SlideShare uma empresa Scribd logo
1 de 12
Prepared by:
Ayush GOYAL
KUMAR VIKRAMADITYa
shivaM SHARMA
TAUQEER KHAN
INTRODUCTION
 The representation of another’s work as one’s
own.
 It is serious problem for academics now a days.
 In computing courses, students often plagiarize
various assignments, source code.
 Usually they may copy it from their friends or
web.
 Manual comparison is rather impractical or
difficult too.
What is Plagiarism?
 “Copying the language, structure, ideas
and/or thoughts of another and adopting the
same as one’s own original work.”
 Taking over the ideas, methods, or written
words of another, without acknowledgement
and with the intention that they be taken as
the work of the deceiver.
Why is plagiarism strongly
discouraged?
 Plagiarism is dishonest because one uses another’s
work as one’s own.
 If one plagiarize, they are cheating themselves.
Plagiarism violates intellectual property rights,
leading to damages or fines.
How to avoid plagiarism
 Use your own words and ideas.
 Give proper credit for copied, adapted or
paraphrased materials.
 Avoid using others work with minor cosmetic
changes. Examples: using synonyms such as
therefore and thus, reversing sentence order or
changing format or layout of a text.
 If you use another’s exact words, you must use
quotation marks (“..”) or (‘..’).
how IT WORKS?
 In the program we have used Several String
matching algorithms like Naïve, KMP, Boyre’s
Moore, Rabin Karp. These Algorithms attempts
to compute the degree of similarity between the
selected file.
 This involves in each case , Removing comments
and string-constants. Translating upper case
letters into lower case.
 The output gives us the detailed Analysis of the
percentage copied between various input files.
 LCS (LONGEST COMMON SUBSEQUENCE)
 KMP (KNUTH-MORRIS-PRATT)
 NAIVE
 RABIN KARP
Conclusion
In the age of information technologies plagiarism has
become more actual and turned into a serious problem. In
this ways how to reduce plagiarism are discussed.
Plagiarism prevention methods which are based on society’s
change of attitude against plagiarism without any doubt are
the most significant means to fight against plagiarism, but
implementation of these methods is a challenge for society
as a whole. At the present such abilities are not available for
plagiarism detection software tools. But nevertheless
computer based plagiarism detection tools can considerably
help to find plagiarized documents.
Thanks for
Watching

Mais conteúdo relacionado

Semelhante a Presentation1.pptx

An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
Indian Institute of Management Ahmedabad
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
MirXahid1
 
Responsible scholarship.part1
Responsible scholarship.part1Responsible scholarship.part1
Responsible scholarship.part1
Susanne Noll
 

Semelhante a Presentation1.pptx (16)

An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
 
A Survey On Plagiarism Detection
A Survey On Plagiarism DetectionA Survey On Plagiarism Detection
A Survey On Plagiarism Detection
 
Plagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita AnandPlagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita Anand
 
Plagiarism and Research Integrity
Plagiarism and Research IntegrityPlagiarism and Research Integrity
Plagiarism and Research Integrity
 
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic ApproachA Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
 
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...
 
Plagiarism for dummies
Plagiarism for dummiesPlagiarism for dummies
Plagiarism for dummies
 
copycats
copycatscopycats
copycats
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Responsible scholarship.part1
Responsible scholarship.part1Responsible scholarship.part1
Responsible scholarship.part1
 
seminar on how to write research papers without being called plagiarist
seminar on how to write research papers without  being called  plagiaristseminar on how to write research papers without  being called  plagiarist
seminar on how to write research papers without being called plagiarist
 
Essays On Plagiarism
Essays On PlagiarismEssays On Plagiarism
Essays On Plagiarism
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 

Último

Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In ArjanArjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
parisharma5056
 
100%Safe delivery(+971558539980)Abortion pills for sale..dubai sharjah, abu d...
100%Safe delivery(+971558539980)Abortion pills for sale..dubai sharjah, abu d...100%Safe delivery(+971558539980)Abortion pills for sale..dubai sharjah, abu d...
100%Safe delivery(+971558539980)Abortion pills for sale..dubai sharjah, abu d...
hyt3577
 

Último (9)

Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In ArjanArjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
 
Mercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human ResourcesMercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human Resources
 
Cleared Job Fair Handbook | May 2, 2024
Cleared Job Fair Handbook  |  May 2, 2024Cleared Job Fair Handbook  |  May 2, 2024
Cleared Job Fair Handbook | May 2, 2024
 
2k Shots ≽ 9205541914 ≼ Call Girls In Vinod Nagar East (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Vinod Nagar East (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Vinod Nagar East (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Vinod Nagar East (Delhi)
 
RecruZone - Your Recruiting Bounty marketplace
RecruZone - Your Recruiting Bounty marketplaceRecruZone - Your Recruiting Bounty marketplace
RecruZone - Your Recruiting Bounty marketplace
 
Webinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislationWebinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislation
 
HRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socializationHRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socialization
 
Mastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementMastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership Management
 
100%Safe delivery(+971558539980)Abortion pills for sale..dubai sharjah, abu d...
100%Safe delivery(+971558539980)Abortion pills for sale..dubai sharjah, abu d...100%Safe delivery(+971558539980)Abortion pills for sale..dubai sharjah, abu d...
100%Safe delivery(+971558539980)Abortion pills for sale..dubai sharjah, abu d...
 

Presentation1.pptx

  • 1. Prepared by: Ayush GOYAL KUMAR VIKRAMADITYa shivaM SHARMA TAUQEER KHAN
  • 2. INTRODUCTION  The representation of another’s work as one’s own.  It is serious problem for academics now a days.  In computing courses, students often plagiarize various assignments, source code.  Usually they may copy it from their friends or web.  Manual comparison is rather impractical or difficult too.
  • 3. What is Plagiarism?  “Copying the language, structure, ideas and/or thoughts of another and adopting the same as one’s own original work.”  Taking over the ideas, methods, or written words of another, without acknowledgement and with the intention that they be taken as the work of the deceiver.
  • 4. Why is plagiarism strongly discouraged?  Plagiarism is dishonest because one uses another’s work as one’s own.  If one plagiarize, they are cheating themselves. Plagiarism violates intellectual property rights, leading to damages or fines.
  • 5. How to avoid plagiarism  Use your own words and ideas.  Give proper credit for copied, adapted or paraphrased materials.  Avoid using others work with minor cosmetic changes. Examples: using synonyms such as therefore and thus, reversing sentence order or changing format or layout of a text.  If you use another’s exact words, you must use quotation marks (“..”) or (‘..’).
  • 6. how IT WORKS?  In the program we have used Several String matching algorithms like Naïve, KMP, Boyre’s Moore, Rabin Karp. These Algorithms attempts to compute the degree of similarity between the selected file.  This involves in each case , Removing comments and string-constants. Translating upper case letters into lower case.  The output gives us the detailed Analysis of the percentage copied between various input files.
  • 7.  LCS (LONGEST COMMON SUBSEQUENCE)
  • 11. Conclusion In the age of information technologies plagiarism has become more actual and turned into a serious problem. In this ways how to reduce plagiarism are discussed. Plagiarism prevention methods which are based on society’s change of attitude against plagiarism without any doubt are the most significant means to fight against plagiarism, but implementation of these methods is a challenge for society as a whole. At the present such abilities are not available for plagiarism detection software tools. But nevertheless computer based plagiarism detection tools can considerably help to find plagiarized documents.