The JK System to Detect Plagiarism
In this research a system, referred to as Jubair-Khaireddin (JK), has been developed to assess the degree of similarity between two programs even though they look superficially dissimilar. The JK system has the capability to detect deliberate attempts of plagiarism. Reverse engineering technique is...
Guardado en:
| Autores principales: | , |
|---|---|
| Formato: | Articulo |
| Lenguaje: | Inglés |
| Publicado: |
2006
|
| Materias: | |
| Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/9540 http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct06-2.pdf |
| Aporte de: |
| id |
I19-R120-10915-9540 |
|---|---|
| record_format |
dspace |
| institution |
Universidad Nacional de La Plata |
| institution_str |
I-19 |
| repository_str |
R-120 |
| collection |
SEDICI (UNLP) |
| language |
Inglés |
| topic |
Ciencias Informáticas SOFTWARE ENGINEERING Entropía Plagio Restructuring, reverse engineering, and reengineering |
| spellingShingle |
Ciencias Informáticas SOFTWARE ENGINEERING Entropía Plagio Restructuring, reverse engineering, and reengineering Sabri, Khair Eddin M. Al-Jaafer, Jubair J. The JK System to Detect Plagiarism |
| topic_facet |
Ciencias Informáticas SOFTWARE ENGINEERING Entropía Plagio Restructuring, reverse engineering, and reengineering |
| description |
In this research a system, referred to as Jubair-Khaireddin (JK), has been developed to assess the degree of similarity between two programs even though they look superficially dissimilar. The JK system has the capability to detect deliberate attempts of plagiarism. Reverse engineering technique is used to bring each suspected program back to its initial specification stage. This operation enables us to extract the structure of the program which is an important factor in detecting plagiarism. This can be achieved through the extraction of the Static Execution Tree (SET) for each program. The SET is then transformed into Terminating Binary Sequence (TBS). The TBSs generated from the tested programs are compared in order to get similar branches. Reengineering technique is then applied on these similar branches in order to compute its entropy (information content). The entropy is computed to prove or disprove the existence of similarities between programs. The JK system has been tested on different Java programs with different modifications, and proved successful in detecting almost all cases including those of partially plagiarised programs. |
| format |
Articulo Articulo |
| author |
Sabri, Khair Eddin M. Al-Jaafer, Jubair J. |
| author_facet |
Sabri, Khair Eddin M. Al-Jaafer, Jubair J. |
| author_sort |
Sabri, Khair Eddin M. |
| title |
The JK System to Detect Plagiarism |
| title_short |
The JK System to Detect Plagiarism |
| title_full |
The JK System to Detect Plagiarism |
| title_fullStr |
The JK System to Detect Plagiarism |
| title_full_unstemmed |
The JK System to Detect Plagiarism |
| title_sort |
jk system to detect plagiarism |
| publishDate |
2006 |
| url |
http://sedici.unlp.edu.ar/handle/10915/9540 http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct06-2.pdf |
| work_keys_str_mv |
AT sabrikhaireddinm thejksystemtodetectplagiarism AT aljaaferjubairj thejksystemtodetectplagiarism AT sabrikhaireddinm jksystemtodetectplagiarism AT aljaaferjubairj jksystemtodetectplagiarism |
| bdutipo_str |
Repositorios |
| _version_ |
1764820491865948161 |