999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

University Learning and Anti-Plagiarism Back-End Services

2021-12-15 12:45:58ManjurKolharandAbdallaAlameen
Computers Materials&Continua 2021年2期

Manjur Kolhar and Abdalla Alameen

Prince Sattam Bin Abdulaziz University, Wadi Ad Dawaser, 11990,Saudi Arabia

Abstract: Plagiarism refers to the use of other people’s ideas and information without acknowledging the source.In this research, anti-plagiarism software was designed especially for the university and its campuses to identify plagiarized text in students’written assignments and laboratory reports.The proposed framework collected original documents to identify plagiarized text using natural language processing.Our research proposes a method to detect plagiarism by applying the core concept of text, which is semantic associations of words and their syntactic composition.Information on the browser was obtained through Request application programming interface by name Url.AbsoluteUri, and it is stored in a centralized Microsoft database Server.A total of 55,001 data samples were collected from 2015 to 2019.Furthermore, we assimilated data from a university website, specifically from the psau.edu.sa network, and arranged the data into students’ categories.Furthermore, we extracted words from source documents and student documents using the WordNet library.On a benchmark dataset consisting of 785 plagiarized text and 4,716 original text data,a significant accuracy of 90.2% was achieved.Therefore, the proposed framework demonstrated better performance than the other available tools.Many students mentioned that working on assignments using the framework was suitable because they were able to work on the assignments in harmony,as per their timeframe and from different network locations.The framework also recommends procedures that can be used to avoid plagiarism.

Keywords:NLP;information science;text data;semantic;syntactic analysis

1 Introduction

The purest form of research misconduct,which causes a substantial adverse impact on academics and the public, is academic plagiarism; and as [1,2] highlighted, plagiarized papers hinder the scientific research process.Plagiarized content and potentially wrong findings can adversely impact future research directions as well as practical applications [3].In fields such as medicine and pharmacology, plagiarized research can skew meta-studies, which cause a detrimental effect on patient safety, and can even jeopardize their safety.Similarly, in academics, plagiarism impacts the acquisition of knowledge as well as assessment.Authors [1] reported that when a student receives a grade for plagiarized work, their extrinsic motivation reduces learning and knowledge acquisition.Likewise, this distorts competency assessment, which can result in an undue advantage to the plagiarist in terms of career prospects [4].Plagiarism in education is not new and has prevailed for centuries.The continuous upsurge in information technology (IT) has made academic plagiarism easy due to an increased access to different information sources.Universities and colleges regularly conduct workshops on plagiarism for new students and warn them about the severe consequences.However, students continue to plagiarize text to complete their assignments and engage in dishonest practices during practical examinations [4,5].To overcome this, the use of anti-plagiarism software is quite common in universities [6].The software can be accessed through software clients or by connecting a browser to a backend server.A backend server involves crucial software and hardware-based logic, which hosts the services.The actual plagiarism software process involves three significant steps:

? The client uploads information on the title and author’s name and the document to be checked.

? The server refers to the database of originally published documents for computing the similarity index.

? The server produces the result of the similarity between the uploaded document and the already published text.

This paper presents an approach for identifying original documents and detecting academic plagiarism and involves collecting documents, URLs, and other means used by students as information sources and acquired through their computers in a network-based environment to complete their assignments.Through a literature review, to the best of the researchers’ knowledge, the methods, and systems presented in this approach have not been proposed elsewhere.The proposed client allows the results to be filtered to reduce the similarity index in the bibliography, quotations, and author details.The backend server used for hosting anti-plagiarism services should be equipped with software logic to find original documents and similar text under time constraints.However, the backend server may require more time if the submitted document or research paper is lengthy, given the increased burden on the server.Therefore,in this study, anti-plagiarism services were designed and implemented specifically for the university learning setup.

