WorldWideScience

Sample records for source code plagiarism

  1. Source Code Plagiarism--A Student Perspective

    Science.gov (United States)

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  2. Discovering Clusters of Plagiarism in Students’ Source Codes

    Directory of Open Access Journals (Sweden)

    L. Moussiades

    2016-03-01

    Full Text Available Plagiarism in students’ source codes constitutes an important drawback for the educational process. In addition, plagiarism detection in source codes is time consuming and tiresome task. Therefore, many approaches for plagiarism detection have been proposed. Most of the aforementioned approaches receive as input a set of source files and calculate a similarity between each pair of the input set. However, the tutor often needs to detect the clusters of plagiarism, i.e. clusters of students’ assignments such as all assignments in a cluster derive from a common original. In this paper, we propose a novel plagiarism detection algorithm that receives as input a set of source codes and calculates the clusters of plagiarism. Experimental results show the efficiency of our approach and encourage us to further research.

  3. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    Science.gov (United States)

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  4. A Comparison of Source Code Plagiarism Detection Engines

    Science.gov (United States)

    Lancaster, Thomas; Culwin, Fintan

    2004-06-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and effective techniques are seen to involve tokenising student submissions then searching pairs of submissions for long common substrings, an example of what is defined to be a paired structural metric. Computing academics are recommended to use one of the two Web-based detection engines, MOSS and JPlag. It is shown that whilst detection is well established there are still places where further research would be useful, particularly where visual support of the investigation process is possible.

  5. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  6. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    Science.gov (United States)

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  7. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    Science.gov (United States)

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  8. Source Code Plagiarism Detection Method Using Protégé Built Ontologies

    Directory of Open Access Journals (Sweden)

    Ion SMEUREANU

    2013-01-01

    Full Text Available Software plagiarism is a growing and serious problem that affects computer science universities in particular and the quality of education in general. More and more students tend to copy their thesis’s software from older theses or internet databases. Checking source codes manually, to detect if they are similar or the same, is a laborious and time consuming job, maybe even impossible due to existence of large digital repositories. Ontology is a way of describing a document’s semantic, so it can be easily used for source code files too. OWL Web Ontology Language could find its applicability in describing both vocabulary and taxonomy of a programming language source code. SPARQL is a query language based on SQL that extracts saved or deducted information from ontologies. Our paper proposes a source code plagiarism detection method, based on ontologies created using Protégé editor, which can be applied in scanning students' theses' software source code.

  9. Source Code Plagiarism Detection Method Using Protégé Built Ontologies

    OpenAIRE

    Ion SMEUREANU; Bogdan IANCU

    2013-01-01

    Software plagiarism is a growing and serious problem that affects computer science universities in particular and the quality of education in general. More and more students tend to copy their thesis’s software from older theses or internet databases. Checking source codes manually, to detect if they are similar or the same, is a laborious and time consuming job, maybe even impossible due to existence of large digital repositories. Ontology is a way of describing a document’s semantic, so it ...

  10. Source Retrieval for Plagiarism Detection

    OpenAIRE

    Suchomel Šimon; Brandejs Michal

    2015-01-01

    Plagiarism has become a serious problem mainly because of the electronically available documents. An online document retrieval is a weighty part of a modern anti-plagiarism tool. This paper describes an architecture and concepts of a real-world document retrieval system, which is a part of a general anti-plagiarism software. Up to date systems for plagiarism detection are discussed from the source retrieval perspective. The key approaches of source retrieval are compared. The system recommend...

  11. Detecting plagiarism in program code and free text

    OpenAIRE

    Bandelj, Anej

    2014-01-01

    Lately we often hear allegations that a certain work is a plagiarism, hence I decided to describe this area in detail in my diploma thesis. First I define what precisely the term plagiarism means, in which areas it is present, how to limit it, and how to utilize software for its detection. I delve into the utility of software which detects details in source code and text documents. Such software does not determine plagiarism itself, but rather indicates the percentage of text or source code s...

  12. A Ranking Approach to Source Retrieval of Plagiarism Detection

    National Research Council Canada - National Science Library

    KONG, Leilei; LU, Zhimao; HAN, Zhongyuan; QI, Haoliang

    2017-01-01

    This paper addresses the issue of source retrieval in plagiarism detection. The task of source retrieval is retrieving all plagiarized sources of a suspicious document from a source document corpus whilst minimizing retrieval costs...

  13. Source-Code Plagiarism in Universities: A Comparative Study of Student Perspectives in China and the UK

    Science.gov (United States)

    Zhang, Dongyang; Joy, Mike; Cosma, Georgina; Boyatt, Russell; Sinclair, Jane; Yau, Jane

    2014-01-01

    There has been much research and discussion relating to variations in plagiaristic activity observed in students from different demographic backgrounds. Differences in behaviour have been noted in many studies, although the underlying reasons are still a matter of debate. Existing work focuses mainly on textual plagiarism, and most often derives…

  14. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  15. Monitoring source in an unconscious plagiarism paradigm.

    Science.gov (United States)

    Landau, J D; Marsh, R L

    1997-06-01

    Current laboratory paradigms used to assess unconscious plagiarism consist of three tasks. First, participants generate solutions to a puzzle task with a partner (initial generation task); second, they recall their individual contribution (recall-own task); and third, they attempt to create new solutions that were not offered previously (generate-new task). An analysis of these tasks indicated that they differ in terms of the source monitoring they require. The two generative tasks require less differentiated information (e.g., familiarity) and relatively lax decision criteria. The recall-own task, however, demands more differentiated information and more extended decision criteria. In two experiments, factors known to influence source monitoring were manipulated. Consistent with the analysis, no effects were associated with the generative tasks. Recall-own plagiarisms increased when self- and other-generated solutions were difficult to distinguish (Experiment 1) and decreased when the two sources were easier to distinguish (Experiment 2).

  16. Plagiarism and Source Deception Detection Based on Syntax Analysis

    Directory of Open Access Journals (Sweden)

    Eman Salih Al-Shamery

    2017-02-01

    Full Text Available In this research, the shingle algorithm with Jaccard method are employed as a new approach to detect deception in sources in addition to detect plagiarism . Source deception occurs as a result of taking a particular text from a source and relative it to another source, while plagiarism occurs in the documents as a result of taking part or all of the text belong to another research, this approach is based on Shingle algorithm with Jaccard coefficient , Shingling is an efficient way to compare the set of shingle in the files that contain text which are used as a feature to measure the syntactic similarity of the documents and it will work with Jaccard coefficient that measures similarity between sample sets . In this proposed system, text will be checked whether it contains syntax plagiarism or not and gives a percentage of similarity with other documents , As well as research sources will be checked to detect deception in source , by matching it with available sources from Turnitin report of the same research by using shingle algorithm with Jaccard coefficient. The motivations of this work is to discovery of literary thefts that occur on the researches , especially what students are doing in their researches , also discover the deception that occurs in the sources.

  17. An Investigation into Electronic-Source Plagiarism in a First-Year Essay Assignment

    Science.gov (United States)

    Ellery, Karen

    2008-01-01

    Since the emergence of the electronic era, plagiarism has become an increasingly prevalent problem at tertiary institutions. This study investigated the role electronic sources of information played in influencing plagiarism in an essay assignment in a first-year geography module at the University of KwaZulu-Natal in South Africa. Despite explicit…

  18. The credibility of a source influences the rate of unconscious plagiarism.

    Science.gov (United States)

    Bink, M L; Marsh, R L; Hicks, J L; Howard, J D

    1999-05-01

    Three experiments were conducted to investigate the relationship between the credibility of information and later unconscious plagiarism of that information. In each experiment, ideas concerning ways to reduce traffic accidents were presented from a more credible source (traffic planners) and a less credible source (college freshmen). After a distractor task, participants were asked to generate novel ways to reduce traffic accidents. In Experiments 1 and 2, unconscious plagiarism of ideas presented from the more credible source was greater than from the less credible source. In neither experiment was explicit memory for ideas from each source different in tests of source monitoring or free recall. However, the difference in unconscious plagiarism was eliminated in Experiment 3 by having participants generate the implications of ideas at study. The results are discussed in terms of the explicit factors that affect the incidence of unconscious plagiarism.

  19. Two First-Year Students' Strategies for Writing from Sources: Patchwriting or Plagiarism?

    Science.gov (United States)

    Li, Yongyan; Casanave, Christine Pearson

    2012-01-01

    In this paper we report a case study of two first-year students at a university in Hong Kong doing the same writing assignment that required the use of sources. We explore the students' understanding of plagiarism, their strategies for composing, the similarity between their texts and source texts, and the lecturer's assessment of their work. The…

  20. The problem of plagiarism.

    Science.gov (United States)

    Anderson, Melissa S; Steneck, Nicholas H

    2011-01-01

    Plagiarism is a form of research misconduct and a serious violation of the norms of science. It is the misrepresentation of another's ideas or words as one's own, without proper acknowledgement of the original source. Certain aspects of plagiarism make it less straightforward than this definition suggests. Over the past 30 years, the U.S. Federal Government has developed and refined its policies on misconduct, and Federal agencies, as well as research institutions, have established approaches to responding to allegations and instances of plagiarism. At present, efforts to avert plagiarism focus on plagiarism-detection software and instructional strategies. Copyright © 2011 Elsevier Inc. All rights reserved.

  1. Source credibility and idea improvement have independent effects on unconscious plagiarism errors in recall and generate-new tasks.

    Science.gov (United States)

    Perfect, Timothy J; Field, Ian; Jones, Robert

    2009-01-01

    Unconscious plagiarism occurs when people try to generate new ideas or when they try to recall their own ideas from among a set generated by a group. In this study, the factors that independently influence these two forms of plagiarism error were examined. Participants initially generated solutions to real-world problems in 2 domains of knowledge in collaboration with a confederate presented as an expert in 1 domain. Subsequently, the participant generated improvements to half of the ideas from each person. Participants returned 1 day later to recall either their own ideas or their partner's ideas and to complete a generate-new task. A double dissociation was observed. Generate-new plagiarism was driven by partner expertise but not by idea improvement, whereas recall plagiarism was driven by improvement but not expertise. This improvement effect on recall plagiarism was seen for the recall-own but not the recall-partner task, suggesting that the increase in recall-own plagiarism is due to mistaken idea ownership, not source confusion.

  2. Stealing or Sharing? Cross-Cultural Issues of Plagiarism in an Open-Source Era

    Science.gov (United States)

    Haitch, Russell

    2016-01-01

    More professors and institutions want to move from a detect-and-punish to an educate-and-prevent model for dealing with plagiarism. Understanding the causes of plagiarism, especially among international students, can aid in efforts to educate students and prevent plagiarism. Research points to a confluence of causal factors, such as time pressure,…

  3. Plagiarism – A Noble Misconduct

    Directory of Open Access Journals (Sweden)

    Md. Rezwanur Rahman

    2015-07-01

    eloquence of the text.8 But, there is a dilemma in scientific writing where the essence of the work is the originality of the scientific content no matter how it is presented.9 Unlike any other author, the author of a scientific paper are ought to follow certain well-established scientific methodology and always be careful not to be affected by his or her intuition or biases that might jeopardize the judgment of a researcher.9,10 For a scientific paper, the author has to take sufficient time to read and understand thoroughly the main source of the article, and then he can organize into his own ideas or thoughts. Before submitting their ideas or manuscript to the journal office, the author should rewrite the article in his own words without seeing from the original source and if in any doubt, should take help of the guide/instructor.4,11,12 Researchers and authors of scholarly papers have to follow ethical codes of Good Scientific Practice (GSP,13 primarily based of the principles of honesty and integrity.11 In the modern-day collaborative and multidisciplinary research, honesty of each and every author is becoming a pillar of trustworthy science.14 Scientists absorb new information, design new studies and publish their experimental results in various related biomedical journals. Because of the ease of using various search engines for researching resources on the internet, large numbers of published papers that contain an enormous amount of study materials can be quickly obtained. As such, plagiarism or duplicate publication may occur either consciously or unconsciously when the authors are preparing their manuscript.15 In fact availability of internet facilities and free online journals are the main sources of today's plagiarism among the students, faculty and researchers of any profession.6,16-19 Unfortunately, digitalization made copy-paste plagiarism and inappropriate re-use of sources from the websites, online journals, and other electronic media widespread.14 According

  4. Can Paraphrasing Practice Help Students Define Plagiarism?

    Science.gov (United States)

    Barry, Elaine S.

    2006-01-01

    Plagiarism is the new dirty word on campus, and college instructors are increasingly interested in teaching students how to prevent committing plagiarism. In this study, college students wrote definitions of plagiarism before and after 6 weeks of practice paraphrasing and citing original sources. Students' definitions of plagiarism were evaluated…

  5. Academic dishonesty and misconduct: Curbing plagiarism in the Muslim world

    Directory of Open Access Journals (Sweden)

    Abdul Rashid Moten

    2014-12-01

    Full Text Available Plagiarism is the theft of someone’s ideas or language, and is a form of cheating which is morally and ethically unacceptable. This study analyses the nature of plagiarism from an Islamic perspective and its prevalence in institutions of higher learning in the Muslim world, especially among faculty members. It also examines the ways in which universities attempt to minimise or marginalise plagiarism. This study is warranted by the fact that there is relatively very little research on the issue of plagiarism at universities in the Muslim world and that existing research seldom addresses the issue of academics engaged in such unethical practices. Based upon existing surveys, interviews, and documentary sources, the study found that in earlier periods, standards were not inevitably lower than those that exist today and that the scope for condemning plagiarists has always existed. It also found that despite Islam’s loathing, the incidence of plagiarism has grown significantly among Muslim students and faculty members in the Muslim world. The response to plagiarism varies from country to country. Some Muslim countries tolerate plagiarism, while others are taking steps to curb it. Institutions in Malaysia approach the problem of plagiarism as a matter of morality and crime that emphasise the need to develop writing and researching skills. They resort to honour codes, emphasise law and enforcement, and teach ways to write and cite. However, the success of these methods needs to be further probed.

  6. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  7. Plagiarism and Self-plagiarism

    OpenAIRE

    2013-01-01

    Plagiarism is unauthorized appropriation of other people’s ideas, processes or text without giving correct credit and with intention to present it as own property. Appropriation of own published ideas or text and passing it as original is denominated self-plagiarism and considered as bad as plagiarism. The frequency of plagiarism is increasing and development of information and communication technologies facilitates it, but simultaneously, thanks to the same technology, plagiarism detection s...

  8. Single Sourcing, Boilerplates, and Re-Purposing: Plagiarism and Technical Writing

    Science.gov (United States)

    Louch, Michelle O'Brien

    2016-01-01

    In academia, plagiarism adheres to the traditional definition: utilizing another person's words or ideas without proper credit. Students are taught to cite everything, while instructors are given tools to detect plagiarism. This ultimately creates an atmosphere of paranoia, where students fear accusation and teachers are convinced that plagiarism…

  9. The Ethics of Plagiarism: How Genre Affects Writers' Use of Source Materials.

    Science.gov (United States)

    Jameson, Daphne A.

    1993-01-01

    Explores the definition of plagiarism in terms of genre. Recommends ways that business communication faculty can provide their students with an understanding of the problem and its solution. Suggests that business communication needs a broader view of what constitutes plagiarism, how documentation expectations are developed, and why the ethical…

  10. Local Plagiarisms

    Science.gov (United States)

    Borg, Erik

    2009-01-01

    Plagiarism and collusion are significant issues for most lecturers whatever their discipline, and to universities and the higher education sector. Universities respond to these issues by developing institutional definitions of plagiarism, which are intended to apply to all instances of plagiarism and collusion. This article first suggests that…

  11. Students versus Plagiarism: How is Online Plagiarism Detection Service Perceived?

    Directory of Open Access Journals (Sweden)

    Muhammad Affan Ramadhana

    2016-08-01

    Full Text Available The development of information and communication technology plays a considerable role for students in writing their theses. The positive side, it will help the students to find countless number of academic sources ranging from journal articles to complete theses written by other scholars. On the other hand, it will also create a chance for the students to commit plagiarism easier. Unoriginal writing and plagiarism in this digital era can be detected in the digital way by using plagiarism detection software. This paper elaborates how students understand the concept of plagiarism, how they avoid plagiarism, and how they perceive online plagiarism detection service. The data was taken from interviews to MA students during their period of thesis writing. This paper concludes several important outlines to be learning guidelines for the students in improving their academic writing.

  12. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  13. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual

  14. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual

  15. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  16. Computation of Program Source Code Similarity by Composition of Parse Tree and Call Graph

    Directory of Open Access Journals (Sweden)

    Hyun-Je Song

    2015-01-01

    Full Text Available This paper proposes a novel method to compute how similar two program source codes are. Since a program source code is represented as a structural form, the proposed method adopts convolution kernel functions as a similarity measure. Actually, a program source code has two kinds of structural information. One is syntactic information and the other is the dependencies of function calls lying on the program. Since the syntactic information of a program is expressed as its parse tree, the syntactic similarity between two programs is computed by a parse tree kernel. The function calls within a program provide a global structure of a program and can be represented as a graph. Therefore, the similarity of function calls is computed with a graph kernel. Then, both structural similarities are reflected simultaneously into comparing program source codes by composing the parse tree and the graph kernels based on a cyclomatic complexity. According to the experimental results on a real data set for program plagiarism detection, the proposed method is proved to be effective in capturing the similarity between programs. The experiments show that the plagiarized pairs of programs are found correctly and thoroughly by the proposed method.

  17. Plagiarism: Why is it such a big issue for medical writers?

    OpenAIRE

    Natasha Das; Monica Panjabi

    2011-01-01

    Plagiarism is the wrongful presentation of somebody else′s work or idea as one′s own without adequately attributing it to the source. Most authors know that plagiarism is an unethical publication practice. Yet, it is a serious problem in the medical writing arena. Plagiarism is perhaps the commonest ethical issue plaguing medical writing. In this article, we highlight the different types of plagiarism and address the issues of plagiarism of text, plagiarism of ideas, mosaic plagiarism, self-p...

  18. Plagiarism Prevention

    Science.gov (United States)

    Probett, Christine

    2011-01-01

    Plagiarism does exist at universities today. In some cases, students are naive with respect to understanding what plagiarism is and how to avoid it. In other cases, students blatantly disregard and disrespect the written work of others, claiming it as their own. Regardless, educators must be vigilant in their efforts to discourage and prevent…

  19. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  20. Measuring Source Code Similarity Using Reference Vectors

    Science.gov (United States)

    Ohno, Asako; Murao, Hajime

    In this paper, we propose a novel method to measure similarity between program source codes. Different to others, our method doues not compare two source codes directly but compares two reference vectors, where a reference vector is calculated from one source code and a set of reference source codes. This means that our method requires no original source code when considering an application open to public such as a search engine for the program source code on the internet. We have built a simple search system and have evaluated with Java source codes made in the university course of basic programming. Results show that the system can achieve quite high average precision rate in very short time which means the proposed method can measure correct similarity very fast.

  1. Prevalence of plagiarism among medical students.

    Science.gov (United States)

    Bilić-Zulle, Lidija; Frković, Vedran; Turk, Tamara; Azman, Josip; Petrovecki, Mladen

    2005-02-01

    To determine the prevalence of plagiarism among medical students in writing essays. During two academic years, 198 second year medical students attending Medical Informatics course wrote an essay on one of four offered articles. Two of the source articles were available in an electronic form and two in printed form. Two (one electronic and one paper article) were considered less complex and the other two more complex. The essays were examined using plagiarism detection software "WCopyfind," which counted the number of matching phrases with six or more words. Plagiarism rate, expressed as the percentage of the plagiarized text, was calculated as a ratio of the absolute number of matching words and the total number of words in the essay. Only 17 (9%) of students did not plagiarize at all and 68 (34%) plagiarized less than 10% of the text. The average plagiarism rate (% of plagiarized text) was 19% (5-95% percentile=0-88). Students who were strictly warned not to plagiarize had a higher total word count in their essays than students who were not warned (P=0.002) but there was no difference between them in the rate of plagiarism. Students with higher grades in Medical Informatics exam plagiarized less than those with lower grades (P=0.015). Gender, subject source, and complexity had no influence on the plagiarism rate. Plagiarism in writing essays is common among medical students. An explicit warning is not enough to deter students from plagiarism. Detection software can be used to trace and evaluate the rate of plagiarism in written student assays.

  2. Plagiarism in solutions of programming tasks in distance learning

    Directory of Open Access Journals (Sweden)

    Krzysztof Barteczko

    2012-12-01

    Full Text Available Source code plagiarism in students solutions of programming tasks is a serious problem, especially important in distance learning. Naturally, it should be prevented, but publicly available code plagiarism detection tools are not fully adjusted to this purpose. This paper proposes the specific approach to detecting code duplicates. This approach is based on adapting of detection process to characteristics of programming tasks and comprise of freshly developed detecting tools, which could be configured and tuned to fit individual features of the programming task. Particular attention is paid to the possibility of an automatic elimination of duplicate codes from the set of all solutions. As a minimum, this requires the rejection of false-positive duplicates, even for simple, schematic tasks. The case in the use of tools is presented in this context. The discussion is illustrated by applying of proposed tools to duplicates detection in the set of actual, real-life, codes written in Java programming language.

  3. An Institutional Code of Ethics--A Response to Attitude of Israeli Teachers' Education College Students towards Academic Plagiarism

    Science.gov (United States)

    Reingold,, Roni; Baratz, Lea

    2011-01-01

    Academic plagiarism becomes very easy due to new opportunities provided by the Internet era (Scrinber, 2003; Underwood & Sazabo, 2003; Ross, 2005). We believe that academic dishonesty is a major issue, because it strikes at the heart of the academic and social values: honesty, trust and integrity. When dealing with education students, the…

  4. Plagiarism and Self-plagiarism

    Directory of Open Access Journals (Sweden)

    Bakir Mehić

    2013-08-01

    Full Text Available Plagiarism is unauthorized appropriation of other people’s ideas, processes or text without giving correct credit and with intention to present it as own property. Appropriation of own published ideas or text and passing it as original is denominated self-plagiarism and considered as bad as plagiarism. The frequency of plagiarism is increasing and development of information and communication technologies facilitates it, but simultaneously, thanks to the same technology, plagiarism detection software is developing[1].Within academia, plagiarism by students, professors, or researchers is considered academic dishonesty or academic fraud, and offenders are punished by sanctions ranging from suspension to termination, along with the loss of credibility and perceived integrity[2].When we talking about self-plagiarism avid B. Resnik clarifies, “Self-plagiarism involves dishonesty but not intellectual theft[3].” Roig (2002[4] offers a useful classification system including four types of self-plagiarism: - duplicate publication of an article in more than one journal;- partitioning of one study into multiple publications, often called salami-slicing;- text recycling; and- copyright infringement. In cases of proven plagiarism and academic self-plagiarism consequences may include[5]: - The author is obliged to withdraw the disputable manuscript which is already published or in different pre-publication stages.- In the event of co-authorship, the co-author must approve of publication withdrawal, even if the misconduct is not related to them.- Publications proved to be false by the Commission are erased from author’s bibliography or marked appropriately.- The procedure for detraction from academic degrees (MSc or PhD at the University is initiated if obtained based on false thesis or dissertation.- The procedure for detraction from scientific and educational titles is initiated by a relevant body if based on false publications or other

  5. Source code retrieval using conceptual similarity

    NARCIS (Netherlands)

    Mishne, G.A.; de Rijke, M.

    2004-01-01

    We propose a method for retrieving segments of source code from a large repository. The method is based on conceptual modeling of the code, combining information extracted from the structure of the code and standard informationdistance measures. Our results show an improvement over traditional

  6. Note on plagiarism

    Indian Academy of Sciences (India)

    WINTEC

    the Internet and easy access to vast amounts of published material. The degree of plagiarism could be as mild as the copying of a single sentence from another author without acknowledgement, or could involve much more extensive 'lifting of material' from other sources, including previous publications of the author.

  7. Coding for Correlated Sources with Unknown Parameters.

    Science.gov (United States)

    1980-05-01

    D. Davisson , "Universal source coding," IEEE Transactions on Information Theory, vol. IT-19, pp. 783-795, 1973. 13. D. Neuhoff, R. Gray, and L... Davisson , "Fixed rate universal source coding with a fidelity criterion," IEEE Transactions on Information Theory, vol. IT-21, pp. 511-523, 1975. 14. D

  8. University Student Online Plagiarism

    Science.gov (United States)

    Wang, Yu-mei

    2008-01-01

    This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

  9. Authorship attribution of source code by using back propagation neural network based on particle swarm optimization.

    Science.gov (United States)

    Yang, Xinyu; Xu, Guoai; Li, Qi; Guo, Yanhui; Zhang, Miao

    2017-01-01

    Authorship attribution is to identify the most likely author of a given sample among a set of candidate known authors. It can be not only applied to discover the original author of plain text, such as novels, blogs, emails, posts etc., but also used to identify source code programmers. Authorship attribution of source code is required in diverse applications, ranging from malicious code tracking to solving authorship dispute or software plagiarism detection. This paper aims to propose a new method to identify the programmer of Java source code samples with a higher accuracy. To this end, it first introduces back propagation (BP) neural network based on particle swarm optimization (PSO) into authorship attribution of source code. It begins by computing a set of defined feature metrics, including lexical and layout metrics, structure and syntax metrics, totally 19 dimensions. Then these metrics are input to neural network for supervised learning, the weights of which are output by PSO and BP hybrid algorithm. The effectiveness of the proposed method is evaluated on a collected dataset with 3,022 Java files belong to 40 authors. Experiment results show that the proposed method achieves 91.060% accuracy. And a comparison with previous work on authorship attribution of source code for Java language illustrates that this proposed method outperforms others overall, also with an acceptable overhead.

  10. Minimum Redundancy Coding for Uncertain Sources

    CERN Document Server

    Baer, Michael B; Charalambous, Charalambos D

    2011-01-01

    Consider the set of source distributions within a fixed maximum relative entropy with respect to a given nominal distribution. Lossless source coding over this relative entropy ball can be approached in more than one way. A problem previously considered is finding a minimax average length source code. The minimizing players are the codeword lengths --- real numbers for arithmetic codes, integers for prefix codes --- while the maximizing players are the uncertain source distributions. Another traditional minimizing objective is the first one considered here, maximum (average) redundancy. This problem reduces to an extension of an exponential Huffman objective treated in the literature but heretofore without direct practical application. In addition to these, this paper examines the related problem of maximal minimax pointwise redundancy and the problem considered by Gawrychowski and Gagie, which, for a sufficiently small relative entropy ball, is equivalent to minimax redundancy. One can consider both Shannon-...

  11. Semantically Detecting Plagiarism for Research Papers

    OpenAIRE

    Reena Kharat, Preeti M. Chavan, Vaibhav Jadhav, Kuldeep Rakibe

    2013-01-01

    Plagiarism means copying of published work without proper acknowledgement of source. Plagiarism is a major concern, in an academic environment, which affects both the credibility of institutions as well as its ability to ensure quality of its student. Plagiarism detection of research papers deals with checking similarities with other research papers. Manual methods cannot be used for checking research papers, as the assigned reviewer may have inadequate knowledge in the research disciplines. ...

  12. On Delayed Sequential Coding of Correlated Sources

    OpenAIRE

    Ma, Nan; Wang, Ye; Ishwar, Prakash

    2007-01-01

    Motivated by video coding applications, the problem of sequential coding of correlated sources with encoding and/or decoding frame-delays is studied. The fundamental tradeoffs between individual frame rates, individual frame distortions, and encoding/decoding frame-delays are derived in terms of a single-letter information-theoretic characterization of the rate-distortion region for general inter-frame source correlations and certain types of potentially frame specific and coupled single-lett...

  13. Plagiarism: Librarians Help Provide New Solutions to an Old Problem.

    Science.gov (United States)

    Hamilton, Denise

    2003-01-01

    While technology has made plagiarism easier, it has also made it easier to detect. This article explains how librarians are getting involved in this battle, what can tip off a plagiarized hand, and the software that can turn suspicion into confirmation. A list of online sources of plagiarism guidelines is provided. (AEF)

  14. Plagiarism in Academic Texts

    Directory of Open Access Journals (Sweden)

    Marta Eugenia Rojas-Porras

    2012-08-01

    Full Text Available The ethical and social responsibility of citing the sources in a scientific or artistic work is undeniable. This paper explores, in a preliminary way, academic plagiarism in its various forms. It includes findings based on a forensic analysis. The purpose of this paper is to raise awareness on the importance of considering these details when writing and publishing a text. Hopefully, this analysis may put the issue under discussion.

  15. Plagiarism in residency application essays.

    Science.gov (United States)

    Segal, Scott; Gelfand, Brian J; Hurwitz, Shelley; Berkowitz, Lori; Ashley, Stanley W; Nadel, Eric S; Katz, Joel T

    2010-07-20

    Anecdotal reports suggest that some residency application essays contain plagiarized content. To determine the prevalence of plagiarism in a large cohort of residency application essays. Retrospective cohort study. 4975 application essays submitted to residency programs at a single large academic medical center between 1 September 2005 and 22 March 2007. Specialized software was used to compare residency application essays with a database of Internet pages, published works, and previously submitted essays and the percentage of the submission matching another source was calculated. A match of more than 10% to an existing work was defined as evidence of plagiarism. Evidence of plagiarism was found in 5.2% (95% CI, 4.6% to 5.9%) of essays. The essays of non-U.S. citizens were more likely to demonstrate evidence of plagiarism. Other characteristics associated with the prevalence of plagiarism included medical school location outside the United States and Canada; previous residency or fellowship; lack of research experience, volunteer experience, or publications; a low United States Medical Licensing Examination Step 1 score; and non-membership in the Alpha Omega Alpha Honor Medical Society. The software database is probably incomplete, the 10%-match threshold for defining plagiarism has not been statistically validated, and the study was confined to applicants to 1 institution. Evidence of matching content in an essay cannot be used to infer the applicant's intent and is not sensitive to variations in the cultural context of copying in some societies. Evidence of plagiarism in residency application essays is more common in international applicants but was found in those by applicants to all specialty programs, from all medical school types, and even among applicants with significant academic honors. No external funding.

  16. Knowing and avoiding plagiarism during scientific writing.

    Science.gov (United States)

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, Svvs; Nagasree, M

    2014-09-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing.

  17. Knowing and Avoiding Plagiarism During Scientific Writing

    Science.gov (United States)

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, SVVS; Nagasree, M

    2014-01-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing. PMID:25364588

  18. Plagiarism in research.

    Science.gov (United States)

    Helgesson, Gert; Eriksson, Stefan

    2015-02-01

    Plagiarism is a major problem for research. There are, however, divergent views on how to define plagiarism and on what makes plagiarism reprehensible. In this paper we explicate the concept of "plagiarism" and discuss plagiarism normatively in relation to research. We suggest that plagiarism should be understood as "someone using someone else's intellectual product (such as texts, ideas, or results), thereby implying that it is their own" and argue that this is an adequate and fruitful definition. We discuss a number of circumstances that make plagiarism more or less grave and the plagiariser more or less blameworthy. As a result of our normative analysis, we suggest that what makes plagiarism reprehensible as such is that it distorts scientific credit. In addition, intentional plagiarism involves dishonesty. There are, furthermore, a number of potentially negative consequences of plagiarism.

  19. Entropy Approximation in Lossy Source Coding Problem

    Directory of Open Access Journals (Sweden)

    Marek Śmieja

    2015-05-01

    Full Text Available In this paper, we investigate a lossy source coding problem, where an upper limit on the permitted distortion is defined for every dataset element. It can be seen as an alternative approach to rate distortion theory where a bound on the allowed average error is specified. In order to find the entropy, which gives a statistical length of source code compatible with a fixed distortion bound, a corresponding optimization problem has to be solved. First, we show how to simplify this general optimization by reducing the number of coding partitions, which are irrelevant for the entropy calculation. In our main result, we present a fast and feasible for implementation greedy algorithm, which allows one to approximate the entropy within an additive error term of log2 e. The proof is based on the minimum entropy set cover problem, for which a similar bound was obtained.

  20. Statistical physics, optimization and source coding

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 64; Issue 6. Statistical physics, optimization and source coding. Riccardo Zecchina. Invited Talks:- Topic 12. Other applications of statistical physics (networks, traffic flows, algorithmic problems, econophysics, astrophysical applications, etc.) Volume 64 Issue 6 June ...

  1. Plagiarism in scientific publishing.

    Science.gov (United States)

    Masic, Izet

    2012-12-01

    Scientific publishing is the ultimate product of scientist work. Number of publications and their quoting are measures of scientist success while unpublished researches are invisible to the scientific community, and as such nonexistent. Researchers in their work rely on their predecessors, while the extent of use of one scientist work, as a source for the work of other authors is the verification of its contributions to the growth of human knowledge. If the author has published an article in a scientific journal it cannot publish the article in any other journal h with a few minor adjustments or without quoting parts of the first article, which are used in another article. Copyright infringement occurs when the author of a new article with or without the mentioning the author used substantial portions of previously published articles, including tables and figures. Scientific institutions and universities should,in accordance with the principles of Good Scientific Practice (GSP) and Good Laboratory Practices (GLP) have a center for monitoring,security, promotion and development of quality research. Establish rules and compliance to rules of good scientific practice are the obligations of each research institutions,universities and every individual-researchers,regardless of which area of science is investigated. In this way, internal quality control ensures that a research institution such as a university, assume responsibility for creating an environment that promotes standards of excellence, intellectual honesty and legality. Although the truth should be the aim of scientific research, it is not guiding fact for all scientists. The best way to reach the truth in its study and to avoid the methodological and ethical mistakes is to consistently apply scientific methods and ethical standards in research. Although variously defined plagiarism is basically intended to deceive the reader's own scientific contribution. There is no general regulation of control of

  2. PLAGIARISM IN SCIENTIFIC PUBLISHING

    Science.gov (United States)

    Masic, Izet

    2012-01-01

    Scientific publishing is the ultimate product of scientist work. Number of publications and their quoting are measures of scientist success while unpublished researches are invisible to the scientific community, and as such nonexistent. Researchers in their work rely on their predecessors, while the extent of use of one scientist work, as a source for the work of other authors is the verification of its contributions to the growth of human knowledge. If the author has published an article in a scientific journal it cannot publish the article in any other journal h with a few minor adjustments or without quoting parts of the first article, which are used in another article. Copyright infringement occurs when the author of a new article with or without the mentioning the author used substantial portions of previously published articles, including tables and figures. Scientific institutions and universities should,in accordance with the principles of Good Scientific Practice (GSP) and Good Laboratory Practices (GLP) have a center for monitoring,security, promotion and development of quality research. Establish rules and compliance to rules of good scientific practice are the obligations of each research institutions,universities and every individual-researchers,regardless of which area of science is investigated. In this way, internal quality control ensures that a research institution such as a university, assume responsibility for creating an environment that promotes standards of excellence, intellectual honesty and legality. Although the truth should be the aim of scientific research, it is not guiding fact for all scientists. The best way to reach the truth in its study and to avoid the methodological and ethical mistakes is to consistently apply scientific methods and ethical standards in research. Although variously defined plagiarism is basically intended to deceive the reader’s own scientific contribution. There is no general regulation of control of

  3. Measuring Modularity in Open Source Code Bases

    Directory of Open Access Journals (Sweden)

    Roberto Milev

    2009-03-01

    Full Text Available Modularity of an open source software code base has been associated with growth of the software development community, the incentives for voluntary code contribution, and a reduction in the number of users who take code without contributing back to the community. As a theoretical construct, modularity links OSS to other domains of research, including organization theory, the economics of industry structure, and new product development. However, measuring the modularity of an OSS design has proven difficult, especially for large and complex systems. In this article, we describe some preliminary results of recent research at Carleton University that examines the evolving modularity of large-scale software systems. We describe a measurement method and a new modularity metric for comparing code bases of different size, introduce an open source toolkit that implements this method and metric, and provide an analysis of the evolution of the Apache Tomcat application server as an illustrative example of the insights gained from this approach. Although these results are preliminary, they open the door to further cross-discipline research that quantitatively links the concerns of business managers, entrepreneurs, policy-makers, and open source software developers.

  4. Plagiarism in nursing education: an integrative review.

    Science.gov (United States)

    Lynch, Joan; Everett, Bronwyn; Ramjan, Lucie M; Callins, Renee; Glew, Paul; Salamonson, Yenna

    2017-10-01

    To identify the prevalence and antecedents of plagiarism within nursing education and approaches to prevention and management. There has been growing media attention highlighting the prevalence of plagiarism in universities, including the academic integrity of undergraduate nursing students. A breach of academic integrity among nursing students also raises further concern with the potential transfer of this dishonest behaviour to the clinical setting. Integrative review. A systematic search of five electronic databases including CINAHL, MEDLINE, SCOPUS, ProQuest Nursing & Allied Health Source, and ERIC was undertaken. Only primary studies related to plagiarism and nursing students (undergraduate or postgraduate) studying at a tertiary education institution or nursing faculty were included. Both qualitative and quantitative study designs were included. Twenty studies were included in this review with six key themes identified: (1) prevalence; (2) knowledge, understanding and attitudes; (3) types of plagiarism; (4) antecedents to plagiarism; (5) interventions to reduce or prevent plagiarism; and (6) the relationship between academic honesty and professional integrity. Plagiarism is common among university nursing students, with a difference in perception of this behaviour between students and academics. The review also highlighted the importance of distinguishing between inadvertent and deliberate plagiarism, with differing strategies suggested to address this behaviour. Nevertheless, interventions to reduce plagiarism have not been shown to be effective. The current punitive approach to plagiarism within nursing faculties has not reduced its occurrence. There is a need to promote awareness, knowledge and provide students with the appropriate referencing skills, to reduce the significant amount of inadvertent plagiarism. The importance of promoting honesty and academic integrity in nursing education is highlighted. Cheating within the academic setting has been

  5. Source Code Generator Based on Dynamic Frames

    Directory of Open Access Journals (Sweden)

    Danijel Radošević

    2011-06-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} This paper presents the model of source code generator based on dynamic frames. The model is named as the SCT model because if its three basic components: Specification (S, which describes the application characteristics, Configuration (C, which describes the rules for building applications, and Templates (T, which refer to application building blocks. The process of code generation dynamically creates XML frames containing all building elements (S, C ant T until final code is produced. This approach is compared to existing XVCL frames based model for source code generating. The SCT model is described by both XML syntax and the appropriate graphical elements. The SCT model is aimed to build complete applications, not just skeletons. The main advantages of the presented model are its textual and graphic description, a fully configurable generator, and the reduced overhead of the generated source code. The presented SCT model is shown on development of web application example in order to demonstrate its features and justify our design choices.

  6. Research on Primary Shielding Calculation Source Generation Codes

    OpenAIRE

    Zheng Zheng; Mei Qiliang; Li Hui; Shangguan Danhua; Zhang Guangchun

    2017-01-01

    Primary Shielding Calculation (PSC) plays an important role in reactor shielding design and analysis. In order to facilitate PSC, a source generation code is developed to generate cumulative distribution functions (CDF) for the source particle sample code of the J Monte Carlo Transport (JMCT) code, and a source particle sample code is deveoped to sample source particle directions, types, coordinates, energy and weights from the CDFs. A source generation code is developed to transform three di...

  7. Plagiarism: Why is it such a big issue for medical writers?

    Directory of Open Access Journals (Sweden)

    Natasha Das

    2011-01-01

    Full Text Available Plagiarism is the wrongful presentation of somebody else′s work or idea as one′s own without adequately attributing it to the source. Most authors know that plagiarism is an unethical publication practice. Yet, it is a serious problem in the medical writing arena. Plagiarism is perhaps the commonest ethical issue plaguing medical writing. In this article, we highlight the different types of plagiarism and address the issues of plagiarism of text, plagiarism of ideas, mosaic plagiarism, self-plagiarism, and duplicate publication. An act of plagiarism can have several repercussions for the author, the journal in question and the publication house as a whole. Sometimes, strict disciplinary action is also taken against the plagiarist. The article cites examples of retraction of articles, suspension of authors, apology letters from journal editors, and other such actions against plagiarism.

  8. Plagiarism: Why is it such a big issue for medical writers?

    Science.gov (United States)

    Das, Natasha; Panjabi, Monica

    2011-01-01

    Plagiarism is the wrongful presentation of somebody else‘s work or idea as one’s own without adequately attributing it to the source. Most authors know that plagiarism is an unethical publication practice. Yet, it is a serious problem in the medical writing arena. Plagiarism is perhaps the commonest ethical issue plaguing medical writing. In this article, we highlight the different types of plagiarism and address the issues of plagiarism of text, plagiarism of ideas, mosaic plagiarism, self-plagiarism, and duplicate publication. An act of plagiarism can have several repercussions for the author, the journal in question and the publication house as a whole. Sometimes, strict disciplinary action is also taken against the plagiarist. The article cites examples of retraction of articles, suspension of authors, apology letters from journal editors, and other such actions against plagiarism. PMID:21731858

  9. Code source sans code: le cas de l'ENIAC.

    OpenAIRE

    De Mol, Liesbeth

    2016-01-01

    Doctoral; Qu’est-ce qu’un programme ? Qu’est-ce qu’un code (source) ? Est-ce un « texte » susceptible d’une analyse littéraire ou plutôt quelque chose qui réside dans les circuit électroniques de l’ordinateur ? Est-ce un objet technique ou formel ? D’un certain point de vue, ces questions purement philosophiques ont peu à voir avec une réalité quelle qu’elle soit. Mais en informatique, ces questions sont au cœur de la discipline et les réponses qu’on leur donne déterminent des décisions qui a...

