期刊文献+

基于段落相似度的论文抄袭判定 被引量:2

The Way to Judge Plagiarism Based on Similarity Between Paragraphs
在线阅读 下载PDF
导出
摘要 从抄袭的定义和法律规定出发,在分析比较国内外主要的论文抄袭判定方法基础上,提出存在的问题和改进策略,最后给出一种基于段落相似度的论文抄袭判定算法。此算法可以检测出抄袭者将论文的段落顺序打乱或者将段落文字打乱重新组合的情况,并将确认抄袭和疑似抄袭的抄袭论文和原论文的相应内容输出,方便用户进一步审查。 Based on the definition of plagiarism and the law, we put forwards the existent problems and strategies for improvement by analyzing the main methods to deal with plagiarism judgment both at home and abroad, and give a method to judge plagiarism according to the similarity between paragraphs. In this way we can find out the cases in which plagiarists reform the articles by rearranging the order of paragraphs or the words of one paragraph, and output the papers which are confirmed or suspected as plagiarisms and the corresponding content in the original in order to make it convenient for users to check.
作者 赵俊杰 谢飞
机构地区 合肥工业大学
出处 《电脑与电信》 2008年第8期22-23,35,共3页 Computer & Telecommunication
基金 2007年度国家教育部人文社科研究基金青年项目 研究方向:07JC870006 安徽财经大学教研重点项目 研究方向:ACJYZD200914
关键词 抄袭判定 段落相似度 向量空间模型 TFIDF plagiarism judgrnent similarity between paragraphs vector space model TFIDF
  • 相关文献

参考文献6

二级参考文献48

  • 1董振东,董强.面向信息处理的词汇语义研究中的若干问题[J].语言文字应用,2001(3):27-32. 被引量:37
  • 2史彦军,滕弘飞,金博.抄袭论文识别研究与进展[J].大连理工大学学报,2005,45(1):50-57. 被引量:36
  • 3[2]Griswold G N. A method for protecting copyright on networks. In: Proc of Joint Harvard MIT Workshop on Technology Strategies for Protecting Intellectual Property in the Networked Multimedia Environment. Cambridge, MA: MIT Press, 1993. 214~221
  • 4[3]Brassil J, Low S, Maxemchuk N et al. Document marking and identification using both line and word shifting. AT & T Bell Laboratories, Tech Rep: TR94.6.8, 1994
  • 5[4]JPEG. JPEG digital compression and coding of continuous still images. ISO, Draft, Tech Rep: ISO 10918, 1991
  • 6[5]Brin S, Davis J, Garciaolina H. Copy detection mechanisms for digital documents. In: Proc of the ACM SIGMOD Int'l Conf on Management of Data. San Francisco, CA: ACM Press, 1995. 398~409
  • 7[1]Popek G J, Kline C S. Encryption and secure computer networks. ACM Computing Surveys, 1979, 11(4): 331~356
  • 8[1]DONALD L M C. CAI research [EB/OL]. http:∥www.academicintegrity.org/cairesearch.asp., 2004-07-01.
  • 9[2]OTTENSTEIN K J. An algorithmic approach to the detection and prevention of plagiarism [J]. ACM SIGCSE Bull, 1976,8(4): 30-41.
  • 10[3]CLOUGH P. Plagiarism in natural and programming languages: An overview of current tools and technologies [A]. Research Memoranda: CS-00-05 [R]. Sheffield: Department of Computer Science, University of Sheffield, 2000. 1-31.

共引文献132

同被引文献22

引证文献2

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部