Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Research Paper On Plagiarism Detection Methods: Submitted By: Supervised by

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

Research Paper on Plagiarism

detection Methods

UNIVERSITY INSTITUTE OF ENGINEERING


ACADEMIC UNIT 5

Submitted by : Supervised by :
Satyam Kumar Rawat (22BCS14274) Dr. Gaurav Kumar Bharti,
Prateek Pratap Singh (22BCS10036) Assistant Professor,
YashVeer Singh (22BCS10047) AU-5 , Chandigarh University.
Rishav Dhiman (22BCS12362)
Aditya Kr. Jha (22BCS14746)
CONTENT

• 1.Abstract
• 2.Methodology
• 3.Problem,Need
• 4.Literature Review
• 5.Technical Gap
• 6.Timeline
• 7.References

• 08/05/2023 • Er.Rohit kumar EED UIE • 2


• www.cuchd.i • Campus: Gharuan, Mohali
Abstract
Plagiarism is a growing concern in academia, with students and researchers often
unaware of the implications of copying and pasting content from other sources. In
this paper, we present a comparative study of various plagiarism detection
methods to identify the most effective approach for detecting plagiarized content.
We analyzed the effectiveness of six different methods, including Google search
engine, plagiarism detection software, Turnitin, fingerprinting, semantic analysis,
and machine learning algorithms. Our findings indicate that machine learning
algorithms, particularly deep learning techniques such as convolutional neural
networks and recurrent neural networks, show promising results in detecting
plagiarism. We also discuss the limitations of each method and propose future
research directions to improve the accuracy of plagiarism detection methods. This
study contributes to the ongoing discussion on the effectiveness of plagiarism
detection methods and provides insights into the application of machine learning
algorithms for this purpose.

• 08/05/2023 • Er.Rohit kumar EED UIE • 3


• www.cuchd.i • Campus: Gharuan, Mohali
Methodology
To design and produce robust and no error Plagiarism Detection Process, four main
stages are required. These stages described below :
1. Collecting the content: It is the first stage, where the plagiarism detector collects
the required
content from the users through a search engine which acts as the interface between
the users and the detector.
2. Analyzing the similarities: After collecting the content (scientific papers,
assignments, and other
softcopies), the detector runs an analyzing method to search for the similarities
among the documents and reveal the original copy.

• 08/05/2023 • Er.Rohit kumar EED UIE • 4


• www.cuchd.i • Campus: Gharuan, Mohali
3. Confirming the copy: After the analyzing stage, a function for plagiarism
conformation is required to reveal the plagiarized text from an original one. Sometimes, a
degree of the plagiarized text is confirmed with this process.

4. Investigation: It is the final stage, which depends highly on the interference


made by the user whenever a plagiarism is confirmed. It also relies on the expert
of the user to distinguish between the really plagiarized documents and the cited
ones.

• 08/05/2023 • Er.Rohit kumar EED UIE • 5


• www.cuchd.i • Campus: Gharuan, Mohali
• Collecting the content

• Analyzing the similarities

• Confirming the copy

• Investigation

• 08/05/2023 • Er.Rohit kumar EED UIE • 6


• www.cuchd.i • Campus: Gharuan, Mohali
Problems Need,Client
• Identification of plagiarism: The project would focus on identifying different types of plagiarism,
• including verbatim copying, paraphrasing, and rewording . Review of existing plagiarism detection
methods: The project would review and compare various existing methods of plagiarism detection,
including manual methods and software-based methods . Development of a new plagiarism detection
method: The project may involve the development of a new plagiarism detection method, which could be
a hybrid of manual and software-based approaches . Evaluation of effectiveness: The project would
evaluate the effectiveness of different plagiarism detection methods in detecting various types of
plagiarism, including intentional and unintentional plagiarism . Limitations of the methods: The project
would also examine the limitations of each plagiarism detection method, including factors that may affect
their accuracy and reliability.
• Recommendations: Based on the findings of the project, recommendations would be provided for
improving the effectiveness of plagiarism detection methods, as well as guidelines for educators and
students on how to avoid plagiarism . Overall, the project would aim to provide a comprehensive review of
different plagiarism detection methods, identify their strengths and weaknesses, and develop
recommendations for improving their effectiveness. It would also contribute to the ongoing efforts to
combat plagiarism in academic and professional settings.
Literature Review
Author Approach Illustration Limitation
Rajkumar Latent Semantic Used to find out the A distributed model that is not
Kundu, Analysis LSA semantic suitable for nonlinear equations
Kartik. K SVD and reduction to
capture
all similar text