  10. Foreign-Educated Graduate Nursing Students and Plagiarism.

    Science.gov (United States)

    Knowlton, Mary; Collins, Shawn Bryant

    2017-04-01

    Plagiarism is a concern related to students educated in countries other than the United States, where English is not the first language spoken. The authors' experience with plagiarism by a foreign-educated nursing student prompted an investigation into this topic. This article focuses on the occurrence of unintentional plagiarism, a common focus with foreign-educated students, addressing linguistic, as well as cultural, viewpoints. The findings from the literature on plagiarism among foreign-educated students are elicited and the article discusses strategies to help foreign-educated students learn about plagiarism and how to properly cite and reference sources. A variety of proactive strategies exist that can be used by both faculty and students to mitigate the occurrence of plagiarism by foreign-educated nursing students in higher education, starting with a clearer understanding of some of the antecedents to the problem of plagiarism. [J Nurs Educ. 2017;56(4):211-214.]. Copyright 2017, SLACK Incorporated.

  11. Plagiarism in the Internet Age

    Science.gov (United States)

    Howard, Rebecca Moore; Davies, Laura J.

    2009-01-01

    In an age when students gravitate to online sources for research--and when tremendous amounts of both reputable and questionable information are available online--many have come to regard the Internet itself as a culprit in students' plagiarism. Some teachers go so far as to forbid students from researching online, in the mistaken assumption that…

  12. Students' Perception on Plagiarism

    OpenAIRE

    Manalu, Mika Hatigoran

    2013-01-01

    This research is intended to find out how far college students' knowledge within act of plagiarism. Also, the issue of plagiarism was lifted to the surface because issues of plagiarism that have been revealed to the public is spread rapidly. One of the main reasons why plagiarism exists because teaching processing in classroom doesn't care on this issue. In this research, respondents were given a questionnaire that consists of 20 questions. Analysis of completed questionnaire showed student u...

  13. The plagiarism project.

    Science.gov (United States)

    Glassman, Nancy R; Sorensen, Karen; Habousha, Racheline G; Minuti, Aurelia; Schwartz, Rachel

    2011-01-01

    Plagiarism has been a problem plaguing academia for centuries. The Internet has made it easier than ever to copy material from one electronic document and paste it into another. Many cases are unintentional, as writers are unaware of the rules regarding plagiarism. This paper provides an overview of plagiarism and describes a project in which librarians partnered with the assistant dean of a graduate science program to educate students about the perils of plagiarism and encourage ethical writing practices.

  14. Plagiarism in Academia

    Science.gov (United States)

    Shahabuddin, Syed

    2009-01-01

    Plagiarism sometimes creates legal and ethical problems for students and faculty. It can have serious consequences. Fortunately, there are ways to stop plagiarism. There are many tools available to detect plagiarism, e.g. using software for detecting submitted articles. Also, there are many ways to punish a plagiarist, e.g. banning plagiarists…

  15. Software Model Checking Without Source Code

    Science.gov (United States)

    Chaki, Sagar; Ivers, James

    2009-01-01

    We present a framework, called AIR, for verifying safety properties of assembly language programs via software model checking. AIR extends the applicability of predicate abstraction and counterexample guided abstraction refinement to the automated verification of low-level software. By working at the assembly level, AIR allows verification of programs for which source code is unavailable-such as legacy and COTS software-and programs that use features-such as pointers, structures, and object-orientation-that are problematic for source-level software verification tools. In addition, AIR makes no assumptions about the underlying compiler technology. We have implemented a prototype of AIR and present encouraging results on several non-trivial examples.

  16. Coded source imaging simulation with visible light

    Energy Technology Data Exchange (ETDEWEB)

    Wang Sheng [State Key Laboratory of Nuclear Physics and Technology and School of Physics, IHIP, Peking University, Yiheyuan Lu 5, Beijing 100871 (China); Zou Yubin, E-mail: zouyubin@pku.edu.cn [State Key Laboratory of Nuclear Physics and Technology and School of Physics, IHIP, Peking University, Yiheyuan Lu 5, Beijing 100871 (China); Zhang Xueshuang; Lu Yuanrong; Guo Zhiyu [State Key Laboratory of Nuclear Physics and Technology and School of Physics, IHIP, Peking University, Yiheyuan Lu 5, Beijing 100871 (China)

    2011-09-21

    A coded source could increase the neutron flux with high L/D ratio. It may benefit a neutron imaging system with low yield neutron source. Visible light CSI experiments were carried out to test the physical design and reconstruction algorithm. We used a non-mosaic Modified Uniformly Redundant Array (MURA) mask to project the shadow of black/white samples on a screen. A cooled-CCD camera was used to record the image on the screen. Different mask sizes and amplification factors were tested. The correlation, Wiener filter deconvolution and Richardson-Lucy maximum likelihood iteration algorithm were employed to reconstruct the object imaging from the original projection. The results show that CSI can benefit the low flux neutron imaging with high background noise.

  17. Personalized Assessment as a Means to Mitigate Plagiarism

    Science.gov (United States)

    Manoharan, Sathiamoorthy

    2017-01-01

    Although every educational institution has a code of academic honesty, they still encounter incidents of plagiarism. These are difficult and time-consuming to detect and deal with. This paper explores the use of personalized assessments with the goal of reducing incidents of plagiarism, proposing a personalized assessment software framework…

  18. The confounding factors leading to plagiarism in academic writing and some suggested remedies: A systematic review.

    Science.gov (United States)

    Guraya, Salman Yousuf; Guraya, Shaista Salman

    2017-05-01

    There is a staggering upsurge in the incidence of plagiarism of scientific literature. Literature shows divergent views about the factors that make plagiarism reprehensible. This review explores the causes and remedies for the perennial academic problem of plagiarism. Data sources were searched for full text English language articles published from 2000 to 2015. Data selection was done using medical subject headline (MeSH) terms plagiarism, unethical writing, academic theft, retraction, medical field, and plagiarism detection software. Data extraction was undertaken by selecting titles from retrieved references and data synthesis identified key factors leading to plagiarism such as unawareness of research ethics, poor writing skills and pressure or publish mantra. Plagiarism can be managed by a balance among its prevention, detection by plagiarism detection software, and institutional sanctions against proven plagiarists. Educating researchers about ethical principles of academic writing and institutional support in training writers about academic integrity and ethical publications can curtail plagiarism.

  19. How to Verify and Manage the Translational Plagiarism?

    OpenAIRE

    Viroj Wiwanitkit

    2016-01-01

    The use of Google translator as a tool for determining translational plagiarism is a big challenge. As noted, plagiarism of the original papers written in Macedonian and translated into other languages can be verified after computerised translation in other languages. Attempts to screen the translational plagiarism should be supported. The use of Google Translate tool might be helpful. Special focus should be on any non-English reference that might be the source of plagiarised material and no...

  20. Source Code Author Attribution Using Author’s Programming Style and Code Smells

    OpenAIRE

    Muqaddas Gull; Tehseen Zia; Muhammad Ilyas

    2017-01-01

    Source code is an intellectual property and using it without author’s permission is a violation of property right. Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies. Characterizing author’s signature for identifying their footprints is the core task of authorship attribution. Different aspects of source code have been considered for characterizing signatures including author’s coding style and programming structu...

  1. Plagiarism in computer science courses

    Energy Technology Data Exchange (ETDEWEB)

    Harris, J.K. [Francis Marion Univ., Florence, SC (United States)

    1994-12-31

    Plagiarism of computer programs has long been a problem in higher education. Ease of electronic copying, vague understanding by students as to what constitutes plagiarism, increasing acceptance of plagiarism by students, lack of enforcement by instructors and school administrators, and a whole host of other factors contribute to plagiarism. The first step in curbing plagiarism is prevention, the second (and much less preferable) is detection. History files and software metrics can be used as a tool to aid in detecting possible plagiarism. This paper gives advice concerning how to deal with plagiarism and with using software monitors to detect plagiarism.

  2. Research on Primary Shielding Calculation Source Generation Codes

    Directory of Open Access Journals (Sweden)

    Zheng Zheng

    2017-01-01

    Full Text Available Primary Shielding Calculation (PSC plays an important role in reactor shielding design and analysis. In order to facilitate PSC, a source generation code is developed to generate cumulative distribution functions (CDF for the source particle sample code of the J Monte Carlo Transport (JMCT code, and a source particle sample code is deveoped to sample source particle directions, types, coordinates, energy and weights from the CDFs. A source generation code is developed to transform three dimensional (3D power distributions in xyz geometry to source distributions in r θ z geometry for the J Discrete Ordinate Transport (JSNT code. Validation on PSC model of Qinshan No.1 nuclear power plant (NPP, CAP1400 and CAP1700 reactors are performed. Numerical results show that the theoretical model and the codes are both correct.

  3. Research on Primary Shielding Calculation Source Generation Codes

    Science.gov (United States)

    Zheng, Zheng; Mei, Qiliang; Li, Hui; Shangguan, Danhua; Zhang, Guangchun

    2017-09-01

    Primary Shielding Calculation (PSC) plays an important role in reactor shielding design and analysis. In order to facilitate PSC, a source generation code is developed to generate cumulative distribution functions (CDF) for the source particle sample code of the J Monte Carlo Transport (JMCT) code, and a source particle sample code is deveoped to sample source particle directions, types, coordinates, energy and weights from the CDFs. A source generation code is developed to transform three dimensional (3D) power distributions in xyz geometry to source distributions in r θ z geometry for the J Discrete Ordinate Transport (JSNT) code. Validation on PSC model of Qinshan No.1 nuclear power plant (NPP), CAP1400 and CAP1700 reactors are performed. Numerical results show that the theoretical model and the codes are both correct.

  4. Plagiarism: understanding and management.

    Science.gov (United States)

    Wicker, Paul

    2007-08-01

    An epidemic of plagiarism is sweeping the world. A study carried out in the US suggested that 80% of college students admit to cheating at least once (Ashworth et al 1997). Alternative evidence from an American education and software company, Plagiarism.org, reported that 36% of undergraduates plagiarise written material and that 90% of students believe that cheaters are never caught or disciplined (Plagiarism.org 2005). Closer to home, research carried out in the UK by Clare (1996) suggested that 50% of students copy work and invent data. More recently the Plagiarism Advisory Service, based at Northumbria University, reported that 25% of students plagiarise, while lecturers only detect plagiarism 3% of the time (Plagiarism Advisory Service 2006).

  5. Plagiarism: Words and ideas

    OpenAIRE

    Bouville, Mathieu

    2008-01-01

    Plagiarism is a crime against academy. It deceives readers, hurts plagiarized authors, and gets the plagiarist undeserved benefits. However, even though these arguments do show that copying other people's intellectual contribution is wrong, they do not apply to the copying of words. Copying a few sentences that contain no original idea (e.g. in the introduction) is of marginal importance compared to stealing the ideas of others. The two must be clearly distinguished, and the 'plagiarism' labe...

  6. The Visual Code Navigator : An Interactive Toolset for Source Code Investigation

    NARCIS (Netherlands)

    Lommerse, Gerard; Nossin, Freek; Voinea, Lucian; Telea, Alexandru

    2005-01-01

    We present the Visual Code Navigator, a set of three interrelated visual tools that we developed for exploring large source code software projects from three different perspectives, or views: The syntactic view shows the syntactic constructs in the source code. The symbol view shows the objects a

  7. Source Code Management and Software Distribution using Open Source Technologies

    Science.gov (United States)

    Bly, M. J.; Allan, A.; Jenness, T.

    The Starlink Software Collection (USSC) runs on three different platforms and contains approximately 130 separate software items, totaling over 6 million lines of code. Distribution of such large software systems and installation at multiple remote sites has always been problematic due to the complex web of inter-dependencies such systems invariably generate. The rise of the Open Source movement has brought standard tools into common use to cope with such large and complex tasks. The RedHat Package Manager (RPM) software is one such which is available for many platforms. We have shown it is possible to automate the distribution and installation of the Starlink Software using RPM. We anticipate that this will vastly simplify installation and package management for Systems Administrators who must support the USSC in production data processing environments.

  8. The Use of Technology to Combat Plagiarism in Business Communication Classes

    Science.gov (United States)

    Stowers, Robert H.; Hummel, Julie Y.

    2011-01-01

    Some have called plagiarism literary theft. Plagiarizing is akin to stealing the intellect of another person. At times, plagiarism occurs because of ignorance, sloppy authorship, or lack of knowledge about proper sourcing. Sometimes, it is done purposefully. Experts have suggested that the concept of intellectual ownership is limited to Western…

  9. When Emotion Stands to Reason: A Phenomenological Study of Composition Instructors' Emotional Responses to Plagiarism

    Science.gov (United States)

    Biswas, Ann E.

    2015-01-01

    Plagiarism has been the focus of considerable scholarly research in recent decades, much of which has examined the number of students who are plagiarizing, why they plagiarize, and what instructors can do to teach students to effectively and ethically integrate their own words and ideas with those of their sources. Overlooked in this scholarship…

  10. Bit rates in audio source coding

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    1992-01-01

    The goal is to introduce and solve the audio coding optimization problem. Psychoacoustic results such as masking and excitation pattern models are combined with results from rate distortion theory to formulate the audio coding optimization problem. The solution of the audio optimization problem is a

  11. A Construction of Lossy Source Code Using LDPC Matrices

    Science.gov (United States)

    Miyake, Shigeki; Muramatsu, Jun

    Research into applying LDPC code theory, which is used for channel coding, to source coding has received a lot of attention in several research fields such as distributed source coding. In this paper, a source coding problem with a fidelity criterion is considered. Matsunaga et al. and Martinian et al. constructed a lossy code under the conditions of a binary alphabet, a uniform distribution, and a Hamming measure of fidelity criterion. We extend their results and construct a lossy code under the extended conditions of a binary alphabet, a distribution that is not necessarily uniform, and a fidelity measure that is bounded and additive and show that the code can achieve the optimal rate, rate-distortion function. By applying a formula for the random walk on lattice to the analysis of LDPC matrices on Zq, where q is a prime number, we show that results similar to those for the binary alphabet condition hold for Zq, the multiple alphabet condition.

  12. Source Coding for Wireless Distributed Microphones in Reverberant Environments

    DEFF Research Database (Denmark)

    Zahedi, Adel

    2016-01-01

    the distributed source coding part, we use zero error coding as a suboptimal implementation. We show that significant gains are achievable using the sufficient statistics for joint coding, and small gains can also be obtained by our suboptimal implementation of the distributed source coding scenario......Modern multimedia systems are more and more shifting toward distributed and networked structures. This includes audio systems, where networks of wireless distributed microphones are replacing the traditional microphone arrays. This allows for flexibility of placement and high spatial diversity...... for the transmitting microphone to reduce the rate by using distributed source coding. Within this framework, we apply our coding schemes to Gaussian signals as well as audio measurements and compare the rate-distortion performances for distributed and non-distributed source coding scenarios. We also compare...

  13. EDITORIAL: On plagiarism

    Science.gov (United States)

    Harris, Simon; Webb, Steve; Hendee, William R.

    2008-03-01

    Plagiarism Plagiarism is, we are pleased to observe, not a common occurrence in Physics in Medicine & Biology (PMB); however, like those responsible for all scientific journals, we are concerned about plagiarism, and very keen to prevent it. The Publications Committee of the International Organization of Medical Physics (IOMP) has prepared a generic editorial on plagiarism. The editorial is reproduced here (with permission of the IOMP), with slight modifications to enhance its relevance to the audience of PMB, along with our procedures for dealing with any cases of plagiarism should they ever arise. Plagiarism (from the Latin 'plagiare', 'to kidnap') is defined as 'the appropriation or imitation of the language, ideas, and thoughts of another author, and representation of them as one's original work' (the Random House Dictionary of the English Language—unabridged). Plagiarism is a serious breach of research ethics that, if committed intentionally, is considered research misconduct. Plagiarism in its most serious form is the passing off of all, or large sections, of another author's published paper as one's original work. If, following appropriate confidential investigation (see below), such a plagiarism is established, this will result in heavy sanctions including retraction of the article, up to a 5 year publication ban from PMB, and informing of employers and/or professional bodies (even after one offence). This may result in loss of research funding, loss of professional stature, and even termination of employment of the plagiarizing author(s). Plagiarism undermines the authenticity of research manuscripts and the journals in which they are published, and compromises the integrity of the scientific process and the public regard for science. Plagiarism violates the literary rights of the individuals who are plagiarized, and the property rights of copyright holders. Violation of these rights may result in legal action against the individual(s) committing

  14. A concatenation scheme of LDPC codes and source codes for flash memories

    Science.gov (United States)

    Huang, Qin; Pan, Song; Zhang, Mu; Wang, Zulin

    2012-12-01

    Recently, low-density parity-check (LDPC) codes have been applied in flash memories to correct errors. However, as verified in this article, their performance degrades rapidly as the number of stuck cells increases. Thus, this paper presents a concatenation reliability scheme of LDPC codes and source codes, which aims to improve the performance of LDPC codes for flash memories with stuck cells. In this scheme, the locations of stuck cells is recorded by source codes in the write process such that erasures rather than wrong log-likelihood ratios on these cells are given in the read process. Then, LDPC codes correct these erasures and soft errors caused by cell-to-cell interferences. The analyses of channel capacity and compression rates of source codes with side information show that the memory cost of the proposed scheme is moderately low. Simulation results verify that the proposed scheme outperforms the traditional scheme with only LDPC codes.

  15. Research into Plagiarism Cases and Plagiarism Detection Methods

    OpenAIRE

    Kashkur, M; Paršutins, S; Borisovs, A

    2010-01-01

    In the age of information technology intellectual property becomes especially valuable. This is one of the causes why the cases of the plagiarism appear more frequently in all vital sectors. Due to that, there is a growing need for different instruments for the protection and verification of copyright for finding plagiarism. Before checking the document for plagiarism, reviewing algorithms and approaches for searching plagiarism, you must know and understand what constitutes the plagiarism. T...

  16. Plagiarism explainer for students

    OpenAIRE

    Barba, Lorena A.

    2016-01-01

    A slide deck to serve as an explainer of plagiarism in academic settings, with a personal viewpoint. For my students.Also on SpeakerDeck:https://speakerdeck.com/labarba/plagiarism-explainer-for-students(The slide viewer on SpeakerDeck is much nicer.)

  17. The Plagiarism Polyconundrum

    Science.gov (United States)

    Bethany, Reine D.

    2016-01-01

    Plagiarism hinders student success because it shortcuts genuine writing practice and incurs penalties when discovered. Although students are aware of its potential consequences, plagiarism continues. This article reflects on the polyconundrum of empathizing with the many hindrances to student writing while deploying strategies to reduce plagiarism…

  18. Note on Plagiarism

    Indian Academy of Sciences (India)

    to the growth of the Internet and easy access to vast amounts of written material. One dictionary defines plagiarism as “the appropriation or imitation of the language, ideas, and thoughts of another author, and representation of them as one's original work”. The degree of plagiarism could be as mild as the copying of a single ...

  19. Plagiarism and Cheating.

    Science.gov (United States)

    Mawdsley, Ralph D.; Permuth, Steve

    Plagiarism and cheating can be defined as academic dishonesty and represent policy concerns among all levels of education. Such cases involve academic versus disciplinary decisions and the need to determine the student's understanding of the definition of plagiarism or cheating. This paper analyzes six legal issues raised in court cases and…

  20. Rate-adaptive BCH coding for Slepian-Wolf coding of highly correlated sources

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Salmistraro, Matteo; Larsen, Knud J.

    2012-01-01

    This paper considers using BCH codes for distributed source coding using feedback. The focus is on coding using short block lengths for a binary source, X, having a high correlation between each symbol to be coded and a side information, Y, such that the marginal probability of each symbol, Xi in X......, given Y is highly skewed. In the analysis, noiseless feedback and noiseless communication are assumed. A rate-adaptive BCH code is presented and applied to distributed source coding. Simulation results for a fixed error probability show that rate-adaptive BCH achieves better performance than LDPCA (Low......-Density Parity-Check Accumulate) codes for high correlation between source symbols and the side information....

  1. Student's Plagiarisms in Higher Learning Institutions in the Era of Improved Internet Access: Case Study of Developing Countries

    Science.gov (United States)

    Anney, Vicent Naano; Mosha, Mary Atanas

    2015-01-01

    This study investigated students' plagiarism practices in Tanzania higher learning institutions by involving two universities-one public and one private university as a case study. The universities involved have honour code and policies for plagiarism detection however they do not employ software for checking students' plagiarism. The study…

  2. Schroedinger’s code: Source code availability and transparency in astrophysics

    Science.gov (United States)

    Ryan, PW; Allen, Alice; Teuben, Peter

    2018-01-01

    Astronomers use software for their research, but how many of the codes they use are available as source code? We examined a sample of 166 papers from 2015 for clearly identified software use, then searched for source code for the software packages mentioned in these research papers. We categorized the software to indicate whether source code is available for download and whether there are restrictions to accessing it, and if source code was not available, whether some other form of the software, such as a binary, was. Over 40% of the source code for the software used in our sample was not available for download.As URLs have often been used as proxy citations for software, we also extracted URLs from one journal’s 2015 research articles, removed those from certain long-term, reliable domains, and tested the remainder to determine what percentage of these URLs were still accessible in September and October, 2017.

  3. Undergraduates’ Misconceptions Concerning Plagiarism

    Directory of Open Access Journals (Sweden)

    Nermin Çakmak

    2015-06-01

    Full Text Available In their education lives undergraduate students’ one of the most encountered difficulty is to provide citations for their research projects and term papers. This difficulty drives students to two kinds of plagiarism: intentional or unintentional plagiarism. In this context, plagiarism is a no ethical  scientific behaviour we encounter most frequently among undergraduate students. When plagiarism is investigated in national and international literature, which is considered as an important problem regarding scientific communication and ethics principles, it is seen that research focused on intentional plagiarism. In this context the present study aimed to focus on university students’ unintentional plagiarism, a nonethical academic behaviour, based on their misconceptions. Adding it is aimed to attract the attention of the researchers in librarianship and information sciences to the problem, increase their awareness and to encourage them to make in-depth research. Thus the present study includes issues of conceptions; learning concepts; misconceptions; plagiarism; misconceptions of university students regarding plagiarism and the reasoning; defining and preventing misconceptions; the roles of librarianships and teachers in correcting the misconceptions regarding plagiarism. Present study followed a comprehensive review utilizing descriptive approaches to reveal the situation. At the end of the study a short summary evaluating the situation depending on the literature analysed is also added. Adding ideas and suggestions in how to reveal probable misconceptions and how to prevent or decrease their formation are also presented.

  4. Avoiding plagiarism: guidance for nursing students.

    Science.gov (United States)

    Price, Bob

    The pressures of study, diversity of source materials, past assumptions relating to good writing practice, ambiguous writing guidance on best practice and students' insecurity about their reasoning ability, can lead to plagiarism. With the use of source checking software, there is an increased chance that plagiarised work will be identified and investigated, and penalties given. In extreme cases, plagiarised work may be reported to the Nursing and Midwifery Council and professional as well as academic penalties may apply. This article provides information on how students can avoid plagiarism when preparing their coursework for submission.

  5. Plagiarism: words and ideas.

    Science.gov (United States)

    Bouville, Mathieu

    2008-09-01

    Plagiarism is a crime against academy. It deceives readers, hurts plagiarized authors, and gets the plagiarist undeserved benefits. However, even though these arguments do show that copying other people's intellectual contribution is wrong, they do not apply to the copying of words. Copying a few sentences that contain no original idea (e.g. in the introduction) is of marginal importance compared to stealing the ideas of others. The two must be clearly distinguished, and the 'plagiarism' label should not be used for deeds which are very different in nature and importance.

  6. Source Code Review Using Static Analysis Tools

    OpenAIRE

    Moiras, Stavros; Lüders, Stefan; Tsouvelekakis, Aimilios

    2015-01-01

    Abstract Many teams at CERN, develop their own software to solve their tasks. This software may be public or it may be used for internal purposes. It is of major importance for developers to know that their software is secure. Humans are able to detect bugs and vulnerabilities but it is impossible to discover everything when they need to read hundreds’ lines of code. As a result, computer scientists have developed tools which complete efficiently and within minut...

  7. Social influences on unconscious plagiarism and anti-plagiarism.

    Science.gov (United States)

    Hollins, Timothy J; Lange, Nicholas; Dennis, Ian; Longmore, Christopher A

    2016-08-01

    People are more likely to unconsciously plagiarise ideas from a same-sex partner than a different-sex partner, and more likely to unconsciously plagiarise if recalling alone rather than in the presence of their partner [Macrae, C. N., Bodenhausen, G. V., & Calvini, G. (1999). Contexts of cryptomnesia: May the source be with you. Social Cognition, 17, 273-297. doi: 10.1521/soco.1999.17.3.273 ]. Two sets of experiments explore these phenomena, using extensions of the standard unconscious plagiarism paradigm. In Experiment 1A participants worked together in same- or different-sex dyads before trying to recall their own ideas or their partner's ideas. More source errors were evident for same-sex dyads (Experiment 1A), but this effect was absent when participants recalled from both sources simultaneously (Experiment 1B). In Experiment 2A, participants recalled ideas from a single source either alone or in the presence of the partner, using an extended-recall task. Partner presence did not affect the availability of ideas, but did reduce the propensity to report them as task compliant, relative to a partner-present condition. Simultaneous recall from both sources removed this social effect (Experiment 2B). Thus social influences on unconscious plagiarism are apparent, but are influenced by the salience of the alternate source at retrieval.

  8. How to Verify and Manage the Translational Plagiarism?

    Science.gov (United States)

    Wiwanitkit, Viroj

    2016-01-01

    The use of Google translator as a tool for determining translational plagiarism is a big challenge. As noted, plagiarism of the original papers written in Macedonian and translated into other languages can be verified after computerised translation in other languages. Attempts to screen the translational plagiarism should be supported. The use of Google Translate tool might be helpful. Special focus should be on any non-English reference that might be the source of plagiarised material and non-English article that might translate from an original English article, which cannot be detected by simple plagiarism screening tool. It is a hard job for any journal to detect the complex translational plagiarism but the harder job might be how to effectively manage the case. PMID:27703588

  9. How to Verify and Manage the Translational Plagiarism?

    Directory of Open Access Journals (Sweden)

    Viroj Wiwanitkit

    2016-06-01

    Full Text Available The use of Google translator as a tool for determining translational plagiarism is a big challenge. As noted, plagiarism of the original papers written in Macedonian and translated into other languages can be verified after computerised translation in other languages. Attempts to screen the translational plagiarism should be supported. The use of Google Translate tool might be helpful. Special focus should be on any non-English reference that might be the source of plagiarised material and non-English article that might translate from an original English article, which cannot be detected by simple plagiarism screening tool. It is a hard job for any journal to detect the complex translational plagiarism but the harder job might be how to effectively manage the case.

  10. None-Native University Students’ Perception of Plagiarism

    Directory of Open Access Journals (Sweden)

    Ummul Khair Ahmad

    2012-01-01

    Full Text Available Plagiarism is a complex issue especially among non-native students and it has received a lot of attention from researchers and scholars of academic writing. Some scholars attribute this problem to cultural perceptions and different attitudes toward texts. This study evaluates student perception of different aspects of plagiarism. A small group of postgraduate students in a Malaysian university were asked to categorize ten cases of plagiarism instances. They were also asked to identify plagiarized paraphrased versions of five excerpts of different source texts provided. The findings showed that students had misconceptions about different aspect of plagiarism including citation conventions, collusion, using another writer’s idea, and style of writing. Further analysis has shown that students were aware that plagiarism is wrong but they could not correctly identify the multiple forms in which plagiarism could happen. These findings indicate that students need to be taught and exposed to various forms and layers of plagiarism so that they would know how best to avoid it in their own writing.

  11. Iterative List Decoding of Concatenated Source-Channel Codes

    Science.gov (United States)

    Hedayat, Ahmadreza; Nosratinia, Aria

    2005-12-01

    Whenever variable-length entropy codes are used in the presence of a noisy channel, any channel errors will propagate and cause significant harm. Despite using channel codes, some residual errors always remain, whose effect will get magnified by error propagation. Mitigating this undesirable effect is of great practical interest. One approach is to use the residual redundancy of variable length codes for joint source-channel decoding. In this paper, we improve the performance of residual redundancy source-channel decoding via an iterative list decoder made possible by a nonbinary outer CRC code. We show that the list decoding of VLC's is beneficial for entropy codes that contain redundancy. Such codes are used in state-of-the-art video coders, for example. The proposed list decoder improves the overall performance significantly in AWGN and fully interleaved Rayleigh fading channels.

  12. Iterative List Decoding of Concatenated Source-Channel Codes

    Directory of Open Access Journals (Sweden)

    Hedayat Ahmadreza

    2005-01-01

    Full Text Available Whenever variable-length entropy codes are used in the presence of a noisy channel, any channel errors will propagate and cause significant harm. Despite using channel codes, some residual errors always remain, whose effect will get magnified by error propagation. Mitigating this undesirable effect is of great practical interest. One approach is to use the residual redundancy of variable length codes for joint source-channel decoding. In this paper, we improve the performance of residual redundancy source-channel decoding via an iterative list decoder made possible by a nonbinary outer CRC code. We show that the list decoding of VLC's is beneficial for entropy codes that contain redundancy. Such codes are used in state-of-the-art video coders, for example. The proposed list decoder improves the overall performance significantly in AWGN and fully interleaved Rayleigh fading channels.

  13. The Astrophysics Source Code Library by the numbers

    Science.gov (United States)

    Allen, Alice; Teuben, Peter; Berriman, G. Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert; Ryan, PW; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Wallin, John; Warmels, Rein

    2018-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) was founded in 1999 by Robert Nemiroff and John Wallin. ASCL editors seek both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and add entries for the found codes to the library. Software authors can submit their codes to the ASCL as well. This ensures a comprehensive listing covering a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL is indexed by both NASA’s Astrophysics Data System (ADS) and Web of Science, making software used in research more discoverable. This presentation covers the growth in the ASCL’s number of entries, the number of citations to its entries, and in which journals those citations appear. It also discusses what changes have been made to the ASCL recently, and what its plans are for the future.

  14. Plagiarism, Kinship and Slavery

    OpenAIRE

    Biagioli, M

    2014-01-01

    In conversation with Marilyn Strathern's work on kinship and especially on metaphors of intellectual and reproductive creativity, this paper provides an analysis of plagiarism not as a violation of intellectual property but of the kinship relationships between author, work, and readers. It also analyzes the role of figures of kidnapped slaves and children in the genealogy of the modern concept of plagiarism. © 2014, SAGE Publications. All rights reserved.

  15. Code Forking, Governance, and Sustainability in Open Source Software

    Directory of Open Access Journals (Sweden)

    Juho Lindman

    2013-01-01

    Full Text Available The right to fork open source code is at the core of open source licensing. All open source licenses grant the right to fork their code, that is to start a new development effort using an existing code as its base. Thus, code forking represents the single greatest tool available for guaranteeing sustainability in open source software. In addition to bolstering program sustainability, code forking directly affects the governance of open source initiatives. Forking, and even the mere possibility of forking code, affects the governance and sustainability of open source initiatives on three distinct levels: software, community, and ecosystem. On the software level, the right to fork makes planned obsolescence, versioning, vendor lock-in, end-of-support issues, and similar initiatives all but impossible to implement. On the community level, forking impacts both sustainability and governance through the power it grants the community to safeguard against unfavourable actions by corporations or project leaders. On the business-ecosystem level forking can serve as a catalyst for innovation while simultaneously promoting better quality software through natural selection. Thus, forking helps keep open source initiatives relevant and presents opportunities for the development and commercialization of current and abandoned programs.

  16. Prevalence of plagiarism in recent submissions to the Croatian Medical Journal.

    Science.gov (United States)

    Baždarić, Ksenija; Bilić-Zulle, Lidija; Brumini, Gordana; Petrovečki, Mladen

    2012-06-01

    To assess the prevalence of plagiarism in manuscripts submitted for publication in the Croatian Medical Journal (CMJ). All manuscripts submitted in 2009-2010 were analyzed using plagiarism detection software: eTBLAST, CrossCheck, and WCopyfind. Plagiarism was suspected in manuscripts with more than 10% of the text derived from other sources. These manuscripts were checked against the Déjà vu database and manually verified by investigators. Of 754 submitted manuscripts, 105 (14%) were identified by the software as suspicious of plagiarism. Manual verification confirmed that 85 (11%) manuscripts were plagiarized: 63 (8%) were true plagiarism and 22 (3%) were self-plagiarism. Plagiarized manuscripts were mostly submitted from China (21%), Croatia (14%), and Turkey (19%). There was no significant difference in the text similarity rate between plagiarized and self-plagiarized manuscripts (25% [95% CI 22-27%] vs. 28% [95% CI 20-33%]; U = 645.50; P = 0.634). Differences in text similarity rate were found between various sections of self-plagiarized manuscripts (H = 12.65, P = 0.013). The plagiarism rate in the Materials and Methods (61% (95% CI 41-68%) was higher than in the Results (23% [95% CI 17-36%], U = 33.50; P = 0.009) or Discussion (25.5 [95% CI 15-35%]; U = 57.50; P Plagiarism detection software combined with manual verification may be used to detect plagiarized manuscripts and prevent their publication. The prevalence of plagiarized manuscripts submitted to the CMJ, a journal dedicated to promoting research integrity, was 11% in the 2-year period 2009-2010.

  17. On the Combination of Multi-Layer Source Coding and Network Coding for Wireless Networks

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Fitzek, Frank; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces a mutually beneficial interplay between network coding and scalable video source coding in order to propose an energy-efficient video streaming approach accommodating multiple heterogeneous receivers, for which current solutions are either inefficient or insufficient. State...... support of multi-resolution video streaming....

  18. How College Freshmen View Plagiarism.

    Science.gov (United States)

    Kroll, Barry M.

    1988-01-01

    Classifies students' responses to a plagiarism questionnaire into six categories. Concludes that students take plagiarism seriously and that their reasons are based most often on fairness, individual responsibility, and ownership. (JAD)

  19. Joint distributed source-channel coding for 3D videos

    Science.gov (United States)

    Palma, Veronica; Cancellaro, Michela; Neri, Alessandro

    2011-03-01

    This paper presents a distributed joint source-channel 3D video coding system. Our aim is the design of an efficient coding scheme for stereoscopic video communication over noisy channels that preserves the perceived visual quality while guaranteeing a low computational complexity. The drawback in using stereo sequences is the increased amount of data to be transmitted. Several methods are being used in the literature for encoding stereoscopic video. A significantly different approach respect to traditional video coding has been represented by Distributed Video Coding (DVC), which introduces a flexible architecture with the design of low complex video encoders. In this paper we propose a novel method for joint source-channel coding in a distributed approach. We choose turbo code for our application and study the new setting of distributed joint source channel coding of a video. Turbo code allows to send the minimum amount of data while guaranteeing near channel capacity error correcting performance. In this contribution, the mathematical framework will be fully detailed and tradeoff among redundancy and perceived quality and quality of experience will be analyzed with the aid of numerical experiments.

  20. Beyond Culture: Helping International Students Avoid Plagiarism

    Science.gov (United States)

    Adhikari, Soni

    2018-01-01

    With the rapid increase in the number of international students from different academic backgrounds around the world, college and university teachers in the West find it harder to understand the many and complex reasons when these students plagiarize or use sources ineffectively. Reviewing relevant literature, I first make a pedagogical analysis…

  1. Plagiarism in the Context of Education and Evolving Detection Strategies

    Science.gov (United States)

    Nurmashev, Bekaidar; Seksenbayev, Bakhytzhan

    2017-01-01

    Plagiarism may take place in any scientific journals despite currently employed anti-plagiarism tools. The absence of widely acceptable definitions of research misconduct and reliance solely on similarity checks do not allow journal editors to prevent most complex cases of recycling of scientific information and wasteful, or ‘predatory,’ publishing. This article analyses Scopus-based publication activity and evidence on poor writing, lack of related training, emerging anti-plagiarism strategies, and new forms of massive wasting of resources by publishing largely recycled items, which evade the ‘red flags’ of similarity checks. In some non-Anglophone countries ‘copy-and-paste’ writing still plagues pre- and postgraduate education. Poor research management, absence of courses on publication ethics, and limited access to quality sources confound plagiarism as a cross-cultural and multidisciplinary phenomenon. Over the past decade, the advent of anti-plagiarism software checks has helped uncover elementary forms of textual recycling across journals. But such a tool alone proves inefficient for preventing complex forms of plagiarism. Recent mass retractions of plagiarized articles by reputable open-access journals point to critical deficiencies of current anti-plagiarism software that do not recognize manipulative paraphrasing and editing. Manipulative editing also finds its way to predatory journals, ignoring the adherence to publication ethics and accommodating nonsense plagiarized items. The evolving preventive strategies are increasingly relying on intelligent (semantic) digital technologies, comprehensively evaluating texts, keywords, graphics, and reference lists. It is the right time to enforce adherence to global editorial guidance and implement a comprehensive anti-plagiarism strategy by helping all stakeholders of scholarly communication. PMID:28665055

  2. Attitudes towards students who plagiarize: a dental hygiene faculty perspective.

    Science.gov (United States)

    Patel-Bhakta, Hemali G; Muzzin, Kathleen B; Dewald, Janice P; Campbell, Patricia R; Buschang, Peter H

    2014-01-01

    The purpose of this study was to examine baccalaureate dental hygiene faculty members' attitudes and practices regarding student plagiarism. An email containing a link to a thirty-two-item survey was sent to fifty-two baccalaureate dental hygiene program directors in the United States; thirty of those agreed for their faculty members to participate. Of the 257 faculty members who received the survey link, 106 completed the survey, for a response rate of 41.2 percent. The responding faculty members reported thinking plagiarism is a rising concern in their dental hygiene programs (54.5 percent, 54/99). The majority said they check for plagiarism on student class assignment/projects (67.1 percent, 53/79). For those who did not check for plagiarism, 45.8 percent (11/24) stated it took "too much time to check" or it was "too hard to prove" (16.6 percent, 4/24). The most frequent form of student plagiarism observed by the respondents was "copying directly from a source electronically" (78.0 percent, 39/50). Most respondents reported checking for plagiarism through visual inspection (without technological assistance) (73.0 percent, 38/52). Of those who said they use plagiarism detection software/services, 44.4 percent (16/36) always recommended their students use plagiarism detection software/services to detect unintentional plagiarism. For those faculty members who caught students plagiarizing, 52.9 percent (27/51) reported they "always or often" handled the incident within their dental hygiene department, and 76.5 percent (39/51) said they had never reported the student's violation to an academic review board.

  3. Plagiarism in the Context of Education and Evolving Detection Strategies.

    Science.gov (United States)

    Gasparyan, Armen Yuri; Nurmashev, Bekaidar; Seksenbayev, Bakhytzhan; Trukhachev, Vladimir I; Kostyukova, Elena I; Kitas, George D

    2017-08-01

    Plagiarism may take place in any scientific journals despite currently employed anti-plagiarism tools. The absence of widely acceptable definitions of research misconduct and reliance solely on similarity checks do not allow journal editors to prevent most complex cases of recycling of scientific information and wasteful, or 'predatory,' publishing. This article analyses Scopus-based publication activity and evidence on poor writing, lack of related training, emerging anti-plagiarism strategies, and new forms of massive wasting of resources by publishing largely recycled items, which evade the 'red flags' of similarity checks. In some non-Anglophone countries 'copy-and-paste' writing still plagues pre- and postgraduate education. Poor research management, absence of courses on publication ethics, and limited access to quality sources confound plagiarism as a cross-cultural and multidisciplinary phenomenon. Over the past decade, the advent of anti-plagiarism software checks has helped uncover elementary forms of textual recycling across journals. But such a tool alone proves inefficient for preventing complex forms of plagiarism. Recent mass retractions of plagiarized articles by reputable open-access journals point to critical deficiencies of current anti-plagiarism software that do not recognize manipulative paraphrasing and editing. Manipulative editing also finds its way to predatory journals, ignoring the adherence to publication ethics and accommodating nonsense plagiarized items. The evolving preventive strategies are increasingly relying on intelligent (semantic) digital technologies, comprehensively evaluating texts, keywords, graphics, and reference lists. It is the right time to enforce adherence to global editorial guidance and implement a comprehensive anti-plagiarism strategy by helping all stakeholders of scholarly communication. © 2017 The Korean Academy of Medical Sciences.

  4. Beyond the Accusation of Plagiarism

    Science.gov (United States)

    Gu, Qing; Brooks, Jane

    2008-01-01

    The paper explores the complexity of the notion of plagiarism from sociocultural and psychological perspectives. Plagiarism is a dynamic and multi-layered phenomenon [Russikoff, K., Fucaloro, L., Salkauskiene, D., 2003. "Plagiarism as a cross-cultural phenomenon." "The CAL Poly Pomona Journal of Interdisciplinary Studies" 16, 109-120.…

  5. Plagiarism and Self-plagiarism. A Reflexion

    Directory of Open Access Journals (Sweden)

    Renzo Ramirez Bacca

    2016-07-01

    Full Text Available En el año 2011, el Ministro de Defensa Alemán Karl Theodor zu Guttenberg renunció a su cargo por ser acusado de plagiar su tesis doctoral (Luchini 2011.  Además, por primera vez en la historia de El Colegio de México, se decidió en el 2015 revocar el título de Doctor en Historia conferido en 2004 a Rodrigo Christian Núñez por plagiar su tesis doctoral (Martínez 2015. El otro caso reciente es el de César Acuña Peralta, excandidato a la presidencia en el Perú, fundador y dueño de la Universidad César Vallejo quien ha sido señalado de plagiar todos sus títulos y la autoría de un libro (Fowks 2016. Estos sucesos a nivel internacional, ofrecen un panorama para la reflexión sobre el plagio y el “auto-plagio”  en las publicaciones científicas y académicas.

