2018
DOI: 10.11591/eecsi.v5.1599
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Winnowing Algorithm for Document Plagiarism Detection

Abstract: The rapid development of the internet influences information availability. It makes easier for someone to do the plagiarism of a work. The rise of information available online makes the habit of copy-paste without mentioning the reference to become easy so that scientific work unwittingly becomes the result of plagiarism from other scientific works. Plagiarism prevention efforts are envolving in various sector. Designing and developing plagiarism checker applications is the purpose of this paper. Specifically … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
4

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 12 publications
(5 reference statements)
0
3
0
4
Order By: Relevance
“…The stages of the Horspool Boyer-Moore algorithm were preprocessing, needle word-trigrams formation, bad-character table formation, and haystack-needle matching. The illustration of the different stages of the Rabin-Karp, Winnowing, and Horspool Boyer-Moore algorithms [4], [14], [24], [26], [29], [30], [31], [32] in identifying similarity based on word-level trigrams is presented in Figure 2.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The stages of the Horspool Boyer-Moore algorithm were preprocessing, needle word-trigrams formation, bad-character table formation, and haystack-needle matching. The illustration of the different stages of the Rabin-Karp, Winnowing, and Horspool Boyer-Moore algorithms [4], [14], [24], [26], [29], [30], [31], [32] in identifying similarity based on word-level trigrams is presented in Figure 2.…”
Section: Methodsmentioning
confidence: 99%
“…Therefore, to avoid collisions, sub-strings should be converted into the hash, valuessing the Rolling Hash formula [37]. The Rolling Hash formula is written as follows [29], [38]:…”
Section: Hash Values Formationmentioning
confidence: 99%
See 1 more Smart Citation
“…Ulinnuha dkk. juga mengimplementasikan algoritma winnowing untuk mendetaksi plagiarisme dari nilai persentase kesamaan antara dokumen asli dengan dokuman-dokumen uji dan menghasilkan akurasi hingga 91% (Ulinnuha et al, 2019). Implementasi algoritma winnowing untuk mendeteksi plagiarisme juga digunakan oleh Arifin dkk.…”
Section: Pendahuluanunclassified
“…Pengukuran similaritas menggunakan Jaccard Coefficient. Hasil penelitian menunjukkan bahwa sistem mampu mendeteksi plagiarisme dengan sensitivitas 82%, spesifisitas 100%, dan akurasi 91% [10].…”
Section: Pendahuluanunclassified