Alireza Plagiarism Both character- based and A comparison based technique


Talebpour et Detection based knowledge-based that requires processing of
al on Trie-tree approaches content which is not an
based data are used for comparing efficient solution for large
structure number of files

S.N. Autade Evolutionary System synonym recognition A large word dictionary update
et.al multi-agent and word -generalization is is required
system used

Jingling Zhao An AST-based They proposed AST- CC Less efficiency for the storage
et. Al Code Plagiarism algorithm to generate and of data structure
Detection compare hash values
Algorithm

• 08/05/2023 • Er.Rohit kumar EED UIE • 9


• www.cuchd.i • Campus: Gharuan, Mohali
Author Approach Illustration Limitation
Mayank A State of Art Various methods like NLP It is hard to locate the
Agrawal et al on Source Code and machine learning plagiarism among
Plagiarism different
source codes of different
languages

Agung Longest A numerical based The drawback of this


Sediyono et al common comparison algorithm proposed
consecutive that algorithm is loading time.
word outsources suffix tree
algorithm

Michal Detection of Provides anti- plagiarism Needs to process multiple


Ďuračíka et. clones and system which is to handle documents with similar
al [22] methods for large size of dataset identity which exhibits
determining high
similarity execution

• 08/05/2023 • Er.Rohit kumar EED UIE • 10


• www.cuchd.i • Campus: Gharuan, Mohali
Timeline

• 08/05/2023 • Er.Rohit kumar EED UIE • 11


• www.cuchd.i • Campus: Gharuan, Mohali
References
• Wikipedia Available here: https://www.wikipedia.org/

• Science Direct for clone detection. Available here


https://www.sciencedirect.com/topics/computer-science/clone-detection

• Google Scholar . https://link.springer.com/10.1007%2F978-0-387-39940-9_233


https://scholar.google.com/

springer.com Available here : https://link.springer.com/10.1007%2F978-0-387-39940-


9_233

• 08/05/2023 • Er.Rohit kumar EED UIE • 12


• www.cuchd.i • Campus: Gharuan, Mohali
[1] S.A.Hiremath, “Plagiarism Detection-Different Methods and Their Analysis:
Review “Comput. International Journal of Innovative Research in Advanced Engineering
(IJIRAE) ISSN: 2349-2163
[2] Rajkumar Kundu, Kartik., “Contextual Plagiarism Detection Using Latent Semantic
Analysis,” International Research Journal of Advanced Engineering and Science ISSN
(Online): 2455-9024
[3] Michal Ďuračíka et. al ,’’A Review on Various Plagiarism Detection Systems Based on
Exterior and Interior Method” International Journal of Advanced Research in Computer and
Communication Engineering Vol. 7, Issue 9, September 2018
[4]

• 08/05/2023 • Er.Rohit kumar EED UIE • 13


• www.cuchd.i • Campus: Gharuan, Mohali
[5]

[7]

[8]

[9]

[10]

• 08/05/2023 • Er.Rohit kumar EED UIE • 14


• www.cuchd.i • Campus: Gharuan, Mohali
THANK YOU

• 08/05/2023 • Er.Rohit kumar EED UIE • 15


• www.cuchd.i • Campus: Gharuan, Mohali

You might also like