  6. Toward the Automated Generation of Components from Existing Source Code

    Energy Technology Data Exchange (ETDEWEB)

    Quinlan, D; Yi, Q; Kumfert, G; Epperly, T; Dahlgren, T; Schordan, M; White, B

    2004-12-02

    A major challenge to achieving widespread use of software component technology in scientific computing is an effective migration strategy for existing, or legacy, source code. This paper describes initial work and challenges in automating the identification and generation of components using the ROSE compiler infrastructure and the Babel language interoperability tool. Babel enables calling interfaces expressed in the Scientific Interface Definition Language (SIDL) to be implemented in, and called from, an arbitrary combination of supported languages. ROSE is used to build specialized source-to-source translators that (1) extract a SIDL interface specification from information implicit in existing C++ source code and (2) transform Babel's output to include dispatches to the legacy code.

  7. Web Plagiarism: Empirical Study

    Directory of Open Access Journals (Sweden)

    Alexander E. Voiskounsky

    2009-01-01

    Full Text Available A questionnaire measuring web plagiarism (or academic cheating, worked out by Underwood and Szabo (2003 has been adapted and applied to the population of undergraduate science students in Russia. The students at four technical universities are questioned (N=292. The study shows the students perform webplagiarizing, i.e. take materials from the Internet and hand these materials in as their own assignments. Russian students are reportedly competent in the use of the Internet; they report to have rather few moral barriers towards plagiarizing; they believe most of their mates do the same; they are not sure their tutors are able and willing to recognize cheating; finally, they are competent enough in English and are hypothetically able to plagiarize in two languages.

  8. Semantic-based technique for thai documents plagiarism detection

    Directory of Open Access Journals (Sweden)

    Sorawat Prapanitisatian

    2014-03-01

    Full Text Available Plagiarism is the act of taking another person's writing or idea without referring to the source of information. This is one of major problems in educational institutes. There is a number of plagiarism detection software available on the Internet. However, a few numbers of them works. Typically, they use a simple method for plagiarism detection e.g. string matching. The main weakness of this method is it cannot detect the plagiarism when the author replaces some words using synonyms. As such, this paper presents a new technique for a semantic-based plagiarism detection using Semantic Role Labeling (SRL and term weighting. SRL is deployed in order to calculate the semantic-based similarity. The main different from the existing framework is terms in a sentence are weighted dynamically depending on their roles in the sentence e.g. subject, verb or object. This technique enhances the plagiarism detection mechanism more efficiently than existing system although positions of terms in a sentence are reordered. The experimental results show that the proposed method can detect the plagiarism document more effective than the existing methods, Anti-kobpae, Turnit-in and Traditional Semantic Role Labeling.

  9. What is Plagiarism?

    Science.gov (United States)

    Vishniac, Ethan T.

    2012-01-01

    Manuscripts submitted to The Astrophysical Journal are required to contain "novel and significant" material and to be free of plagiarism. There is a surprising amount of confusion regarding the definition of plagiarism and what constitutes prior publication. I will discuss the definitions used by the ApJ and the procedures we follow to to support this rule. Individual members of the community frequently show a very different understanding of these standards and are surprised at the conflict. Time allowing, I will briefly discuss some of the other common ethical problems that arise during the preparation and publication of articles.

  10. Surveillance in Programming Plagiarism beyond Techniques: An Incentive-Based Fishbone Model

    Science.gov (United States)

    Wang, Yanqing; Chen, Min; Liang, Yaowen; Jiang, Yu

    2013-01-01

    Lots of researches have showed that plagiarism becomes a severe problem in higher education around the world, especially in programming learning for its essence. Therefore, an effective strategy for plagiarism surveillance in program learning is much essential. Some literature focus on code similarity algorithm and the related tools can help to…

  11. The Ethics of Plagiarism.

    Science.gov (United States)

    Jolly, Peggy

    Within the academy the commonly held definition of plagiarism--using another's words, ideas, or stylistic individuality without attribution--is widespread, appearing on most English course syllabi. Judicial guidelines are followed: neither stealing nor ignorance of the law is to be sanctioned. Furthermore, penalties for students can be severe: a…

  12. Note on Plagiarism

    Indian Academy of Sciences (India)

    conferences have been held to discuss this issue which seriously affects both the conduct of science and the public perception of science. The major forms of scientific misconduct are captured by three words: fabrication, falsifi- cation and plagiarism. Their meanings are self-evident. The first two forms are most likely to.

  13. Statement on Plagiarism

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 13; Issue 5. Statement on Plagiarism. S Mahadevan N Mukunda. Editorial Volume 13 Issue 5 May 2008 pp 403-404. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/013/05/0403-0404. Author Affiliations.

  14. Source mask optimization using real-coded genetic algorithms

    Science.gov (United States)

    Yang, Chaoxing; Wang, Xiangzhao; Li, Sikun; Erdmann, Andreas

    2013-04-01

    Source mask optimization (SMO) is considered to be one of the technologies to push conventional 193nm lithography to its ultimate limits. In comparison with other SMO methods that use an inverse problem formulation, SMO based on genetic algorithm (GA) requires very little knowledge of the process, and has the advantage of flexible problem formulation. Recent publications on SMO using a GA employ a binary-coded GA. In general, the performance of a GA depends not only on the merit or fitness function, but also on the parameters, operators and their algorithmic implementation. In this paper, we propose a SMO method using real-coded GA where the source and mask solutions are represented by floating point strings instead of bit strings. Besides from that, the selection, crossover, and mutation operators are replaced by corresponding floating-point versions. Both binary-coded and real-coded genetic algorithms were implemented in two versions of SMO and compared in numerical experiments, where the target patterns are staggered contact holes and a logic pattern with critical dimensions of 100 nm, respectively. The results demonstrate the performance improvement of the real-coded GA in comparison to the binary-coded version. Specifically, these improvements can be seen in a better convergence behavior. For example, the numerical experiments for the logic pattern showed that the average number of generations to converge to a proper fitness of 6.0 using the real-coded method is 61.8% (100 generations) less than that using binary-coded method.

  15. Source Coding in Networks with Covariance Distortion Constraints

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2016-01-01

    -distortion function (RDF). We then study the special cases and applications of this result. We show that two well-studied source coding problems, i.e. remote vector Gaussian Wyner-Ziv problems with mean-squared error and mutual information constraints are in fact special cases of our results. Finally, we apply our...

  16. Independent Source Coding for Control over Noiseless Channels

    DEFF Research Database (Denmark)

    da Silva, Eduardo; Derpich, Milan; Østergaard, Jan

    2010-01-01

    has been designed assuming transparent feedback and, due to implementation constraints, a source coding scheme has to be deployed in the feedback path. We give a closed form expression for the minimal average data-rate required to achieve a given performance level, and also study the interplay between...

  17. Secondary neutron source modelling using MCNPX and ALEPH codes

    Science.gov (United States)

    Trakas, Christos; Kerkar, Nordine

    2014-06-01

    Monitoring the subcritical state and divergence of reactors requires the presence of neutron sources. But mainly secondary neutrons from these sources feed the ex-core detectors (SRD, Source Range Detector) whose counting rate is correlated with the level of the subcriticality of reactor. In cycle 1, primary neutrons are provided by sources activated outside of the reactor (e.g. Cf252); part of this source can be used for the divergence of cycle 2 (not systematic). A second family of neutron sources is used for the second cycle: the spontaneous neutrons of actinides produced after irradiation of fuel in the first cycle. Both families of sources are not sufficient to efficiently monitor the divergence of the second cycles and following ones, in most reactors. Secondary sources cluster (SSC) fulfil this role. In the present case, the SSC [Sb, Be], after activation in the first cycle (production of Sb124, unstable), produces in subsequent cycles a photo-neutron source by gamma (from Sb124)-neutron (on Be9) reaction. This paper presents the model of the process between irradiation in cycle 1 and cycle 2 results for SRD counting rate at the beginning of cycle 2, using the MCNPX code and the depletion chain ALEPH-V1 (coupling of MCNPX and ORIGEN codes). The results of this simulation are compared with two experimental results of the PWR 1450 MWe-N4 reactors. A good agreement is observed between these results and the simulations. The subcriticality of the reactors is about at -15,000 pcm. Discrepancies on the SRD counting rate between calculations and measurements are in the order of 10%, lower than the combined uncertainty of measurements and code simulation. This comparison validates the AREVA methodology, which allows having an SRD counting rate best-estimate for cycles 2 and next ones and optimizing the position of the SSC, depending on the geographic location of sources, main parameter for optimal monitoring of subcritical states.

  18. From the Board of Editors: on Plagiarism

    Science.gov (United States)

    2005-05-01

    similar scientific content of one's own in the same or different journals. Self-plagiarism causes duplicate papers in the scientific literature, violates copyright agreements, and unduly burdens reviewers, editors, and the scientific publishing enterprise. Plagiarism from others' works constitutes the most offensive form of plagiarism. Effectively, it is using someone else's work as if it is your own. Any text, equations, ideas, or figures taken from another paper or work must be specifically acknowledged as they occur in that paper or work. Figures, tables, or other images reproduced from another source normally require permission from the publisher. Text or concepts can, for example, be quoted as follows: "As stated by xxx (name of lead author), "text" [reference]." Action on Notification of Allegations of Plagiarism: OSA identifies an act of plagiarism in a published document to be the substantial replication, without appropriate attribution, of significant elements of another document already published by the same or other authors. OSA has implemented a process for dealing with cases of plagiarism. When the Editor-in-Chief of a journal is notified of an instance of either of the two possible forms of plagiarism discussed above, he or she will make a preliminary investigation of the allegations, including a request for the accused authors to explain the situation. If further action is justified, then the Editor-in-Chief will convene a panel consisting of the Editor-in-Chief of the OSA journal involved, the Chair of the Board of Editors, and the Senior Director of Publications. Their unanimous decision confirming that an act of plagiarism has occurred requires the insertion of the following statement in the official OSA electronic record of the plagiarizing article: "It has come to the attention of the Optical Society of America that this article should not have been submitted owing to its substantial replication, without appropriate attribution, of significant elements

  19. Plagiarism and scientific writing: a personal commentary.

    Science.gov (United States)

    Ponniah, Irulandy

    2012-11-01

    There have been a number of papers that have addressed the issue of plagiarism. Nevertheless, the charges of plagiarism usually merit little attention with experts, because it is still not clear what sort of copying actually constitutes plagiarism. Another problem that eludes consensus is whether plagiarism was committed with or without intention. This paper discusses certain issues relating to plagiarism and differentiates between intentional and unintentional forms of plagiarism. © 2011 Blackwell Publishing Asia Pty Ltd.

  20. Plagiarism Curricula May Reduce Need for Punitive Plagiarism Education

    OpenAIRE

    Robin E. Miller

    2014-01-01

    Objective – To describe the development and implementation of two courses designed to help university students avoid plagiarism. Design – Quantitative and qualitative analysis. Setting – A university in the United Kingdom. Subjects – An unknown number of university students who took a Plagiarism Awareness Program (PAP) course between 2008 and 2011, and approximately 3,000 university students enrolled in a Plagiarism Avoidance for New Students (PANS) course delivered via a virt...

  1. Helping International Students Succeed Academically through Research Process and Plagiarism Workshops

    Science.gov (United States)

    Chen, Yu-Hui; Van Ullen, Mary K.

    2011-01-01

    Workshops on the research process and plagiarism were designed to meet the needs of international students at the University at Albany. The research process workshop covered formulating research questions, as well as locating and evaluating sources. The plagiarism workshop focused on acknowledging sources, quoting, paraphrasing, and summarizing…

  2. Blahut-Arimoto algorithm and code design for action-dependent source coding problems

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Simeone, Osvaldo; Popovski, Petar

    2013-01-01

    The source coding problem with action-dependent side information at the decoder has recently been introduced to model data acquisition in resource-constrained systems. In this paper, an efficient Blahut-Arimoto-type algorithm for the numerical computation of the rate-distortion-cost function...

  3. Distributed Source Coding Techniques for Lossless Compression of Hyperspectral Images

    Directory of Open Access Journals (Sweden)

    Barni Mauro

    2007-01-01

    Full Text Available This paper deals with the application of distributed source coding (DSC theory to remote sensing image compression. Although DSC exhibits a significant potential in many application fields, up till now the results obtained on real signals fall short of the theoretical bounds, and often impose additional system-level constraints. The objective of this paper is to assess the potential of DSC for lossless image compression carried out onboard a remote platform. We first provide a brief overview of DSC of correlated information sources. We then focus on onboard lossless image compression, and apply DSC techniques in order to reduce the complexity of the onboard encoder, at the expense of the decoder's, by exploiting the correlation of different bands of a hyperspectral dataset. Specifically, we propose two different compression schemes, one based on powerful binary error-correcting codes employed as source codes, and one based on simpler multilevel coset codes. The performance of both schemes is evaluated on a few AVIRIS scenes, and is compared with other state-of-the-art 2D and 3D coders. Both schemes turn out to achieve competitive compression performance, and one of them also has reduced complexity. Based on these results, we highlight the main issues that are still to be solved to further improve the performance of DSC-based remote sensing systems.

  4. Source-Code Instrumentation and Quantification of Events

    Science.gov (United States)

    Filman, Robert E.; Havelund, Klaus; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Aspect Oriented Programming (AOP) is making quantified programmatic assertions over programs that otherwise are not annotated to receive these assertions. Varieties of AOP systems are characterized by which quantified assertions they allow, what they permit in the actions of the assertions (including how the actions interact with the base code), and what mechanisms they use to achieve the overall effect. Here, we argue that all quantification is over dynamic events, and describe our preliminary work in developing a system that maps dynamic events to transformations over source code. We discuss possible applications of this system, particularly with respect to debugging concurrent systems.

  5. Undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty.

    Science.gov (United States)

    Ryan, Greg; Bonanno, Helen; Krass, Ines; Scouller, Karen; Smith, Lorraine

    2009-10-01

    To assess undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty. A questionnaire was administered to undergraduate and postgraduate pharmacy students to determine their levels of awareness of university policy concerning academic honesty; attitudes to plagiarism by rating the acceptability of a range of plagiarizing and cheating practices; and choice of appropriate penalties for a first and second occurrence. The choice of behaviors in response to a scenario about the preparation of a reading-based written assignment and the strategies that students would be prepared to use in order to submit the assignment on time were also assessed. Findings indicated widespread deficiencies in student knowledge of, and attitudes towards, plagiarism. Students did not perceive plagiarism as a serious issue and the use of inappropriate strategies for sourcing and acknowledging material was common. The study highlights the importance of achieving a balance among the 3 dimensions of plagiarism management: prevention, detection and penalty.

  6. Undergraduate and Postgraduate Pharmacy Students' Perceptions of Plagiarism and Academic Honesty

    Science.gov (United States)

    Bonanno, Helen; Krass, Ines; Scouller, Karen; Smith, Lorraine

    2009-01-01

    Objectives To assess undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty. Methods A questionnaire was administered to undergraduate and postgraduate pharmacy students to determine their levels of awareness of university policy concerning academic honesty; attitudes to plagiarism by rating the acceptability of a range of plagiarizing and cheating practices; and choice of appropriate penalties for a first and second occurrence. The choice of behaviors in response to a scenario about the preparation of a reading-based written assignment and the strategies that students would be prepared to use in order to submit the assignment on time were also assessed. Results Findings indicated widespread deficiencies in student knowledge of, and attitudes towards, plagiarism. Students did not perceive plagiarism as a serious issue and the use of inappropriate strategies for sourcing and acknowledging material was common. Conclusions The study highlights the importance of achieving a balance among the 3 dimensions of plagiarism management: prevention, detection and penalty. PMID:19885074

  7. Optimization of Coding of AR Sources for Transmission Across Channels with Loss

    DEFF Research Database (Denmark)

    Arildsen, Thomas

    . Channel coding is usually applied in combination with source coding to ensure reliable transmission of the (source coded) information at the maximal rate across a channel given the properties of this channel. In this thesis, we consider the coding of auto-regressive (AR) sources which are sources that can...

  8. Joint Source-Channel Coding by Means of an Oversampled Filter Bank Code

    Directory of Open Access Journals (Sweden)

    Marinkovic Slavica

    2006-01-01

    Full Text Available Quantized frame expansions based on block transforms and oversampled filter banks (OFBs have been considered recently as joint source-channel codes (JSCCs for erasure and error-resilient signal transmission over noisy channels. In this paper, we consider a coding chain involving an OFB-based signal decomposition followed by scalar quantization and a variable-length code (VLC or a fixed-length code (FLC. This paper first examines the problem of channel error localization and correction in quantized OFB signal expansions. The error localization problem is treated as an -ary hypothesis testing problem. The likelihood values are derived from the joint pdf of the syndrome vectors under various hypotheses of impulse noise positions, and in a number of consecutive windows of the received samples. The error amplitudes are then estimated by solving the syndrome equations in the least-square sense. The message signal is reconstructed from the corrected received signal by a pseudoinverse receiver. We then improve the error localization procedure by introducing a per-symbol reliability information in the hypothesis testing procedure of the OFB syndrome decoder. The per-symbol reliability information is produced by the soft-input soft-output (SISO VLC/FLC decoders. This leads to the design of an iterative algorithm for joint decoding of an FLC and an OFB code. The performance of the algorithms developed is evaluated in a wavelet-based image coding system.

  9. Combating plagiarism: a shared responsibility.

    Science.gov (United States)

    Rathod, Sujit D

    2010-01-01

    Scientific progress depends on the free dissemination of original thinking and research. With the evidence base formed by publication, investigators develop and implement additional studies, and policy makers propose new laws and regulations. The ramifications of this evidence can affect millions of lives and reallocate considerable resources for programmes or research. As such, it is incumbent on investigators to conduct rigorous research, which precludes engaging in scientific misconduct such as falsification, fabrication and plagiarism. This article addresses the causes and consequences of plagiarism and the processes by which plagiarism is discovered. It concludes by considering the responsibilities of members of the research community in preventing and addressing plagiarism.

  10. Plagiarism Curricula May Reduce Need for Punitive Plagiarism Education

    Directory of Open Access Journals (Sweden)

    Robin E. Miller

    2014-03-01

    Full Text Available Objective – To describe the development and implementation of two courses designed to help university students avoid plagiarism. Design – Quantitative and qualitative analysis. Setting – A university in the United Kingdom. Subjects – An unknown number of university students who took a Plagiarism Awareness Program (PAP course between 2008 and 2011, and approximately 3,000 university students enrolled in a Plagiarism Avoidance for New Students (PANS course delivered via a virtual learning environment (VLE between October and December 2012. The authors attempted to collect rates of continued plagiarism among students who had taken plagiarism education courses. The authors also surveyed 702 university students about plagiarism in 2011. Methods – Data collected from PAP participants informed revision of the authors’ approach to plagiarism education and led to development of the second course, PANS. At the end of the course, students completed a test of their knowledge about plagiarism. Authors compared scores from students who took a course supervised by a librarian to the scores from students who took the course independently. Main Results – Students reported that many aspects of citation and attribution are challenging (p. 149. The authors discovered that 93% of students who completed the PANS course facilitated by a librarian in-person passed the final exam with a grade of 70% or higher, while 85% of students who took the same course independently, without a librarian instructor, in an online VLE scored 70% or higher (p. 155. The authors report that referrals of students who plagiarized declined significantly (p-value < 0.001 since the implementation of a plagiarism avoidance curriculum. Conclusion – As reported by the authors, first-year university students require more extensive education about plagiarism avoidance. A university plagiarism avoidance program instructed by librarians reduces the total number of students caught

  11. The Astrophysics Source Code Library: Supporting software publication and citation

    Science.gov (United States)

    Allen, Alice; Teuben, Peter

    2018-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net), established in 1999, is a free online registry for source codes used in research that has appeared in, or been submitted to, peer-reviewed publications. The ASCL is indexed by the SAO/NASA Astrophysics Data System (ADS) and Web of Science and is citable by using the unique ascl ID assigned to each code. In addition to registering codes, the ASCL can house archive files for download and assign them DOIs. The ASCL advocations for software citation on par with article citation, participates in multidiscipinary events such as Force11, OpenCon, and the annual Workshop on Sustainable Software for Science, works with journal publishers, and organizes Special Sessions and Birds of a Feather meetings at national and international conferences such as Astronomical Data Analysis Software and Systems (ADASS), European Week of Astronomy and Space Science, and AAS meetings. In this presentation, I will discuss some of the challenges of gathering credit for publishing software and ideas and efforts from other disciplines that may be useful to astronomy.

  12. Verification test calculations for the Source Term Code Package

    Energy Technology Data Exchange (ETDEWEB)

    Denning, R S; Wooton, R O; Alexander, C A; Curtis, L A; Cybulskis, P; Gieseke, J A; Jordan, H; Lee, K W; Nicolosi, S L

    1986-07-01

    The purpose of this report is to demonstrate the reasonableness of the Source Term Code Package (STCP) results. Hand calculations have been performed spanning a wide variety of phenomena within the context of a single accident sequence, a loss of all ac power with late containment failure, in the Peach Bottom (BWR) plant, and compared with STCP results. The report identifies some of the limitations of the hand calculation effort. The processes involved in a core meltdown accident are complex and coupled. Hand calculations by their nature must deal with gross simplifications of these processes. Their greatest strength is as an indicator that a computer code contains an error, for example that it doesn't satisfy basic conservation laws, rather than in showing the analysis accurately represents reality. Hand calculations are an important element of verification but they do not satisfy the need for code validation. The code validation program for the STCP is a separate effort. In general the hand calculation results show that models used in the STCP codes (e.g., MARCH, TRAP-MELT, VANESA) obey basic conservation laws and produce reasonable results. The degree of agreement and significance of the comparisons differ among the models evaluated. 20 figs., 26 tabs.

  13. Source Code Vulnerabilities in IoT Software Systems

    Directory of Open Access Journals (Sweden)

    Saleh Mohamed Alnaeli

    2017-08-01

    Full Text Available An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the number of unsafe commands (e.g., strcpy, strcmp, and strlen that are well-known among research communities to cause potential risks and security concerns, thereby decreasing a system’s robustness and quality. These unsafe statements are banned by many companies (e.g., Microsoft. The use of these commands should be avoided from the start when writing code and should be removed from legacy code over time as recommended by new C/C++ language standards. Each system is analyzed and the distribution of the known unsafe commands is presented. Historical trends in the usage of the unsafe commands of 7 of the systems are presented to show how the studied systems evolved over time with respect to the vulnerable code. The results show that the most prevalent unsafe command used for most systems is memcpy, followed by strlen. These results can be used to help train software developers on secure coding practices so that they can write higher quality software systems.

  14. From Tavarod to Plagiarism

    Directory of Open Access Journals (Sweden)

    S. Gavad Mortezaei

    2014-08-01

    Full Text Available Abstract “Plagiarism” has been one of the important subjects in the field of literary criticism and argued in the press and meetings from past till now. Today, there isn't any day and month that will go by without seeing a case in this field being presented or claimed in books, journals or newspapers. However, thanks to the expanse of operation and wide scope of the Judiciary, mentioned claims are studied in Judicial courts as well (you can just search “Plagiarism” in Google search engine, and then you will encounter with hundred different pages on this subject. In countries that they have copyright rule, this subject is taken into account seriously and if someone adapts a subject or extracts some text from another one's, without mentioning its reference, he will be punished firmly in accordance with rules and regulations. Despite the importance of this subject in literary criticism, unfortunately it is not considered as it deserves in our country. Regardless of definition and categorization of Plagiarism by rhetoricians, there is disagreement for making decision whether a Plagiarism is happened or it is some other cases such as Tavarod (occurrence of one thought in two persons' minds or Intertextuality. Considering the fact that contents and concepts are common between people in every inches of our planet, it is so hard to determine and prove that someone is innovator and creator of concept or content and if someone else uses the same content, he is copying the original creator. We know that sometimes the same word or phrase comes to the minds of two persons accidentally, so accusing somebody of plagiary should be done with care and comprehensive study and it should be provable. In other words, definition of Plagiarism boundaries based on rate of uniformity and similarity of terms and concepts of two works is very hard and the border between plagiarism and Tavarod is very narrow and skeptical.

  15. [High frequency of plagiarism in medical thesis from a Peruvian public university].

    Science.gov (United States)

    Saldaña-Gastulo, J Jhan C; Quezada-Osoria, C Claudia; Peña-Oscuvilca, Américo; Mayta-Tristán, Percy

    2010-03-01

    An observational study was conducted to describe the presence of plagiarism in medical thesis in 2008 performed at a public university in Peru. Search for plagiarism in 33 thesis introductions using a Google search algorithm, characterizes of the study type and we search in electronic form if the thesis mentor have published articles in scientific journals. We found evidence of plagiarism in 27/33 introductions, 37.3% (171/479) of all the paragraphs analyzed had some degree of plagiarism, literal plagiarism was the most frequent (20/27) and journals were the most common sources of plagiarism (19/27). The characteristics of the studies were observational (32/33), cross-sectional (30/33), descriptive (25/33) and retrospective (19/33). None of the authors had published in a scientific journal, and only nine of his tutors of them had at least one publication. No association was found between the characteristics of the thesis and the presence of plagiarism. In conclusion, we found a high frequency of plagiarism in theses analyzed. Is responsibility of medical schools take the necessary actions to detect and avoid plagiarism among their students.

  16. Plagiarism: More than Meets the Eye

    Science.gov (United States)

    Hussin, Habsah; Ismail, Maimunah

    2013-01-01

    Plagiarism is the euphemism for "academic theft", "academic dishonesty" and "academic misconduct in academia"; and is the taboo word among academics in academia. This paper discusses the issue of plagiarism in terms of what constitutes plagiarism, who are normally "the practitioners" of plagiarism, be it…

  17. Plagiarism by Adult Learners Online: A Case Study in Detection and Remediation

    Science.gov (United States)

    Jocoy, Christine; DiBiase, David

    2006-01-01

    Detecting and combating plagiarism from Web-based sources is a concern for administrators and instructors involved in online distance education. In this paper, we quantify copy-and-paste plagiarism among adult learners in an online geography course offered through Penn State's World Campus Geographic Information Systems (GIS) certificate program.…

  18. Social Network Aided Plagiarism Detection

    Science.gov (United States)

    Zrnec, Aljaž; Lavbic, Dejan

    2017-01-01

    The prevalence of different kinds of electronic devices and the volume of content on the Web have increased the amount of plagiarism, which is considered an unethical act. If we want to be efficient in the detection and prevention of these acts, we have to improve today's methods of discovering plagiarism. The paper presents a research study where…

  19. University Students' Perceptions of Plagiarism

    Science.gov (United States)

    Power, Lori G.

    2009-01-01

    Plagiarism is an intriguing topic with many avenues for exploration. Students' perceptions of plagiarism certainly differ from their professors' and it is valuable to attempt to listen in some small measure to what those perceptions are. The purpose of this study was to gain an understanding of some of the ways first- and second-year university…

  20. The Illusory Dichotomy of Plagiarism

    Science.gov (United States)

    Stuhmcke, Anita; Booth, Tracey; Wangmann, Jane

    2016-01-01

    Plagiarism has been characterised as a "major problem" for universities. While tensions between students and universities are inevitable, the problem with the existing system of plagiarism management and prevention is that it operates to problematise the relationship between the university and the student, rather than address the core…

  1. Exploring Student Self-Plagiarism

    Science.gov (United States)

    Halupa, Colleen M.

    2014-01-01

    Student self-plagiarism is a confusing issue for both faculty and students alike. This problem is compounded because both groups perceive the concept very differently. Recent literature regarding these perceptions is reviewed and some brief preliminary results of an exploratory multi-university study of student perceptions of self-plagiarism are…

  2. Avoiding plagiarism in academic writing.

    Science.gov (United States)

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance.

  3. Robust video transmission with distributed source coded auxiliary channel.

    Science.gov (United States)

    Wang, Jiajun; Majumdar, Abhik; Ramchandran, Kannan

    2009-12-01

    We propose a novel solution to the problem of robust, low-latency video transmission over lossy channels. Predictive video codecs, such as MPEG and H.26x, are very susceptible to prediction mismatch between encoder and decoder or "drift" when there are packet losses. These mismatches lead to a significant degradation in the decoded quality. To address this problem, we propose an auxiliary codec system that sends additional information alongside an MPEG or H.26x compressed video stream to correct for errors in decoded frames and mitigate drift. The proposed system is based on the principles of distributed source coding and uses the (possibly erroneous) MPEG/H.26x decoder reconstruction as side information at the auxiliary decoder. The distributed source coding framework depends upon knowing the statistical dependency (or correlation) between the source and the side information. We propose a recursive algorithm to analytically track the correlation between the original source frame and the erroneous MPEG/H.26x decoded frame. Finally, we propose a rate-distortion optimization scheme to allocate the rate used by the auxiliary encoder among the encoding blocks within a video frame. We implement the proposed system and present extensive simulation results that demonstrate significant gains in performance both visually and objectively (on the order of 2 dB in PSNR over forward error correction based solutions and 1.5 dB in PSNR over intrarefresh based solutions for typical scenarios) under tight latency constraints.

  4. Towards Holography via Quantum Source-Channel Codes.

    Science.gov (United States)

    Pastawski, Fernando; Eisert, Jens; Wilming, Henrik

    2017-07-14

    While originally motivated by quantum computation, quantum error correction (QEC) is currently providing valuable insights into many-body quantum physics, such as topological phases of matter. Furthermore, mounting evidence originating from holography research (AdS/CFT) indicates that QEC should also be pertinent for conformal field theories. With this motivation in mind, we introduce quantum source-channel codes, which combine features of lossy compression and approximate quantum error correction, both of which are predicted in holography. Through a recent construction for approximate recovery maps, we derive guarantees on its erasure decoding performance from calculations of an entropic quantity called conditional mutual information. As an example, we consider Gibbs states of the transverse field Ising model at criticality and provide evidence that they exhibit nontrivial protection from local erasure. This gives rise to the first concrete interpretation of a bona fide conformal field theory as a quantum error correcting code. We argue that quantum source-channel codes are of independent interest beyond holography.

  5. Plagiarism Detection by Online Solutions.

    Science.gov (United States)

    Masic, Izet; Begic, Edin; Dobraca, Amra

    2017-01-01

    The problem of plagiarism represents one of the burning issues of the modern scientific world. Detection of plagiarism is a problem that the Editorial Board encounters in their daily work. Software solutions represent a good solution for the detection of plagiarism. The problem of plagiarism will become most discussed topic of the modern scientific world, especially due to the development of standard measures, which rank the work of one author. Investment in education, education of young research personnel about the importance of scientific research, with paying particular attention on ethical behavior, becomes an imperative of academic staff. Editors have to invest additional effort in the development of the base of reviewers team as well as in their proper guidance, because after all, despite the software solutions, they are the best weapon to fight plagiarism. Peer review process should be a key of successful operation of each journal.

  6. Cheaters: A Case Study of Plagiarism in Composition Classrooms

    Science.gov (United States)

    Yadgir, Sheri A.

    2013-01-01

    This study sought to find a better understanding of plagiarism in the university writing classroom; specifically, institutional and departmental honor codes and policies were looked at--as was the tendency of individual instructors to follow those policies versus creating their own. The narrow purpose of the study was to investigate plagiarism…

  7. Development of parallel DEM for the open source code MFIX

    Energy Technology Data Exchange (ETDEWEB)

    Gopalakrishnan, Pradeep; Tafti, Danesh

    2013-02-01

    The paper presents the development of a parallel Discrete Element Method (DEM) solver for the open source code, Multiphase Flow with Interphase eXchange (MFIX) based on the domain decomposition method. The performance of the code was evaluated by simulating a bubbling fluidized bed with 2.5 million particles. The DEM solver shows strong scalability up to 256 processors with an efficiency of 81%. Further, to analyze weak scaling, the static height of the fluidized bed was increased to hold 5 and 10 million particles. The results show that global communication cost increases with problem size while the computational cost remains constant. Further, the effects of static bed height on the bubble hydrodynamics and mixing characteristics are analyzed.

  8. Plagiarism in Student Research: Responsibility of the Supervisors and Suggestions to Ensure Plagiarism Free Research.

    Science.gov (United States)

    Krishan, Kewal; Kanchan, Tanuj; Baryah, Neha; Mukhra, Richa

    2017-08-01

    Plagiarism is a serious threat plaguing the research in publication of science globally. There is an increasing need to address the issue of plagiarism especially among young researchers in the developing part of the world. Plagiarism needs to be earnestly discouraged to ensure a plagiarism free research environment. We provide further suggestions to combat student plagiarism at Master's level and the regulations/guidelines regarding plagiarism in India.

  9. Plagiarism, Cheating and Research Integrity: Case Studies from a Masters Program in Peru.

    Science.gov (United States)

    Carnero, Andres M; Mayta-Tristan, Percy; Konda, Kelika A; Mezones-Holguin, Edward; Bernabe-Ortiz, Antonio; Alvarado, German F; Canelo-Aybar, Carlos; Maguiña, Jorge L; Segura, Eddy R; Quispe, Antonio M; Smith, Edward S; Bayer, Angela M; Lescano, Andres G

    2017-08-01

    Plagiarism is a serious, yet widespread type of research misconduct, and is often neglected in developing countries. Despite its far-reaching implications, plagiarism is poorly acknowledged and discussed in the academic setting, and insufficient evidence exists in Latin America and developing countries to inform the development of preventive strategies. In this context, we present a longitudinal case study of seven instances of plagiarism and cheating arising in four consecutive classes (2011-2014) of an Epidemiology Masters program in Lima, Peru, and describes the implementation and outcomes of a multifaceted, "zero-tolerance" policy aimed at introducing research integrity. Two cases involved cheating in graded assignments, and five cases correspond to plagiarism in the thesis protocol. Cases revealed poor awareness of high tolerance to plagiarism, poor academic performance, and widespread writing deficiencies, compensated with patchwriting and copy-pasting. Depending on the events' severity, penalties included course failure (6/7) and separation from the program (3/7). Students at fault did not engage in further plagiarism. Between 2011 and 2013, the Masters program sequentially introduced a preventive policy consisting of: (i) intensified research integrity and scientific writing education, (ii) a stepwise, cumulative writing process; (iii) honor codes; (iv) active search for plagiarism in all academic products; and (v) a "zero-tolerance" policy in response to documented cases. No cases were detected in 2014. In conclusion, plagiarism seems to be widespread in resource-limited settings and a greater response with educational and zero-tolerance components is needed to prevent it.

  10. An editorial on plagiarism

    Directory of Open Access Journals (Sweden)

    Nico Keilman

    2011-03-01

    Full Text Available In January this year, we were confronted with a case of plagiarism. One paper that had been submitted last year by a certain person turned out to be written by three other persons. It was presented by the three true authors at a conference in 2010, where they distributed copies of their paper. One of the reviewers of the paper informed us about that fact. We asked the three authors for a copy, which turned out to be identical with the submission, except for a few minor details. When confronted with these facts, the person who had submitted the paper was unable to give us a satisfactory explanation. This is a case of serious scientific misconduct. The editors and the publisher of Demographic Research cannot and will not accept any form of plagiarism. Nor will we accept any other form of misconduct in science, including fabrication, falsification, or other practices that seriously deviate from those that are commonly accepted within the scientific community for proposing, conducting, or reporting research. With Long et al. ("Responding to possible plagiarism", Science 6 March 2009, we are of the opinion that the responsibility for research integrity ultimately lies in the hands of the scientific community: educators, students, authors, and those who provide peer reviews. Journal editors must take appropriate action and verify the originality of suspected manuscripts. The Office of Research Integrity provides useful guidelines (http://ori.dhhs.gov/. We have decided that any future submission to Demographic Research that lists the plagiarist as an author or co-author will be rejected automatically.

  11. Citation-based plagiarism detection detecting disguised and cross-language plagiarism using citation pattern analysis

    CERN Document Server

    Gipp, Bela

    2014-01-01

    Plagiarism is a problem with far-reaching consequences for the sciences. However, even today's best software-based systems can only reliably identify copy & paste plagiarism. Disguised plagiarism forms, including paraphrased text, cross-language plagiarism, as well as structural and idea plagiarism often remain undetected. This weakness of current systems results in a large percentage of scientific plagiarism going undetected. Bela Gipp provides an overview of the state-of-the art in plagiarism detection and an analysis of why these approaches fail to detect disguised plagiarism forms. The aut

  12. Development of a code clone search tool for open source repositories

    OpenAIRE

    Xia, Pei; Yoshida, Norihiro; Manabe, Yuki; Inoue, Katsuro

    2011-01-01

    Finding code clones in the open source systems is one of important and demanding features for efficient and safe reuse of existing open source software. In this paper, we propose a novel search model, open code clone search, to explore code clones in open source repositories on the Internet. Based on this search model, we have designed and implemented a prototype system named Open CCFinder. This system takes a query code fragment as its input, and returns the code fragments containing the cod...

  13. Plagiarism Continues to Affect Scholarly Journals.

    Science.gov (United States)

    Hong, Sung Tae

    2017-02-01

    I have encountered 3 cases of plagiarism as editor of the Journal of Korean Medical Science (JKMS). The first one was copying figures from a JKMS article without citation, the second was submission of a copied manuscript of a published article to JKMS, and the third was publishing a copied JKMS article in another journal. The first and third cases violated copyrights of JKMS, but the violating journals made no action on the misconduct. The second and third cases were slightly modified copies of the source articles but similarity check by the Crosscheck could not identify the text overlap initially and after one year reported 96% overlap for the second case. The similarity of the third case was reported 3%. The Crosscheck must upgrade its system for better reliable screening of text plagiarism. The copy of the second case was committed by a corrupt Chinese editing company and also by some unethical researchers. In conclusion, plagiarism still threatens the trustworthiness of the publishing enterprises and is a cumbersome burden for editors of scholarly journals. We require a better system to increase the vigilance and to prevent the misconduct.

  14. Mouse Click Plagiarism: Can Technology Help to Fight Back?

    Science.gov (United States)

    Tulley Pitchford, Kay

    2012-01-01

    Many students arrive at university accustomed to adopting the internet as their primary source of information, but with no prior experience of referencing. This raises issues of the reliability and validity of digital sources, as well as bringing new opportunities for cheating. The internet has made plagiarism quicker and easier; a student simply…

  15. Educational approaches for discouraging plagiarism.

    Science.gov (United States)

    Fischer, Beth A; Zigmond, Michael J

    2011-01-01

    Suggested approaches to reduce the occurrence of plagiarism in academia, particularly among trainees. These include (1) educating individuals as to the definition of plagiarism and its consequences through written guidelines, active discussions, and practice in identifying proper and improper citation practices; (2) distributing checklists that break the writing task into more manageable steps, (3) requiring the submission of an outline and then a first draft prior to the deadline for a paper; (4) making assignments relevant to individual interests; and (5) providing trainees with access to software programs that detect plagiarism. Copyright © 2011 Elsevier Inc. All rights reserved.

  16. Plagiarism: More than Meets the Eye

    Directory of Open Access Journals (Sweden)

    Habsah Hussin

    2013-07-01

    Full Text Available Plagiarism is the euphemism for ‘academic theft’, ‘academic dishonesty’ and ‘academic misconduct in academia’; and is the taboo word among academics in academia. This paper discusses the issue of plagiarism in terms of what constitutes plagiarism, who are normally ‘the practitioners’ of plagiarism, be it un-intentionally or otherwise, factors contributing to the practise of plagiarism, effects and implications of plagiarism on the ‘practitioners’, and offers suggestions on how to reduce (if not eliminate any involvement in plagiarism. Knowledge and awareness about plagiarism would help academics and aspiring scholars to steer away from this act, as plagiarism would have dire and long term repercussions on their career, reputation and those who come to be associated with them.

  17. Benchmarking of the SOURCES3A code for PuBe sources

    Energy Technology Data Exchange (ETDEWEB)

    Estes, G.P. [Los Alamos National Lab., NM (United States)

    1998-12-31

    The SOURCES3A code calculates neutron production rates and spectra from ({alpha},n) reactions, spontaneous fission decays, and delayed neutron emission in homogeneous media, interface problems, and alpha-particle beams. SOURCES3A promises to be a very useful tool for generating the characteristics of unique sources for use in neutron transport calculations. A number of comparisons of SOURCES3A results with experiments for various source types were presented in Ref. 1. Here, additional spectral benchmarks with both experiments and other calculations for homogeneous PuBe{sub 13} sources are provided. Preliminary results for neutron production rates from Bu-Pe metal interfaces are also given. Note that SOURCES3A assumes that alpha-particle ranges are small relative to the dimensions of the materials.

  18. STOLEN SCIENCE: WHY PLAGIARISM AND SELF-PLAGIARISM ARE UNACCEPTABLE

    OpenAIRE

    Kulikova E.Yu.

    2016-01-01

    Plagiarism is appropriation of someone else's ideas, texts, images and other materials without acknowledging their author. It is a serious violation of publication ethics that once detected results in the retraction of the submitted article. It has a disastrous impact on the author's reputation, because the publication is not removed from online databases, but stored there with a retracted publication tag. Plagiarism comes in different forms many of which still cannot be detected even by a sp...