The remainder of this paper is organized into five sections.Sections 2 and 3 discuss current systems and the proposed framework and its modules.Section 4 lists the advantages of the proposed system,including a brief account of the implemented framework experience and the student’s behavior.Finally, Section 5 highlights the limitations of the study and briefly presents our conclusions.

2 Literature Review

A critical prerequisite is the identification of plagiarized text among millions of original documents.Thus, the server needs to refer to the host database server of documents on a specific topic that is sufficient for identifying similar text during the process and producing the result.However, finding the original authors’ work is complicated because of the existence of millions of websites [7].However,plagiarism software leverages its controls to clients to analyze the text and classify the original text in it.Moreover, translated, rephrased, and similar research texts are often not identified and detected by antiplagiarism software, and consequently, many papers have been published with such text.Furthermore, the weakness of plagiarism software is that it excludes everyday phrases from the similarity index [8].Many researchers have suggested that universities should opt for specialist software to eradicate dishonest practices and plagiarism among university students [9,10].In the present research, the iThenticate software, a well-known program for detecting plagiarism, is considered.It is used to examine submissions by students and researchers for detecting plagiarized text and delivering highly accurate similarity index reports on documents [11].Plagiarism software is widely used across several disciplines,such as computer science, engineering, mathematics, and applied medical science [12,13].It was recently used for university programs and was found to improve student awareness regarding plagiarism; students were asked to resubmit their assignments to reduce the plagiarism ratio compared to that in the first submission [14-18].As per the student opinions, the software was useful against plagiarism, and its use was recommended in small colleges as well as large schools.A systematic examination for detecting plagiarism can be performed using knowledge graph analysis and cross-language lingual text alignment,which was used for fine-grained plagiarism detection, irrespective of language [15].However, these proposed experimental methods cannot detect text that has been modified to hide plagiarism.

The authors Abdi et al.[19]suggested that there is an integration of semantic relations between words and their syntactic composition for detecting plagiarism.They used a three-step mechanism, that is, preprocessing the basic natural language, comparing the suspicious and source texts after decomposing them into several sentences, and presenting the plagiarized sentences.However, categorizing active and passive sentence constructions increases the semantic knowledge base.In [19], this categorization was currently missing and required further research.

It is also suggested that a model of semantics of a basic block is created using symbolic formulas that represent the input-output relations of the block.Thus, the semantic similarity of these two blocks was checked using a theorem.The authors then modeled the semantic similarity, which was calculated using the longest common subsequence.This method has resulted in strong resilience to code obfuscation.However, this theorem has limitations such as opaque predicates or unsolved conjectures [20-21].According to [22], artificial publication inflation counts through plagiarism can cause adverse outcomes.Such studies on plagiarized content are often cited similar to those in the original content, increasing the citation counts,affecting research performance, and causing problems in funding and hiring.

Fig.1 shows the process followed by iThenticate to identify plagiarism.The iThenticate system compares the document to be verified against original documents; it initially converts the source document into a digital fingerprint.This digital fingerprint is then checked against the database of original documents.Once the document is verified, the iThenticate system considers the number of matching words within the source document and divides it by the source document’s total word count to yield the similarity index.Additionally, this study contributes to university learning and software development,considering the lack of understanding of how students often use text comparison of anti-plagiarism software for plagiarism detection.It can be considered a formative learning tool in a substantial pedagogically-led discussion regarding the synthesis, critique, and understanding of the academic literature based on how the software is presented to students.

3 Proposed System

The proposed system architecture is shown in Fig.2.It depicts the test system that is currently running on the domain www.psau.edu.sa.The university domain hosts many services for faculty, students, and support staff.The faculty members are equipped with multimedia e-learning tools for learning, and teaching purposes.Students submit their class assignments, scientific research, and class activity sessions to their respective faculty members through a student dashboard of multimedia e-learning modules.Our university uses Blackboard as its multimedia learning tool.This tool has many features, allowing faculty members to collect data from each student’s dashboard.However, our proposed system has a plagiarism material collector module that works along with the domain name system to retrieve student data.Our plagiarism module has three main modules to detect plagiarism in student work.These modules are the data gatherer (DG), preprocessor (PP), and assessor.The DG module is responsible for collecting student data to include the browsed data collected via DNS from each student’s PC from the lab network and was in place from 2015 to 2019, collecting a total of 55,001 data instances.This data include the date, lab session name, student name,student work name, time, day,faculty name, and nature of the work plan.

