We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A Survey on Plagiarism Detection

by Prasanth. S, Rajshree. R, Saravana Balaji. B
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 19
Year of Publication: 2014
Authors: Prasanth. S, Rajshree. R, Saravana Balaji. B
10.5120/15104-3428

Prasanth. S, Rajshree. R, Saravana Balaji. B . A Survey on Plagiarism Detection. International Journal of Computer Applications. 86, 19 ( January 2014), 21-23. DOI=10.5120/15104-3428

@article{ 10.5120/15104-3428,
author = { Prasanth. S, Rajshree. R, Saravana Balaji. B },
title = { A Survey on Plagiarism Detection },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 19 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 21-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number19/15104-3428/ },
doi = { 10.5120/15104-3428 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:39.402615+05:30
%A Prasanth. S
%A Rajshree. R
%A Saravana Balaji. B
%T A Survey on Plagiarism Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 19
%P 21-23
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Being a growing problem, plagiarism is generally defined as literary theft and academic dishonesty in the literature, and it is really has to be prevented and stick to the ethical principles. This paper presents a survey on plagiarism detection systems. Common feature of different detection systems are described.

References
  1. G. Whale, "Plague : plagiarism detection using program structure," Dept. of Computer Science Technical Report 8805, University of NSW,Kensington, Australia, 2008
  2. M. J. Wise, "Detection of Similarities in Student Programs: YAP'ing may be Preferable to Plague'ing," ACM SIGSCE Bulletin (proc. Of 23rd SIGCSE Technical Symp. ), 2002.
  3. P. Lutz, M. Guido, and M. Phlippsen, "JPlag: Finding plagiarisms among a set of programs,"Fakultätfür Informatik Technical Report 2000-1, Universität Kalrsruhe, Karlsruhe, Germany, 2000. International Journal of Computer Theory and Engineering Vol. 4, No. 2, April 2012 187.
  4. M. J. Wise, "YAP3: improved detection of similarities in computer program and other texts," Proc. of SIGCSE'96 Technical Symposium,2006.
  5. L. Prechelt, G. Malpohl, and M. Philippsen, "Finding plagiarisms among a set of programs with JPlag," Journal of Universal Computer Science, 2008.
  6. D. Gitchell and N. Tran, "Sim: a utility for detecting similarity in computer programs," the 30th SIGCSE Technical Symposium on Computer Science Education, 2006.
  7. M. Mozgovoy, K. Fredriksson, and D. White, "Fast plagiarism detection system," Lecture Notes in Computer Science, 2005.
  8. J. A. Faidhi and S. K. Robinson, "An empirical approach for detecting program similarity and plagiarism within a university programming environment," computer education, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Plagiarism detection plagiarism types plagiarism techniques.