  19. Joint Source-Channel Coding for Wavelet-Based Scalable Video Transmission Using an Adaptive Turbo Code

    Directory of Open Access Journals (Sweden)

    Ramzan Naeem

    2007-01-01

    Full Text Available An efficient approach for joint source and channel coding is presented. The proposed approach exploits the joint optimization of a wavelet-based scalable video coding framework and a forward error correction method based on turbo codes. The scheme minimizes the reconstructed video distortion at the decoder subject to a constraint on the overall transmission bitrate budget. The minimization is achieved by exploiting the source rate distortion characteristics and the statistics of the available codes. Here, the critical problem of estimating the bit error rate probability in error-prone applications is discussed. Aiming at improving the overall performance of the underlying joint source-channel coding, the combination of the packet size, interleaver, and channel coding rate is optimized using Lagrangian optimization. Experimental results show that the proposed approach outperforms conventional forward error correction techniques at all bit error rates. It also significantly improves the performance of end-to-end scalable video transmission at all channel bit rates.

  20. Joint Source-Channel Coding for Wavelet-Based Scalable Video Transmission Using an Adaptive Turbo Code

    Directory of Open Access Journals (Sweden)

    Naeem Ramzan

    2007-03-01

    Full Text Available An efficient approach for joint source and channel coding is presented. The proposed approach exploits the joint optimization of a wavelet-based scalable video coding framework and a forward error correction method based on turbo codes. The scheme minimizes the reconstructed video distortion at the decoder subject to a constraint on the overall transmission bitrate budget. The minimization is achieved by exploiting the source rate distortion characteristics and the statistics of the available codes. Here, the critical problem of estimating the bit error rate probability in error-prone applications is discussed. Aiming at improving the overall performance of the underlying joint source-channel coding, the combination of the packet size, interleaver, and channel coding rate is optimized using Lagrangian optimization. Experimental results show that the proposed approach outperforms conventional forward error correction techniques at all bit error rates. It also significantly improves the performance of end-to-end scalable video transmission at all channel bit rates.

  1. Plagiarism by Adult Learners Online: A case study in detection and remediation

    Directory of Open Access Journals (Sweden)

    Christine Jocoy

    2006-06-01

    Full Text Available Detecting and combating plagiarism from Web-based sources is a concern for administrators and instructors involved in online distance education. In this paper, we quantify copy-and-paste plagiarism among adult learners in an online geography course offered through Penn State’s World Campus Geographic Information Systems (GIS certificate program. We also evaluate the effectiveness of an “expectation management” strategy intended to discourage adult learners from unintentional violations. We found that while manual methods detected plagiarism in only about 3 percent of assignments, Turnitin.com revealed a 13 percent plagiarism rate among the same assignments. Our attempts to increase awareness and manage expectations decreased infractions measurably, but not significantly. In contrast, Turnitin.com substantially improved our ability to detect infractions. We conclude that raising awareness and managing expectations about plagiarism may be worthwhile, but is no substitute for systematic detection and vigilant enforcement, even among adult learners.

  2. Plagiarism: More than Meets the Eye

    OpenAIRE

    Habsah Hussin; Maimunah Ismail

    2013-01-01

    Plagiarism is the euphemism for ‘academic theft’, ‘academic dishonesty’ and ‘academic misconduct in academia’; and is the taboo word among academics in academia. This paper discusses the issue of plagiarism in terms of what constitutes plagiarism, who are normally ‘the practitioners’ of plagiarism, be it un-intentionally or otherwise, factors contributing to the practise of plagiarism, effects and implications of plagiarism on the ‘practitioners’, and offers suggestions on how to reduce (if n...

  3. Plagiarism: The Worm of Reason.

    Science.gov (United States)

    Kolich, Augustus M.

    1983-01-01

    Points out problems and complications of dealing with plagiarism. Argues that while teaching students to write, teachers should also try to encourage them to commit themselves to intellectual inquiry and originality. (JL)

  4. Plagiarism: Problem, Behaviour and Reduction

    OpenAIRE

    kiran Malik; Pritee

    2012-01-01

    Plagiarism has been troubling academic world since long.With the invention of electronic resources like internet inrecent times, it has become easier and more accessible forstudents than ever before. Practice of plagiarism bystudents has resulted negative consequences in theacademic field, and university teachers are now facingproblems that are more challenging. This has led to theproduction and submission of assignments and researchworks that are not properly referenced and cited or, worsest...

  5. Source Code Verification for Embedded Systems using Prolog

    Directory of Open Access Journals (Sweden)

    Frank Flederer

    2017-01-01

    Full Text Available System relevant embedded software needs to be reliable and, therefore, well tested, especially for aerospace systems. A common technique to verify programs is the analysis of their abstract syntax tree (AST. Tree structures can be elegantly analyzed with the logic programming language Prolog. Moreover, Prolog offers further advantages for a thorough analysis: On the one hand, it natively provides versatile options to efficiently process tree or graph data structures. On the other hand, Prolog's non-determinism and backtracking eases tests of different variations of the program flow without big effort. A rule-based approach with Prolog allows to characterize the verification goals in a concise and declarative way. In this paper, we describe our approach to verify the source code of a flash file system with the help of Prolog. The flash file system is written in C++ and has been developed particularly for the use in satellites. We transform a given abstract syntax tree of C++ source code into Prolog facts and derive the call graph and the execution sequence (tree, which then are further tested against verification goals. The different program flow branching due to control structures is derived by backtracking as subtrees of the full execution sequence. Finally, these subtrees are verified in Prolog. We illustrate our approach with a case study, where we search for incorrect applications of semaphores in embedded software using the real-time operating system RODOS. We rely on computation tree logic (CTL and have designed an embedded domain specific language (DSL in Prolog to express the verification goals.

  6. Continuation of research into language concepts for the mission support environment: Source code

    Science.gov (United States)

    Barton, Timothy J.; Ratner, Jeremiah M.

    1991-01-01

    Research into language concepts for the Mission Control Center is presented. A computer code for source codes is presented. The file contains the routines which allow source code files to be created and compiled. The build process assumes that all elements and the COMP exist in the current directory. The build process places as much code generation as possible on the preprocessor as possible. A summary is given of the source files as used and/or manipulated by the build routine.

  7. Analyzing and reducing plagiarism at university

    National Research Council Canada - National Science Library

    Jorge López Puga

    2014-01-01

    Plagiarism is one of the less desirable practises in the academic context. This paper presents an experience of massive plagiarism detection at university and the steps taken to prevent its subsequent occurrence...

  8. FLOWTRAN-TF v1. 2 source code

    Energy Technology Data Exchange (ETDEWEB)

    Aleman, S.E.; Cooper, R.E.; Flach, G.P.; Hamm, L.L.; Lee, S.; Smith, F.G. III.

    1993-02-01

    The FLOWTRAN-TF code development effort was initiated in early 1989 as a code to monitor production reactor cooling systems at the Savannah River Plant. This report is a documentation of the various codes that make up FLOWTRAN-TF.

  9. FLOWTRAN-TF v1.2 source code

    Energy Technology Data Exchange (ETDEWEB)

    Aleman, S.E.; Cooper, R.E.; Flach, G.P.; Hamm, L.L.; Lee, S.; Smith, F.G. III

    1993-02-01

    The FLOWTRAN-TF code development effort was initiated in early 1989 as a code to monitor production reactor cooling systems at the Savannah River Plant. This report is a documentation of the various codes that make up FLOWTRAN-TF.

  10. HELIOS: A new open-source radiative transfer code

    Science.gov (United States)

    Malik, Matej; Grosheintz, Luc; Lukas Grimm, Simon; Mendonça, João; Kitzmann, Daniel; Heng, Kevin

    2015-12-01

    I present the new open-source code HELIOS, developed to accurately describe radiative transfer in a wide variety of irradiated atmospheres. We employ a one-dimensional multi-wavelength two-stream approach with scattering. Written in Cuda C++, HELIOS uses the GPU’s potential of massive parallelization and is able to compute the TP-profile of an atmosphere in radiative equilibrium and the subsequent emission spectrum in a few minutes on a single computer (for 60 layers and 1000 wavelength bins).The required molecular opacities are obtained with the recently published code HELIOS-K [1], which calculates the line shapes from an input line list and resamples the numerous line-by-line data into a manageable k-distribution format. Based on simple equilibrium chemistry theory [2] we combine the k-distribution functions of the molecules H2O, CO2, CO & CH4 to generate a k-table, which we then employ in HELIOS.I present our results of the following: (i) Various numerical tests, e.g. isothermal vs. non-isothermal treatment of layers. (ii) Comparison of iteratively determined TP-profiles with their analytical parametric prescriptions [3] and of the corresponding spectra. (iii) Benchmarks of TP-profiles & spectra for various elemental abundances. (iv) Benchmarks of averaged TP-profiles & spectra for the exoplanets GJ1214b, HD189733b & HD209458b. (v) Comparison with secondary eclipse data for HD189733b, XO-1b & Corot-2b.HELIOS is being developed, together with the dynamical core THOR and the chemistry solver VULCAN, in the group of Kevin Heng at the University of Bern as part of the Exoclimes Simulation Platform (ESP) [4], which is an open-source project aimed to provide community tools to model exoplanetary atmospheres.-----------------------------[1] Grimm & Heng 2015, ArXiv, 1503.03806[2] Heng, Lyons & Tsai, Arxiv, 1506.05501Heng & Lyons, ArXiv, 1507.01944[3] e.g. Heng, Mendonca & Lee, 2014, ApJS, 215, 4H[4] exoclime.net

  11. Sexuality, Textuality: The Cultural Work of Plagiarism.

    Science.gov (United States)

    Howard, Rebecca Moore

    2000-01-01

    Considers how plagiarism continues to elude definition because teachers cannot possibly formulate and act on a definition of plagiarism that articulates both its textual and sexual work. Discusses linking sexual property to textual transgression and rejecting metaphors in relationship to rejecting plagiarism. Suggests educators stop using the term…

  12. Shameless! Reconceiving the Problem of Plagiarism.

    Science.gov (United States)

    Briggs, Robert

    2002-01-01

    Argues that a moralistic approach to plagiarism is not likely to make the problem disappear. New thinking about plagiarism and pedagogy must take its complexity into account, since plagiarism is not always the result of a willful desire to deceive, but may reflect a misunderstanding of the nature of work in the discipline. (SLD)

  13. Student Online Plagiarism: How Do We Respond?

    Science.gov (United States)

    Scanlon, Patrick M.

    2003-01-01

    The perception that Internet plagiarism by university students is on the rise has alarmed college teachers, leading to the adoption of electronic plagiarism checkers, among other responses. Although some recent studies suggest that estimates of online plagiarism may be exaggerated, cause for concern remains. This article reviews quantitative…

  14. Rethinking Plagiarism in the Digital Age

    Science.gov (United States)

    Evering, Lea Calvert; Moorman, Gary

    2012-01-01

    Plagiarism is a complex issue in need of reexamination. A common misconception is there is consensus on what constitute plagiarism, and general agreement that engaging in plagiarism and other forms of academic dishonesty is a major breech of ethics. There seems to be little concern for differentiating degrees of seriousness; the intentional…

  15. Plagiarism: Moving from Punitive to Proactive Approaches

    Science.gov (United States)

    Eaton, Sarah Elaine; Guglielmin, Melanie; Otoo, Benedict Kojo

    2017-01-01

    Plagiarism continues to be an issue in postsecondary contexts. This paper discusses how educators can take a proactive stance to prevent plagiarism and cultivate students' sense of honour and academic integrity, rather than focusing on punitive consequences after plagiarism has already occurred. Strategies include assessment design, formative…

  16. Students' Perceptions of Plagiarism

    Science.gov (United States)

    Fish, Reva; Hura, Gerri

    2013-01-01

    While plagiarism by college students is a serious problem that must be addressed, students generally overestimate the frequency of plagiarism at their schools and blame students they do not know for the majority of incidents. This study looked at students' estimations of the frequency of plagiarism at a large urban college and explored how…

  17. Education Improves Plagiarism Detection by Biology Undergraduates

    Science.gov (United States)

    Holt, Emily A.

    2012-01-01

    Regrettably, the sciences are not untouched by the plagiarism affliction that threatens the integrity of budding professionals in classrooms around the world. My research, however, suggests that plagiarism training can improve students' recognition of plagiarism. I found that 148 undergraduate ecology students successfully identified plagiarized…

  18. Plagiarism Due to Misunderstanding: Online Instructor Perceptions

    Science.gov (United States)

    Greenberger, Scott; Holbeck, Rick; Steele, John; Dyer, Thomas

    2016-01-01

    Plagiarism is an ongoing problem in higher education. This problem exists in both online and face-to-face modalities. The literature indicates that there are three ways higher education institutions define plagiarism, which includes theft, deception, and misunderstanding. Plagiarism due to misunderstanding has received less attention in the…

  19. OSSMETER D3.4 – Language-Specific Source Code Quality Analysis

    NARCIS (Netherlands)

    J.J. Vinju (Jurgen); A. Shahi (Ashim); H.J.S. Basten (Bas)

    2014-01-01

    htmlabstractThis deliverable is part of WP3: Source Code Quality and Activity Analysis. It provides descriptions and prototypes of the tools that are needed for source code quality analysis in open source software projects. It builds upon the results of: • Deliverable 3.1 where infra-structure and

  20. OSSMETER D3.3 – Language Agnostic Source Code Quality Analysis

    NARCIS (Netherlands)

    J.J. Vinju (Jurgen); A. Shahi (Ashim); H.J.S. Basten (Bas)

    2014-01-01

    htmlabstractThis deliverable is part of WP3: Source Code Quality and Activity Analysis. It provides descriptions and prototypes of the tools that are needed for source code quality analysis in open source software projects. It builds upon the results of: • Deliverable 3.1 where infra-structure and

  1. Plagiarism Detection Based on SCAM Algorithm

    DEFF Research Database (Denmark)

    Anzelmi, Daniele; Carlone, Domenico; Rizzello, Fabio

    2011-01-01

    Plagiarism is a complex problem and considered one of the biggest in publishing of scientific, engineering and other types of documents. Plagiarism has also increased with the widespread use of the Internet as large amount of digital data is available. Plagiarism is not just direct copy but also...... paraphrasing, rewording, adapting parts, missing references or wrong citations. This makes the problem more difficult to handle adequately. Plagiarism detection techniques are applied by making a distinction between natural and programming languages. Our proposed detection process is based on natural language...... document. Our plagiarism detection system, like many Information Retrieval systems, is evaluated with metrics of precision and recall....

  2. [Plagiarism in medical schools, and its prevention].

    Science.gov (United States)

    Annane, Djillali; Annane, Frédérique

    2012-09-01

    The plagiarism has become very common in universities and medical school. Undoubtedly, the easy access to a huge amount of electronic documents is one explanation for the increasing prevalence of plagiarism among students. While most of universities and medical school have clear statements and rules about plagiarism, available tools for the detection of plagiarism remain inefficient and dedicate training program for students and teachers too scarce. As lack of time is one reason for students to choose plagiarism, it should be one main target for educational programs. Copyright © 2012. Published by Elsevier Masson SAS.

  3. Analyzing programming behavior to support self-reflection for improving source code quality

    OpenAIRE

    Prause, Christian R.; Scheffel, Maren; Niemann, Katja; Wolpers, Martin

    2011-01-01

    Improving the quality of source code is an important aspect of reducing software development cost in industry. This position paper postulates that developers in a software team conduct different activities during software development like closing the source code editor for compilation as opposed to leaving it open that either improve or degrade the quality of resulting source code. We propose to combine mining of contextualized attention metadata with developers' quality reputations to identi...

  4. The Optimal Fix-Free Code for Anti-Uniform Sources

    Directory of Open Access Journals (Sweden)

    Ali Zaghian

    2015-03-01

    Full Text Available An \\(n\\ symbol source which has a Huffman code with codelength vector \\(L_{n}=(1,2,3,\\cdots,n-2,n-1,n-1\\ is called an anti-uniform source. In this paper, it is shown that for this class of sources, the optimal fix-free code and symmetric fix-free code is \\(C_{n}^{*}=(0,11,101,1001,\\cdots,1\\overbrace{0\\cdots0}^{n-2}1 \\

  5. Neutron spallation source and the Dubna Cascade Code

    Indian Academy of Sciences (India)

    Neutron multiplicity per incident proton, /, in collision of high energy proton beam with voluminous Pb and W targets has been estimated from the Dubna Cascade Code and compared with the available experimental data for the purpose of benchmarking of the code. Contributions of various atomic and nuclear processes ...

  6. Plagiarism: an egregious form of misconduct.

    Science.gov (United States)

    Juyal, Deepak; Thawani, Vijay; Thaledi, Shweta

    2015-02-01

    Publishing research papers for academic fraternity has become important for career advancement and promotion. Number of publications in peer reviewed journals and subsequent citations are recognized as measures of scientific success. Non-publishing academicians and researchers are invisible to the scientific community. With pressure to publish, misconduct has crept into scientific writing with the result that research misconduct, plagiarism, misappropriation of intellectual property, and substantial unattributed textual copying of another's publication have become common. The Office of Research Integrity, USA, defines research misconduct as "fabrication, falsification or plagiarism in proposing, performing or reviewing research, or in reporting research results." Although plagiarism is difficult to define in few words, it can be viewed as the stealing of another person's ideas, methods, results, or words without giving proper attribution. The Office of Research Integrity defines plagiarism as being "theft or misappropriation of intellectual property and the substantial unattributed textual copying of another's work." Plagiarism is one of the most vehemently derided breaches of research integrity as it undermines the original and honest contribution to an existing body of knowledge. Plagiarism has many forms viz. blatant plagiarism, technical plagiarism, patchwork plagiarism, and self-plagiarism. In any form, the plagiarism is a threat to the research integrity and is unacceptable. We do need to detect such acts and effectively prosecute the offenders.

  7. Plagiarism: An Egregious Form of Misconduct

    Science.gov (United States)

    Juyal, Deepak; Thawani, Vijay; Thaledi, Shweta

    2015-01-01

    Background: Publishing research papers for academic fraternity has become important for career advancement and promotion. Number of publications in peer reviewed journals and subsequent citations are recognized as measures of scientific success. Non-publishing academicians and researchers are invisible to the scientific community. Discussion: With pressure to publish, misconduct has crept into scientific writing with the result that research misconduct, plagiarism, misappropriation of intellectual property, and substantial unattributed textual copying of another's publication have become common. The Office of Research Integrity, USA, defines research misconduct as “fabrication, falsification or plagiarism in proposing, performing or reviewing research, or in reporting research results.” Although plagiarism is difficult to define in few words, it can be viewed as the stealing of another person's ideas, methods, results, or words without giving proper attribution. The Office of Research Integrity defines plagiarism as being “theft or misappropriation of intellectual property and the substantial unattributed textual copying of another's work.” Plagiarism is one of the most vehemently derided breaches of research integrity as it undermines the original and honest contribution to an existing body of knowledge. Conclusion: Plagiarism has many forms viz. blatant plagiarism, technical plagiarism, patchwork plagiarism, and self-plagiarism. In any form, the plagiarism is a threat to the research integrity and is unacceptable. We do need to detect such acts and effectively prosecute the offenders. PMID:25789254

  8. Authors, editors, and the signs, symptoms and causes of plagiarism

    Science.gov (United States)

    Shashok, Karen

    2011-01-01

    Plagiarism and inadequate citing appear to have reached epidemic proportions in research publication. This article discusses how plagiarism is defined and suggests some possible causes for the increase in the plagiarism disease. Most editors do not have much tolerance for text re-use with inadequate citation regardless of reasons why words are copied from other sources without correct attribution. However, there is now some awareness that re-use of words in research articles to improve the writing or “the English” (which has become a common practice) should be distinguished from intentional deceit for the purpose of stealing other authors’ ideas (which appears to remain a very rare practice). Although it has become almost as easy for editors to detect duplicate text as it is for authors to re-use text from other sources, editors often fail to consider the reasons why researchers resort to this strategy, and tend to consider any text duplication as a symptom of serious misconduct. As a result, some authors may be stigmatized unfairly by being labeled as plagiarists. The article concludes with practical advice for researchers on how to improve their writing and citing skills and thus avoid accusations of plagiarism. PMID:21957412

  9. Authors, editors, and the signs, symptoms and causes of plagiarism

    Directory of Open Access Journals (Sweden)

    Karen Shashok

    2011-01-01

    Full Text Available Plagiarism and inadequate citing appear to have reached epidemic proportions in research publication. This article discusses how plagiarism is defined and suggests some possible causes for the increase in the plagiarism disease. Most editors do not have much tolerance for text re-use with inadequate citation regardless of reasons why words are copied from other sources without correct attribution. However, there is now some awareness that re-use of words in research articles to improve the writing or "the English" (which has become a common practice should be distinguished from intentional deceit for the purpose of stealing other authors′ ideas (which appears to remain a very rare practice. Although it has become almost as easy for editors to detect duplicate text as it is for authors to re-use text from other sources, editors often fail to consider the reasons why researchers resort to this strategy, and tend to consider any text duplication as a symptom of serious misconduct. As a result, some authors may be stigmatized unfairly by being labeled as plagiarists. The article concludes with practical advice for researchers on how to improve their writing and citing skills and thus avoid accusations of plagiarism.

  10. No Harm, Still Foul: Concerns About Reputation Drive Dislike of Harmless Plagiarizers.

    Science.gov (United States)

    Silver, Ike; Shaw, Alex

    2017-05-05

    Across a variety of situations, people strongly condemn plagiarizers who steal credit for ideas, even when the theft in question does not appear to harm anyone. Why would people react negatively to relatively harmless acts of plagiarism? In six experiments, we predict and find that these negative reactions are driven by people's aversion toward agents who attempt to falsely improve their reputations. In Studies 1-3, participants condemn plagiarism cases that they agree are harmless (i.e., stealing credit from an anonymous source). This effect is mediated by the extent to which participants perceive the plagiarizer to have falsely benefitted from plagiarizing. In Studies 4-5, we demonstrate that this effect is not explained solely by participants' negative response to lies or violations of permission. In Study 6, participants condemn a plagiarism case in which the idea's original author actually benefits, providing the strongest evidence that people condemn plagiarism for reasons beyond perceived harm. We discuss how this work connects to broader questions of intellectual property and impression management. Copyright © 2017 Cognitive Science Society, Inc.

  11. Why do I always have the best ideas? The role of idea quality in unconscious plagiarism.

    Science.gov (United States)

    Perfect, Timothy J; Stark, Louisa-Jayne

    2008-05-01

    Groups of individuals often work together to generate solutions to a problem. Subsequently, one member of the group can plagiarise another either by recalling that person's idea as their own (recall-own plagiarism), or by generating a novel solution that duplicates a previous idea (generate-new plagiarism). The current study examines the extent to which these forms of plagiarism are influenced by the quality of the ideas. Groups of participants initially generated ideas, prior to an elaboration phase in which idea quality was manipulated in two ways: participants received feedback on the quality of the ideas as rated by independent judges, and they generated improvements to a subset of the ideas. Unconscious plagiarism was measured in recall-own and generate-new tasks. For recall, idea improvement led to increased plagiarism, while for the generate-new task, the independent ratings influenced plagiarism. These data indicate that different source-judgement processes underlie the two forms of plagiarism, neither of which can be reduced simply to memory strength.

  12. Some Techniques in Universal Source Coding and During for Composite Sources.

    Science.gov (United States)

    1981-12-01

    10. E. H. Gilberz, "Capacity of a burst-noise channel," 2ell l voil, l. 39, pp. 1253-1266, 1960. 11. L. D. Davisson , R. J. 14oEliece, "I. B. Pursley...1980. 21. D. ieuhoff, R. Gray, and L. Davisson , "Fixed rate universal source coding with a fidelity criterion," =- TraE sacion 2&fration Theory, vol...p . 34-95, 1930. 26 R. G. Galla&er, i Theor an Ri om iati n, Wiley, [ hNew York, 1968. 27. R. 14. Gray and L. D. Davisson , "Quantizer wisuatch," I TEi

  13. Plagiarism among undergraduate students in the Faculty of Applied Science at a South African Higher Education Institution

    Directory of Open Access Journals (Sweden)

    Mapule Patricia Sentleng

    2012-12-01

    Full Text Available The purpose of this study was to investigate plagiarism among undergraduate students at a higher education institution inSouth Africa. This study investigated the awareness and causes of plagiarism among undergraduate first, second and thirdyear students of the departments of Chemistry and Mathematical Technology within the Faculty of Applied Science at auniversity of technology. A quantitative research method was used. The results of the study confirm that studentplagiarism is fairly common. The study shows that 41% of undergraduate students think that plagiarism is very serious,but plagiarism is still being practised within these departments. It was also found that 71.9% of students admit to usingthe Internet to compile their assignments. This implies that the Internet is the most possible source of plagiarism.Students also used books and journal articles as possible sources to plagiarise.

  14. Neutron spallation source and the Dubna cascade code

    CERN Document Server

    Kumar, V; Goel, U; Barashenkov, V S

    2003-01-01

    Neutron multiplicity per incident proton, n/p, in collision of high energy proton beam with voluminous Pb and W targets has been estimated from the Dubna cascade code and compared with the available experimental data for the purpose of benchmarking of the code. Contributions of various atomic and nuclear processes for heat production and isotopic yield of secondary nuclei are also estimated to assess the heat and radioactivity conditions of the targets. Results obtained from the code show excellent agreement with the experimental data at beam energy, E < 1.2 GeV and differ maximum up to 25% at higher energy. (author)

  15. Plagiarism in Publications Using the Unpublished Raw Data of Archived Research.

    Science.gov (United States)

    Yahaghi, Javad; Beddu, Salmia Bnt; Muda, Zakaria Che

    2017-04-01

    It is obligatory to educate student researchers before they start their work by teaching them about the various types of plagiarism and how to avoid them. It is also vital that research supervisors take into account the sources of data that are explored in their students' manuscripts. This article tries to draw the reader's attention to the importance of avoiding all types of plagiarism in their research.

  16. Fostering academic competence or putting students under general suspicion? Voluntary plagiarism check of academic papers by means of a web-based plagiarism detection system

    Directory of Open Access Journals (Sweden)

    Kerstin Eleonora Kohl

    2011-02-01

    Full Text Available In view of the increasing number of cases of plagiarism and the ease of use of online published texts, universities are faced with a considerable challenge to prevent and take action against plagiarism in academic student papers. In reaction to plagiarism, web-based plagiarism detection systems (PDSs are increasingly used to check submitted papers - this checking entails various problems, for example the percentage of plagiarism found is only an indication of the actual extent of plagiarism and not all types of plagiarism can be identified. To cope with this problematic situation the voluntary plagiarism check (VPC, an alternative preventive university didactic concept, was developed at the University of Education, Freiburg (Germany. It focused on the development of individual skills. Students were able to submit their academic papers (e.g. an undergraduate paper, final thesis anonymously. These were then tested with the PDS Ephorus. Following interpretation and summary of the findings by the project team - plagiarism as well as referencing mistakes - we advised the students on a suitable approach to academic writing based on their own typical mistakes. The VPC was conducted as a three-semester research project and was later evaluated. About 500 academic papers were tested. In 90% of the undergraduates' work incorrect and/or missing citations were found. This high percentage decreased among students in later semesters. Instances of plagiarism were detected in about 40% of the papers when the texts of advanced students (≥6th semester were tested. At the same time the length of the plagiarised texts decreased. Around half of the students stated that it was acceptable to copy single sentences or short passages from other sources without citation; they did not consider plagiarising on a limited scale as cheating. A similar number of students admitted to having doubts about whether they could write a good paper without plagiarising. Almost all

  17. Plagiarism: What's the Big Deal?

    Science.gov (United States)

    Hansen, Brittney; Stith, Danica; Tesdell, Lee S.

    2011-01-01

    In academic culture, plagiarism is considered to be a form of cheating and therefore unethical. Understandably, instructors try to eliminate this kind of unethical behavior from their courses. But what if they designed their assignments and exams in such a way that students would find no reason to cheat? The authors think that it is possible, at…

  18. Plagiarism: Can It Be Stopped?

    Science.gov (United States)

    Christensen, G. Jay

    2011-01-01

    Plagiarism can be controlled, not stopped. The more appropriate question to ask is: What can be done to encourage students to "cheat" correctly by doing the assignment the way it was intended? Cheating by college students continues to reach epidemic proportions on selected campuses, as witnessed by the recent episode at Central Florida University,…

  19. Eu-NORSEWInD - Assessment of Viability of Open Source CFD Code for the Wind Industry

    DEFF Research Database (Denmark)

    Stickland, Matt; Scanlon, Tom; Fabre, Sylvie

    2009-01-01

    . The cost of the extra licences can become the limit on the final number of nodes employed. Whilst there are significant benefits to be found when using a commercial code which has a user friendly interface and has undergone significant verification testing the financial advantages of using an open source...... between the results of simulations created by the commercial code FLUENT and the open source code OpenFOAM. An assessment of the ease with which the open source code can be used is also included....

  20. Remodularizing Java Programs for Improved Locality of Feature Implementations in Source Code

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2011-01-01

    Explicit traceability between features and source code is known to help programmers to understand and modify programs during maintenance tasks. However, the complex relations between features and their implementations are not evident from the source code of object-oriented Java programs. Conseque...

  1. Using Source Code Metrics to Predict Change-Prone Java Interfaces

    NARCIS (Netherlands)

    Romano, D.; Pinzger, M.

    2011-01-01

    Recent empirical studies have investigated the use of source code metrics to predict the change- and defect-proneness of source code files and classes. While results showed strong correlations and good predictive power of these metrics, they do not distinguish between interface, abstract or concrete

  2. OSSMETER D3.2 – Report on Source Code Activity Metrics

    NARCIS (Netherlands)

    J.J. Vinju (Jurgen); A. Shahi (Ashim)

    2014-01-01

    htmlabstractThis deliverable is part of WP3: Source Code Quality and Activity Analysis. It provides descriptions and initial prototypes of the tools that are needed for source code activity analysis. It builds upon the Deliverable 3.1 where infra-structure and a domain analysis have been

  3. How Australian and Indonesian Universities Treat Plagiarism: a Comparative Study

    OpenAIRE

    Cahyono, Bambang Yudi

    2005-01-01

    This article is a part of a larger study comparing various aspects of policies on plagiarism in two university contexts. It compares policies on plagiarism in universities in Australia and Indonesia. The results of this comparative study showed that Australian and Indonesian universities treat plagiarism differently. Australian universities treat plagiarism explicitly in their university policies. In Australian universities, plagiarism is defined clearly and forms of plagiarism are explained ...

  4. How Australian and Indonesian Universities Treat Plagiarism: A Comparative Study

    OpenAIRE

    Bambang Yudi Cahyono

    2016-01-01

    This article is a part of a larger study comparing various aspects of policies on plagiarism in two university contexts. It compares policies on plagiarism in universities in Australia and Indonesia. The results of this comparative study showed that Australian and Indonesian universities treat plagiarism differently. Australian universities treat plagiarism explicitly in their university policies. In Australian universities, plagiarism is defined clearly and forms of plagiarism are explained ...

  5. Plagiarism, Cheating and Research Integrity: Case Studies from a Masters Program in Peru

    Science.gov (United States)

    Carnero, Andres M.; Mayta-Tristan, Percy; Konda, Kelika A.; Mezones-Holguin, Edward; Bernabe-Ortiz, Antonio; Alvarado, German F.; Canelo-Aybar, Carlos; Maguiña, Jorge L.; Segura, Eddy R.; Quispe, Antonio M.; Smith, Edward S.; Bayer, Angela M.; Lescano, Andres G.

    2017-01-01

    Plagiarism is a serious, yet widespread type of research misconduct, and is often neglected in developing countries. Despite its far-reaching implications, plagiarism is poorly acknowledged and discussed in the academic setting, and insufficient evidence exists in Latin America and developing countries to inform the development of preventive strategies. In this context, we present a longitudinal case study of seven instances of plagiarism and cheating arising in four consecutive classes (2011–2014) of an Epidemiology Masters program in Lima, Peru, and describes the implementation and outcomes of a multifaceted, “zero-tolerance” policy aimed at introducing research integrity. Two cases involved cheating in graded assignments, and five cases correspond to plagiarism in the thesis protocol. Cases revealed poor awareness of high tolerance to plagiarism, poor academic performance, and widespread writing deficiencies, compensated with patchwriting and copy-pasting. Depending on the events’ severity, penalties included course failure (6/7) and separation from the program (3/7). Students at fault did not engage in further plagiarism. Between 2011 and 2013, the Masters program sequentially introduced a preventive policy consisting of: (i) intensified research integrity and scientific writing education, (ii) a stepwise, cumulative writing process; (iii) honor codes; (iv) active search for plagiarism in all academic products; and (v) a “zero-tolerance” policy in response to documented cases. No cases were detected in 2014. In conclusion, plagiarism seems to be widespread in resource-limited settings and a greater response with educational and zero-tolerance components is needed to prevent it. PMID:27848191

  6. Investigating Plagiarism: the Form and the Motivation in Performing Plagiarism in High Education

    OpenAIRE

    Sariffuddin, S; Astuti, Khristiana Dwi; Arthur, Riyan

    2017-01-01

    The rapid development of information technology, especially the Internet is pointed out to be factor driving the student to practice plagiarism. Prevention efforts continue to be made both from government policies and stakeholder by creating software anti-plagiarism. However, in the reality the practice of plagiarism re-mains common and relatively more widespread. This practice continues to be varied, so that we need to up-date the information and findings through investigations plagiarism pr...

  7. Neutron spallation source and the Dubna Cascade Code

    Indian Academy of Sciences (India)

    into a stationary state sometimes emitting several nucleons. At the third and the last stage the excited residual nucleus decays by competitive successive evaporation of nucleons, fission and emission of γ-quanta. Dubna Cascade Code [4] developed for the purpose of mathematical modeling of ADSS allows one to estimate ...

  8. Multicode comparison of selected source-term computer codes

    Energy Technology Data Exchange (ETDEWEB)

    Hermann, O.W.; Parks, C.V.; Renier, J.P.; Roddy, J.W.; Ashline, R.C.; Wilson, W.B.; LaBauve, R.J.

    1989-04-01

    This report summarizes the results of a study to assess the predictive capabilities of three radionuclide inventory/depletion computer codes, ORIGEN2, ORIGEN-S, and CINDER-2. The task was accomplished through a series of comparisons of their output for several light-water reactor (LWR) models (i.e., verification). Of the five cases chosen, two modeled typical boiling-water reactors (BWR) at burnups of 27.5 and 40 GWd/MTU and two represented typical pressurized-water reactors (PWR) at burnups of 33 and 50 GWd/MTU. In the fifth case, identical input data were used for each of the codes to examine the results of decay only and to show differences in nuclear decay constants and decay heat rates. Comparisons were made for several different characteristics (mass, radioactivity, and decay heat rate) for 52 radionuclides and for nine decay periods ranging from 30 d to 10,000 years. Only fission products and actinides were considered. The results are presented in comparative-ratio tables for each of the characteristics, decay periods, and cases. A brief summary description of each of the codes has been included. Of the more than 21,000 individual comparisons made for the three codes (taken two at a time), nearly half (45%) agreed to within 1%, and an additional 17% fell within the range of 1 to 5%. Approximately 8% of the comparison results disagreed by more than 30%. However, relatively good agreement was obtained for most of the radionuclides that are expected to contribute the greatest impact to waste disposal. Even though some defects have been noted, each of the codes in the comparison appears to produce respectable results. 12 figs., 12 tabs.

  9. Does the Adoption of Plagiarism-Detection Software in Higher Education Reduce Plagiarism?

    Science.gov (United States)

    Youmans, Robert J.

    2011-01-01

    In two studies, students at California State University, Northridge wrote papers that were checked for plagiarism using plagiarism-detection software. In the first study, half of the students in two classes were randomly selected and told by the professor that their term papers would be scanned for plagiarism using the software. Students in the…

  10. Penguins and Plagiarism: Stemming the Tide of Plagiarism in Elementary School

    Science.gov (United States)

    Mitchell, Sara

    2007-01-01

    Plagiarism is on the rise on high school and college campuses. There are many reasons why students tend to plagiarize. One of these is that many students are interested in the shortest possible route through a course. Some students also fear that their writing ability is inadequate. If student plagiarism and lack of academic integrity are…

  11. JOURNAL CLUB: Plagiarism in Manuscripts Submitted to the AJR: Development of an Optimal Screening Algorithm and Management Pathways.

    Science.gov (United States)

    Taylor, Donna B

    2017-04-01

    The objective of this study was to investigate the incidence of plagiarism in a sample of manuscripts submitted to the AJR using CrossCheck, develop an algorithm to identify significant plagiarism, and formulate management pathways. A sample of 110 of 1610 (6.8%) manuscripts submitted to AJR in 2014 in the categories of Original Research or Review were analyzed using CrossCheck and manual assessment. The overall similarity index (OSI), highest similarity score from a single source, whether duplication was from single or multiple origins, journal section, and presence or absence of referencing the source were recorded. The criteria outlined by the International Committee of Medical Journal Editors were the reference standard for identifying manuscripts containing plagiarism. Statistical analysis was used to develop a screening algorithm to maximize sensitivity and specificity for the detection of plagiarism. Criteria for defining the severity of plagiarism and management pathways based on the severity of the plagiarism were determined. Twelve manuscripts (10.9%) contained plagiarism. Nine had an OSI excluding quotations and references of less than 20%. In seven, the highest similarity score from a single source was less than 10%. The highest similarity score from a single source was the work of the same author or authors in nine. Common sections for duplication were the Materials and Methods, Discussion, and abstract. Referencing the original source was lacking in 11. Plagiarism was undetected at submission in five of these 12 articles; two had been accepted for publication. The most effective screening algorithm was to average the OSI including quotations and references and the highest similarity score from a single source and to submit manuscripts with an average value of more than 12% for further review. The current methods for detecting plagiarism are suboptimal. A new screening algorithm is proposed.

  12. Plagiarism--an act of stealing.

    Science.gov (United States)

    Vogelsang, J

    1997-12-01

    Plagiarism is one of those ethical issues no one wants to talk about. This article sets the stage for educating readers, authors, and researchers in the fundamentals of scholarship. Legal ramifications for professional theft, deception, and misconduct provide information regarding the perpetration, constituents, and aftermath of the act of plagiarism. The article then communicates a shift in thinking about the deviation from ethical standards and strategies for the prevention of the ethical issue. Plagiarism can be prevented.

  13. To question of determination of the plagiarism

    OpenAIRE

    Грабовська, Ганна; Зуєва, Вікторія

    2016-01-01

    The article is dedicated to the question of decision of plagiarism in the Ukrainian legislation. Authors are investigating various approaches that can expose essence of this type of copyright infringement. In the article summarized existent problem moments of decision of plagiarism, and specification of forms and methods of his exposure in the text of the scientific work. English abstract A. Grabovska, V. Zueva To question of determination of the plagiarism The article is devoted to the def...

  14. Plagiarism In English Language Theses In Indonesia

    Directory of Open Access Journals (Sweden)

    Like Raskova Octaberlina

    2016-02-01

    Full Text Available This article argues that plagiarism in Indonesia exists due to some reasons. The reasons range from the requirements on the part of the students to adhere to uniformity in terms of thesis format to failure on the part of the government to effectively enforce a regulation dealing with plagiarism. Anecdotal observations as a student in one Indonesian university will give color to the discussion throughout this article. A recommendation to subdue plagiarism in Indonesia will conclude the article.

  15. Three-Level Delta Modulation for Laplacian Source Coding

    Directory of Open Access Journals (Sweden)

    DENIC, B.

    2017-02-01

    Full Text Available This paper proposes a novel solution for coding of time varying signals with Laplacian distribution, which is based on delta modulation and three-level quantization. It upgrades the conventional scheme by introducing the quantizer with variable length code. Forward adaptive scheme is used, where the adaptation to the signal variance is performed on frame-by-frame basis. We employ configurations with simple fixed first-order predictor and switched first-order predictor utilizing correlation. Furthermore, we propose different methods for optimizing predictor coefficients. The configurations are tested on speech signal and compared to an adaptive two-level and four-level delta modulation, showing that proposed three-level delta modulation offers performance comparable to a four-level baseline with significant savings in bit rate.

  16. Open Genetic Code : On open source in the life sciences

    NARCIS (Netherlands)

    Deibel, E.

    2014-01-01

    The introduction of open source in the life sciences is increasingly being suggested as an alternative to patenting. This is an alternative, however, that takes its shape at the intersection of the life sciences and informatics. Numerous examples can be identified wherein open source in the life

  17. Plagiarism challenges at Ukrainian science and education

    Directory of Open Access Journals (Sweden)

    Denys Svyrydenko

    2016-12-01

    Full Text Available The article analyzes the types and severity of plagiarism violations at the modern educational and scientific spheres using the philosophic methodological approaches. The author analyzes Ukrainian context as well as global one and tries to formulate "order of the day" of plagiarism challenges. The plagiarism phenomenon is intuitively comprehensible for academicians but in reality it has a very complex nature and a lot of manifestation. Using approaches of ethics, philosophical anthropology, philosophy of science and education author formulates the series of recommendation for overcoming of plagiarism challenges at Ukrainian science and education.