Figure 1:Process of iThenticate system(courtesy of Turnitin)

Figure 2:Proposed system architecture

3.1 Data Gathering

To understand the student activities in lab sessions, browsed data were collected from the website www.psau.edu.sa.The lab session platform enables the students, faculty, and departmental heads to attend online exams.This site began in 2009 and records the LAB work, LAB tests, and LAB final exams.These sessions aimed to enhance the examination procedures and provide improved faculty and student services to overcome the problem of plagiarism.The university was recognized under the Saudi Education Ministry, and it offered various programs across domains, including computers, medicine, engineering,nursing, and science, along with various other courses targeted to suit the needs of foreign and local students.In the plagiarism network for the examinations, student activities concerning mouse and keyboard behavior were uploaded on the database.The system describes these activities based on student identification and their IP addresses.In addition, it also describes the keywords and their respective tasks.Fig.3 presents a sample of student lab/assignment/classwork.After obtaining approval from the university, the browsed data were collected from each student’s PC on the lab network collected from 2015 to 2019, for a total of 55,001 data instances.This data includes the date, lab session name, student name, student work name,time, day,faculty name,and nature of the work plan.

Figure 3:Student’s lab/assignment work sample

3.2 Preprocessing(PP)

The PP module prepares the data for the assessor; the preparation involves breaking each student document into sentences and then removing any stop words.Further, each word stems from its root words; this process eventually removes morphological affixes from words, leaving only the word stem.For stemming purposes, we employed a lexical database to create stem words from the WordNet database.However, there are a number of pre-processing operations on gathered text that can be applied to obtain a machine-readable format for further processing.The following are the facilities provided in our PP module to prepare student data for assessing plagiarism.

a) Conversion of all letters (upper to lower case)

b) Conversion of numbers into words.

c) Detect and delete punctuation.

d) Detect and remove white spaces

e) Expansion of abbreviations or vice-versa

f) Text canonicalization

There are many features of PP module,which were incorporated and yielded highly desirable processing results.One such feature was saving processing time and database space.Hence,the result of this process is used for a more complicated natural language processing (NLP)task called Assessor.

3.3 Assessor

The Assessor module is responsible for detecting plagiarized material in the sentences of a submitted assignment collected during the submission process and their corresponding reference material.The Assessor employs semantic analysis after the extraction of the semantic evaluation of both documents;results are presented in the form of a similarity index.For plagiarism detection, we need to construct vectors of each word appearing in both documents.Hence, words used from both documents that have similarity in text obtain similar vector representations.Once we map the words into a vector space, we can then use them to find words that have similar semantics.Algorithm 1 is used to perform the semantic analysis.The vector space model is a statistical model representing text information for our proposed method.

Algorithm 1:Semantic analysis

The first step is to form word-embedding for a given document to quantify the similarity index.To form such an index,the WordNet algorithm uses a feedforward neural network to predict the vector representation of words derived from both sources.When we compare words between two documents using the lexical knowledge-based library called WordNet, it gives an arrangement of words in the lexical database.Hence, we can create a relation between words using synsets in the lexical database.Before comparing the original and plagiarized documents, it is better to understand many important elements of sentences and words that were formed together to create a report complete document.First, the word set between these two documents is compared.Hence, a similarity is derived based on the semantic level from the WordNet library; further, the semantic similarity results derived from WordNet and the tree kernel are combined.The lexical database gives information content for each word from WordNet, which also hosts synonym set called synsets; this is obtained using the following Eq.(1):

where IC is the information content concerning each word present in both documents for the WordNet lexical database.Furthermore,the similarity of two words in the equation,as mentioned earlier,IC can also be used to find similarity by Least Common Subsume.

