using data dependency matrix method" , in proceedings of International Conference on Computer Applications 2010 , Pondicherry , India December 24-27, 2010, pp 215-220.
  10. Seema Kolkur, Madhavi Naik (Samant) "Comparative study of two different aspects of program plagiarism detection", presented and published in proceedings of International Conference On Sunrise Technologies 2011, Dhule, India January 13-15, 2011.
  11. Xin Chen, Brent Francia, Ming Li, Member, IEEE, Brian McKinnon, and Amit Seker "Shared Information and Program Plagiarism Detection" IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 7, JULY 2004.
  12. Chao Liu, Chen Chen, Jiawei Han , Philip S. Yu "GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis", KDD'06, Philadelphia, Pennsylvania, USA. August 20–23, 2006.
  13. Tommy W. S. Chow and M. K. M. Rahman " Multilayer SOM With Tree-Structured Data for Efficient Document Retrieval and Plagiarism Detection"IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 20, NO. 9, SEPTEMBER 2009.
  14. K. L. Verco and M. J. Wise, "Software for detecting suspected plagiarism: Comparing structure and attribute-counting systems," in Proc. 1st SIGCSE Australasian Conf. Computer Science Education, J. Rosenberg, Ed. , New York, Jul. 1996, pp. 81–88.
  15. M. Joy and M. Luck, "Plagiarism in programming assignments," IEEE Trans. Educ. , vol. 42, no. 2, pp. 129–133, May 1999.
  16. X. Chen, B. Francia, M. Li, B. McKinnon, and A. Seker, "Shared information and program plagiarism detection," IEEE Trans. Inf. Theory, vol. 50, no. 7, pp. 1545–1551, Jul. 2004.
  17. C. Liu, C. Chen, J. Han, and P. S. Yu, "Gplag: Detection of software plagiarism by program dependence graph analysis," in Proc. 12th Int. Conf. Special Interest Group Knowledge Discovery and Data Mining, New York, 2006, pp. 872–881.
  18. A. Apostolico, "String editing and longest common subsequences," in Handbook of Formal Languages, Volume 2 Linear Modeling: Background and Application. Berlin, Germany: Springer-Verlag, 1997, pp. 361–398.
  19. L. Bergroth, H. Hakonen, and T. Raita, "A survey of longest common subsequence algorithms," in Proc. 7th Int. Symp. String Processing Information Retrieval, Los Alamitos, CA, 2000, pp. 39–48.
  20. V. Levenshtein, "Binary codes capable of correcting deletions, insertions and reversals," Sov. Phys. —Dokl. , vol. 10, no. 8, pp. 707–710, 1966.
  21. C. Daly and J. Horgan, "Patterns of plagiarism," in Proc. 36th SIGCSE Tech. Symp. Computer Science Education, New York, 2005, pp. 383–387.
  22. "MC88110: Second Generation RISC Microprocessor User's Manual," Motorola Inc. , Schaumburg, IL, 1991.
  23. A. S. Tanenbaum, Modern Operating Systems, 2nd ed. Engelewood Cliffs, NJ: Prentice-Hall, 2001.
  24. M. Córdoba and M. Nieto, Jul. 2007, Technical Univ. Madrid, Spain http://www. datsi. fi. upm. es/docencia/Estructura/U_Control
  25. C. Bell and A. Newell, Computer Structures: Readings and Examples. New York: McGraw-Hill, 1971.
  26. F. Culwin and T. Lancaster, 2001, Plagiarism, Prevention, Deterrence and Detection [Online]. Available: http://www. ilt. ac. uk/resources/ Culwin-Lancaster. htm
Index Terms

Computer Science
Information Sciences

Keywords

Document retrieval Plagiarism Algorithm Karp-Rabin plagiarism detection String mtching. )