  18. How Australian and Indonesian Universities Treat Plagiarism: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Bambang Yudi Cahyono

    2016-02-01

    Full Text Available This article is a part of a larger study comparing various aspects of policies on plagiarism in two university contexts. It compares policies on plagiarism in universities in Australia and Indonesia. The results of this comparative study showed that Australian and Indonesian universities treat plagiarism differently. Australian universities treat plagiarism explicitly in their university policies. In Australian universities, plagiarism is defined clearly and forms of plagiarism are explained thoroughly, policies on plagiarism are informed to all university academic members, and there are mechanisms to manage cases related to plagiarism. In contrast, not all Indonesian universities treat plagiarism directly. Some universities depend on religious morality and academic ethics in dealing with plagiarism. Accordingly, this article recommends the explicit treatment of plagiarism in Indonesian universities.

  19. Open Genetic Code: on open source in the life sciences.

    Science.gov (United States)

    Deibel, Eric

    2014-01-01

    The introduction of open source in the life sciences is increasingly being suggested as an alternative to patenting. This is an alternative, however, that takes its shape at the intersection of the life sciences and informatics. Numerous examples can be identified wherein open source in the life sciences refers to access, sharing and collaboration as informatic practices. This includes open source as an experimental model and as a more sophisticated approach of genetic engineering. The first section discusses the greater flexibly in regard of patenting and the relationship to the introduction of open source in the life sciences. The main argument is that the ownership of knowledge in the life sciences should be reconsidered in the context of the centrality of DNA in informatic formats. This is illustrated by discussing a range of examples of open source models. The second part focuses on open source in synthetic biology as exemplary for the re-materialization of information into food, energy, medicine and so forth. The paper ends by raising the question whether another kind of alternative might be possible: one that looks at open source as a model for an alternative to the commodification of life that is understood as an attempt to comprehensively remove the restrictions from the usage of DNA in any of its formats.

  20. Source Term Code Package: a user's guide (Mod 1)

    Energy Technology Data Exchange (ETDEWEB)

    Gieseke, J.A.; Cybulskis, P.; Jordan, H.; Lee, K.W.; Schumacher, P.M.; Curtis, L.A.; Wooton, R.O.; Quayle, S.F.; Kogan, V.

    1986-07-01

    As part of a major reassessment of the release of radioactive materials to the environment (source terms) in severe reactor accidents, a group of state-of-the-art computer codes was utilized to perform extensive analyses. A major product of this source term reassessment effort was a demonstrated methodology for analyzing specific accident situations to provide source term predictions. The computer codes forming this methodology have been upgraded and modified for release and further use. This system of codes has been named the Source Term Code Package (STCP) and is the subject of this user's guide. The guide is intended to provide an understanding of the STCP structure and to facilitate STCP use. The STCP was prepared for operation on a CDC system but is written in FORTRAN-77 to permit transportability. In the current version (Mod 1) of the STCP, the various calculational elements fall into four major categories represented by the codes MARCH3, TRAP-MELT3, VANESA, and NAUA/SPARC/ICEDF. The MARCH3 code is a combination of the MARCH2, CORSOR-M, and CORCON-Mod 2 codes. The TRAP-MELT3 code is a combination of the TRAP-MELT2.0 and MERGE codes.

  1. Beyond Trust: Plagiarism and Truth.

    Science.gov (United States)

    Penders, Bart

    2017-12-12

    Academic misconduct distorts the relationship between scientific practice and the knowledge it produces. The relationship between science and the knowledge it produces is, however, not something universally agreed upon. In this paper I will critically discuss the moral status of an act of research misconduct, namely plagiarism, in the context of different epistemological positions. While from a positivist view of science, plagiarism only influences trust in science but not the content of the scientific corpus, from a constructivist point of view both are at stake. Consequently, I argue that discussions of research misconduct and responsible research ought to be explicitly informed by the authors' views on the relationship between science and the knowledge it produces.

  2. Guidelines on What Constitutes Plagiarism and Electronic Tools to Detect it.

    Science.gov (United States)

    Luksanapruksa, Panya; Millhouse, Paul W

    2016-04-01

    Plagiarism is a serious ethical problem among scientific publications. There are various definitions of plagiarism, and the major categories include unintentional (unsuitable paraphrasing or improper citations) and intentional. Intentional plagiarism includes mosaic plagiarism, plagiarism of ideas, plagiarism of text, and self-plagiarism. There are many Web sites and software packages that claim to detect plagiarism effectively. A violation of plagiarism laws can lead to serious consequences including author banning, loss of professional reputation, termination of a position, and even legal action.

  3. Investigating Plagiarism: The Form and The Motivation in Performing Plagiarism in High Education

    Directory of Open Access Journals (Sweden)

    S Sariffuddin

    2017-05-01

    Full Text Available The rapid development of information technology, especially the Internet is pointed out to be factor driving the student to practice plagiarism. Prevention efforts continue to be made both from government policies and stakeholder by creating software anti-plagiarism. However, in the reality the practice of plagiarism re-mains common and relatively more widespread. This practice continues to be varied, so that we need to up-date the information and findings through investigations plagiarism practices in student assign-ments. The method used was a mixed-method approach or mix of quantitative and quali-tative approaches. A quantitative approach was done by using software turnitin.com to scan for plagiarism indication of the level of student assignment in common. To study the behavior of plagiarism, the interview process was also done informally to students who commit high plagiarism. The results showed that the pattern of students’ plagiarism consists of five forms: sham paraphrasing, illicit paraphrasing, other plagiarism, copying verbatim and purloining. Illicit paraphrasing practices are a form of copy-paste literature review and did not pay attention to the bibliography. Besides, the practice of plagiarism is closely associated with low academic writing knowledge. Therefore, the practice of plagiarism should not only be viewed from the perspective of the academic violations, but also from the other perspectives.

  4. Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model

    Directory of Open Access Journals (Sweden)

    Salha M. Alzahrani

    2015-07-01

    Full Text Available Highly obfuscated plagiarism cases contain unseen and obfuscated texts, which pose difficulties when using existing plagiarism detection methods. A fuzzy semantic-based similarity model for uncovering obfuscated plagiarism is presented and compared with five state-of-the-art baselines. Semantic relatedness between words is studied based on the part-of-speech (POS tags and WordNet-based similarity measures. Fuzzy-based rules are introduced to assess the semantic distance between source and suspicious texts of short lengths, which implement the semantic relatedness between words as a membership function to a fuzzy set. In order to minimize the number of false positives and false negatives, a learning method that combines a permission threshold and a variation threshold is used to decide true plagiarism cases. The proposed model and the baselines are evaluated on 99,033 ground-truth annotated cases extracted from different datasets, including 11,621 (11.7% handmade paraphrases, 54,815 (55.4% artificial plagiarism cases, and 32,578 (32.9% plagiarism-free cases. We conduct extensive experimental verifications, including the study of the effects of different segmentations schemes and parameter settings. Results are assessed using precision, recall, F-measure and granularity on stratified 10-fold cross-validation data. The statistical analysis using paired t-tests shows that the proposed approach is statistically significant in comparison with the baselines, which demonstrates the competence of fuzzy semantic-based model to detect plagiarism cases beyond the literal plagiarism. Additionally, the analysis of variance (ANOVA statistical test shows the effectiveness of different segmentation schemes used with the proposed approach.

  5. Measuring students' perceptions of plagiarism: modification and Rasch validation of a plagiarism attitude scale.

    Science.gov (United States)

    Howard, Steven J; Ehrich, John F; Walton, Russell

    2014-01-01

    Plagiarism is a significant area of concern in higher education, given university students' high self-reported rates of plagiarism. However, research remains inconsistent in prevalence estimates and suggested precursors of plagiarism. This may be a function of the unclear psychometric properties of the measurement tools adopted. To investigate this, we modified an existing plagiarism scale (to broaden its scope), established its psychometric properties using traditional (EFA, Cronbach's alpha) and modern (Rasch analysis) survey evaluation approaches, and examined results of well-functioning items. Results indicated that traditional and modern psychometric approaches differed in their recommendations. Further, responses indicated that although most respondents acknowledged the seriousness of plagiarism, these attitudes were neither unanimous nor consistent across the range of issues assessed. This study thus provides rigorous psychometric testing of a plagiarism attitude scale and baseline data from which to begin a discussion of contextual, personal, and external factors that influence students' plagiarism attitudes.

  6. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Daehee Kim

    2016-07-01

    Full Text Available Code dissemination in wireless sensor networks (WSNs is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.

  7. PENGECEKAN PLAGIARISME PADA CODE DALAM BAHASA C++

    Directory of Open Access Journals (Sweden)

    Liliana .

    2012-01-01

    Full Text Available Informatics department of Petra Christian University has used to practice programming for students at programming studio, especially students who take algorithms and programming course. The system is currently implemented is to provide practice programming skill according to their ability. Assessment is done by calculating the points of all questions are done correctly. Problem which occurs at about the work in programming studio is plagiarism among students’ work. Unfortunately, plagiarism checking consumes a lot of time. In one semester, each student can do about 100 questions. If the total of students taking programming course, at least 100 people, we need many people to do this work. Departing from this problem, we design and develop an application to check for plagiarism between two different answer files from the same question. The degree of similarity is calculated using combined method of Jaccard similarity coefficient and cosine similarity coefficient. This system is able to check similarities in source code files are the work of students with moderate levels of complexity.

  8. Building guide : how to build Xyce from source code.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric Richard; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Mei, Ting; Verley, Jason C.

    2013-08-01

    While Xyce uses the Autoconf and Automake system to configure builds, it is often necessary to perform more than the customary %E2%80%9C./configure%E2%80%9D builds many open source users have come to expect. This document describes the steps needed to get Xyce built on a number of common platforms.

  9. Experiences of experts about the instances of plagiarism.

    Science.gov (United States)

    Keyvanara, Mahmod; Ojaghi, Rezvan; Sohrabi, Mozafar Cheshmeh; Papi, Ahmad

    2013-01-01

    Plagiarism is defined as intentional deceiving or lack of honesty, which deprives others from both material and spiritual possessions. Ethics is considered as one of the most important aspects of evaluating the quality of higher education. Moreover, scientific ethics should be reflected from university values, as a specialized institution, rather than being a reflection of the others cares. Therefore, the main aim of the present study is explore of expert experiences about plagiarism in Isfahan University of Medical Sciences. This study employed qualitative method with using in-deep interview. The research participants consisted of 21, who tend to this work. Semi structure interview were conducted and recorded. The method of analyzing data was 'thematic analysis'. The data were transcribed and saved on computer after each interview. Themes and sub-themes were extracted. Finally, relevant sub-themes were arranged in a category and suggested were presented. Analyzing data showed 600 primary codes, 40 sub-themes and 6 themes. The main themes included repeated works, non-normative adoption, non-normative adaptation, shares distribution, forging, and profit-seeking, each of which consisted of one or several subgroups. The findings of this study show that since, there are numerous ways of cheating, the universities' research committees must create institutions in order to educate the individuals how to avoid plagiarism. In addition, providing information about different types of scientific violations, as well as their following punishments might lead to the decrease of such misbehaviors.

  10. Experiences of experts about the instances of plagiarism

    Science.gov (United States)

    Keyvanara, Mahmod; Ojaghi, Rezvan; Sohrabi, Mozafar Cheshmeh; Papi, Ahmad

    2013-01-01

    Introduction: Plagiarism is defined as intentional deceiving or lack of honesty, which deprives others from both material and spiritual possessions. Ethics is considered as one of the most important aspects of evaluating the quality of higher education. Moreover, scientific ethics should be reflected from university values, as a specialized institution, rather than being a reflection of the others cares. Therefore, the main aim of the present study is explore of expert experiences about plagiarism in Isfahan University of Medical Sciences. Materials and Methods: This study employed qualitative method with using in-deep interview. The research participants consisted of 21, who tend to this work. Semi structure interview were conducted and recorded. The method of analyzing data was ‘thematic analysis’. The data were transcribed and saved on computer after each interview. Themes and sub-themes were extracted. Finally, relevant sub-themes were arranged in a category and suggested were presented. Result: Analyzing data showed 600 primary codes, 40 sub-themes and 6 themes. The main themes included repeated works, non-normative adoption, non-normative adaptation, shares distribution, forging, and profit-seeking, each of which consisted of one or several subgroups. Conclusion: The findings of this study show that since, there are numerous ways of cheating, the universities’ research committees must create institutions in order to educate the individuals how to avoid plagiarism. In addition, providing information about different types of scientific violations, as well as their following punishments might lead to the decrease of such misbehaviors. PMID:24083282

  11. Judging Plagiarism: A Problem of Morality and Convention

    Science.gov (United States)

    East, Julianne

    2010-01-01

    This paper considers the problem of plagiarism as an issue of morality. Outrage about student plagiarism in universities positions it as dishonesty and a transgression of standards. Despite this, there has been little work analysing the implications of positioning plagiarism as a moral matter in the making of judgments about plagiarism and…

  12. Online Plagiarism Training Falls Short in Biology Classrooms

    Science.gov (United States)

    Holt, Emily A.; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework…

  13. Rapid assessment of assignments using plagiarism detection software.

    Science.gov (United States)

    Bischoff, Whitney R; Abrego, Patricia C

    2011-01-01

    Faculty members most often use plagiarism detection software to detect portions of students' written work that have been copied and/or not attributed to their authors. The rise in plagiarism has led to a parallel rise in software products designed to detect plagiarism. Some of these products are configurable for rapid assessment and teaching, as well as for plagiarism detection.

  14. Design a Persian Automated Plagiarism Detector (AMZPPD)

    OpenAIRE

    Mahmoodi, Maryam; Varnamkhasti, Mohammad Mahmoodi

    2014-01-01

    Currently there are lots of plagiarism detection approaches. But few of them implemented and adapted for Persian languages. In this paper, our work on designing and implementation of a plagiarism detection system based on pre-processing and NLP technics will be described. And the results of testing on a corpus will be presented.

  15. Plagiarisms, Authorships, and the Academic Death Penalty.

    Science.gov (United States)

    Howard, Rebecca Moore

    1995-01-01

    Suggests a plagiarism policy that would respect present concerns and discipline but would allow for an enlarged range of definitions of and motivations for plagiarism. Brings to bear contemporary theoretical approaches that take issue with authoring as an autonomous, individual, original act. (TB)

  16. Automatic Student Plagiarism Detection: Future Perspectives

    Science.gov (United States)

    Mozgovoy, Maxim; Kakkonen, Tuomo; Cosma, Georgina

    2010-01-01

    The availability and use of computers in teaching has seen an increase in the rate of plagiarism among students because of the wide availability of electronic texts online. While computer tools that have appeared in recent years are capable of detecting simple forms of plagiarism, such as copy-paste, a number of recent research studies devoted to…

  17. Analyzing and reducing plagiarism at university

    Directory of Open Access Journals (Sweden)

    Jorge López Puga

    2014-12-01

    Full Text Available Plagiarism is one of the less desirable practises in the academic context. This paper presents an experience of massive plagiarism detection at university and the steps taken to prevent its subsequent occurrence. Plagiarism was detected in the first assessment phase of a research project practise. As a result, students were required to arrange ethical group discussions with the professor to prevent plagiarism in the future. A substantial reduction in the rate of plagiarism was observed from the first practical assessment to the second one, t(16=2.5, p=.02, d=0.83, 1-?=.63, unilateral contrast. Additionally, a survey was developed to analyse students’ opinions and attitudes about plagiarism. A sample of 64 students (15 boys and 49 girls with an average age of 22.69 (SD=2.8 filled in an electronic questionnaire. More than a half of the sample (56.92% admitted that they had plagiarised before but most of the students (83.08% agreed they would not like someone else plagiarising their reports. A preliminary short scale to measure attitude towards plagiarism in undergraduate students at university is provided. Finally, a set of recommendations are given based on this experience to prevent and to reduce the level of plagiarism in the university contex.

  18. Chinese University EFL Teachers' Perceptions of Plagiarism

    Science.gov (United States)

    Lei, Jun; Hu, Guangwei

    2015-01-01

    Although Chinese university students' perceptions of plagiarism have been extensively investigated, those of their teachers have been surprisingly under-researched. This study sought to address this gap by investigating 112 Chinese university English teachers' knowledge of and attitudes towards plagiarism. While 57 participating teachers had…

  19. Exploring Reflective Means to Handle Plagiarism

    Science.gov (United States)

    Dalal, Nikunj

    2016-01-01

    Plagiarism has become widespread in the university teaching environment. This article presents practical wisdom from several years of experience handling plagiarism in two Information Systems (IS) courses with the exploratory use of reflective means such as dialogues and essays. There has been very little work on the use of reflective approaches…

  20. Evaluating Students' Plagiarism in Higher Education Institutions ...

    African Journals Online (AJOL)

    Plagiarism is a threat to students' empowerment in higher education in a knowledge economy. In this paper the phenomenon of students' plagiarism in higher education institutions and how it disempowers the advancement of global knowledge by students, are discussed. The paper begins with a description of the meaning ...

  1. Viewpoint of Undergraduate Engineering Students on Plagiarism

    Science.gov (United States)

    Starovoytova, Diana; Namango, Saul Sitati

    2016-01-01

    Undoubtedly, plagiarism has been a global concern, especially so, in institutions of higher learning. Furthermore, over the past decades, cases of student plagiarism, in higher education, have increased, substantially. This issue cannot be taken, without due consideration, and it is crucial for educators, and universities, at large, to find the…

  2. Plagiarism in Second-Language Writing

    Science.gov (United States)

    Pecorari, Diane; Petric, Bojana

    2014-01-01

    Plagiarism is a broad and multidisciplinary field of study, and within second-language (L2) writing, research on the topic goes back to the mid-1980s. In this review article we first discuss the received view of plagiarism as a transgressive act and alternative understandings which have been presented in the L1 and L2 writing literature. We then…

  3. False feathers a perspective on academic plagiarism

    CERN Document Server

    Weber-Wulff, Debora

    2014-01-01

    With plagiarism a growing problem on university campuses, this book explains a range of strategies to identify instances of the offence. Written by an activist in the VroniPlag Wiki group, it shows how members find and document plagiarism in dissertations.

  4. Exploring Staff Perceptions of Student Plagiarism

    Science.gov (United States)

    Flint, Abbi; Clegg, Sue; Macdonald, Ranald

    2006-01-01

    This paper presents analysis of qualitative data from a research project looking at staff perceptions of plagiarism at a post-1992 university. Twenty-six members of staff from departments and academic schools from across the university took part in open and semi-structured interviews. Analysis shows that variable definitions of plagiarism exist;…

  5. Open-Source Development of the Petascale Reactive Flow and Transport Code PFLOTRAN

    Science.gov (United States)

    Hammond, G. E.; Andre, B.; Bisht, G.; Johnson, T.; Karra, S.; Lichtner, P. C.; Mills, R. T.

    2013-12-01

    Open-source software development has become increasingly popular in recent years. Open-source encourages collaborative and transparent software development and promotes unlimited free redistribution of source code to the public. Open-source development is good for science as it reveals implementation details that are critical to scientific reproducibility, but generally excluded from journal publications. In addition, research funds that would have been spent on licensing fees can be redirected to code development that benefits more scientists. In 2006, the developers of PFLOTRAN open-sourced their code under the U.S. Department of Energy SciDAC-II program. Since that time, the code has gained popularity among code developers and users from around the world seeking to employ PFLOTRAN to simulate thermal, hydraulic, mechanical and biogeochemical processes in the Earth's surface/subsurface environment. PFLOTRAN is a massively-parallel subsurface reactive multiphase flow and transport simulator designed from the ground up to run efficiently on computing platforms ranging from the laptop to leadership-class supercomputers, all from a single code base. The code employs domain decomposition for parallelism and is founded upon the well-established and open-source parallel PETSc and HDF5 frameworks. PFLOTRAN leverages modern Fortran (i.e. Fortran 2003-2008) in its extensible object-oriented design. The use of this progressive, yet domain-friendly programming language has greatly facilitated collaboration in the code's software development. Over the past year, PFLOTRAN's top-level data structures were refactored as Fortran classes (i.e. extendible derived types) to improve the flexibility of the code, ease the addition of new process models, and enable coupling to external simulators. For instance, PFLOTRAN has been coupled to the parallel electrical resistivity tomography code E4D to enable hydrogeophysical inversion while the same code base can be used as a third

  6. IDENTIFYING DOCUMENT-LEVEL TEXT PLAGIARISM: A TWO-PHASE APPROACH

    Directory of Open Access Journals (Sweden)

    VANI K.

    2017-12-01

    Full Text Available The rapid evolution of information content and its ease of access have made the field of research and academia so vulnerable to plagiarism. Plagiarism is an act of intellectual theft and information breach which must be restricted to ensure educational integrity. Usually in plagiarism checking, exhaustive document comparisons with large repositories and databases have to be done. The paper presents a two phase document retrieval approach which can effectively reduce the search space for plagiarism detection task. An initial heuristic retrieval process is carried out before the actual exhaustive analysis to retrieve the globally similar documents or the near duplicates corresponding to the suspected document. The work proposes a two phase candidate retrieval approach for an offline plagiarism detection system that can identify the plagiarized sources having different complexity levels. This means that we already have the source document data base offline and hence the work is not focusing on online source retrieval. It explores and integrates the prospective aspects of document ranking approaches with vector space model in first phase and N-gram models in second phase for candidate refinement stage. The proposed approach is evaluated on the standard plagiarism corpus provided by PAN-14 text alignment data set and the efficiency is analyzed using the standard IR measures, viz., precision, recall and F1-score. Comparison is done with the vector space model and N-gram models to analyse the performance efficiency. Further statistical analysis is done using paired t-test with means of F1-scores of these techniques over the samples extracted from the PAN-14 set. Experimental results show that the proposed two phase candidate selection approach outperforms the compared models specifically when it comes to comparison and retrieval of complex and manipulated text.

  7. Derivation and implementation of the three-region problem in the SOURCES code system

    Energy Technology Data Exchange (ETDEWEB)

    Charlton, William S.; Perry, Robert T.; Estes, Guy P. [Los Alamos National Laboratory, NM (United States); Parish, Theodore A. [Dept. of Nuclear Engineering, Texas A and M Univ., College Station, TX (United States)

    2000-03-01

    The SOURCES code system was designed to calculate neutron production rates and spectra in materials due to the decay of radionuclides [specifically from ({alpha},n) reactions, spontaneous fission, and delayed neutron emission]. The current version (SOURCES-3A) is capable of calculating ({alpha},n) source rates and spectra for three types of problems: homogeneous materials, interface problems, and beam problems. Recent interest in ({alpha},n) sources has prompted the development of a fourth scenario: the three-region problem. To allow SOURCES to confront this problem, the relevant equations defining the {alpha}-particle source rates and spectra at each interface and the neutron source rates and spectra per unit area of interface were derived. These equations (in discretized form) were added as a new subroutine to the SOURCES code system (dubbed SOURCES-4A). The new code system was tested by analyzing the results for a simple three-region problem in two limits: with an optically thin 'intermediate region' and with an optically thick 'intermediate region.' To further validate the code system, SOURCES-4A will be experimentally benchmarked as measured data becomes available. (author)

  8. The challenges for scientists in avoiding plagiarism.

    Science.gov (United States)

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required.

  9. An Efficient SF-ISF Approach for the Slepian-Wolf Source Coding Problem

    Directory of Open Access Journals (Sweden)

    Tu Zhenyu

    2005-01-01

    Full Text Available A simple but powerful scheme exploiting the binning concept for asymmetric lossless distributed source coding is proposed. The novelty in the proposed scheme is the introduction of a syndrome former (SF in the source encoder and an inverse syndrome former (ISF in the source decoder to efficiently exploit an existing linear channel code without the need to modify the code structure or the decoding strategy. For most channel codes, the construction of SF-ISF pairs is a light task. For parallelly and serially concatenated codes and particularly parallel and serial turbo codes where this appear less obvious, an efficient way for constructing linear complexity SF-ISF pairs is demonstrated. It is shown that the proposed SF-ISF approach is simple, provenly optimal, and generally applicable to any linear channel code. Simulation using conventional and asymmetric turbo codes demonstrates a compression rate that is only 0.06 bit/symbol from the theoretical limit, which is among the best results reported so far.

  10. Evaluating Open-Source Full-Text Search Engines for Matching ICD-10 Codes.

    Science.gov (United States)

    Jurcău, Daniel-Alexandru; Stoicu-Tivadar, Vasile

    2016-01-01

    This research presents the results of evaluating multiple free, open-source engines on matching ICD-10 diagnostic codes via full-text searches. The study investigates what it takes to get an accurate match when searching for a specific diagnostic code. For each code the evaluation starts by extracting the words that make up its text and continues with building full-text search queries from the combinations of these words. The queries are then run against all the ICD-10 codes until a match indicates the code in question as a match with the highest relative score. This method identifies the minimum number of words that must be provided in order for the search engines choose the desired entry. The engines analyzed include a popular Java-based full-text search engine, a lightweight engine written in JavaScript which can even execute on the user's browser, and two popular open-source relational database management systems.

  11. Comparison of DT neutron production codes MCUNED, ENEA-JSI source subroutine and DDT

    Energy Technology Data Exchange (ETDEWEB)

    Čufar, Aljaž, E-mail: aljaz.cufar@ijs.si [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia); Lengar, Igor; Kodeli, Ivan [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia); Milocco, Alberto [Culham Centre for Fusion Energy, Culham Science Centre, Abingdon, OX14 3DB (United Kingdom); Sauvan, Patrick [Departamento de Ingeniería Energética, E.T.S. Ingenieros Industriales, UNED, C/Juan del Rosal 12, 28040 Madrid (Spain); Conroy, Sean [VR Association, Uppsala University, Department of Physics and Astronomy, PO Box 516, SE-75120 Uppsala (Sweden); Snoj, Luka [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia)

    2016-11-01

    Highlights: • Results of three codes capable of simulating the accelerator based DT neutron generators were compared on a simple model where only a thin target made of mixture of titanium and tritium is present. Two typical deuteron beam energies, 100 keV and 250 keV, were used in the comparison. • Comparisons of the angular dependence of the total neutron flux and spectrum as well as the neutron spectrum of all the neutrons emitted from the target show general agreement of the results but also some noticeable differences. • A comparison of figures of merit of the calculations using different codes showed that the computational time necessary to achieve the same statistical uncertainty can vary for more than 30× when different codes for the simulation of the DT neutron generator are used. - Abstract: As the DT fusion reaction produces neutrons with energies significantly higher than in fission reactors, special fusion-relevant benchmark experiments are often performed using DT neutron generators. However, commonly used Monte Carlo particle transport codes such as MCNP or TRIPOLI cannot be directly used to analyze these experiments since they do not have the capabilities to model the production of DT neutrons. Three of the available approaches to model the DT neutron generator source are the MCUNED code, the ENEA-JSI DT source subroutine and the DDT code. The MCUNED code is an extension of the well-established and validated MCNPX Monte Carlo code. The ENEA-JSI source subroutine was originally prepared for the modelling of the FNG experiments using different versions of the MCNP code (−4, −5, −X) and was later extended to allow the modelling of both DT and DD neutron sources. The DDT code prepares the DT source definition file (SDEF card in MCNP) which can then be used in different versions of the MCNP code. In the paper the methods for the simulation of the DT neutron production used in the codes are briefly described and compared for the case of a

  12. Combined Source-Channel Coding of Images under Power and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Fossorier Marc

    2007-01-01

    Full Text Available This paper proposes a framework for combined source-channel coding for a power and bandwidth constrained noisy channel. The framework is applied to progressive image transmission using constant envelope -ary phase shift key ( -PSK signaling over an additive white Gaussian noise channel. First, the framework is developed for uncoded -PSK signaling (with . Then, it is extended to include coded -PSK modulation using trellis coded modulation (TCM. An adaptive TCM system is also presented. Simulation results show that, depending on the constellation size, coded -PSK signaling performs 3.1 to 5.2 dB better than uncoded -PSK signaling. Finally, the performance of our combined source-channel coding scheme is investigated from the channel capacity point of view. Our framework is further extended to include powerful channel codes like turbo and low-density parity-check (LDPC codes. With these powerful codes, our proposed scheme performs about one dB away from the capacity-achieving SNR value of the QPSK channel.

  13. Combined Source-Channel Coding of Images under Power and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Marc Fossorier

    2007-01-01

    Full Text Available This paper proposes a framework for combined source-channel coding for a power and bandwidth constrained noisy channel. The framework is applied to progressive image transmission using constant envelope M-ary phase shift key (M-PSK signaling over an additive white Gaussian noise channel. First, the framework is developed for uncoded M-PSK signaling (with M=2k. Then, it is extended to include coded M-PSK modulation using trellis coded modulation (TCM. An adaptive TCM system is also presented. Simulation results show that, depending on the constellation size, coded M-PSK signaling performs 3.1 to 5.2 dB better than uncoded M-PSK signaling. Finally, the performance of our combined source-channel coding scheme is investigated from the channel capacity point of view. Our framework is further extended to include powerful channel codes like turbo and low-density parity-check (LDPC codes. With these powerful codes, our proposed scheme performs about one dB away from the capacity-achieving SNR value of the QPSK channel.

  14. The plagiarism euphemism parade continues

    Directory of Open Access Journals (Sweden)

    Marcus, Adam

    2015-08-01

    Full Text Available Since its founding in 2010 the American blog “Retraction Watch” collects reasons (and excuses for academic misconduct appearing during the peer review and editing process of submitted publications to international scientific journals. For this short contribution both founding fathers of the blog present us with an euphemism parade on plagiarism. Many of the rather grotesque paraphrases for simple copy&paste were provided by the authors of the retracted publications themselves. A serious question remains – why don't we all just call a spade a spade?

  15. Joint Source and Channel Decoding for Variable Length Encoded Turbo Codes

    Directory of Open Access Journals (Sweden)

    Yang Yang

    2007-11-01

    Full Text Available Joint source and channel decoding (JSCD has been proved to be an effective technique which can improve decoding performance by exploiting residual source redundancy. Most previous publications on this subject focus on a traditional coding scheme in which the source variable-length coding (VLC is serially concatenated with a channel code. In this paper, a parallel concatenated coding scheme for the VLC combined with a turbo code is presented. By merging a symbol-level VLC trellis with a convolutional trellis, we construct a symbol-level joint trellis with compound states. Also, a solution of the symbol-by-symbol a posteriori probability (APP decoding algorithm based on this joint trellis is derived, which leads to an iterative JSCD approach in the similar way to the classical turbo decoder. The simulation results show that our joint source-channel en/decoding system achieves some gains at the cost of increasing decoding complexity, when compared to the joint iterative decoding based on the bit-level super trellis for the separate coding system.

  16. Why Do Students Plagiarize? Efl Undergraduates’ Views on the Reasons Behind Plagiarism

    Directory of Open Access Journals (Sweden)

    Doró Katalin

    2014-03-01

    Full Text Available Cheating and plagiarism spread like pandemics in many educational contexts and are difficulty to detect, fight and also to understand. The purpose of this exploratory study is to investigate what first-year students of English at a large Hungarian university believe to be the main reasons for plagiarism. Twenty-five students were asked to express their views in a free opinion essay. Perceived reasons were categorized into twelve main groups based on the literature and the reasons for plagiarism provided by faculty members at the same university. The most often mentioned reasons included saving time and effort and unintentional plagiarism.

  17. An IR-Based Approach Utilizing Query Expansion for Plagiarism Detection in MEDLINE.

    Science.gov (United States)

    Nawab, Rao Muhammad Adeel; Stevenson, Mark; Clough, Paul

    2017-01-01

    The identification of duplicated and plagiarized passages of text has become an increasingly active area of research. In this paper, we investigate methods for plagiarism detection that aim to identify potential sources of plagiarism from MEDLINE, particularly when the original text has been modified through the replacement of words or phrases. A scalable approach based on Information Retrieval is used to perform candidate document selection-the identification of a subset of potential source documents given a suspicious text-from MEDLINE. Query expansion is performed using the ULMS Metathesaurus to deal with situations in which original documents are obfuscated. Various approaches to Word Sense Disambiguation are investigated to deal with cases where there are multiple Concept Unique Identifiers (CUIs) for a given term. Results using the proposed IR-based approach outperform a state-of-the-art baseline based on Kullback-Leibler Distance.

  18. Student plagiarism and professional practice.

    Science.gov (United States)

    Kenny, Deborah

    2007-01-01

    With the ever-increasing availability and accessibility of the Internet, students are able to access a multitude of resources in support of their studies. However, this has also led to an increase in their ability to cheat through plagiarising text and claiming it as their own. Increased pressures of balancing work and study have contributed to this rise. Not only confined to the student population, some academics are also guilty of engaging in this practice providing a less than favourable role model for their students. Of increasing concern is the links of this practice to professionalism or indeed in this case unprofessionalism. Both pre- and post-registration nursing students who plagiarise risk bringing the reputation of the profession into disrepute. There are a number of methods that may be used to detect plagiarism but often the penalties are menial and inconsistently applied. Overall it is essential that academic institutions foster a culture of honesty and integrity amongst its academic community. A culture that clearly emphasises that plagiarism in any form is unacceptable.

  19. Development of Coupled Interface System between the FADAS Code and a Source-term Evaluation Code XSOR for CANDU Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Son, Han Seong; Song, Deok Yong [ENESYS, Taejon (Korea, Republic of); Kim, Ma Woong; Shin, Hyeong Ki; Lee, Sang Kyu; Kim, Hyun Koon [Korea Institute of Nuclear Safety, Taejon (Korea, Republic of)

    2006-07-01

    An accident prevention system is essential to the industrial security of nuclear industry. Thus, the more effective accident prevention system will be helpful to promote safety culture as well as to acquire public acceptance for nuclear power industry. The FADAS(Following Accident Dose Assessment System) which is a part of the Computerized Advisory System for a Radiological Emergency (CARE) system in KINS is used for the prevention against nuclear accident. In order to enhance the FADAS system more effective for CANDU reactors, it is necessary to develop the various accident scenarios and reliable database of source terms. This study introduces the construction of the coupled interface system between the FADAS and the source-term evaluation code aimed to improve the applicability of the CANDU Integrated Safety Analysis System (CISAS) for CANDU reactors.

  20. Low complexity source and channel coding for mm-wave hybrid fiber-wireless links

    DEFF Research Database (Denmark)

    Lebedev, Alexander; Vegas Olmos, Juan José; Pang, Xiaodan

    2014-01-01

    performance of several encoded high-definition video sequences constrained by the channel bitrate and the packet size. We argue that light video compression and low complexity channel coding for the W-band fiber-wireless link enable low-delay multiple channel 1080p wireless HD video transmission.......We report on the performance of channel and source coding applied for an experimentally realized hybrid fiber-wireless W-band link. Error control coding performance is presented for a wireless propagation distance of 3 m and 20 km fiber transmission. We report on peak signal-to-noise ratio...

  1. Fine-Grained Energy Modeling for the Source Code of a Mobile Application

    DEFF Research Database (Denmark)

    Li, Xueliang; Gallagher, John Patrick

    2016-01-01

    . Using the model we observed several counter-intuitive effects, e.g., in a common game scenario, control flow operations consume around 38% of the total CPU energy use, while arithmetic operations consume only 6%. Our model is being integrated into a source-level energy-optimization approach, which we......The goal of an energy model for source code is to lay a foundation for the application of energy-aware programming techniques. State of the art solutions are based on source-line energy information. In this paper, we present an approach to constructing a fine-grained energy model which is able...... to provide operation-related information that is more valuable for guiding code-optimization than source-line information. The modeling is enabled by a set of novel and practical techniques such as source-level operation identification, block-varied execution-case design and measurement variability control...

  2. Data integration of structured and unstructured sources for assigning clinical codes to patient stays.

    Science.gov (United States)

    Scheurwegs, Elyne; Luyckx, Kim; Luyten, Léon; Daelemans, Walter; Van den Bulcke, Tim

    2016-04-01

    Enormous amounts of healthcare data are becoming increasingly accessible through the large-scale adoption of electronic health records. In this work, structured and unstructured (textual) data are combined to assign clinical diagnostic and procedural codes (specifically ICD-9-CM) to patient stays. We investigate whether integrating these heterogeneous data types improves prediction strength compared to using the data types in isolation. Two separate data integration approaches were evaluated. Early data integration combines features of several sources within a single model, and late data integration learns a separate model per data source and combines these predictions with a meta-learner. This is evaluated on data sources and clinical codes from a broad set of medical specialties. When compared with the best individual prediction source, late data integration leads to improvements in predictive power (eg, overall F-measure increased from 30.6% to 38.3% for International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM) diagnostic codes), while early data integration is less consistent. The predictive strength strongly differs between medical specialties, both for ICD-9-CM diagnostic and procedural codes. Structured data provides complementary information to unstructured data (and vice versa) for predicting ICD-9-CM codes. This can be captured most effectively by the proposed late data integration approach. We demonstrated that models using multiple electronic health record data sources systematically outperform models using data sources in isolation in the task of predicting ICD-9-CM codes over a broad range of medical specialties. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. SOURCES 4C : a code for calculating ([alpha],n), spontaneous fission, and delayed neutron sources and spectra.

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, W. B. (William B.); Perry, R. T. (Robert T.); Shores, E. F. (Erik F.); Charlton, W. S. (William S.); Parish, Theodore A.; Estes, G. P. (Guy P.); Brown, T. H. (Thomas H.); Arthur, Edward D. (Edward Dana),; Bozoian, Michael; England, T. R.; Madland, D. G.; Stewart, J. E. (James E.)

    2002-01-01

    SOURCES 4C is a computer code that determines neutron production rates and spectra from ({alpha},n) reactions, spontaneous fission, and delayed neutron emission due to radionuclide decay. The code is capable of calculating ({alpha},n) source rates and spectra in four types of problems: homogeneous media (i.e., an intimate mixture of a-emitting source material and low-Z target material), two-region interface problems (i.e., a slab of {alpha}-emitting source material in contact with a slab of low-Z target material), three-region interface problems (i.e., a thin slab of low-Z target material sandwiched between {alpha}-emitting source material and low-Z target material), and ({alpha},n) reactions induced by a monoenergetic beam of {alpha}-particles incident on a slab of target material. Spontaneous fission spectra are calculated with evaluated half-life, spontaneous fission branching, and Watt spectrum parameters for 44 actinides. The ({alpha},n) spectra are calculated using an assumed isotropic angular distribution in the center-of-mass system with a library of 107 nuclide decay {alpha}-particle spectra, 24 sets of measured and/or evaluated ({alpha},n) cross sections and product nuclide level branching fractions, and functional {alpha}-particle stopping cross sections for Z < 106. The delayed neutron spectra are taken from an evaluated library of 105 precursors. The code provides the magnitude and spectra, if desired, of the resultant neutron source in addition to an analysis of the'contributions by each nuclide in the problem. LASTCALL, a graphical user interface, is included in the code package.

  4. Source-Channel Coding Theorems for the Multiple-Access Relay Channe

    CERN Document Server

    Murin, Yonathan; Gündüz, Deniz

    2011-01-01

    Reliable transmission of arbitrarily correlated sources over multiple-access relay channels (MARCs) and multiple-access broadcast relay channels (MABRCs) is considered. In MARCs only the destination is interested in a reconstruction of the sources, while in MABRCs both the relay and the destination want to reconstruct the sources. In addition to arbitrary correlation among the source signals at the users, both the relay and the destination are assumed to have side information correlated with the source signals. Sufficient conditions for reliable communication based on operational separation, as well as necessary conditions on the achievable source-channel rates are characterized. Since operational separation is generally not optimal for MARCs and MABRCs, sufficient conditions for reliable communication using joint source-channel coding schemes based on a combination of the correlation preserving mapping technique with binning are also derived. For correlated sources transmitted over fading Gaussian MARCs and ...

  5. [Plagiarism. A fools' errand.

    Science.gov (United States)

    Jefferson, Tom; De Fiore, Luca

    2017-01-01

    An old Italian proverb states that lies have short legs. In other words, in the end you get found out. This is exactly what happened to an Italian researcher who acted as a referee for a manuscript submitted in 2015 to Annals of Internal Medicine. After a negative report (which presumably led to the rejection of the submission) he submitted a manuscript which was essentially the same. But he and his accomplices got found out and paraded in front of the world in an earth-shatteringly polite "Dear Plagiarist" letter by the first robbed author: Dr Michael Dansinger. Dr Dansiger's letter is a model of polite logic and an ethical masterpiece, the fake article got retracted and the thief's institution contacted. No reply so far, a depressingly familiar theme in contemporary research. We wonder why we carry on with a system which is completely broken. Commercial interests, reporting bias, secrecy, ethically dubious studies and inertia are the ingredients of contemporary research and publication practices. Editorial peer review, a scholarly practice originating in a more genteel era, is clearly unable to do much other than lend a very thin veneer of credibility to this pandemic of junk which is threatening healthcare budgets and the ethics of the next generation of researchers. We need a complete reform of the system which could give back some credibility to the "e" of evidence-based medicine. Complete lawful transparency, public reimbursement of interventions only on the basis of independently generated evidence and research ethics as a part of an international curriculum for budding researchers are urgently needed. These should be linked to publishers' complete disclosure of their sources of income and custodial sentences for those who abuse positions of trust. Meanwhile, stay away from anything implausible and non-replicable (as they probably are).

  6. Plagiarism: the Internet makes it easy.

    Science.gov (United States)

    Logue, Roger

    This article examines the issue of plagiarism by nursing students and academics in British universities and highlights how electronic developments such as the Internet and word processing have made it easier. It describes how some websites support plagiarism and how, for a price, a qualification up to and including higher degree level may be gained without the recipient of the award having to do any coursework.

