|
|
|
V. I. Shynkarenko,?. S. Kuropiatnyk
Pág. 131 - 142
|
|
|
|
|
|
|
Ricardo Franclinton,Oscar Karnalim
Pág. 110 - 119
Background: Most source code plagiarism detection tools are not modifiable. Consequently, when a modification is required to be applied, a new detection tool should be created along with it. This could be a problem as creating the tool from scratch is ti...
ver más
|
|
|
|
|
|
|
Ariel Elbert Budiman and Oscar Karnalim
Most source code plagiarism detection tools only rely on source code similarity to indicate plagiarism. This can be an issue since not all source code pairs with high similarity are plagiarism. Moreover, the culprits (i.e., the ones who plagiarise) canno...
ver más
|
|
|
|
|
|
|
Hossein Hassani and Emmanuel Sirmal Silva
ChatGPT, a conversational AI interface that utilizes natural language processing and machine learning algorithms, is taking the world by storm and is the buzzword across many sectors today. Given the likely impact of this model on data science, through t...
ver más
|
|
|
|
|
|
|
Kuldeep Gurjar, Yang-Sae Moon and Tamer Abuhmed
The digitalization of music has led to increased availability of music globally, and this spread has further raised the possibility of plagiarism. Numerous methods have been proposed to analyze the similarity between two pieces of music. However, these t...
ver más
|
|
|
|
|
|
|
Fariha Iffath, A. S. M. Kayes, Md. Tahsin Rahman, Jannatul Ferdows, Mohammad Shamsul Arefin and Md. Sabir Hossain
A programming contest generally involves the host presenting a set of logical and mathematical problems to the contestants. The contestants are required to write computer programs that are capable of solving these problems. An online judge system is used...
ver más
|
|
|
|
|
|
|
Syezreen Dalina Rusdi,Norashikin Hussein,Nor Azian Abdul Rahman,Fauziah Noordin
Pág. 62 - 71
As the education world places countless emphasis on achievement and success, the issue of academic dishonesty particularly involving plagiarism has reached prevalent extents especially in the institutions of higher learning. Since this contemporary probl...
ver más
|
|
|
|
|
|
|
Adi Wijaya,Romi Satria Wahono
Pág. 1 - 8
Intrinsic plagiarism detection is the task of analyzing a document with respect to undeclared changes in writing style which treated as outliers. Naive Bayes is often used to outlier detection. However, Naive Bayes has assumption that the values of conti...
ver más
|
|
|
|
|
|
|
|
Sergio A. Rojas
AbstractDownloadsHow to Cite
|
|
|
|
|
|
|
Youssef Ali Alhendawi
Pág. 20 - 25
The paper has been deleted due to the discovered plagiarism.
|
|
|
|
|
|
|
Youssef Ali Alhendawi
Pág. 26 - 30
The paper has been deleted due to the discovered plagiarism.
|
|
|
|
|
|
|
Ariel Elbert Budiman and Oscar Karnalim
-
|
|
|
|
|
|
|
Dan Remenyi
AbstractThe subject of ethics is important in university research for a number of reasons. All masters or doctorate candidates need to be familiar with the issues involved in order to avoid any problems or criticisms of their work. This article addresses...
ver más
|
|
|
|
|
|
|
Dan Remenyi
AbstractThe subject of ethics is important in university research for a number of reasons. All masters or doctorate candidates need to be familiar with the issues involved in order to avoid any problems or criticisms of their work. This article addresses...
ver más
|
|
|
|
|
|
|
Mausumi Goswami,B.S Purkayastha
With fast growth in size of digital text documents over internet and digital repositories, the pools of digital document is piling up day by day. Due to this digital revolution and growth, an efficient and effective technique is required to handle such a...
ver más
|
|
|
|
|
|
|
Aleksandr Romanov, Anna Kurtukova, Alexander Shelupanov, Anastasia Fedotova and Valery Goncharov
The article explores approaches to determining the author of a natural language text and the advantages and disadvantages of these approaches. The importance of the considered problem is due to the active digitalization of society and reassignment of mos...
ver más
|
|
|
|
|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
|
Aliya Jangabylova, Alexander Krassovitskiy, Rustam Mussabayev and Irina Ualiyeva
The documents similarity metric is a substantial tool applied in areas such as determining topic in relation to documents, plagiarism detection, or problems necessary to capture the semantic, syntactic, or structural similarity of texts. Evaluated result...
ver más
|
|
|
|
|
|
|
Hanae Mgarbi,Mohamed Yassin Chkouri,Abderrahim Tahiri
Pág. 37 - 42
Before the development of the web, we talk about the portfolio; it was represented by a simple portfolio of student skills in paper form. This form of representation of skills and professional career has continued to develop over the years. After a succe...
ver más
|
|
|
|