4 Experiments

This prototype application was developed to detect plagiarism by comparing students’documents against the data gathered on the university network.To accomplish this task,we used the NLP library for the Python programming language.The NLP has built-in libraries for pre-processing data for tokenization, parsing,classification, stemming, tagging, and semantic reasoning.We also employed the Gensim library, which has packages to process documents and also possesses the ability to create word vectors using WordNet.For evaluation purposes, different evaluation metrics were employed, such as precision, recall, F-measure, and granularity.Eqs.(2)-(4)were used to detect plagiarism,based on[19].

whereas

Ifrdetects s and otherwise ?,whereSis a set of cases of plagiarism,Ris the set of detection reported by the developed framework,andsandrare the elements ofSandR,respectively.Further,the F-measure was obtained using Eq.(6).

It was observed that precision and recall produced overlapping results for a given document;hence,it was necessary to quantify granularity.

whereas SR∈S is the cases of plagiarism detected in R,Rs ∈R is detection in s as follows in Eqs.(8)and(9).

An experiment was conducted on the gathered dataset collected for the included years.This dataset was dubious and compared to the student work.Tab.1 shows the comparative results of the study proposal and various state-of-the-art research proposals.The proposed framework outperformed the PANPC-18 system proposals.Different evaluation metrics, including recall, precision, and F-measure, were used for the experiment.

Table 1:Performance comparison between PAN-PC-18 systems

The proposed framework was useful for identifying plagiarism in assignments and laboratory works.Furthermore, the anti-plagiarism software executed without any special library, tools, and software packages.Although iThenticate, Grammarly, plagiarism software, smallseotools.com, Plagiarism Checker X, and EduBirdie.com are easy to use, they are also troublesome and inaccurate concerning the detection of polarized content.For instance, an online plagiarism system requires backend servers or real-time access to large databases.Such services were not reliable because they only refer to a very few sites.Moreover, the documents included were not accessible via Google.Tab.2 lists the performances of the methods arranged in order of regency.It also demonstrates the best recent work.The proposed method was outstanding, as it performed better than the other state-of-the-art research proposals.Tabs.3 and 4 list entries of state of the art of proposals, wherein the formula below was applied [19] to calculate the percentage of improvement over the other methods for the PAN-PC-18 dataset.

Table 3:Our proposed method performance improvement over pan-pc-18 systems

The proposed framework was useful for identifying plagiarism in assignments and laboratory work.Furthermore, the anti-plagiarism software was executed without any special library, tools, and software packages.Although iThenticate, Grammarly, smallseotools.com, Plagiarism Checker X, and EduBirdie.com are easy to use, they are troublesome and inaccurate for the detection of plagiarized content.For instance,an online plagiarism system requires backend servers or real-time access to large databases.Such services are not reliable because they only refer to very few sites.Moreover,the documents included were not accessible via Google.The proposed project aids teachers by highlighting the similarity index and the source,which can be extremely cumbersome for teachers to find.In contrast,the use of the proposed client service model for plagiarism detection helps obtain instant results.Notably, the client-server model includes realtime capturing of URL and keypress events, particularly Ctrl+V and Ctrl+C, which are present on local servers.Thus, these stored databases need to be downloaded and sent to the service provider to verify that no plagiarism was present in student assignments.Globally, the number of plagiarism cases by students and faculty is growing.However, academic institutions are steadfast in maintaining moral standards for students and faculty.To protect academic integrity and avoid plagiarism, most universities either buy or develop plagiarism detection technology.This section describes a few plagiarism detection software programs used by highly ranked institutions to avoid plagiarism.IThenticate is a plagiarism detection software program that runs on the website Turnitin and protects intellectual property.In 2006,leading newspapers reported that the novel “Godless” had an instance of plagiarism.The proposed framework provided other key benefits apart from removing plagiarized text.Because the framework is programmed using a Windows login system, it does not allow students to work if the framework itself is not working.This Windows login arrangement is necessary, particularly when students are assigned a task, which further enables faculty members to supervise students.Second, as the proposed framework runs as a background process, it does not affect the university campus network.Hence, this framework collected data in a secure environment.Duplichecker is another web-based plagiarism service that performs sentence-by-sentence comparisons over the Internet; it probably depends on Google.However,it might miss some rephrased sentences.Numerous online plagiarism verifiers are currently available;however, most do not disclose their work mode.Moreover, they do not generate comprehensive plagiarism reports.The study used these verifiers on many documents containing copied sample text for verification and found that the verifiers were unable to detect plagiarism.Third, students need to adopt honest practices to rapidly complete their non-plagiarized assignments.Fourth, instructors can grade students’ work remotely and submit their assignments for plagiarism detection.Fifth, it reduces the university practices of buying expensive plagiarism software, for which a license fee/use is charged.Finally, the laboratory slot problem is no longer an issue because students can work on their assignments anytime and from anywhere.