  7. Distributed Remote Vector Gaussian Source Coding for Wireless Acoustic Sensor Networks

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2014-01-01

    encoding multiple sources. We focus on the case where node measurements are in form of noisy linearly mixed combinations of the sources and the acoustic channel mixing matrices are invertible. For this problem, we derive the rate-distortion function for vector Gaussian sources and under covariance......In this paper, we consider the problem of remote vector Gaussian source coding for a wireless acoustic sensor network. Each node receives messages from multiple nodes in the network and decodes these messages using its own measurement of the sound field as side information. The node’s measurement...

  8. A 1D cylindrical kinetic wave code for helicon plasma sources

    Science.gov (United States)

    Kamenski, I. V.; Borg, G. G.

    1998-09-01

    We describe a 1D plasma kinetic code UFEM, which is specifically designed for the treatment of radiofrequency wave excitation and propagation in cylindrical low temperature plasmas. The code should find extensive application in the design and study of helicon wave driven plasma sources which are increasingly used for industrial plasma processing. The code includes the effects of collisional dissipation and the important parallel electron dynamics, such as Landau damping, that are necessary for the description of wave absorption. It employs a finite element discretization of rf fields in terms of electromagnetic potentials that is suitable for wave calculations in the lower hydrid range of frequencies where helicon waves typically propagate. Finite Larmor radius effects are known to be negligible in industrial plasma sources. These are therefore neglected leading to a considerable simplification of the dielectric tensor; in particular, the complex issue of the equilibrium gradient terms is avoided. The user can choose from a menu of several standard antenna types so that antenna optimizations can be readily performed. Four different variations of cylindrical system geometry can be used. The important issues of complex antenna near-fields and short wavelength modes can be treated fully self-consistently. We also perform a benchmark of the UFEM and ISMENE 5 codes for four different wave conditions over the Alfvén to lower hybrid frequency ranges. Finally we conclude with a presentation of code results for the conditions of a typical helicon plasma source driven by a realistic antenna.

  9. Shared and Distributed Memory Parallel Security Analysis of Large-Scale Source Code and Binary Applications

    Energy Technology Data Exchange (ETDEWEB)

    Quinlan, D; Barany, G; Panas, T

    2007-08-30

    Many forms of security analysis on large scale applications can be substantially automated but the size and complexity can exceed the time and memory available on conventional desktop computers. Most commercial tools are understandably focused on such conventional desktop resources. This paper presents research work on the parallelization of security analysis of both source code and binaries within our Compass tool, which is implemented using the ROSE source-to-source open compiler infrastructure. We have focused on both shared and distributed memory parallelization of the evaluation of rules implemented as checkers for a wide range of secure programming rules, applicable to desktop machines, networks of workstations and dedicated clusters. While Compass as a tool focuses on source code analysis and reports violations of an extensible set of rules, the binary analysis work uses the exact same infrastructure but is less well developed into an equivalent final tool.

  10. SOURCES 4A: A Code for Calculating (alpha,n), Spontaneous Fission, and Delayed Neutron Sources and Spectra

    Energy Technology Data Exchange (ETDEWEB)

    Madland, D.G.; Arthur, E.D.; Estes, G.P.; Stewart, J.E.; Bozoian, M.; Perry, R.T.; Parish, T.A.; Brown, T.H.; England, T.R.; Wilson, W.B.; Charlton, W.S.

    1999-09-01

    SOURCES 4A is a computer code that determines neutron production rates and spectra from ({alpha},n) reactions, spontaneous fission, and delayed neutron emission due to the decay of radionuclides. The code is capable of calculating ({alpha},n) source rates and spectra in four types of problems: homogeneous media (i.e., a mixture of {alpha}-emitting source material and low-Z target material), two-region interface problems (i.e., a slab of {alpha}-emitting source material in contact with a slab of low-Z target material), three-region interface problems (i.e., a thin slab of low-Z target material sandwiched between {alpha}-emitting source material and low-Z target material), and ({alpha},n) reactions induced by a monoenergetic beam of {alpha}-particles incident on a slab of target material. Spontaneous fission spectra are calculated with evaluated half-life, spontaneous fission branching, and Watt spectrum parameters for 43 actinides. The ({alpha},n) spectra are calculated using an assumed isotropic angular distribution in the center-of-mass system with a library of 89 nuclide decay {alpha}-particle spectra, 24 sets of measured and/or evaluated ({alpha},n) cross sections and product nuclide level branching fractions, and functional {alpha}-particle stopping cross sections for Z < 106. The delayed neutron spectra are taken from an evaluated library of 105 precursors. The code outputs the magnitude and spectra of the resultant neutron source. It also provides an analysis of the contributions to that source by each nuclide in the problem.

  11. Low-complexity and error-resilient hyperspectral image compression based on distributed source coding

    Science.gov (United States)

    Abrardo, A.; Barni, M.; Bertoli, A.; Garzelli, A.; Magli, E.; Nencini, F.; Penna, B.; Vitulli, R.

    2008-10-01

    In this paper we propose a lossless compression algorithm for hyperspectral images based on distributed source coding; this algorithm represents a significant improvement over our prior work on the same topic, and has been developed during a project funded by ESA-ESTEC. In particular, the algorithm achieves good compression performance with very low complexity; moreover, it also features a very good degree of error resilience. These features are obtained taking inspiration from distributed source coding, and particularly employing coset codes and CRC-based decoding. As the CRC can be used to decode blocks using a reference different from that used to compress the image, this yields error resilience. In particular, if a block is lost, decoding using the closest collocated block in the second previous band is successful about 70% of the times.

  12. Text-based plagiarism in scientific publishing: issues, developments and education.

    Science.gov (United States)

    Li, Yongyan

    2013-09-01

    Text-based plagiarism, or copying language from sources, has recently become an issue of growing concern in scientific publishing. Use of CrossCheck (a computational text-matching tool) by journals has sometimes exposed an unexpected amount of textual similarity between submissions and databases of scholarly literature. In this paper I provide an overview of the relevant literature, to examine how journal gatekeepers perceive textual appropriation, and how automated plagiarism-screening tools have been developed to detect text matching, with the technique now available for self-check of manuscripts before submission; I also discuss issues around English as an additional language (EAL) authors and in particular EAL novices being the typical offenders of textual borrowing. The final section of the paper proposes a few educational directions to take in tackling text-based plagiarism, highlighting the roles of the publishing industry, senior authors and English for academic purposes professionals.

  13. Plagiarism: A plaque to research

    Directory of Open Access Journals (Sweden)

    S Gowri

    2014-01-01

    Full Text Available The virus of scientific dishonesty has spread across the globe and in all age groups, students as well as faculties. Copying text, figures, tables from other published material without giving due credit are rampant. This kind of act will not only defame the individual, but also puts forth a question mark on the integrity of practitioners in general. The concept of plagiarism is by no means simple or an unambiguous one, yet unless we are clear on this, we cannot begin to make any kind of progress on the practical measures that need to be taken to reduce it. In what follows, we will attempt to explore the confusions and contradictions in the way the term is currently used, and an attempt is made to relocate its meaning such that at least some information and knowledge can be imbibed.

  14. 50 CFR 23.24 - What code is used to show the source of the specimen?

    Science.gov (United States)

    2010-10-01

    ..., EXPORTATION, AND IMPORTATION OF WILDLIFE AND PLANTS (CONTINUED) CONVENTION ON INTERNATIONAL TRADE IN... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false What code is used to show the source of the specimen? 23.24 Section 23.24 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE...

  15. DeFacto: Language-Parametric Fact Extraction from Source Code

    NARCIS (Netherlands)

    H.J.S. Basten (Bas); P. Klint (Paul); D. Gasevic; R. Lämmel (Ralf); E. van Wyk

    2008-01-01

    htmlabstractExtracting facts from software source code forms the foundation for any software analysis. Experience shows, however, that extracting facts from programs written in a wide range of programming and application languages is labour-intensive and error-prone. We present DeFacto, a new

  16. Turning to Turnitin to Fight Plagiarism among University Students

    National Research Council Canada - National Science Library

    Tshepo Batane

    2010-01-01

      This paper reports on a pilot project of the Turnitin plagiarism detection software, which was implemented to determine the impact of the software on the level of plagiarism among University of Botswana (UB) students...

  17. Students’ perceptions of plagiarism and relevant policies in Cyprus

    National Research Council Canada - National Science Library

    Kokkinaki, Angelika I; Demoliou, Catherine; Iakovidou, Melpo

    2015-01-01

    Effective plagiarism deterrence in the Republic of Cyprus, requires the identification of any gaps, best practices and case studies relating to plagiarism across the Higher Educational Institutions in the country...

  18. Students' Views on Prevention of Coursework Plagiarism | Bada ...

    African Journals Online (AJOL)

    ... and unrealistic coursework timeframes were cited for plagiarism in doing coursework assignments. Recommendations for preventing plagiarism are drawn out of these findings. Thereafter, a framework for administering coursework is developed. Keywords: Academic dishonesty; Higher education evaluation; Research ...

  19. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    Science.gov (United States)

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools.

  20. Phase 1 Validation Testing and Simulation for the WEC-Sim Open Source Code

    Science.gov (United States)

    Ruehl, K.; Michelen, C.; Gunawan, B.; Bosma, B.; Simmons, A.; Lomonaco, P.

    2015-12-01

    WEC-Sim is an open source code to model wave energy converters performance in operational waves, developed by Sandia and NREL and funded by the US DOE. The code is a time-domain modeling tool developed in MATLAB/SIMULINK using the multibody dynamics solver SimMechanics, and solves the WEC's governing equations of motion using the Cummins time-domain impulse response formulation in 6 degrees of freedom. The WEC-Sim code has undergone verification through code-to-code comparisons; however validation of the code has been limited to publicly available experimental data sets. While these data sets provide preliminary code validation, the experimental tests were not explicitly designed for code validation, and as a result are limited in their ability to validate the full functionality of the WEC-Sim code. Therefore, dedicated physical model tests for WEC-Sim validation have been performed. This presentation provides an overview of the WEC-Sim validation experimental wave tank tests performed at the Oregon State University's Directional Wave Basin at Hinsdale Wave Research Laboratory. Phase 1 of experimental testing was focused on device characterization and completed in Fall 2015. Phase 2 is focused on WEC performance and scheduled for Winter 2015/2016. These experimental tests were designed explicitly to validate the performance of WEC-Sim code, and its new feature additions. Upon completion, the WEC-Sim validation data set will be made publicly available to the wave energy community. For the physical model test, a controllable model of a floating wave energy converter has been designed and constructed. The instrumentation includes state-of-the-art devices to measure pressure fields, motions in 6 DOF, multi-axial load cells, torque transducers, position transducers, and encoders. The model also incorporates a fully programmable Power-Take-Off system which can be used to generate or absorb wave energy. Numerical simulations of the experiments using WEC-Sim will be

  1. Dealing with Students' Plagiarism Pre-Emptively through Teaching Proper Information Exploitation

    Science.gov (United States)

    Chankova, Mariya

    2017-01-01

    The present contribution looks into the much discussed issue of student plagiarism, which is conjectured to stem from problems with information searching and exploitation, underdeveloped exposition skills and difficulty in using sources, especially concerning quotations and references. The aim of the study is to determine how effective pre-emptive…

  2. Turnitoff: Identifying and Fixing a Hole in Current Plagiarism Detection Software

    Science.gov (United States)

    Heather, James

    2010-01-01

    In recent times, "plagiarism detection software" has become popular in universities and colleges, in an attempt to stem the tide of plagiarised student coursework. Such software attempts to detect any copied material and identify its source. The most popular such software is Turnitin, a commercial system used by thousands of institutions…

  3. Using Anti-Plagiarism Software to Promote Academic Honesty in the Context of Peer Reviewed Assignments

    Science.gov (United States)

    Ledwith, Ann; Risquez, Angelica

    2008-01-01

    A variety of free and commercial software applications designed to detect plagiarism from Internet sources has appeared in recent years. However, their effectiveness and impact on student behaviour has been assumed rather than confirmed. The study presented here explores the responses and perceptions of a group of first year students at an Irish…

  4. Comparative Analysis of Institutional Policy Definitions of Plagiarism: A Pan-Canadian University Study

    Science.gov (United States)

    Eaton, Sarah Elaine

    2017-01-01

    This article shares the findings of a study investigating institutional policy definitions of plagiarism at twenty English-speaking Canadian universities. The types of primary sources consulted for this study included: (1) university academic calendars for 2016-2017, (2) institutional policies on academic misconduct, and (3) student academic codes…

  5. How do we handle self-plagiarism in submitted manuscripts?

    OpenAIRE

    Šupak Smolčić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms ...

  6. Exploring Plagiarism Into Perspectives of Indonesian Academics and Students

    OpenAIRE

    AGUSTINA, Rina; Raharjo, Pambudi

    2017-01-01

    Plagiarism has been done by students from around the globes. There has been a heated discussion of finding reasons why plagiarism occurred in academic world and Eastern students in particular. This research wants to explore how actually students perceive plagiarism in their academic writing as well as how lecturers coped with plagiarism in the students' assignments. The research participants were taken from 2 different majors, 32 English Education students and 10 Psychology students as well a...

  7. Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques

    Directory of Open Access Journals (Sweden)

    Valenzise G

    2009-01-01

    Full Text Available In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. We propose a novel hashing scheme which exploits the paradigms of compressive sensing and distributed source coding to generate a compact hash signature, and we apply it to the case of audio content protection. The audio content provider produces a small hash signature by computing a limited number of random projections of a perceptual, time-frequency representation of the original audio stream; the audio hash is given by the syndrome bits of an LDPC code applied to the projections. At the content user side, the hash is decoded using distributed source coding tools. If the tampering is sparsifiable or compressible in some orthonormal basis or redundant dictionary, it is possible to identify the time-frequency position of the attack, with a hash size as small as 200 bits/second; the bit saving obtained by introducing distributed source coding ranges between 20% to 70%.

  8. Experimental benchmark of the NINJA code for application to the Linac4 H‑ ion source plasma

    Science.gov (United States)

    Briefi, S.; Mattei, S.; Rauner, D.; Lettry, J.; Tran, M. Q.; Fantz, U.

    2017-10-01

    For a dedicated performance optimization of negative hydrogen ion sources applied at particle accelerators, a detailed assessment of the plasma processes is required. Due to the compact design of these sources, diagnostic access is typically limited to optical emission spectroscopy yielding only line-of-sight integrated results. In order to allow for a spatially resolved investigation, the electromagnetic particle-in-cell Monte Carlo collision code NINJA has been developed for the Linac4 ion source at CERN. This code considers the RF field generated by the ICP coil as well as the external static magnetic fields and calculates self-consistently the resulting discharge properties. NINJA is benchmarked at the diagnostically well accessible lab experiment CHARLIE (Concept studies for Helicon Assisted RF Low pressure Ion sourcEs) at varying RF power and gas pressure. A good general agreement is observed between experiment and simulation although the simulated electron density trends for varying pressure and power as well as the absolute electron temperature values deviate slightly from the measured ones. This can be explained by the assumption of strong inductive coupling in NINJA, whereas the CHARLIE discharges show the characteristics of loosely coupled plasmas. For the Linac4 plasma, this assumption is valid. Accordingly, both the absolute values of the accessible plasma parameters and their trends for varying RF power agree well in measurement and simulation. At varying RF power, the H‑ current extracted from the Linac4 source peaks at 40 kW. For volume operation, this is perfectly reflected by assessing the processes in front of the extraction aperture based on the simulation results where the highest H‑ density is obtained for the same power level. In surface operation, the production of negative hydrogen ions at the converter surface can only be considered by specialized beam formation codes, which require plasma parameters as input. It has been demonstrated

  9. The Toolbox for Local and Global Plagiarism Detection

    Science.gov (United States)

    Butakov, Sergey; Scherbinin, Vladislav

    2009-01-01

    Digital plagiarism is a problem for educators all over the world. There are many software tools on the market for uncovering digital plagiarism. Most of them can work only with text submissions. In this paper, we present a new architecture for a plagiarism detection tool that can work with many different kinds of digital submissions, from plain or…

  10. Turning to Turnitin to Fight Plagiarism among University Students

    Science.gov (United States)

    Batane, Tshepo

    2010-01-01

    This paper reports on a pilot project of the Turnitin plagiarism detection software, which was implemented to determine the impact of the software on the level of plagiarism among University of Botswana (UB) students. Students' assignments were first submitted to the software without their knowledge so as to gauge their level of plagiarism. The…

  11. "You Fail": Plagiarism, the Ownership of Writing, and Transnational Conflicts

    Science.gov (United States)

    Lyon, Arabella

    2009-01-01

    Responding to cultural concerns about the ownership of writing and the nature of plagiarism, this article examines discourses about plagiarism by ESL students and argues for a plurality of approaches to understanding the ownership of language and textual appropriation. First, it uses speech act theory to explain the dynamics of plagiarism; second,…

  12. The Crime of Plagiarism: A Critique of Literary Property Law.

    Science.gov (United States)

    Hatch, Gary Layne

    Understanding the history of plagiarism may put scholars in a position to define plagiarism more precisely and to decide plagiarism disputes involving students and scholars more fairly. The origins of literary property are found in ritual and religious drama. In classical Greece and Rome, literary property began to hold some value for the author.…

  13. Inoculating against Pro-Plagiarism Justifications: Rational and Affective Strategies

    Science.gov (United States)

    Compton, Josh; Pfau, Michael

    2008-01-01

    Student plagiarism continues to threaten academic integrity. This investigation assessed whether an inoculation message strategy could combat university plagiarism by protecting student attitudes against pro-plagiarism justification arguments. Additionally, we sought theoretical confirmation of previous findings on involvement and accessibility in…

  14. Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing

    Science.gov (United States)

    Bakhtiyari, Kaveh; Salehi, Hadi; Embi, Mohamed Amin; Shakiba, Masoud; Zavvari, Azam; Shahbazi-Moghadam, Masoomeh; Ebrahim, Nader Ale; Mohammadjafari, Marjan

    2014-01-01

    This paper discusses plagiarism origins, and the ethical solutions to prevent it. It also reviews some unethical approaches, which may be used to decrease the plagiarism rate in academic writings. We propose eight ethical techniques to avoid unconscious and accidental plagiarism in manuscripts without using online systems such as Turnitin and/or…

  15. Awareness and Incidence of Plagiarism among Undergraduates in a ...

    African Journals Online (AJOL)

    A significant positive relationship was found between levels awareness and incidence of plagiarism, indicating that awareness of behaviour that constitutes plagiarism may not deter students from engaging in it. The study recommended that academic institutions should discourage unintentional plagiarism by teaching ...

  16. The Issue of (Software) Plagiarism: A Student View

    Science.gov (United States)

    Chuda, D.; Navrat, P.; Kovacova, B.; Humay, P.

    2012-01-01

    The issue of plagiarism is discussed in the context of university education in disciplines related to computing. The focus is therefore mainly on software plagiarism. First, however, a case is made for the claim that the most important reason that plagiarism cannot be tolerated lies in the essence of the concept of a university as it is rooted in…

  17. Rational Ignorance in Education: A Field Experiment in Student Plagiarism

    Science.gov (United States)

    Dee, Thomas S.; Jacob, Brian A.

    2012-01-01

    Plagiarism appears to be a common problem among college students, yet there is little evidence on the effectiveness of interventions designed to minimize plagiarism. This study presents the results of a field experiment that evaluated the effects of a web-based educational tutorial in reducing plagiarism. We found that assignment to the treatment…

  18. Perceptions about Plagiarism between Faculty and Undergraduate Students

    Science.gov (United States)

    Pritchett, Serene

    2010-01-01

    The problem. Through observation and the review of literature, students often receive inconsistent and vague messages about plagiarism from faculty. Marcoux (2002) and Roig (2001) found a lack of consensus between faculty concerning definitions and forms of plagiarism. Although some students develop skills in order to avoid plagiarism, almost half…

  19. 363 Evaluating Students' Plagiarism in Higher Education Institutions ...

    African Journals Online (AJOL)

    Nekky Umera

    description of the meaning, forms and reasons for plagiarism among students. It goes further to discuss some strategies for evaluating and detecting plagiarism in students' works using Information technology. Finally some knowledge empowerment strategies are presented to show how lecturers could tackle plagiarism by ...

  20. Technology Enhanced Learning and Plagiarism in Entrepreneurship Education

    Science.gov (United States)

    Risquez, Angelica; O'Dwyer, Michele; Ledwith, Ann

    2011-01-01

    Purpose: This paper seeks to explore the relationship between entrepreneurship students' ethical views on plagiarism, their self reported engagement in plagiarism and their participation in an online plagiarism prevention tutorial. Design/methodology/approach: The study is based on a questionnaire administered to 434 undergraduate university…

  1. Exponential Golomb and Rice Error Correction Codes for Generalized Near-Capacity Joint Source and Channel Coding

    National Research Council Canada - National Science Library

    Brejza, Matthew F; Wang, Tao; Zhang, Wenbo; Al-Khalili, David; Maunder, Robert G; Al-Hashimi, Bashir M; Hanzo, Lajos

    2016-01-01

    .... In this paper, we generalize the family of UEC and EGEC codes to the class of rice and exponential Golomb error correction codes, which have a much wider applicability, including the symbols produced by the H...

  2. Hybrid digital-analog coding with bandwidth expansion for correlated Gaussian sources under Rayleigh fading

    Science.gov (United States)

    Yahampath, Pradeepa

    2017-12-01

    Consider communicating a correlated Gaussian source over a Rayleigh fading channel with no knowledge of the channel signal-to-noise ratio (CSNR) at the transmitter. In this case, a digital system cannot be optimal for a range of CSNRs. Analog transmission however is optimal at all CSNRs, if the source and channel are memoryless and bandwidth matched. This paper presents new hybrid digital-analog (HDA) systems for sources with memory and channels with bandwidth expansion, which outperform both digital-only and analog-only systems over a wide range of CSNRs. The digital part is either a predictive quantizer or a transform code, used to achieve a coding gain. Analog part uses linear encoding to transmit the quantization error which improves the performance under CSNR variations. The hybrid encoder is optimized to achieve the minimum AMMSE (average minimum mean square error) over the CSNR distribution. To this end, analytical expressions are derived for the AMMSE of asymptotically optimal systems. It is shown that the outage CSNR of the channel code and the analog-digital power allocation must be jointly optimized to achieve the minimum AMMSE. In the case of HDA predictive quantization, a simple algorithm is presented to solve the optimization problem. Experimental results are presented for both Gauss-Markov sources and speech signals.

  3. Computer vision for detecting and quantifying gamma-ray sources in coded-aperture images

    Energy Technology Data Exchange (ETDEWEB)

    Schaich, P.C.; Clark, G.A.; Sengupta, S.K.; Ziock, K.P.

    1994-11-02

    The authors report the development of an automatic image analysis system that detects gamma-ray source regions in images obtained from a coded aperture, gamma-ray imager. The number of gamma sources in the image is not known prior to analysis. The system counts the number (K) of gamma sources detected in the image and estimates the lower bound for the probability that the number of sources in the image is K. The system consists of a two-stage pattern classification scheme in which the Probabilistic Neural Network is used in the supervised learning mode. The algorithms were developed and tested using real gamma-ray images from controlled experiments in which the number and location of depleted uranium source disks in the scene are known.

  4. A plug-in to Eclipse for VHDL source codes: functionalities

    Science.gov (United States)

    Niton, B.; Poźniak, K. T.; Romaniuk, R. S.

    The paper presents an original application, written by authors, which supports writing and edition of source codes in VHDL language. It is a step towards fully automatic, augmented code writing for photonic and electronic systems, also systems based on FPGA and/or DSP processors. An implementation is described, based on VEditor. VEditor is a free license program. Thus, the work presented in this paper supplements and extends this free license. The introduction characterizes shortly available tools on the market which serve for aiding the design processes of electronic systems in VHDL. Particular attention was put on plug-ins to the Eclipse environment and Emacs program. There are presented detailed properties of the written plug-in such as: programming extension conception, and the results of the activities of formatter, re-factorizer, code hider, and other new additions to the VEditor program.

  5. Benchmarking Defmod, an open source FEM code for modeling episodic fault rupture

    Science.gov (United States)

    Meng, Chunfang

    2017-03-01

    We present Defmod, an open source (linear) finite element code that enables us to efficiently model the crustal deformation due to (quasi-)static and dynamic loadings, poroelastic flow, viscoelastic flow and frictional fault slip. Ali (2015) provides the original code introducing an implicit solver for (quasi-)static problem, and an explicit solver for dynamic problem. The fault constraint is implemented via Lagrange Multiplier. Meng (2015) combines these two solvers into a hybrid solver that uses failure criteria and friction laws to adaptively switch between the (quasi-)static state and dynamic state. The code is capable of modeling episodic fault rupture driven by quasi-static loadings, e.g. due to reservoir fluid withdraw or injection. Here, we focus on benchmarking the Defmod results against some establish results.

  6. Attitude to plagiarism in different European countries

    Directory of Open Access Journals (Sweden)

    Tomáš Foltýnek

    2012-01-01

    Full Text Available Plagiarism is an important and frequently discussed issue, which may have severe financial impacts for higher education institutions across Europe. However, there are different attitudes to this topic in different countries. Whereas ECTS aims to provide an objective measurement of student effort allowing students to spend part of their studies at different institutions and even different countries, the penalties for plagiarism and other types of cheating may be different. Even the definition of plagiarism may be understood differently in particular European countries. One of the aims of the project IPPHEAE is to identify these differences and try to find common solutions for related problems.The aim of the paper is to present results of research focused on attitudes to plagiarism in Great Britain, Czech Republic, Poland, Lithuania, Cyprus and Bulgaria. A questionnaire survey was conducted in these countries among students and teachers. The results are interesting and inspiring and show huge differences in attitude to plagiarism between western and post-communist countries, surprisingly including the Czech Republic in the group of western countries.

  7. An Adaptive Source-Channel Coding with Feedback for Progressive Transmission of Medical Images

    Directory of Open Access Journals (Sweden)

    Jen-Lung Lo

    2009-01-01

    Full Text Available A novel adaptive source-channel coding with feedback for progressive transmission of medical images is proposed here. In the source coding part, the transmission starts from the region of interest (RoI. The parity length in the channel code varies with respect to both the proximity of the image subblock to the RoI and the channel noise, which is iteratively estimated in the receiver. The overall transmitted data can be controlled by the user (clinician. In the case of medical data transmission, it is vital to keep the distortion level under control as in most of the cases certain clinically important regions have to be transmitted without any visible error. The proposed system significantly reduces the transmission time and error. Moreover, the system is very user friendly since the selection of the RoI, its size, overall code rate, and a number of test features such as noise level can be set by the users in both ends. A MATLAB-based TCP/IP connection has been established to demonstrate the proposed interactive and adaptive progressive transmission system. The proposed system is simulated for both binary symmetric channel (BSC and Rayleigh channel. The experimental results verify the effectiveness of the design.

  8. CACTI: free, open-source software for the sequential coding of behavioral interactions.

    Science.gov (United States)

    Glynn, Lisa H; Hallgren, Kevin A; Houck, Jon M; Moyers, Theresa B

    2012-01-01

    The sequential analysis of client and clinician speech in psychotherapy sessions can help to identify and characterize potential mechanisms of treatment and behavior change. Previous studies required coding systems that were time-consuming, expensive, and error-prone. Existing software can be expensive and inflexible, and furthermore, no single package allows for pre-parsing, sequential coding, and assignment of global ratings. We developed a free, open-source, and adaptable program to meet these needs: The CASAA Application for Coding Treatment Interactions (CACTI). Without transcripts, CACTI facilitates the real-time sequential coding of behavioral interactions using WAV-format audio files. Most elements of the interface are user-modifiable through a simple XML file, and can be further adapted using Java through the terms of the GNU Public License. Coding with this software yields interrater reliabilities comparable to previous methods, but at greatly reduced time and expense. CACTI is a flexible research tool that can simplify psychotherapy process research, and has the potential to contribute to the improvement of treatment content and delivery.

  9. CACTI: free, open-source software for the sequential coding of behavioral interactions.

    Directory of Open Access Journals (Sweden)

    Lisa H Glynn

    Full Text Available The sequential analysis of client and clinician speech in psychotherapy sessions can help to identify and characterize potential mechanisms of treatment and behavior change. Previous studies required coding systems that were time-consuming, expensive, and error-prone. Existing software can be expensive and inflexible, and furthermore, no single package allows for pre-parsing, sequential coding, and assignment of global ratings. We developed a free, open-source, and adaptable program to meet these needs: The CASAA Application for Coding Treatment Interactions (CACTI. Without transcripts, CACTI facilitates the real-time sequential coding of behavioral interactions using WAV-format audio files. Most elements of the interface are user-modifiable through a simple XML file, and can be further adapted using Java through the terms of the GNU Public License. Coding with this software yields interrater reliabilities comparable to previous methods, but at greatly reduced time and expense. CACTI is a flexible research tool that can simplify psychotherapy process research, and has the potential to contribute to the improvement of treatment content and delivery.

  10. Severe accident source term characteristics for selected Peach Bottom sequences predicted by the MELCOR Code

    Energy Technology Data Exchange (ETDEWEB)

    Carbajo, J.J. [Oak Ridge National Lab., TN (United States)

    1993-09-01

    The purpose of this report is to compare in-containment source terms developed for NUREG-1159, which used the Source Term Code Package (STCP), with those generated by MELCOR to identify significant differences. For this comparison, two short-term depressurized station blackout sequences (with a dry cavity and with a flooded cavity) and a Loss-of-Coolant Accident (LOCA) concurrent with complete loss of the Emergency Core Cooling System (ECCS) were analyzed for the Peach Bottom Atomic Power Station (a BWR-4 with a Mark I containment). The results indicate that for the sequences analyzed, the two codes predict similar total in-containment release fractions for each of the element groups. However, the MELCOR/CORBH Package predicts significantly longer times for vessel failure and reduced energy of the released material for the station blackout sequences (when compared to the STCP results). MELCOR also calculated smaller releases into the environment than STCP for the station blackout sequences.

  11. PhpHMM Tool for Generating Speech Recogniser Source Codes Using Web Technologies

    Directory of Open Access Journals (Sweden)

    R. Krejčí

    2011-01-01

    Full Text Available This paper deals with the “phpHMM” software tool, which facilitates the development and optimisation of speech recognition algorithms. This tool is being developed in the Speech Processing Group at the Department of Circuit Theory, CTU in Prague, and it is used to generate the source code of a speech recogniser by means of the PHP scripting language and the MySQL database. The input of the system is a model of speech in a standard HTK format and a list of words to be recognised. The output consists of the source codes and data structures in C programming language, which are then compiled into an executable program. This tool is operated via a web interface.

  12. Source-Search Sensitivity of a Large-Area, Coded-Aperture, Gamma-Ray Imager

    Energy Technology Data Exchange (ETDEWEB)

    Ziock, K P; Collins, J W; Craig, W W; Fabris, L; Lanza, R C; Gallagher, S; Horn, B P; Madden, N W; Smith, E; Woodring, M L

    2004-10-27

    We have recently completed a large-area, coded-aperture, gamma-ray imager for use in searching for radiation sources. The instrument was constructed to verify that weak point sources can be detected at considerable distances if one uses imaging to overcome fluctuations in the natural background. The instrument uses a rank-19, one-dimensional coded aperture to cast shadow patterns onto a 0.57 m{sup 2} NaI(Tl) detector composed of 57 individual cubes each 10 cm on a side. These are arranged in a 19 x 3 array. The mask is composed of four-centimeter thick, one-meter high, 10-cm wide lead blocks. The instrument is mounted in the back of a small truck from which images are obtained as one drives through a region. Results of first measurements obtained with the system are presented.

  13. International perspectives on plagiarism and considerations for teaching international trainees.

    Science.gov (United States)

    Heitman, Elizabeth; Litewka, Sergio

    2011-01-01

    In the increasingly global community of biomedical science and graduate science education, many US academic researchers work with international trainees whose views on scientific writing and plagiarism can be strikingly different from US norms. Although a growing number of countries and international professional organizations identify plagiarism as research misconduct, many international trainees come from research environments where plagiarism is ill-defined and even commonly practiced. Two research-ethics educators consider current perspectives on plagiarism around the world and contend that US research-training programs should focus on trainees' scientific writing skills and acculturation, not simply on preventing plagiarism. Copyright © 2011 Elsevier Inc. All rights reserved.

  14. Patchwork plagiarism--a jigsaw of stolen puzzle pieces.

    Science.gov (United States)

    Supak Smolcić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Plagiarism remains at the top in terms of interest to the scientific community. In its many vicious forms, patchwork plagiarism is characterized by numerous unresolved issues and often passes "below the radar" of editors and reviewers. The problem of detecting the complexity of misconduct has been partially resolved by plagiarism detection software. However, interpretation of relevant reports is not always obvious or easy. This article deals with plagiarism in general and patchwork plagiarism in particular, as well as related problems that editors must deal with to maintain the integrity of scientific journals.

  15. Patchwork plagiarism – a jigsaw of stolen puzzle pieces

    Science.gov (United States)

    Smolčić, Vesna Šupak; Bilić-Zulle, Lidija

    2013-01-01

    Plagiarism remains at the top in terms of interest to the scientific community. In its many vicious forms, patchwork plagiarism is characterized by numerous unresolved issues and often passes “below the radar” of editors and reviewers. The problem of detecting the complexity of misconduct has been partially resolved by plagiarism detection software. However, interpretation of relevant reports is not always obvious or easy. This article deals with plagiarism in general and patchwork plagiarism in particular, as well as related problems that editors must deal with to maintain the integrity of scientific journals. PMID:23457762

  16. International Perspectives on Plagiarism and Considerations for Teaching International Trainees

    Science.gov (United States)

    Heitman, Elizabeth; Litewka, Sergio

    2010-01-01

    In the increasingly global community of biomedical science and graduate science education, many US academic researchers work with international trainees whose views on scientific writing and plagiarism can be strikingly different from US norms. Although a growing number of countries and international professional organizations identify plagiarism as research misconduct, many international trainees come from research environments where plagiarism is ill-defined and even commonly practiced. Two research-ethics educators consider current perspectives on plagiarism around the world and contend that US research-training programs should focus on trainees’ scientific writing skills and acculturation, not simply on preventing plagiarism. PMID:21194646

  17. Sampling-based correlation estimation for distributed source coding under rate and complexity constraints.

    Science.gov (United States)

    Cheung, Ngai-Man; Wang, Huisheng; Ortega, Antonio

    2008-11-01

    In many practical distributed source coding (DSC) applications, correlation information has to be estimated at the encoder in order to determine the encoding rate. Coding efficiency depends strongly on the accuracy of this correlation estimation. While error in estimation is inevitable, the impact of estimation error on compression efficiency has not been sufficiently studied for the DSC problem. In this paper,we study correlation estimation subject to rate and complexity constraints, and its impact on coding efficiency in a DSC framework for practical distributed image and video applications. We focus on, in particular, applications where binary correlation models are exploited for Slepian-Wolf coding and sampling techniques are used to estimate the correlation, while extensions to other correlation models would also be briefly discussed. In the first part of this paper, we investigate the compression of binary data. We first propose a model to characterize the relationship between the number of samples used in estimation and the coding rate penalty, in the case of encoding of a single binary source. The model is then extended to scenarios where multiple binary sources are compressed, and based on the model we propose an algorithm to determine the number of samples allocated to different sources so that the overall rate penalty can be minimized, subject to a constraint on the total number of samples. The second part of this paper studies compression of continuous valued data. We propose a model-based estimation for the particular but important situations where binary bit-planes are extracted from a continuous-valued input source, and each bit-plane is compressed using DSC. The proposed model-based method first estimates the source and correlation noise models using continuous valued samples, and then uses the models to derive the bit-plane statistics analytically. We also extend the model-based estimation to the cases when bit-planes are extracted based on the

  18. 3D color reconstructions in single DMD holographic display with LED source and complex coding scheme

    Science.gov (United States)

    Chlipała, Maksymilian; Kozacki, Tomasz

    2017-06-01

    In the paper we investigate the possibility of color reconstructions of holograms with a single DMD and incoherent LED source illumination. Holographic display is built with 4F imaging system centering reconstruction volume around the DMD surface. The display design employs complex coding scheme, which allows reconstructing complex wave from a binary hologram. In order to improve the quality of reconstructed holograms time multiplexing method is used. During the optical reconstructions we analyze quality of reconstructed holograms with incoherent RGB light sources as a function of reconstruction distance, present the possibility of 3D hologram reconstruction, and investigate temporal coherence effects in holographic display with the DMD.

  19. Multi-rate control over AWGN channels via analog joint source-channel coding

    KAUST Repository

    Khina, Anatoly

    2017-01-05

    We consider the problem of controlling an unstable plant over an additive white Gaussian noise (AWGN) channel with a transmit power constraint, where the signaling rate of communication is larger than the sampling rate (for generating observations and applying control inputs) of the underlying plant. Such a situation is quite common since sampling is done at a rate that captures the dynamics of the plant and which is often much lower than the rate that can be communicated. This setting offers the opportunity of improving the system performance by employing multiple channel uses to convey a single message (output plant observation or control input). Common ways of doing so are through either repeating the message, or by quantizing it to a number of bits and then transmitting a channel coded version of the bits whose length is commensurate with the number of channel uses per sampled message. We argue that such “separated source and channel coding” can be suboptimal and propose to perform joint source-channel coding. Since the block length is short we obviate the need to go to the digital domain altogether and instead consider analog joint source-channel coding. For the case where the communication signaling rate is twice the sampling rate, we employ the Archimedean bi-spiral-based Shannon-Kotel\\'nikov analog maps to show significant improvement in stability margins and linear-quadratic Gaussian (LQG) costs over simple schemes that employ repetition.

  20. Plagiarism in South African management journals

    Directory of Open Access Journals (Sweden)

    Adele Thomas

    2015-01-01

    Full Text Available Plagiarism by academics has been relatively unexplored thus far. However, there has been a growing awareness of this problem in recent years. We submitted 371 published academic articles appearing in 19 South African management journals in 2011 through the plagiarism detection software program Turnitin. High and excessive levels of plagiarism were detected. The cost to government of subsidising unoriginal work in these journals was calculated to approximate ZAR7 million for the period under review. As academics are expected to role model ethical behaviour to students, such a finding is disturbing and has implications for the reputations of the institutions to which the authors are affiliated as well as that of the journals that publish articles that contain plagiarised material.

  1. Is there an effective approach to deterring students from plagiarizing?

    Science.gov (United States)

    Bilic-Zulle, Lidija; Azman, Josip; Frkovic, Vedran; Petrovecki, Mladen

    2008-03-01

    The purpose of this study was to evaluate the effectiveness of plagiarism detection software and penalty for plagiarizing in detecting and deterring plagiarism among medical students. The study was a continuation of previously published research in which second-year medical students from 2001/2002 and 2002/2003 school years were required to write an essay based on one of the four scientific articles offered by the instructor. Students from 2004/2005 (N = 92) included in present study were given the same task. Topics of two of the four articles were considered less complex, and two were more complex. One less and one more complex articles were available only as hardcopies, whereas the other two were available in electronic format. The students from 2001/2002 (N = 111) were only told to write an original essay, whereas the students from 2002/2003 (N = 87) were additionally warned against plagiarism, explained what plagiarism was, and how to avoid it. The students from 2004/2005 were warned that their essays would be examined by plagiarism detection software and that those who had plagiarized would be penalized. Students from 2004/2005 plagiarized significantly less of their essays than students from the previous two groups (2% vs. 17% vs. 21%, respectively, P students more frequently choose articles with more complex subjects (P plagiarism. Use of plagiarism detection software in evaluation of essays and consequent penalties had effectively deterred students from plagiarizing.

  2. Plagiarism and the medical fraternity: a study of knowledge and attitudes.

    Science.gov (United States)

    Shirazi, Bushra; Jafarey, Aamir M; Moazam, Farhat

    2010-04-01

    To assess knowledge and perceptions of plagiarism in medical students and faculty of private and public medical colleges in Karachi. A questionnaire based study was conducted on groups of 4th year medical students and medical faculty members. Group A consisted of medical students while group B comprised faculty members. The questionnaire contained 19 questions that assessed knowledge and attitudes of the respondents regarding various aspects of plagiarism. The total number of medical students (Group A) studied was 114 while the faculty number (Group B) was 82. Nineteen percent Group A and 22% of Group B displayed the correct knowledge about referencing materials from the internet or other sources. Seventeen percent of respondents in Group A and 16% in Group B had correct information about the use of quotation marks when incorporating verbatim phrases from external sources. Regarding Power Point presentations, 53% of respondents from Group A and 57% from Group B knew the appropriate requirements. There was a statistically significant difference among the two groups regarding the issue of self plagiarism, with 63% of respondents in Group A and 88% in Group B demonstrating correct understanding. Both groups showed a general lack of understanding regarding copyright rules and 18% of Group A and 23% of respondents in Group B knew the correct responses. Eighteen percent of respondents in Group A and 27% in Group B claimed to have never indulged in this practice. There is a general lack of information regarding plagiarism among medical students and faculty members.

  3. The academic plagiarism and its punishments - a review

    Directory of Open Access Journals (Sweden)

    Roberto G. S. Berlinck

    2011-06-01

    Full Text Available Currently there is an increase in the occurrence of plagiarism in varied types of academic texts. Therefore, in agreement with the Brazilian Coordination of Improvement of Higher Education Personnel (CAPES policies, Brazilian higher education institutions should establish guidelines for the detection and inhibition of academic plagiarism. However, the notion of plagiarism is extremely complex, since the ability of textual construction acquired during education is also developed using others' words. Thus, it is necessary to better know the concept of plagiarism and its implications, as well as the consequences of plagiarism and the punishments that may result from it. Consequently, rules and policies to be established will be better founded in order to address the problem of plagiarism in academic texts in a comprehensive and consistent way, not only to inhibit plagiarism but also to promote education on how is possible to create texts in an original fashion.

