We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Plagiarism Checker: Text Mining

by Anu Saini, Ankita Bahl, Supriya Kumari, Mitali Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 3
Year of Publication: 2016
Authors: Anu Saini, Ankita Bahl, Supriya Kumari, Mitali Singh
10.5120/ijca2016907833

Anu Saini, Ankita Bahl, Supriya Kumari, Mitali Singh . Plagiarism Checker: Text Mining. International Journal of Computer Applications. 134, 3 ( January 2016), 8-11. DOI=10.5120/ijca2016907833

@article{ 10.5120/ijca2016907833,
author = { Anu Saini, Ankita Bahl, Supriya Kumari, Mitali Singh },
title = { Plagiarism Checker: Text Mining },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 3 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number3/23892-2016907833/ },
doi = { 10.5120/ijca2016907833 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:08.188805+05:30
%A Anu Saini
%A Ankita Bahl
%A Supriya Kumari
%A Mitali Singh
%T Plagiarism Checker: Text Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 3
%P 8-11
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world internet is the answer to every question. So at any time one can easily copy the content from web and use it. This is known as plagiarism .It is growing now days. Usually in plagiarism people reword the documents, copy them, do not give references. It is difficult to detect plagiarism as people rephrase the text do not copy it directly. To detect plagiarism apache lucene have been used. Firstly indexing of the original document is done and then used cosine similarity to compare the plagiarised document with set of documents which are there saved previously.

References
  1. S.A.Hiremath and M.S.Otari ,”Plagiarism Detection-Different Methods and Their Analysis: Review”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 7, August 2014
  2. Ahmad Gull Liaqat & Aijaz Ahmad ,”Plagiarism Detection in Java Code “,Linnaeus University, June 2011
  3. Asim M. El Tahir Ali, Hussam M. Dahwa Abdulla, and V´aclav Sn´aˇsel ,”Overview and Comparison of Plagiarism Detection Tools” 161{172, ISBN 978-80-248-2391-1., 2011
  4. Daniele Anzelmi, Domenico Carlone, Fabio Rizzello, Robert Thomsen, D. M. Akbar Hussain,”Plagiarism Detection Based on SCAM Algorithm”, Proceedings of the International MultiConference of Engineers and Computer Scientists, March 2011
  5. Bela Gipp Norman Meuschke ,”Citation Pattern Matching Algorithms for Citation-based Plagiarism Detection: Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence”, Mountain View, CA, USA, September 2011
  6. http://elearningindustry.com/top-10-free-plagiarism-detection-tools-for-teachers
  7. Romans Lukashenko, Vita Graudina, Janis Grundspenkis, "Computer-Based Plagiarism Detection Methods and Tools: An Overview”, International Conference on Computer Systems and Technologies - CompSysTech’07, 2007
  8. Reena Kharat, Preeti M. Chavan, Vaibhav Jadhav, Kuldeep Rakibe,”Semantically Detecting Plagiarism for Research Papers”, International Journal of Engineering Research and Applications (IJERA), May-Jun 2013
Index Terms

Computer Science
Information Sciences

Keywords

Apache Lucene Indexing Cosine similarity Plagiarism