2016
DOI: 10.25103/jestr.094.23
|View full text |Cite
|
Sign up to set email alerts
|

Study on Extrinsic Text Plagiarism Detection Techniques and Tools

Abstract: The swift evolution of technology has facilitated the access of information through different means which has opened the doors to plagiarism. In today's world of technological outburst, plagiarism is aggravating and has become a serious concern in academia, research and many other fields. To curb this intellectual theft and to ensure academic integrity, efficient software systems to detect them are in urgent need. In this paper, a study on plagiarism is done with the focus on extrinsic text plagiarism detectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…This proposed architecture algorithm is effective for intrinsic detection within the university database as well. Vani & Gupta (2016) claim that it's better for extrinsic plagiarism detection algorithms to classify queries to one of the following; string based, vector space model, semantic based, syntax based, structural based, or citation based. That classification is not presented in the reviewed paper, meaning all documents in the experiment were handled as a single class for extrinsic detection.…”
Section: Paper Methodologymentioning
confidence: 99%
“…This proposed architecture algorithm is effective for intrinsic detection within the university database as well. Vani & Gupta (2016) claim that it's better for extrinsic plagiarism detection algorithms to classify queries to one of the following; string based, vector space model, semantic based, syntax based, structural based, or citation based. That classification is not presented in the reviewed paper, meaning all documents in the experiment were handled as a single class for extrinsic detection.…”
Section: Paper Methodologymentioning
confidence: 99%
“…(3) Idea plagiarism detection tools are ineffective [10]. (4) Most PD methods may not detect structural alterations [11]. (5) Passage-level detections may lack linguistic, semantic, and soft computing tools.…”
Section: Introductionmentioning
confidence: 99%