  4. Plagiarism: A Shared Responsibility of All, Current Situation, and Future Actions in Yemen.

    Science.gov (United States)

    Muthanna, Abdulghani

    2016-01-01

    As combating plagiarism is a shared responsibility of all, this article focuses on presenting the current situation of higher education in Yemen. The critical review of four implementable policy documents and interviews revealed the absence of research ethics code, research misconduct policy, and institutional policies in the country. This led to the presence of several acts of research dishonesty. The article concludes with an initiative for necessary future actions in the nation.

  5. REBOUND: an open-source multi-purpose N-body code for collisional dynamics

    Science.gov (United States)

    Rein, H.; Liu, S.-F.

    2012-01-01

    REBOUND is a new multi-purpose N-body code which is freely available under an open-source license. It was designed for collisional dynamics such as planetary rings but can also solve the classical N-body problem. It is highly modular and can be customized easily to work on a wide variety of different problems in astrophysics and beyond. REBOUND comes with three symplectic integrators: leap-frog, the symplectic epicycle integrator (SEI) and a Wisdom-Holman mapping (WH). It supports open, periodic and shearing-sheet boundary conditions. REBOUND can use a Barnes-Hut tree to calculate both self-gravity and collisions. These modules are fully parallelized with MPI as well as OpenMP. The former makes use of a static domain decomposition and a distributed essential tree. Two new collision detection modules based on a plane-sweep algorithm are also implemented. The performance of the plane-sweep algorithm is superior to a tree code for simulations in which one dimension is much longer than the other two and in simulations which are quasi-two dimensional with less than one million particles. In this work, we discuss the different algorithms implemented in REBOUND, the philosophy behind the code's structure as well as implementation specific details of the different modules. We present results of accuracy and scaling tests which show that the code can run efficiently on both desktop machines and large computing clusters.

  6. Design and Simulation of Photoneutron Source by MCNPX Monte Carlo Code for Boron Neutron Capture Therapy

    Directory of Open Access Journals (Sweden)

    Mona Zolfaghari

    2015-07-01

    Full Text Available Introduction Electron linear accelerator (LINAC can be used for neutron production in Boron Neutron Capture Therapy (BNCT. BNCT is an external radiotherapeutic method for the treatment of some cancers. In this study, Varian 2300 C/D LINAC was simulated as an electron accelerator-based photoneutron source to provide a suitable neutron flux for BNCT. Materials and Methods Photoneutron sources were simulated, using MCNPX Monte Carlo code. In this study, a 20 MeV LINAC was utilized for electron-photon reactions. After the evaluation of cross-sections and threshold energies, lead (Pb, uranium (U and beryllium deuteride (BeD2were selected as photoneutron sources. Results According to the simulation results, optimized photoneutron sources with a compact volume and photoneutron yields of 107, 108 and 109 (n.cm-2.s-1 were obtained for Pb, U and BeD2 composites. Also, photoneutrons increased by using enriched U (10-60% as an electron accelerator-based photoneutron source. Conclusion Optimized photoneutron sources were obtained with compact sizes of 107, 108 and 109 (n.cm-2.s-1, respectively. These fluxs can be applied for BNCT by decelerating fast neutrons and using a suitable beam-shaping assembly, surrounding electron-photon and photoneutron sources.

  7. Multiresolution Source/Filter Model for Low Bitrate Coding of Spot Microphone Signals

    Directory of Open Access Journals (Sweden)

    Panagiotis Tsakalides

    2008-04-01

    Full Text Available A multiresolution source/filter model for coding of audio source signals (spot recordings is proposed. Spot recordings are a subset of the multimicrophone recordings of a music performance, before the mixing process is applied for producing the final multichannel audio mix. The technique enables low bitrate coding of spot signals with good audio quality (above 3.0 perceptual grade compared to the original. It is demonstrated that this particular model separates the various microphone recordings of a multimicrophone recording into a part that mainly characterizes a specific microphone signal and a part that is common to all signals of the same recording (and can thus be omitted during transmission. Our interest in low bitrate coding of spot recordings is related to applications such as remote mixing and real-time collaboration of musicians who are geographically distributed. Using the proposed approach, it is shown that it is possible to encode a multimicrophone audio recording using a single audio channel only, with additional information for each spot microphone signal in the order of 5 kbps, for good-quality resynthesis. This is verified by employing both objective and subjective measures of performance.

  8. Multiresolution Source/Filter Model for Low Bitrate Coding of Spot Microphone Signals

    Directory of Open Access Journals (Sweden)

    Mouchtaris Athanasios

    2008-01-01

    Full Text Available A multiresolution source/filter model for coding of audio source signals (spot recordings is proposed. Spot recordings are a subset of the multimicrophone recordings of a music performance, before the mixing process is applied for producing the final multichannel audio mix. The technique enables low bitrate coding of spot signals with good audio quality (above 3.0 perceptual grade compared to the original. It is demonstrated that this particular model separates the various microphone recordings of a multimicrophone recording into a part that mainly characterizes a specific microphone signal and a part that is common to all signals of the same recording (and can thus be omitted during transmission. Our interest in low bitrate coding of spot recordings is related to applications such as remote mixing and real-time collaboration of musicians who are geographically distributed. Using the proposed approach, it is shown that it is possible to encode a multimicrophone audio recording using a single audio channel only, with additional information for each spot microphone signal in the order of 5 kbps, for good-quality resynthesis. This is verified by employing both objective and subjective measures of performance.

  9. Sources of financial pressure and up coding behavior in French public hospitals.

    Science.gov (United States)

    Georgescu, Irène; Hartmann, Frank G H

    2013-05-01

    Drawing upon role theory and the literature concerning unintended consequences of financial pressure, this study investigates the effects of health care decision pressure from the hospital's administration and from the professional peer group on physician's inclination to engage in up coding. We explore two kinds of up coding, information-related and action-related, and develop hypothesis that connect these kinds of data manipulation to the sources of pressure via the intermediate effect of role conflict. Qualitative data from initial interviews with physicians and subsequent questionnaire evidence from 578 physicians in 14 French hospitals suggest that the source of pressure is a relevant predictor of physicians' inclination to engage in data-manipulation. We further find that this effect is partly explained by the extent to which these pressures create role conflict. Given the concern about up coding in treatment-based reimbursement systems worldwide, our analysis adds to understanding how the design of the hospital's management control system may enhance this undesired type of behavior. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  10. Scalar collapse in AdS with an OpenCL open source code

    Science.gov (United States)

    Liebling, Steven L.; Khanna, Gaurav

    2017-10-01

    We study the spherically symmetric collapse of a scalar field in anti-de Sitter spacetime using a newly constructed, open-source code which parallelizes over heterogeneous architectures using the open standard OpenCL. An open question for this scenario concerns how to tell, a priori, whether some form of initial data will be stable or will instead develop under the turbulent instability into a black hole in the limit of vanishing amplitude. Previous work suggested the existence of islands of stability around quasi-periodic solutions, and we use this new code to examine the stability properties of approximately quasi-periodic solutions which balance energy transfer to higher modes with energy transfer to lower modes. The evolutions provide some evidence, though not conclusively, for stability of initial data sufficiently close to quasiperiodic solutions.

  11. Education: Solomons Winner in Lengthy Plagiarism Trial.

    Science.gov (United States)

    Stinson, Steve

    1980-01-01

    Reports the outcome of a plagiarism suit against organic chemistry professor T. W. Graham Solomons by two emeritus professors at New York University. The ruling of not guilty leaves the way open for Solomons' counterclaim that he lost sales of the book because of the suit. (Author/SA)

  12. Plagiarism within Extension: Origin and Current Effects

    Science.gov (United States)

    Rollins, Dora

    2011-01-01

    Extension publication editors from around the United States are finding cases of plagiarism within manuscripts that Extension educators submit as new public education materials. When editors confront such educators with the problem, some don't understand it as such, rationalizing that reproducing published information for a new purpose qualifies…

  13. Classrooms that Discourage Plagiarism and Welcome Technology

    Science.gov (United States)

    Pearson, Nancy Guillot

    2011-01-01

    The key to establishing a defense against plagiarism is understanding the reasons that students engage in the process in the first place. Many students enter new grade levels academically unprepared for new challenges. When students encounter gaps between knowledge and the expectations of the classroom, some engage in unethical practices to propel…

  14. Plagiarism: Do Students Know What It Is?

    Science.gov (United States)

    Dawson, Maureen M.; Overfield, Joyce A.

    2006-01-01

    The ability of students to plagiarise coursework assessments has been a topic of much debate in recent years. The consequences of plagiarism for students may be devastating, since their failure to learn and use appropriate study skills will affect both their university experience and their subsequent career. This project set out to investigate…

  15. Plagiarism under a Magnifying-Glass

    Science.gov (United States)

    Starovoytova, Diana

    2017-01-01

    This paper embodies the findings from a small part, of a larger study on plagiarism, at the School of Engineering (SOE). The study is a cross-sectional survey, conducted in an institutional setting. 15 senior academic members of staff (N = 15), from SOE were invited to complete a questionnaire. The questioner was pre-tested, to ensure its validity…

  16. Plagiarism: What Don't They Know?

    Science.gov (United States)

    Voelker, Troy A.; Love, Leonard G.; Pentina, Iryna

    2012-01-01

    The present economic environment is beneficial for universities and schools of business that are experiencing significant enrollment increases. But just as the U.S. economy is suffering from an economic recession, universities increasingly suffer from an integrity recession. Student academic misconduct, particularly plagiarism, is at an all-time…

  17. Detecting Plagiarism in MS Access Assignments

    Science.gov (United States)

    Singh, Anil

    2013-01-01

    Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…

  18. Academic Integrity and Plagiarism: Australasian Perspectives

    Science.gov (United States)

    Joyce, Donald

    2007-01-01

    This paper reviews nearly 80 published items concerned with promoting academic integrity and reducing plagiarism. Nearly all of them were published in the last seven years and have authors based in Australasia. Most of them have authors from computing departments and many were published in computing journals or presented at computing conferences.…

  19. Academy Policy on Plagiarism | Overview | Journals | Indian ...

    Indian Academy of Sciences (India)

    2017-12-21

    Dec 21, 2017 ... Defined by the US Office of Research Integrity as “the appropriation of another person's ideas, processes, results or words without giving appropriate credit”, the increase in plagiarism is due not only to all too human failings, but also to the ease with which the emergence of the Internet has made such ...

  20. Attitude toward plagiarism among Iranian medical faculty members.

    Science.gov (United States)

    Ghajarzadeh, Mahsa; Norouzi-Javidan, Abbas; Hassanpour, Kiana; Aramesh, Kiarash; Emami-Razavi, Seyed Hassan

    2012-01-01

    The goal of this study was to assess attitude towards plagiarism in faculty members of Medical School at Tehran University of Medical Sciences. One hundred and twenty medical faculty members of Tehran University of Medical Sciences were enrolled in this cross-sectional study. They were asked to answer to valid and reliable Persian version of attitude towards plagiarism questionnaire. Attitude toward plagiarism, positive attitude toward self-plagiarism and plagiarism acceptance were assessed. Eighty seven filled-up questionnaires were collected. Mean total number of correct answers was 11.6±3.1. Mean number of correct answers to questions evaluating self-plagiarism was 1.7±0.4 and mean number of correct answers to questions evaluating plagiarism acceptance was 1.4±0.2. There was no significant correlation between plagiarism acceptance and self-plagiarism (r=0.17, P=0.1). It is essential to provide materials (such as workshops, leaflets and mandatory courses) to make Iranian medical faculty members familiar with medical research ethics issues such as plagiarism.

  1. Attitude toward Plagiarism among Iranian Medical Faculty Members

    Directory of Open Access Journals (Sweden)

    Seyed Hassan Emami-Razavi

    2012-11-01

    Full Text Available The goal of this study was to assess attitude towards plagiarism in faculty members of Medical School at Tehran University of Medical Sciences. One hundred and twenty medical faculty members ofTehran University of Medical Sciences were enrolled in this cross-sectional study. They were asked to answer to valid and reliable Persian version of attitude towards plagiarism questionnaire. Attitude toward plagiarism, positive attitude toward self-plagiarism and plagiarism acceptance were assessed. Eighty seven filled-up questionnaires were collected. Mean total number of correct answers was 11.6 ± 3.1. Mean number of correct answers to questions evaluating self-plagiarism was 1.7 ± 0.4 and mean number of correct answers to questions evaluating plagiarism acceptance was 1.4 ± 0.2. There was no significant correlation between plagiarism acceptance and self-plagiarism (r=0.17, P=0.1. It is essential to provide materials (such as workshops, leaflets and mandatory courses to make Iranian medical faculty members familiar with medicalresearch ethics issues such as plagiarism.

  2. POLITENESS STRATEGIES USED BY COLTER STEVENS AS THE MAIN CHARACTER IN SOURCE CODE MOVIE

    Directory of Open Access Journals (Sweden)

    Retnowaty Retnowaty

    2017-04-01

    Full Text Available Politeness phenomena can usually be found in language. The objectives of this study are to describe what kind of politeness strategies used by the main character, Colter Stevens in the movie entitled Source Code and to explain the factors that might influence his choice of different politeness strategies. This study was using descriptive qualitative approach. Source of data in this research were every Colter‘s utterance in Source Code movie which contained politeness strategies. Furthermore, the data were classified with accordance to kind of politeness strategies suggested Brown and Levinson (1987. Based on the analysis, it can be described that Colter applied all kind of politeness strategies (bald on record, positive politeness strategies, negative politeness strategies and off record. Related to the data, all factors, like social distance, power and rank of imposition influenced his choice of strategies. From all utterances by Colter Stevens from the first until the end of movie, most appeared to use positive politeness strategies. This study indicates that there is a tendency that Colter tried to minimize the threat to the hearer‘s face to avoid conflict. Furthermore, most utterances denoted to social distance between him and the hearers as the main factor that influence his choices of politeness strategies. Therefore, we can say that he was careful enough in selecting politeness strategies to sustain a good communication.

  3. User`s Manual for the SOURCE1 and SOURCE2 Computer Codes: Models for Evaluating Low-Level Radioactive Waste Disposal Facility Source Terms (Version 2.0)

    Energy Technology Data Exchange (ETDEWEB)

    Icenhour, A.S.; Tharp, M.L.

    1996-08-01

    The SOURCE1 and SOURCE2 computer codes calculate source terms (i.e. radionuclide release rates) for performance assessments of low-level radioactive waste (LLW) disposal facilities. SOURCE1 is used to simulate radionuclide releases from tumulus-type facilities. SOURCE2 is used to simulate releases from silo-, well-, well-in-silo-, and trench-type disposal facilities. The SOURCE codes (a) simulate the degradation of engineered barriers and (b) provide an estimate of the source term for LLW disposal facilities. This manual summarizes the major changes that have been effected since the codes were originally developed.

  4. Chronos sickness: digital reality in Duncan Jones’s Source Code

    Directory of Open Access Journals (Sweden)

    Marcia Tiemy Morita Kawamoto

    2017-01-01

    Full Text Available http://dx.doi.org/10.5007/2175-8026.2017v70n1p249 The advent of the digital technologies unquestionably affected the cinema. The indexical relation and realistic effect with the photographed world much praised by André Bazin and Roland Barthes is just one of the affected aspects. This article discusses cinema in light of the new digital possibilities, reflecting on Steven Shaviro’s consideration of “how a nonindexical realism might be possible” (63 and how in fact a new kind of reality, a digital one, might emerge in the science fiction film Source Code (2013 by Duncan Jones.

  5. Academic Integrity and Plagiarism Prevention at Tata Institute of Social Sciences, Mumbai: A case Study

    OpenAIRE

    Bandi, Shekappa; Pothare, Devyani; Angadi, Mallikarjun; Jange, Suresh

    2016-01-01

    Plagiarism is not always a black and white issue. The boundary between plagiarism and research is often unclear. Learning to recognize the various forms of plagiarism, especially the more ambiguous ones, is an important step towards effective prevention. The study overview the concept and types of plagiarism and it`s benefits, Plagiarism Policies in India, and also discussed turnitin and its workflow process of the TISS comparison of the Turnitin and iThenticate plagiarism tools and other rel...

  6. New Source Term Model for the RESRAD-OFFSITE Code Version 3

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Charley [Argonne National Lab. (ANL), Argonne, IL (United States); Gnanapragasam, Emmanuel [Argonne National Lab. (ANL), Argonne, IL (United States); Cheng, Jing-Jy [Argonne National Lab. (ANL), Argonne, IL (United States); Kamboj, Sunita [Argonne National Lab. (ANL), Argonne, IL (United States); Chen, Shih-Yew [Argonne National Lab. (ANL), Argonne, IL (United States)

    2013-06-01

    This report documents the new source term model developed and implemented in Version 3 of the RESRAD-OFFSITE code. This new source term model includes: (1) "first order release with transport" option, in which the release of the radionuclide is proportional to the inventory in the primary contamination and the user-specified leach rate is the proportionality constant, (2) "equilibrium desorption release" option, in which the user specifies the distribution coefficient which quantifies the partitioning of the radionuclide between the solid and aqueous phases, and (3) "uniform release" option, in which the radionuclides are released from a constant fraction of the initially contaminated material during each time interval and the user specifies the duration over which the radionuclides are released.

  7. How do we handle self-plagiarism in submitted manuscripts?

    Science.gov (United States)

    Šupak-Smolčić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms of self-plagiarism in scientific writing and then present good editorial policy toward questionable material. The importance of dealing with self-plagiarism is emphasized by the recently published proposal of Text Recycling Guidelines by the Committee on Publication Ethics (COPE). PMID:23894861

  8. How do we handle self-plagiarism in submitted manuscripts?

    Science.gov (United States)

    Supak-Smocić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms of self-plagiarism in scientific writing and then present good editorial policy toward questionable material. The importance of dealing with self-plagiarism is emphasized by the recently published proposal of Text Recycling Guidelines by the Committee on Publication Ethics (COPE).

  9. Plagiarism issues in post-1998 Indonesian film posters

    OpenAIRE

    Ekky Imanjaya; Emanuel Pratalaharja

    2012-01-01

    There are online articles, with visual materials, stating that some post-1998 Indonesian film posters were accused as plagiarism by common people. However, academically speaking, it needs deeper skills and knowledge to prove acts of plagiarism. This paper will discuss the issues around Indonesian film posters and plagiarism, including the possibility of citing in graphic design. The research will treat film posters not only as marketing tools to promote the movies, as many people consider, bu...

  10. Plagiarism Detection: Keeping Check on Misuse of Intellectual Property

    OpenAIRE

    Mathur, Iti; Joshi, Nisheeth

    2012-01-01

    Today, Plagiarism has become a menace. Every journal editor or conference organizers has to deal with this problem. Simply Copying or rephrasing of text without giving due credit to the original author has become more common. This is considered to be an Intellectual Property Theft. We are developing a Plagiarism Detection Tool which would deal with this problem. In this paper we discuss the common tools available to detect plagiarism and their short comings and the advantages of our tool over...

  11. Academic dishonesty and misconduct: Curbing plagiarism in the Muslim world

    OpenAIRE

    Abdul Rashid Moten

    2014-01-01

    Plagiarism is the theft of someone’s ideas or language, and is a form of cheating which is morally and ethically unacceptable. This study analyses the nature of plagiarism from an Islamic perspective and its prevalence in institutions of higher learning in the Muslim world, especially among faculty members. It also examines the ways in which universities attempt to minimise or marginalise plagiarism. This study is warranted by the fact that there is relatively very little research on the issu...

  12. Student's plagiarism--a challenge for paramedic educators.

    Science.gov (United States)

    Lass, Piotr; Bandurski, Tomasz; Swietlik, Dariusz; Tomczak, Hanna; Wengler, Lubomira

    2006-01-01

    Student's plagiarism is a growing problem not only in the writing of controlling essays, but above all in the writing in BSc./MSc. diploma theses, which sometimes can be simply bought from ghost-writers. This is a major challenge for medical educators, particularly in paramedic professions. The aim of this paper is to overview the frequency of plagiarism among students, the factors influencing plagiarism, the ways of detecting it and potential countermeasures.

  13. Digital plagiarism - The web giveth and the web shall taketh

    Science.gov (United States)

    Presti, David E

    2000-01-01

    Publishing students' and researchers' papers on the World Wide Web (WWW) facilitates the sharing of information within and between academic communities. However, the ease of copying and transporting digital information leaves these authors' ideas open to plagiarism. Using tools such as the Plagiarism.org database, which compares submissions to reports and papers available on the Internet, could discover instances of plagiarism, revolutionize the peer review process, and raise the quality of published research everywhere. PMID:11720925

  14. Plagiarism as the Moral Problem of the Information Society

    OpenAIRE

    Belyaeva, Elena

    2012-01-01

    Keywords: plagiarism, moral, traditional creation, contemporary creativity, informa- tion society. The problem of plagiarism in the information society is specified by the opened nature of social communication, by changing author’s status in contemporary culture, by the distribution of contemporary creativity – not traditional creation. From a moral point of view a plagiarism is an insult to the moral dignity of man, capable of creative activity. Copyright is the juridic...

  15. The academic plagiarism and its punishments - a review

    OpenAIRE

    BERLINCK, Roberto G. S.

    2011-01-01

    Currently there is an increase in the occurrence of plagiarism in varied types of academic texts. Therefore, in agreement with the Brazilian Coordination of Improvement of Higher Education Personnel (CAPES) policies, Brazilian higher education institutions should establish guidelines for the detection and inhibition of academic plagiarism. However, the notion of plagiarism is extremely complex, since the ability of textual construction acquired during education is also developed using others'...

  16. A brief review of plagiarism in medical scientific research papers

    OpenAIRE

    Mohammad Karami; Gholam Hassan Danaei

    2016-01-01

    Plagiarism refers to “adopting someone else’s words, work or ideas and passing them off as one’s own”. It is potentially considered as the most prevalent form of scientific dishonesty discovered in research papers. The present review aims to provide a thorough account of plagiarism to build awareness about all dimensions of plagiarism.The key words “plagiarism”, “types”, “detection” and “consequences” have been applied to...

  17. Effectiveness Evaluation of Skin Covers against Intravascular Brachytherapy Sources Using VARSKIN3 Code

    Directory of Open Access Journals (Sweden)

    Baghani HR

    2013-12-01

    Full Text Available Background and Objective: The most common intravascular brachytherapy sources include 32P, 188Re, 106Rh and 90Sr/90Y. In this research, skin absorbed dose for different covering materials in dealing with these sources were evaluated and the best covering material for skin protection and reduction of absorbed dose by radiation staff was recognized and recommended. Method: Four materials including polyethylene, cotton and two different kinds of plastic were proposed as skin covers and skin absorbed dose at different depths for each kind of the materials was calculated separately using the VARSKIN3 code. Results: The results suggested that for all sources, skin absorbed dose was minimized when using polyethylene. Considering this material as skin cover, maximum and minimum doses at skin surface were related to 90Sr/90Y and 106Rh, respectively. Conclusion: polyethylene was found the most effective cover in reducing skin dose and protecting the skin. Furthermore, proper agreement between the results of VARSKIN3 and other experimental measurements indicated that VRASKIN3 is a powerful tool for skin dose calculations when working with beta emitter sources. Therefore, it can be utilized in dealing with the issue of radiation protection.

  18. Simple steps to avoid plagiarism and improve scientific writing

    OpenAIRE

    Peeran, Syed Wali; Ahmed, Aisha Mojtaba; Mugrabi, Marei Hamed; Peeran, Syed Ali

    2013-01-01

    Dear Sir, Plagiarism is defined by the Oxford dictionary as ‘the practice of taking someone else’s work or ideas and passing them off as one’s own’. Plagiarism can be defined simply as literary theft. Historically, it used to take place when one tried to steal other’s work to gain recognition. In the recent times, plagiarism includes literary theft or misappropriation of intellectual property and the substantial unattributed textual copying of another’s work. Plagiarism encompasses either pla...

  19. The Phenomena of Plagiarism in Hindu Perspective

    Directory of Open Access Journals (Sweden)

    I Dewa Gede Rat Dwiyana Putra

    2017-10-01

    Full Text Available This article was made based on an observation on the thesis written by undergraduate student. The basic reason for the application of this research is that, there were many problem found in the students writing especially the in the citation process and referencing technique which would bring them to commit plagiarism. Since writing a thesis is essential for the undergraduate students to finish their study, this research would be very beneficial evidence to give a clear picture about plagiarism from Hindus teaching perspective. Library research is the primary method applied in conducting this research. The result shows that there are typical mistakes done by the students in doing citation and referencing. Then, suggestions to those problems were given based on Hindus perspective.

  20. Intelligent Bar Chart Plagiarism Detection in Documents

    Directory of Open Access Journals (Sweden)

    Mohammed Mumtaz Al-Dabbagh

    2014-01-01

    Full Text Available This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR. By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts.

  1. Intelligent Bar Chart Plagiarism Detection in Documents

    Science.gov (United States)

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Alkawaz, Mohammed Hazim; Saba, Tanzila; Al-Rodhaan, Mznah; Al-Dhelaan, Abdullah

    2014-01-01

    This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR). By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts. PMID:25309952

  2. Plagiarism: An egregious form of misconduct

    OpenAIRE

    Deepak Juyal; Vijay Thawani; Shweta Thaledi

    2015-01-01

    Background: Publishing research papers for academic fraternity has become important for career advancement and promotion. Number of publications in peer reviewed journals and subsequent citations are recognized as measures of scientific success. Non-publishing academicians and researchers are invisible to the scientific community. Discussion: With pressure to publish, misconduct has crept into scientific writing with the result that research misconduct, plagiarism, misappropriation of intelle...

  3. Intelligent bar chart plagiarism detection in documents.

    Science.gov (United States)

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Rehman, Amjad; Alkawaz, Mohammed Hazim; Saba, Tanzila; Al-Rodhaan, Mznah; Al-Dhelaan, Abdullah

    2014-01-01

    This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR). By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts.

  4. Using research papers: citations, referencing and plagiarism.

    Science.gov (United States)

    Bryson, David

    2012-06-01

    As a profession when we look to expand our skills, learn new techniques and expand visual communication in healthcare as an area of knowledge research papers become a valuable resource as references, to support this work. This Learning and CPD worksheet looks at citing, referencing and discusses plagiarism as well as giving advice on how to check references and think about using reference management software.

  5. Living Up to the Code's Exhortations? Social Workers' Political Knowledge Sources, Expectations, and Behaviors.

    Science.gov (United States)

    Felderhoff, Brandi Jean; Hoefer, Richard; Watson, Larry Dan

    2016-01-01

    The National Association of Social Workers' (NASW's) Code of Ethics urges social workers to engage in political action. However, little recent research has been conducted to examine whether social workers support this admonition and the extent to which they actually engage in politics. The authors gathered data from a survey of social workers in Austin, Texas, to address three questions. First, because keeping informed about government and political news is an important basis for action, the authors asked what sources of knowledge social workers use. Second, they asked what the respondents believe are appropriate political behaviors for other social workers and NASW. Third, they asked for self-reports regarding respondents' own political behaviors. Results indicate that social workers use the Internet and traditional media services to stay informed; expect other social workers and NASW to be active; and are, overall, more active than the general public in many types of political activities. The comparisons made between expectations for others and their own behaviors are interesting in their complex outcomes. Social workers should strive for higher levels of adherence to the code's urgings on political activity. Implications for future work are discussed.

  6. RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code

    Science.gov (United States)

    Gonggrijp, Rop; Hengeveld, Willem-Jan; Hotting, Eelco; Schmidt, Sebastian; Weidemann, Frederik

    The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the internet. A rather cursory scan of the source code to RIES showed a significant lack of security-awareness among the programmers which - among other things - appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, possibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down-to-earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.

  7. Low-Complexity Compression Algorithm for Hyperspectral Images Based on Distributed Source Coding

    Directory of Open Access Journals (Sweden)

    Yongjian Nian

    2013-01-01

    Full Text Available A low-complexity compression algorithm for hyperspectral images based on distributed source coding (DSC is proposed in this paper. The proposed distributed compression algorithm can realize both lossless and lossy compression, which is implemented by performing scalar quantization strategy on the original hyperspectral images followed by distributed lossless compression. Multilinear regression model is introduced for distributed lossless compression in order to improve the quality of side information. Optimal quantized step is determined according to the restriction of the correct DSC decoding, which makes the proposed algorithm achieve near lossless compression. Moreover, an effective rate distortion algorithm is introduced for the proposed algorithm to achieve low bit rate. Experimental results show that the compression performance of the proposed algorithm is competitive with that of the state-of-the-art compression algorithms for hyperspectral images.

  8. A brief review of plagiarism in medical scientific research papers

    Directory of Open Access Journals (Sweden)

    Mohammad Karami

    2016-06-01

    Full Text Available Plagiarism refers to “adopting someone else’s words, work or ideas and passing them off as one’s own”. It is potentially considered as the most prevalent form of scientific dishonesty discovered in research papers. The present review aims to provide a thorough account of plagiarism to build awareness about all dimensions of plagiarism.The key words “plagiarism”, “types”, “detection” and “consequences” have been applied to retrieve the articles from electronic references such as MEDLINE database. Around five hundred articles have been retrieved. The articles have been subdivided, each group encompassed a dimension of plagiarism. The major findings and updates have been summarized for each topic. The most important reason behind plagiarism as spotted is lack of knowledge about the subject. And when the researchers are trapped with deficient time, in experienced writing skills and the pressure in order get their work published in some decent journals, the authors surreptitiously take access  others’ work and commit plagiarism. Before, detecting plagiarism used to be difficult; however, in recent years,   the journals have devised many plagiarism-detection services and software programs. The current article provides the details on how the journals use these services and software tool to effectively check for plagiarism in submitted manuscripts. In academic settings, plagiarism is a potential devastating offense.Plagiarism is taken as the most common problem in research writing. The most critical way to curb it is to build up awareness about how to cope with this ever increasing problem known as research misconduct.

  9. PLAGIARISM DETECTION PROBLEMS AND ANALYSIS SOFTWARE TOOLS FOR ITS SOLVE

    Directory of Open Access Journals (Sweden)

    V. I. Shynkarenko

    2017-02-01

    Full Text Available Purpose. This study is aimed at: 1 the definition of plagiarism in texts on formal and natural languages, building a taxonomy of plagiarism; 2 identify major problems of plagiarism detection when using automated tools to solve them; 3 Analysis and systematization of information obtained during the review, testing and analysis of existing detection systems. Methodology. To identify the requirements of the software to detect plagiarism apply methods of analysis of normative documentation (legislative base and competitive tools. To check the requirements of the testing methods used and GUI interfaces review. Findings. The paper considers the concept of plagiarism issues of proliferation and classification. A review of existing systems to identify plagiarism: desktop applications, and online resources. Highlighting their functional characteristics, determine the format of the input and output data and constraints on them, customization features and access. Drill down system requirements is made. Originality. The authors proposed schemes complement the existing hierarchical taxonomy of plagiarism. Analysis of existing systems is done in terms of functionality and possibilities for use of large amounts of data. Practical value. The practical significance is determined by the breadth of the problem of plagiarism in various fields. In Ukraine, develops the legal framework for the fight against plagiarism, which requires the active solution development tasks, improvement and delivery of relevant software (PO. This work contributes to the solution of these problems. Review of existing programs, Anti-plagiarism, as well as study and research experience in the field and update the concept of plagiarism, the strategy allows it to identify more fully articulate to the functional performance requirements, the input and output of the developed software, as well as to identify the features of such software. The article focuses on the features of solving the

  10. CodeRAnts: A recommendation method based on collaborative searching and ant colonies, applied to reusing of open source code

    Directory of Open Access Journals (Sweden)

    Isaac Caicedo-Castro

    2014-01-01

    Full Text Available This paper presents CodeRAnts, a new recommendation method based on a collaborative searching technique and inspired on the ant colony metaphor. This method aims to fill the gap in the current state of the matter regarding recommender systems for software reuse, for which prior works present two problems. The first is that, recommender systems based on these works cannot learn from the collaboration of programmers and second, outcomes of assessments carried out on these systems present low precision measures and recall and in some of these systems, these metrics have not been evaluated. The work presented in this paper contributes a recommendation method, which solves these problems.

  11. A Study of Electronic Detection and Pedagogical Approaches for Reducing Plagiarism

    Science.gov (United States)

    Chao, Chia-An; Wilhelm, William J.; Neureuther, Brian D.

    2009-01-01

    Plagiarism is an increasing problem in high schools and universities. To address the issue of how to teach students not to plagiarize, this study examined several pedagogical approaches for reducing plagiarism and the use of Turnitin, an online plagiarism detection software. The study found a significant difference between the control group and…

  12. Addressing Plagiarism in Online Programmes at a Health Sciences University: A Case Study

    Science.gov (United States)

    Ewing, Helen; Anast, Ade; Roehling, Tamara

    2016-01-01

    Plagiarism continues to be a concern for all educational institutions. To build a solid foundation for high academic standards and best practices at a graduate university, aspects of plagiarism were reviewed to develop better management processes for reducing plagiarism. Specifically, the prevalence of plagiarism and software programmes for…

  13. Plagiarism: Examination of Conceptual Issues and Evaluation of Research Findings on Using Detection Services

    Science.gov (United States)

    Konstantinidis, Angelos; Theodosiadou, Dimitra; Pappos, Christos

    2013-01-01

    The purpose of this review is to analyze and evaluate the research findings on using Plagiarism Detection Services (PDS) in universities. In order to do that, conceptual issues about plagiarism are examined and the complex nature of plagiarism is discussed. Subsequently, the pragmatic forms of student plagiarism are listed and PDS strategies on…

  14. Legality, Quality Assurance and Learning: Competing Discourses of Plagiarism Management in Higher Education

    Science.gov (United States)

    Sutherland-Smith, Wendy

    2014-01-01

    In universities around the world, plagiarism management is an ongoing issue of quality assurance and risk management. Plagiarism management discourses are often framed by legal concepts of authorial rights, and plagiarism policies outline penalties for infringement. Learning and teaching discourses argue that plagiarism management is, and should…

  15. Preventing Unintentional Plagiarism: A Method for Strengthening Paraphrasing Skills

    Science.gov (United States)

    Walker, Angela L.

    2008-01-01

    Plagiarism may result from faulty cognitive processing and thereby be unintentional (Marsh, Landau, & Hicks, 1997). The current study tested the effectiveness of paraphrasing training designed to prevent unintentional plagiarism. Thirty-six students enrolled in research methods participated, one group received paraphrasing training; a control…

  16. Attitude to plagiarism and the personal information management ...

    African Journals Online (AJOL)

    Based on the findings, the study concluded that education is necessary for curbing the menace of plagiarism in higher institutions and therefore, recommended that faculty should keep educating students' on issues pertaining to plagiarism while students also endeavour to utilise Cloud and bookmarking applications as ...

  17. Pandora's Box: Academic Perceptions of Student Plagiarism in Writing

    Science.gov (United States)

    Sutherland-Smith, Wendy

    2005-01-01

    Plagiarism is viewed by many academics as a kind of Pandora's box--the elements contained inside are too frightening to allow escape for fear of the havoc that may result. Reluctance by academic members of staff to discuss student plagiarism openly may contribute to the often untenable situations we, as teachers, face when dealing with student…

  18. Good intentions: providing students with skills to avoid accidental plagiarism.

    Science.gov (United States)

    Zafron, Michelle L

    2012-01-01

    This article explores one librarian's experience with creating and implementing a plagiarism seminar as part of the library liaison program to the School of Public Health and Health Professions at the University at Buffalo. The changes and evolution of the seminar over several iterations are described. This article also examines student perceptions, misperceptions, and reactions to the plagiarism workshop.

  19. The Anatomy of a Plagiarism Initiative: One Library's Campus Collaboration

    Science.gov (United States)

    Madray, Amrita

    2008-01-01

    Plagiarism in media and print continues to be a major issue for professors, librarians, and students. Through initiatives and outreach from the B. Davis Memorial Library at the C. W. Post Campus of Long Island University, plagiarism Web sites have been created and workshops and programs continually provided for faculty and students to detect,…

  20. Applying an Employee-Motivation Model to Prevent Student Plagiarism.

    Science.gov (United States)

    Malouff, John M.; Sims, Randi L.

    1996-01-01

    A model based on Vroom's expectancy theory of employee motivation posits that instructors can prevent plagiarism by ensuring that students understand the rules of ethical writing, expect assignments to be manageable and have personal benefits, and expect plagiarism to be difficult and have important personal costs. (SK)

  1. Plagiarism, Enclosure, and the Commons of the Mind.

    Science.gov (United States)

    Scurrah, William L.

    When discussing plagiarism and cheating these days, college faculty seem to find themselves using the rhetoric of crime and punishment ("It's easier to steal from the Internet") on their students rather than a rhetoric more attuned to their actual mission. A short overview in this paper of the history of plagiarism and the development of the…

  2. Arresting Student Plagiarism: Are We Investigators or Educators?

    Science.gov (United States)

    Davis, Lajuan

    2011-01-01

    Managing student plagiarism can cause instructors to feel as if they are serving educational institutions in the role of investigator rather than educator. Since many educators continue to struggle with the issue of student plagiarism, the author interviewed some of her colleagues. In this article, she shares her and her colleagues' antiplagiarism…

  3. Teaching Students about Plagiarism Using a Web-Based Module

    Science.gov (United States)

    Stetter, Maria Earman

    2013-01-01

    The following research delivered a web-based module about plagiarism and paraphrasing to avoid plagiarism in both a blended method, with live instruction paired with web presentation for 105 students, and a separate web-only method for 22 other students. Participants were graduates and undergraduates preparing to become teachers, the majority of…

  4. A Strategy to Reduce Plagiarism in an Undergraduate Course

    Science.gov (United States)

    Belter, Ronald W.; du Pre, Athena

    2009-01-01

    This study evaluated how effective an online academic integrity module was at reducing the occurrence of plagiarism in a written assignment for a university course. In a preintervention comparison group, plagiarism was detected in 25.8% of papers submitted, compared with only 6.5% in the group that completed the academic integrity module. The…

  5. Students' Perceptions of Cheating and Plagiarism in Higher Institutions

    Science.gov (United States)

    Owunwanne, Daniel; Rustagi, Narendra; Dada, Remi

    2010-01-01

    There is a growing body of evidence that cheating and plagiarism are prominent problems in many universities. In informal conversations, it seems that different students perceive plagiarism differently. In this paper, we conducted a survey at Howard University to examine or to follow up with this growing trend. Specifically, team leaders in school…

  6. The significance of anti-plagiarism in modern day authorship ...

    African Journals Online (AJOL)

    The significance of anti-plagiarism in modern day authorship. ... It has made all the steps of the plagiarism process – locating material, copying it and presenting it to audience- easier as well as its detection. The factors that ... Institutions should set policies and take responsibility for integrity of research reporting. This is ...

  7. Plagiarism in the Japanese Universities: Truly a Cultural Matter?

    Science.gov (United States)

    Wheeler, Greg

    2009-01-01

    Although plagiarism is considered among western academic circles as one of the worst "crimes" a student can commit, many scholars suggest that these attitudes do not apply to students from areas outside this sphere. They believe that in many countries, plagiarism is considered culturally acceptable. As such, ESL or EFL instructors in…

  8. Reducing Plagiarism by Using Online Software: An Experimental Study

    Science.gov (United States)

    Kose, Ozgur; Arikan, Arda

    2011-01-01

    This action research attempts to explore the perceptions of Turkish university students on plagiarism while evaluating the effectiveness of an online application used to deter plagiarism. The participants were 40 first year university students studying in two different sections of an academic writing class. The findings show that the participants…

  9. Turnitin Systems: A Deterrent to Plagiarism in College Classrooms

    Science.gov (United States)

    Heckler, Nina C.; Rice, Margaret; Bryan, C. Hobson

    2013-01-01

    Computer technology and the Internet now make plagiarism an easier enterprise. As a result, faculty must be more diligent in their efforts to mitigate the practice of academic integrity, and institutions of higher education must provide the leadership and support to ensure the context for it. This study explored the use of a plagiarism detection…

  10. Plagiarism Litigation Trends in the USA and Australia

    Science.gov (United States)

    Mawdsley, Ralph D.; Cumming, J. Joy

    2008-01-01

    In this article we explore the increasing complexity of plagiarism litigation in the USA and Australia. Plagiarism has always been a serious academic issue and academic staff and students have wrestled with its definition and appropriate penalties for some time. However, the advent of the Internet and more freely accessible information resources,…

  11. Non-Native University Students' Perception of Plagiarism

    Science.gov (United States)

    Ahmad, Ummul Khair; Mansourizadeh, Kobra; Ai, Grace Koh Ming

    2012-01-01

    Plagiarism is a complex issue especially among non-native students and it has received a lot of attention from researchers and scholars of academic writing. Some scholars attribute this problem to cultural perceptions and different attitudes toward texts. This study evaluates student perception of different aspects of plagiarism. A small group of…

  12. Instructor Perceptions of Plagiarism: Are We Finding Common Ground?

    Science.gov (United States)

    Bennett, Kymberley K.; Behrendt, Linda S.; Boothby, Jennifer L.