Table 4:Our proposed method’s performance improvement over other proposals

5 Framework Assessment by Students

A plagiarism collection framework was developed for university courses and evaluated using a smallgroup setting in a pilot study.Tab.5 shows that the scores marked by various faculty members for the student laboratory reports and assignments were not satisfactory before they received any information on plagiarism.

Table 5:Students survey results

*Average Values:5 Strongly Agree,4 Agree, 3 Neutral, 2 Disagree, and 1 Strongly Disagree.

The evaluation results showed that this anti-plagiarism framework has the potential for use in university programs.In the pilot study,25 students(all male)participated in the assignments and laboratory reports of the course; 22 students in this group completed a questionnaire.The questionnaire reflected high overall satisfaction in the study.In the second question, students reported that the course had improved their knowledge of plagiarism, attitudes toward coding, and writing skills.Most respondents (n = 22)completed assignments and laboratory reports after the course.Specifically, the assignment assessed in the survey (second question) had significantly improved grades.The course syllabus has a real-time application, and one of the learning outcomes is the student awareness of plagiarism when submitting assignments and laboratory reports on the latest topics.However, a few students expressed the need for similar sessions for other subjects.The researchers also asked the students to assess their knowledge before and after obtaining plagiarism information.Therefore, as information on plagiarism was disseminated course learning outcomes were improved.Some written comments were also received, in which students stated that the use of the developed framework helped them prepare laboratory reports and assignments.This approach is highly inspired from two perspectives:knowledge about plagiarism and gaining skills, mainly writing skills, for research publication.Many students mentioned that working on assignments using the framework was suitable because they were could work on the assignments conveniently, as per their timeframe, and from different network locations.The students specified that no time was spent on configuring and installing the anti-plagiarism framework.

6 Conclusion

University learning and anti-plagiarism require efforts from both instructors and students.This study found that dissemination of information concerning plagiarism was extremely critical for the undergraduate program.However, a limitation was that every university could not afford plagiarism software, but certain courses that involve research paper writing tasks and coding should incorporate plagiarism check to ensure that it has not occurred.To date, the proposed framework was the only existing software to combat plagiarism effectively, and it may be updated to include more features to work independently without the intervention of third-party plagiarism software.As an alternative to thirdparty software, students can complete laboratory reports and assignments without any software while attempting to be insightful when writing research papers.To effectively utilize anti-plagiarism software,the author must follow comprehensive ethics while adding citations to their work.Existing anti-plagiarism software can be easily misled by removing words and phrases from the document.The authors have built a plagiarism backend framework and installed it on each computer in the university and its affiliated colleges.The framework collected browsed articles and online text and images while laboratory reports were being written.Thus, the framework collected the students’ browsed history and their respective URLs, images, and other text materials present in their local drive, that is, anything copied using a keyboard or mouse.These collected browser data and other data were transferred to the plagiarism software provider to reduce the burden on their server; the software scanned millions of data sets and produced similarity indices of a student’s submitted work.Hence, overall, this approach reduces the burden on the university server instead of completely scanning millions of data.A student-targeted anti-plagiarism framework is proposed in this paper.This approach increases student awareness of plagiarism without revealing their identity.The study provided a prototype implementation of the proposed architecture based on the university network setup that can be dynamically connected to obtain data from students and note their activities when writing an assignment.Although the frequency of reported plagiarism is high in number, many students involved in plagiarism have a low level of plagiarism awareness.Others may claim that they understand the consequences of plagiarism, but they continue to practice plagiarism.Students who truly prioritize their personal growth should focus on originality and find innovative ideas instead of practicing plagiarism.

Acknowledgement:We acknowledge that the Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University supported this project under the research project 2019/01/10440 and we appreciate their kind support thought the research.

Funding Statement:The Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University supported this project under the research project 2019/01/10440.

Conflicts of Interest:The author(s)declare(s)that there is no conflict of interest regarding the publication of this paper.

主站蜘蛛池模板: 久久国产精品夜色| 日韩国产精品无码一区二区三区| 国产爽爽视频| 精品三级网站| 91成人试看福利体验区| 天天摸天天操免费播放小视频| 久草视频一区| 色哟哟国产精品| 无码国内精品人妻少妇蜜桃视频| 很黄的网站在线观看| 久无码久无码av无码| 成年人免费国产视频| 极品国产在线| 亚洲swag精品自拍一区| 亚洲日韩高清无码| 亚洲国产欧洲精品路线久久| 久久先锋资源| 在线不卡免费视频| 成人在线综合| 色综合成人| 狠狠亚洲婷婷综合色香| 2021国产精品自产拍在线观看| 国产日韩欧美黄色片免费观看| 中文字幕资源站| 一本综合久久| 精品国产自| 看国产毛片| 亚洲无码日韩一区| 免费高清自慰一区二区三区| 香蕉久人久人青草青草| 在线观看免费AV网| 亚洲最新网址| 精品自窥自偷在线看| 亚洲无线国产观看| 久久久噜噜噜久久中文字幕色伊伊 | 亚洲一区二区三区香蕉| 免费观看精品视频999| 91福利在线看| 伊人久久久久久久久久| 在线欧美a| 亚洲精品无码人妻无码| 中文天堂在线视频| 亚洲动漫h| 99热国产这里只有精品9九 | 午夜无码一区二区三区在线app| 亚洲欧美人成电影在线观看| 国产成人精品亚洲日本对白优播| 高清色本在线www| 亚洲精品成人福利在线电影| 在线欧美一区| 日本免费一区视频| 91视频精品| 久久精品这里只有国产中文精品| 成人综合网址| 国产视频欧美| 国产成人综合亚洲欧美在| 全部无卡免费的毛片在线看| 18禁不卡免费网站| 波多野结衣中文字幕久久| 在线看片免费人成视久网下载| 国产91熟女高潮一区二区| 热99精品视频| 亚洲欧美日韩成人在线| 无套av在线| 99热这里只有精品免费国产| 亚洲色偷偷偷鲁综合| 手机在线免费不卡一区二| 九九热这里只有国产精品| 成人av专区精品无码国产 | 国产成人a在线观看视频| 亚洲av中文无码乱人伦在线r| 波多野吉衣一区二区三区av| 久久人妻系列无码一区| 一本大道香蕉中文日本不卡高清二区| 高潮毛片免费观看| 国产成人精品高清不卡在线| 香蕉久久国产精品免| 国产成人91精品免费网址在线| 久久久久久尹人网香蕉| 国产免费羞羞视频| 亚洲精品少妇熟女| 久久亚洲高清国产|