    2011-01-01

    This study examined instructor views of what constitutes plagiarism. The authors collected questionnaire data from 158 participants recruited through three teaching-related electronic listservs. Results showed that most participants agreed that behaviors that claim credit for someone else's work constituted plagiarism. Instructors differed in…

  13. Decreasing Plagiarism: What Works and What Doesn't

    Science.gov (United States)

    Houtman, Anne M.; Walker, Sean

    2010-01-01

    The authors tested the predictions of a game theory model of plagiarism, using a test population of student papers submitted to an online plagiarism detection program, over five semesters in a non-majors biology course with multiple sections and high enrollment. Consistent with the model, as the probability of detection and the penalty if caught…

  14. Using Computer Simulations and Games to Prevent Student Plagiarism

    Science.gov (United States)

    Bradley, Elizabeth G.

    2015-01-01

    In this increasingly digital age, student plagiarism is rampant. Roughly half of college students admit to plagiarizing using content found online, directly copying and pasting the work of others. Digital technology and social media have greatly changed the landscape of how knowledge is acquired and disseminated; thus, students must be explicitly…

  15. Application of Plagiarism Screening Software in the Chemical Engineering Curriculum

    Science.gov (United States)

    Cooper, Matthew E.; Bullard, Lisa G.

    2014-01-01

    Plagiarism is an area of increasing concern for written ChE assignments, such as laboratory and design reports, due to ease of access to text and other materials via the internet. This study examines the application of plagiarism screening software to four courses in a university chemical engineering curriculum. The effectiveness of plagiarism…

  16. Protecting Student Intellectual Property in Plagiarism Detection Process

    Science.gov (United States)

    Butakov, Sergey; Barber, Craig

    2012-01-01

    The rapid development of the Internet along with increasing computer literacy has made it easy and tempting for digital natives to copy-paste someone's work. Plagiarism is now a burning issue in education, industry and even in the research community. In this study, the authors concentrate on plagiarism detection with particular focus on the…

  17. Online plagiarism training falls short in biology classrooms.

    Science.gov (United States)

    Holt, Emily A; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework assignment) and their impacts on students' ability to accurately discriminate plagiarism from text that is properly quoted, paraphrased, and attributed. Using pre- and postsurveys of 173 undergraduate students in three general ecology courses, we found that students given the homework assignment had far greater success in identifying plagiarism or the lack thereof compared with students given no training. In general, students trained with the homework assignment more successfully identified plagiarism than did students trained with the online tutorial. We also found that the summative assessment associated with the plagiarism-avoidance training formats (i.e., homework grade and online tutorial assessment score) did not correlate with student improvement on surveys through time.

  18. Student Plagiarism in Higher Education in Vietnam: An Empirical Study

    Science.gov (United States)

    Do Ba, Khang; Do Ba, Khai; Lam, Quoc Dung; Le, Dao Thanh Binh An; Nguyen, Phuong Lien; Nguyen, Phuong Quynh; Pham, Quoc Loc

    2017-01-01

    This paper assesses and compares the prevalence of plagiarism across different student and assignment characteristics at a university in Vietnam, using the similarity index reported by the text-matching software Turnitin as a proxy measure of plagiarism on a sample of 681 student papers. The findings present a level of match higher than reported…

  19. A proposed metamodel for the implementation of object oriented software through the automatic generation of source code

    Directory of Open Access Journals (Sweden)

    CARVALHO, J. S. C.

    2008-12-01

    Full Text Available During the development of software one of the most visible risks and perhaps the biggest implementation obstacle relates to the time management. All delivery deadlines software versions must be followed, but it is not always possible, sometimes due to delay in coding. This paper presents a metamodel for software implementation, which will rise to a development tool for automatic generation of source code, in order to make any development pattern transparent to the programmer, significantly reducing the time spent in coding artifacts that make up the software.

  20. Student Plagiarism and the Use of a Plagiarism Detection Tool by Community College Faculty

    Science.gov (United States)

    Thurmond, Bradley H.

    2010-01-01

    This study sought to better inform community college administrators and faculty regarding possible factors that contribute to higher levels of student plagiarism and to suggest appropriate preventative or responsive interventions. The specific purpose of the study was to investigate a set of faculty related factors that may be associated with…

  1. Who Has Read the Policy on Plagiarism? Unpacking Students' Understanding of Plagiarism

    Science.gov (United States)

    Gullifer, J. M.; Tyson, G. A.

    2014-01-01

    Research has established that the term "plagiarism" is open to different interpretations, resulting in confusion among students and staff alike. University policy on academic integrity/misconduct defines the behaviours that all stakeholders must abide by, and the parameters for reporting, investigating and penalising infringements. These…

  2. Where Does Originality End and Plagiarism Start? Discussing Plagiarism in Information Science

    DEFF Research Database (Denmark)

    Greifeneder, Elke Susanne; Connaway, Lynn Silipigni; Jiang, Tingting

    2014-01-01

    no longer be considered to be original and starts to be considered self-plagiarism. Parts of the discussion will center on the question of whether information science researchers can actually avoid repeating the same words when today they have to publish results from research projects in as many...

  3. Preventing and designing out plagiarism : making the most of VLEs and CAA tools

    OpenAIRE

    Baños-Piñero, Rocío

    2010-01-01

    Plagiarism is an issue that has recently become a heated topic of discussion, attracting the attention of scholars, institutions and the media. Although plagiarism has always existed, the development of new technologies, especially the increased use of the Internet for academic purposes, have lately been blamed for the growth of opportunities for plagiarism (Baty, 2000). The role of new technologies is such that new terms like "cyber plagiarism" or "digital plagiarism" (Park, 2003: 481) and "...

  4. On academic plagiarism in Europe. An analytical approach based on four studies

    OpenAIRE

    Vanja Pupovac; Lidija Bilic-Zulle; Mladen Petrovecki

    2008-01-01

    With the development of information and communication technology (ICT), plagiarism becomes an ever more serious problem in the academic community. According to the studies on academic plagiarism conducted at universities in four different European countries, plagiarism rates among students are quite high and students mostly ignore or allow plagiarism because of a lack of knowledge, lack of consequences, or simply because ICT makes plagiarism easy to commit. The findings of the studies present...

  5. Slow Temporal Integration Enables Robust Neural Coding and Perception of a Cue to Sound Source Location.

    Science.gov (United States)

    Brown, Andrew D; Tollin, Daniel J

    2016-09-21

    In mammals, localization of sound sources in azimuth depends on sensitivity to interaural differences in sound timing (ITD) and level (ILD). Paradoxically, while typical ILD-sensitive neurons of the auditory brainstem require millisecond synchrony of excitatory and inhibitory inputs for the encoding of ILDs, human and animal behavioral ILD sensitivity is robust to temporal stimulus degradations (e.g., interaural decorrelation due to reverberation), or, in humans, bilateral clinical device processing. Here we demonstrate that behavioral ILD sensitivity is only modestly degraded with even complete decorrelation of left- and right-ear signals, suggesting the existence of a highly integrative ILD-coding mechanism. Correspondingly, we find that a majority of auditory midbrain neurons in the central nucleus of the inferior colliculus (of chinchilla) effectively encode ILDs despite complete decorrelation of left- and right-ear signals. We show that such responses can be accounted for by relatively long windows of bilateral excitatory-inhibitory interaction, which we explicitly measure using trains of narrowband clicks. Neural and behavioral data are compared with the outputs of a simple model of ILD processing with a single free parameter, the duration of excitatory-inhibitory interaction. Behavioral, neural, and modeling data collectively suggest that ILD sensitivity depends on binaural integration of excitation and inhibition within a ≳3 ms temporal window, significantly longer than observed in lower brainstem neurons. This relatively slow integration potentiates a unique role for the ILD system in spatial hearing that may be of particular importance when informative ITD cues are unavailable. In mammalian hearing, interaural differences in the timing (ITD) and level (ILD) of impinging sounds carry critical information about source location. However, natural sounds are often decorrelated between the ears by reverberation and background noise, degrading the fidelity of

  6. [Scientific stealing (Plagiarism) in medical journals].

    Science.gov (United States)

    Enöz, Murat

    2007-01-01

    The obligation to publish academic papers in order to get academic rank has made medical doctors more ambitious to publish faster and more papers. According to the ethical and legal rules in our country and in the world, if an idea or technical methods of another person is used in a medical journal, the owner of the method or idea and its publication has to be cited. If an idea, information or a technical method of another scientist is published without citation as if it was one's own idea it's called "Plagiarism". Despite the prohibitive laws and rules, this scientific stealing has become an increasing problem for medical journals worldwide.

  7. Do medical students require education on issues related to plagiarism?

    Science.gov (United States)

    Varghese, Joe; Jacob, Molly

    2015-01-01

    In the course of our professional experience, we have seen that many medical students plagiarise. We hypothesised that they do so out of ignorance and that they require formal education on the subject. With this objective in mind, we conducted a teaching session on issues related to plagiarism. As a part of this, we administered a quiz to assess their baseline knowledge on plagiarism and a questionnaire to determine their attitudes towards it. We followed this up with an interactive teaching session, in which we discussed various aspects of plagiarism. We subjected the data obtained from the quiz and questionnaire to bivariate and multivariate analysis. A total of 423 medical students participated in the study. Their average score for the quiz was 4.96±1.67 (out of 10). Age, gender and years in medical school were not significantly associated with knowledge regarding plagiarism. The knowledge scores were negatively correlated with permissive attitudes towards plagiarism and positively correlated with attitudes critical of the practice. Men had significantly higher scores on permissive attitudes compared to women . In conclusion, we found that the medical students' knowledge regarding plagiarism was limited. Those with low knowledge scores tended to have permissive attitudes towards plagiarism and were less critical of the practice. We recommend the inclusion of formal instruction on this subject in the medical curriculum, so that this form of academic misconduct can be tackled.

  8. Construction of knowledge, attitude and practice questionnaire for assessing plagiarism.

    Science.gov (United States)

    Poorolajal, J; Cheraghi, P; Irani, A Doosti; Cheraghi, Z; Mirfakhraei, M

    2012-01-01

    This study was conducted to develop a questionnaire in order to evaluate knowledge, attitude and practice (KAP) of the faculty members and students toward plagiarism. A KAP study was conducted from June to October 2011 enrolling 390 volunteers anonymously (response rate 96%). The questionnaire included the following four parts: (a) general characteristics like gender, academic degree and education level; (b) nine questions regarding knowledge (Min=0, Max=9); (c) nine questions regarding attitude (Min=9, Max=27); and (d) eight questions regarding practice (Min=0, Max=8). A pilot study was conducted to assess reliability of the questions regarding knowledge and attitude. Cronbach's alpha coefficient for the knowledge and attitude questions was 0.70 and 0.74 respectively. The overall prevalence of at least once plagiarism commission was 38% (SD=0.035). The overall mean score of knowledge, attitude and practice was 5.94 (SD=1.66), 24.12 (SD=2.99), and 0.66 (SD=1.15) respectively. Knowledge of plagiarism was significantly higher among higher academic degrees and females. Their negative attitude toward plagiarism was stronger too. No statistically significant difference regarding plagiarism commission was observed among different academic degrees in both sexes. According to linear regression analysis, plagiarism commission decreased 13% per one unit increase in score of knowledge (P=0.005) and 16% per one unit increase in score of attitude (Pplagiarism and to estimate the prevalence and the type of plagiarism commission.

  9. Exploring Plagiarism into Perspectives of Indonesian Academics and Students

    Directory of Open Access Journals (Sweden)

    Rina Agustina

    2017-08-01

    Full Text Available Plagiarism has been done by students from around the globes. There has been a heated discussion of finding reasons why plagiarism occurred in academic world and Eastern students in particular. This research wants to explore how actually students perceive plagiarism in their academic writing as well as how lecturers coped with plagiarism in the students’ assignments. The research participants were taken from 2 different majors, 32 English Education students and 10 Psychology students as well as 5 lecturers from English Education Department and 3 lecturers from Psychology Faculty in one of private universities in Central Java Province, Indonesia. Questionnaires were distributed to those respondents and also interviews were conducted to several lecturers and students. The results of questionnaire and interview showed that both students and lecturers knew and understand the essence of plagiarism, however, students admitted that they still plagiarised in their assignment. Lecturers, on the other hand, revealed that they could figure out when students plagiarised others’ works. However, it was limited to crossing over assignments between students. In other words, detecting plagiarism was done manually and restricted to students’ written works only. In conclusion, despite comprehending the meaning of plagiarism, student still plagiarised since there was not any real action from lecturers to encounter it.

  10. Construction of Knowledge, Attitude and Practice Questionnaire for Assessing Plagiarism

    Science.gov (United States)

    Poorolajal, J; Cheraghi, P; Irani, A Doosti; Cheraghi, Z; Mirfakhraei, M

    2012-01-01

    Background This study was conducted to develop a questionnaire in order to evaluate knowledge, attitude and practice (KAP) of the faculty members and students toward plagiarism. Methods: A KAP study was conducted from June to October 2011 enrolling 390 volunteers anonymously (response rate 96%). The questionnaire included the following four parts: (a) general characteristics like gender, academic degree and education level; (b) nine questions regarding knowledge (Min=0, Max=9); (c) nine questions regarding attitude (Min=9, Max=27); and (d) eight questions regarding practice (Min=0, Max=8). A pilot study was conducted to assess reliability of the questions regarding knowledge and attitude. Cronbach’s alpha coefficient for the knowledge and attitude questions was 0.70 and 0.74 respectively. Results: The overall prevalence of at least once plagiarism commission was 38% (SD=0.035). The overall mean score of knowledge, attitude and practice was 5.94 (SD=1.66), 24.12 (SD=2.99), and 0.66 (SD=1.15) respectively. Knowledge of plagiarism was significantly higher among higher academic degrees and females. Their negative attitude toward plagiarism was stronger too. No statistically significant difference regarding plagiarism commission was observed among different academic degrees in both sexes. According to linear regression analysis, plagiarism commission decreased 13% per one unit increase in score of knowledge (P=0.005) and 16% per one unit increase in score of attitude (Pplagiarism and to estimate the prevalence and the type of plagiarism commission. PMID:23304676

  11. RZLINE code modelling of distributed tin targets for laser-produced plasma sources of extreme ultraviolet radiation

    NARCIS (Netherlands)

    Koshelev, K.; Noivkov, V.G.; Medvedev, Viacheslav; Grushin, A.S.; Krivtsun, V.M.

    2012-01-01

    Abstract. An integrated model is developed to describe the hydrodynamics, atomic, and radiation processes that take place in extreme ultraviolet (EUV) radiation sources based on a laser-produced plasma with a distributed tin target. The modeling was performed using the RZLINE code—a numerical code

  12. Plagiarism and Prosecution: A New Approach at Air University.

    Science.gov (United States)

    1988-04-01

    publication through plagiarism or otherwise. ś’’ In deciding these cases , a court would look to the same factors as enume rated above for .nfringement...in the academic environment. Its imrpetus ~.as; thtL occurrence of three cases of plagiarism at Air Commurand and Staff College during a t-,oc mcnth...whether the offense contains the element of intent,’ and how to best deal with it. The cases highlight the need to clarify what plagiarism is. how it

  13. Plagiarism issues in post-1998 Indonesian film posters

    Directory of Open Access Journals (Sweden)

    Ekky Imanjaya

    2012-04-01

    Full Text Available There are online articles, with visual materials, stating that some post-1998 Indonesian film posters were accused as plagiarism by common people. However, academically speaking, it needs deeper skills and knowledge to prove acts of plagiarism. This paper will discuss the issues around Indonesian film posters and plagiarism, including the possibility of citing in graphic design. The research will treat film posters not only as marketing tools to promote the movies, as many people consider, but also as graphic design materials. Some terms such as appropriation, homage, and pastiche will be discussed to analyze the phenomenon.

  14. Distributed source coding of video with non-stationary side-information

    NARCIS (Netherlands)

    Meyer, P.F.A.; Westerlaken, R.P.; Klein Gunnewiek, R.; Lagendijk, R.L.

    2005-01-01

    In distributed video coding, the complexity of the video encoder is reduced at the cost of a more complex video decoder. Using the principles of Slepian andWolf, video compression is then carried out using channel coding principles, under the assumption that the video decoder can temporally predict

  15. On Network Coded Filesystem Shim: Over-the-top Multipath Multi-Source Made Easy

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2017-01-01

    approach is that it allows caches in the network to store only a fraction of a specific content in coded form, but sharing the same object identification, i.e., it simplifies the signalling and search of coded content. We describe the NCFSS design and implementation using FUSE and carry out measurements...

  16. A Novel Code System for Revealing Sources of Students' Difficulties with Stoichiometry

    Science.gov (United States)

    Gulacar, Ozcan; Overton, Tina L.; Bowman, Charles R.; Fynewever, Herb

    2013-01-01

    A coding scheme is presented and used to evaluate solutions of seventeen students working on twenty five stoichiometry problems in a think-aloud protocol. The stoichiometry problems are evaluated as a series of sub-problems (e.g., empirical formulas, mass percent, or balancing chemical equations), and the coding scheme was used to categorize each…

  17. VULCAN: An Open-source, Validated Chemical Kinetics Python Code for Exoplanetary Atmospheres

    Science.gov (United States)

    Tsai, Shang-Min; Lyons, James R.; Grosheintz, Luc; Rimmer, Paul B.; Kitzmann, Daniel; Heng, Kevin

    2017-02-01

    We present an open-source and validated chemical kinetics code for studying hot exoplanetary atmospheres, which we name VULCAN. It is constructed for gaseous chemistry from 500 to 2500 K, using a reduced C-H-O chemical network with about 300 reactions. It uses eddy diffusion to mimic atmospheric dynamics and excludes photochemistry. We have provided a full description of the rate coefficients and thermodynamic data used. We validate VULCAN by reproducing chemical equilibrium and by comparing its output versus the disequilibrium-chemistry calculations of Moses et al. and Rimmer & Helling. It reproduces the models of HD 189733b and HD 209458b by Moses et al., which employ a network with nearly 1600 reactions. We also use VULCAN to examine the theoretical trends produced when the temperature-pressure profile and carbon-to-oxygen ratio are varied. Assisted by a sensitivity test designed to identify the key reactions responsible for producing a specific molecule, we revisit the quenching approximation and find that it is accurate for methane but breaks down for acetylene, because the disequilibrium abundance of acetylene is not directly determined by transport-induced quenching, but is rather indirectly controlled by the disequilibrium abundance of methane. Therefore we suggest that the quenching approximation should be used with caution and must always be checked against a chemical kinetics calculation. A one-dimensional model atmosphere with 100 layers, computed using VULCAN, typically takes several minutes to complete. VULCAN is part of the Exoclimes Simulation Platform (ESP; exoclime.net) and publicly available at https://github.com/exoclime/VULCAN.

  18. Chaos gray-coded genetic algorithm and its application for pollution source identifications in convection diffusion equation

    Science.gov (United States)

    Yang, Xiaohua; Yang, Zhifeng; Yin, Xinan; Li, Jianqiang

    2008-10-01

    In order to reduce the computational amount and improve computational precision for nonlinear optimizations and pollution source identification in convection-diffusion equation, a new algorithm, chaos gray-coded genetic algorithm (CGGA) is proposed, in which initial population are generated by chaos mapping, and new chaos mutation and Hooke-Jeeves evolution operation are used. With the shrinking of searching range, CGGA gradually directs to an optimal result with the excellent individuals obtained by gray-coded genetic algorithm. Its convergence is analyzed. It is very efficient in maintaining the population diversity during the evolution process of gray-coded genetic algorithm. This new algorithm overcomes any Hamming-cliff phenomena existing in other encoding genetic algorithm. Its efficiency is verified by application of 20 nonlinear test functions of 1-20 variables compared with standard binary-coded genetic algorithm and improved genetic algorithm. The position and intensity of pollution source are well found by CGGA. Compared with Gray-coded hybrid-accelerated genetic algorithm and pure random search algorithm, CGGA has rapider convergent speed and higher calculation precision.

  19. ANEMOS: A computer code to estimate air concentrations and ground deposition rates for atmospheric nuclides emitted from multiple operating sources

    Energy Technology Data Exchange (ETDEWEB)

    Miller, C.W.; Sjoreen, A.L.; Begovich, C.L.; Hermann, O.W.

    1986-11-01

    This code estimates concentrations in air and ground deposition rates for Atmospheric Nuclides Emitted from Multiple Operating Sources. ANEMOS is one component of an integrated Computerized Radiological Risk Investigation System (CRRIS) developed for the US Environmental Protection Agency (EPA) for use in performing radiological assessments and in developing radiation standards. The concentrations and deposition rates calculated by ANEMOS are used in subsequent portions of the CRRIS for estimating doses and risks to man. The calculations made in ANEMOS are based on the use of a straight-line Gaussian plume atmospheric dispersion model with both dry and wet deposition parameter options. The code will accommodate a ground-level or elevated point and area source or windblown source. Adjustments may be made during the calculations for surface roughness, building wake effects, terrain height, wind speed at the height of release, the variation in plume rise as a function of downwind distance, and the in-growth and decay of daughter products in the plume as it travels downwind. ANEMOS can also accommodate multiple particle sizes and clearance classes, and it may be used to calculate the dose from a finite plume of gamma-ray-emitting radionuclides passing overhead. The output of this code is presented for 16 sectors of a circular grid. ANEMOS can calculate both the sector-average concentrations and deposition rates at a given set of downwind distances in each sector and the average of these quantities over an area within each sector bounded by two successive downwind distances. ANEMOS is designed to be used primarily for continuous, long-term radionuclide releases. This report describes the models used in the code, their computer implementation, the uncertainty associated with their use, and the use of ANEMOS in conjunction with other codes in the CRRIS. A listing of the code is included in Appendix C.

  20. Ethical conduct for research : a code of scientific ethics

    Science.gov (United States)

    Marcia Patton-Mallory; Kathleen Franzreb; Charles Carll; Richard Cline

    2000-01-01

    The USDA Forest Service recently developed and adopted a code of ethical conduct for scientific research and development. The code addresses issues related to research misconduct, such as fabrication, falsification, or plagiarism in proposing, performing, or reviewing research or in reporting research results, as well as issues related to professional misconduct, such...

  1. SMILEI : A collaborative, open-source, multi-purpose particle-in-cell code for plasma simulation

    Science.gov (United States)

    Derouillat, J.; Beck, A.; Pérez, F.; Vinci, T.; Chiaramello, M.; Grassi, A.; Flé, M.; Bouchard, G.; Plotnikov, I.; Aunai, N.; Dargent, J.; Riconda, C.; Grech, M.

    2018-01-01

    SMILEI is a collaborative, open-source, object-oriented (C++) particle-in-cell code. To benefit from the latest advances in high-performance computing (HPC), SMILEI is co-developed by both physicists and HPC experts. The code's structures, capabilities, parallelization strategy and performances are discussed. Additional modules (e.g. to treat ionization or collisions), benchmarks and physics highlights are also presented. Multi-purpose and evolutive, SMILEI is applied today to a wide range of physics studies, from relativistic laser-plasma interaction to astrophysical plasmas.

  2. Methodology and Toolset for Model Verification, Hardware/Software co-simulation, Performance Optimisation and Customisable Source-code generation

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Yu, Hao

    2013-01-01

    The MODUS project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. The MODUS tool will provide a model verification and Hardware/Software co-simulation tool (TRIAL) and a performance...... of system properties, and producing inputs to be fed into these engines, interfacing with standard (SystemC) simulation platforms for HW/SW co-simulation, customisable source-code generation towards respecting coding standards and conventions and software performance-tuning optimisation through automated...

  3. An Exercise To Teach Bioscience Students about Plagiarism.

    Science.gov (United States)

    Willmott, Chris J. R.; Harrison, Tim M.

    2003-01-01

    Plagiarism is an issue of increasing concern to educators, yet students are not always clear on the boundaries between acceptable and unacceptable practice. Presents an exercise to help bioscience students make this important distinction. (Author/SOE)

  4. Do medical students really understand plagiarism? - Case study.

    Science.gov (United States)

    Badea, Oana

    2017-01-01

    In the last decade, more and more medicine students are involved in research, either in the form of a research project within specialized courses or as a scientific article to be presented at student international conferences or published in prestigious medical journals. The present study included 250 2nd year medical students, currently studying within the University of Medicine and Pharmacy of Craiova, Romania. There were collected 239 responses, with a response rate of 95.6%. In our study, the results showed that foreign students within the University of Medicine and Pharmacy of Craiova did have some issues understanding plagiarism with fewer foreign students (34%) than Romanian students (66%) recognizing that simply changing words does not avoid plagiarism. In our opinion, there should be put more emphasis upon plagiarism implications and its aspects, as well, with a permanent order to try to prevent future attempts of plagiarizing among medical students as future researchers within the medical science field.

  5. Writing a research paper at the university: authorship vs plagiarism

    Directory of Open Access Journals (Sweden)

    Maria Fátima Alves

    2016-09-01

    Full Text Available Considering the need of producing academic texts at the university, many undergraduate students do it by copying texts that were already published. In this study we discuss the presence of plagiarism versus authorship marks in the introduction of academic articles produced by freshmen in a licenciateship degree. Therefore, we emphasize the issue of plagiarism and authorship, particularly from the perspective of the enunciative bakhtinian studies and then present the theoretical basis of Literacies, with the most recent studies on Literacies and Socio-Rhetorics. Data analysis revealed and confirmed the academic writing as a complex activity, given the practice of plagiarism found in the analyzed productions. The lack of knowledge of academic writing together not the theme domain contributed to the practice of plagiarism.

  6. Plagiarism Detection Using Artificial Intelligence Technique In Multiple Files

    Directory of Open Access Journals (Sweden)

    Mausumi Sahu

    2015-08-01

    Full Text Available Plagiarism relates to the act of taking information or ideas of someone else and demand it as your own. Basically it reproduce the existing information in modified format. In every field of education it becomes a serious issue. Various techniques and tools are derived these days to detect plagiarism. Various types of plagiarism are there like text matching copy paste grammar based method etc.This paper proposes a new method implemented in a program where we utilise a text set to identify the copied part by comparing with some existing multiple files. Here we put the concept of a machine learning language i.e k-NN. It helps us to identify whether a paper is plagiarized or not.

  7. Retraction: Plagiarism in the article Emphysematous cystitis and ...

    African Journals Online (AJOL)

    Retraction: Plagiarism in the article Emphysematous cystitis and emphysematous pyelitis: a clinically misleading association. Mustapha Ahsaini et al. The Pan African Medical Journal. 2013;16:18. (doi:10.11604/pamj.2013.16.18.2505)

  8. Pharmacy students' ability to identify plagiarism after an educational intervention.

    Science.gov (United States)

    Degeeter, Michelle; Harris, Kira; Kehr, Heather; Ford, Carolyn; Lane, Daniel C; Nuzum, Donald S; Compton, Cynthia; Gibson, Whitney

    2014-03-12

    Objective. To determine if an educational intervention in a doctor of pharmacy (PharmD) degree program increases pharmacy students' ability to identify plagiarism. Methods. First-year (P1), second-year (P2), and third-year (P3) pharmacy students attended an education session during which types of plagiarism and methods for avoiding plagiarism were reviewed. Students completed a preintervention assessment immediately prior to the session and a postintervention assessment the following semester to measure their ability. Results. Two hundred fifty-two students completed both preintervention and postintervention assessments. There was a 4% increase from preintervention to postintervention in assessment scores for the overall student sample (pplagiarism can significantly improve students' ability to identify plagiarism.

  9. Pharmacy Students’ Ability to Identify Plagiarism After an Educational Intervention

    Science.gov (United States)

    Harris, Kira; Kehr, Heather; Ford, Carolyn; Lane, Daniel C.; Nuzum, Donald S.; Compton, Cynthia; Gibson, Whitney

    2014-01-01

    Objective. To determine if an educational intervention in a doctor of pharmacy (PharmD) degree program increases pharmacy students’ ability to identify plagiarism. Methods. First-year (P1), second-year (P2), and third-year (P3) pharmacy students attended an education session during which types of plagiarism and methods for avoiding plagiarism were reviewed. Students completed a preintervention assessment immediately prior to the session and a postintervention assessment the following semester to measure their ability. Results. Two hundred fifty-two students completed both preintervention and postintervention assessments. There was a 4% increase from preintervention to postintervention in assessment scores for the overall student sample (pplagiarism can significantly improve students’ ability to identify plagiarism. PMID:24672066

  10. Activity Surveillance and Hawthorne Effect to Prevent Programming Plagiarism

    OpenAIRE

    Sufian Sufian; Norijah Hussin; Syahanim M. Salleh; Hairulliza M. Judi

    2010-01-01

    Problem statement: Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Preventive action is required rather than curing the problem so that programming students get the right message from the beginning. Approach: To address this problem, a surveillance system was propo...

  11. Combating plagiarism: the role of the health librarian.

    Science.gov (United States)

    Spring, Hannah; Adams, Rachel

    2013-12-01

    This feature looks at the issue of plagiarism in health care students and the role of the health librarian in combating the problem. In particular, consideration is given to how plagiarism can occur and provides some examples from two UK universities of approaches health librarians can take in supporting students to avoid these common pitfalls. © 2013 The authors. Health Information and Libraries Journal © 2013 Health Libraries Group.

  12. Open-source tool for automatic import of coded surveying data to multiple vector layers in GIS environment

    Directory of Open Access Journals (Sweden)

    Eva Stopková

    2016-12-01

    Full Text Available This paper deals with a tool that enables import of the coded data in a singletext file to more than one vector layers (including attribute tables, together withautomatic drawing of line and polygon objects and with optional conversion toCAD. Python script v.in.survey is available as an add-on for open-source softwareGRASS GIS (GRASS Development Team. The paper describes a case study basedon surveying at the archaeological mission at Tell-el Retaba (Egypt. Advantagesof the tool (e.g. significant optimization of surveying work and its limits (demandson keeping conventions for the points’ names coding are discussed here as well.Possibilities of future development are suggested (e.g. generalization of points’names coding or more complex attribute table creation.

  13. Construction and Validation of Attitudes Toward Plagiarism Questionnaire

    Science.gov (United States)

    Mavrinac, Martina; Brumini, Gordana; Bilić-Zulle, Lidija; Petrovečki, Mladen

    2010-01-01

    Aim To develop and test the psychometric characteristics of a questionnaire measuring attitudes toward plagiarism. Methods Participants were 227 undergraduates and graduate students from three Croatian universities, with a median age of 21 years (range 18 to 48). Research was conducted from March to June 2009. For the purpose of construction of the first version of the questionnaire, 67 statements (items) were developed. The statements were based on the relevant literature and were developed following rules and recommendations for questionnaire writing, and 36 items were chosen for final validation. Factor analysis was used to find out the factor structure of the questionnaire and to measure construct validity. Results The final version of the questionnaire consisted of 29 items divided into a three-factor structure: factor I – positive attitude toward plagiarism (12 items); factor II – negative attitude toward plagiarism (7 items); and factor III – subjective norms toward plagiarism (10 items). Cronbach α was calculated to confirm the reliability of the scale: factor I – α = 0.83; factor II – α = 0.79; and factor III – α = 0.85. Correlations between factors were: -0.37 between I and II, -0.41 between I and III, and +0.31 between II and III. Conclusion Attitudes Toward Plagiarism questionnaire was developed, with good psychometric characteristics. It will be used in future research as a standardized tool for measuring attitudes toward plagiarism. PMID:20564761

  14. Construction and validation of attitudes toward plagiarism questionnaire.

    Science.gov (United States)

    Mavrinac, Martina; Brumini, Gordana; Bilić-Zulle, Lidija; Petrovecki, Mladen

    2010-06-01

    To develop and test the psychometric characteristics of a questionnaire measuring attitudes toward plagiarism. Participants were 227 undergraduates and graduate students (128 women and 99 men) from three Croatian universities, with a median age of 21 years (range 18 to 48). Research was conducted from March to June 2009. For the purpose of construction of the first version of the questionnaire, 67 statements (items) were developed. The statements were based on the relevant literature and were developed following rules and recommendations for questionnaire writing, and 36 items were chosen for final validation. Factor analysis was used to find out the factor structure of the questionnaire and to measure construct validity. The final version of the questionnaire consisted of 29 items divided into a three-factor structure: factor I - positive attitude toward plagiarism (12 items); factor II - negative attitude toward plagiarism (7 items); and factor III - subjective norms toward plagiarism (10 items). Cronbach alpha was calculated to confirm the reliability of the scale: factor I - alpha=0.83; factor II - alpha=0.79; and factor III - alpha=0.85. Correlations between factors were: -0.37 between I and II, -0.41 between I and III, and +0.31 between II and III. Attitudes Toward Plagiarism questionnaire was developed, with good psychometric characteristics. It will be used in future research as a standardized tool for measuring attitudes toward plagiarism.

  15. Plagiarism governance in nurse education; dispositions, dimensions and tensions.

    Science.gov (United States)

    Welsh, Marion

    2017-11-01

    The reality of managing plagiarism in nurse education is indicative of multilayered and cumulative governance processes, which exist to fit with the needs of both the higher education institution and that of the Professional Statutory and Regulatory Body. However, the relationship between these entities is diffuse, particularly when this involves major plagiarism by post-qualified learners. This study sought to explore the strategic governance of plagiarism in Scottish higher education institutions offering nurse education and its articulation with the professional requirements of nurse education. The design involved a retrospective quantitative documentary analysis of plagiarism policies within 11 Scottish higher education institutions and a national on-line survey involving nurse educators with an active teaching role (n = 187). The documentary analysis demonstrated deficits and variations in how Scottish higher education institutions communicated the dimensions of plagiarism, and its subsequent management. Statistically significant findings from the on-line survey provided a clear mandate for educational providers to make visible the connectivity between organisational and professional governance processes to support responsive and proportional approaches to managing plagiarism by nurse learners. Significant findings also confirmed role implications and responsibilities, which nurse educators in this study, viewed as primarily pedagogical but crucially remain professionally centric. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. THE CONSTRUCTION OF INDONESIAN-ENGLISH CROSS LANGUAGE PLAGIARISM DETECTION SYSTEM USING FINGERPRINTING TECHNIQUE

    Directory of Open Access Journals (Sweden)

    Zakiy Firdaus Alfikri

    2012-07-01

    Full Text Available Cross language plagiarism detection is an important task since it can protect person intellectual property right. Since English is the most popular international language, we proposed an Indonesian-English cross language plagiarism detection to handle such problem in Indonesian-English domain where the suspected plagiarism document is written in Indonesian and the source document is written in English. To minimize translation error, we build the system by translating the Indonesian document into English and then compare the translated document with the English document collection. The detection system consists of preprocess component, heuristic retrieval component, and detailed analysis component. The main technique used in retrieval process is fingerprinting which can extract lexical features from text which is suitable to be used to detect plagiarism done using literal translation method. In this paper, we also propose additional methods to be implemented in heuristic retrieval component to increase the performance of the system: phrase chunking, stop word removal, stemming, and synonym selection. We evaluated system’s performance and the effects of additional methods to system’s performance, provided several data test sets which represents a plagiarism type. From the experiments, we concluded that the system works on 83.33% of test cases. We also concluded that mainly all additional methods except the phrase chunking have good effects in enhancing the system accuracy. Deteksi plagiarisme lintas bahasa merupakan hal yang penting untuk melindungi hak kekayaan intelektual. Bahasa Inggris adalah bahasa internasional yang paling populer, karenanya peneliti mengusulkan deteksi plagiarisme lintas bahasa Indonesia-Inggris untuk menangani masalah tersebut di mana domain dokumen yang diduga plagiat ditulis dalam bahasa Indonesia dan dokumen sumber ditulis dalam bahasa Inggris. Untuk meminimalkan kesalahan terjemahan, peneliti membangun

  17. Plagiarism in scientific research and publications and how to prevent it.

    Science.gov (United States)

    Masic, Izet

    2014-04-01

    Quality is assessed on the basis of adequate evidence, while best results of the research are accomplished through scientific knowledge. Information contained in a scientific work must always be based on scientific evidence. Guidelines for genuine scientific research should be designed based on real results. Dynamic research and use correct methods of scientific work must originate from everyday practice and the fundamentals of the research. The original work should have the proper data sources with clearly defined research goals, methods of operation which are acceptable for questions included in the study. When selecting the methods it is necessary to obtain the consent of the patients/respondents to provide data for execution of the project or so called informed consent. Only by the own efforts can be reached true results, from which can be drawn conclusions and which finally can give a valid scholarly commentary. Text may be copied from other sources, either in whole or in part and marked as a result of the other studies. For high-quality scientific work necessary are expertise and relevant scientific literature, mostly taken from publications that are stored in biomedical databases. These are scientific, professional and review articles, case reports of disease in physician practices, but the knowledge can also be acquired on scientific and expert lectures by renowned scientists. Form of text publications must meet standards on writing a paper. If the article has already been published in a scientific journal, the same article cannot be published in any other journal with a few minor adjustments, or without specifying the parts of the first article which is used in another article. Copyright infringement occurs when the author of a new article, with or without mentioning the author, uses a substantial portion of previously published articles, including past contributions in the first article. With the permission of the publisher and the author, another journal

  18. Plagiarism in Scientific Research and Publications and How to Prevent It

    Science.gov (United States)

    Masic, Izet

    2014-01-01

    Quality is assessed on the basis of adequate evidence, while best results of the research are accomplished through scientific knowledge. Information contained in a scientific work must always be based on scientific evidence. Guidelines for genuine scientific research should be designed based on real results. Dynamic research and use correct methods of scientific work must originate from everyday practice and the fundamentals of the research. The original work should have the proper data sources with clearly defined research goals, methods of operation which are acceptable for questions included in the study. When selecting the methods it is necessary to obtain the consent of the patients/respondents to provide data for execution of the project or so called informed consent. Only by the own efforts can be reached true results, from which can be drawn conclusions and which finally can give a valid scholarly commentary. Text may be copied from other sources, either in whole or in part and marked as a result of the other studies. For high-quality scientific work necessary are expertise and relevant scientific literature, mostly taken from publications that are stored in biomedical databases. These are scientific, professional and review articles, case reports of disease in physician practices, but the knowledge can also be acquired on scientific and expert lectures by renowned scientists. Form of text publications must meet standards on writing a paper. If the article has already been published in a scientific journal, the same article cannot be published in any other journal with a few minor adjustments, or without specifying the parts of the first article which is used in another article. Copyright infringement occurs when the author of a new article, with or without mentioning the author, uses a substantial portion of previously published articles, including past contributions in the first article. With the permission of the publisher and the author, another journal

  19. Text-based plagiarism in scientific writing: what Chinese supervisors think about copying and how to reduce it in students' writing.

    Science.gov (United States)

    Li, Yongyan

    2013-06-01

    Text-based plagiarism, or textual copying, typically in the form of replicating or patchwriting sentences in a row from sources, seems to be an issue of growing concern among scientific journal editors. Editors have emphasized that senior authors (typically supervisors of science students) should take the responsibility for educating novices against text-based plagiarism. To address a research gap in the literature as to how scientist supervisors perceive the issue of textual copying and what they do in educating their students, this paper reports an interview study with 14 supervisors at a research-oriented Chinese university. The study throws light on the potentiality of senior authors mentoring novices in English as an Additional Language (EAL) contexts and has implications for the efforts that can be made in the wider scientific community to support scientists in writing against text-based plagiarism.

  20. Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information

    Science.gov (United States)

    Frantzeskou, Georgia; Stamatatos, Efstathios; Gritzalis, Stefanos

    Source code authorship analysis is the particular field that attempts to identify the author of a computer program by treating each program as a linguistically analyzable entity. This is usually based on other undisputed program samples from the same author. There are several cases where the application of such a method could be of a major benefit, such as tracing the source of code left in the system after a cyber attack, authorship disputes, proof of authorship in court, etc. In this paper, we present our approach which is based on byte-level n-gram profiles and is an extension of a method that has been successfully applied to natural language text authorship attribution. We propose a simplified profile and a new similarity measure which is less complicated than the algorithm followed in text authorship attribution and it seems more suitable for source code identification since is better able to deal with very small training sets. Experiments were performed on two different data sets, one with programs written in C++ and the second with programs written in Java. Unlike the traditional language-dependent metrics used by previous studies, our approach can be applied to any programming language with no additional cost. The presented accuracy rates are much better than the best reported results for the same data sets.

  1. Study of the source term of radiation of the CDTN GE-PET trace 8 cyclotron with the MCNPX code

    Energy Technology Data Exchange (ETDEWEB)

    Benavente C, J. A.; Lacerda, M. A. S.; Fonseca, T. C. F.; Da Silva, T. A. [Centro de Desenvolvimento da Tecnologia Nuclear / CNEN, Av. Pte. Antonio Carlos 6627, 31270-901 Belo Horizonte, Minas Gerais (Brazil); Vega C, H. R., E-mail: jhonnybenavente@gmail.com [Universidad Autonoma de Zacatecas, Unidad Academica de Estudios Nucleares, Cipres No. 10, Fracc. La Penuela, 98068 Zacatecas, Zac. (Mexico)

    2015-10-15

    Full text: The knowledge of the neutron spectra in a PET cyclotron is important for the optimization of radiation protection of the workers and individuals of the public. The main objective of this work is to study the source term of radiation of the GE-PET trace 8 cyclotron of the Development Center of Nuclear Technology (CDTN/CNEN) using computer simulation by the Monte Carlo method. The MCNPX version 2.7 code was used to calculate the flux of neutrons produced from the interaction of the primary proton beam with the target body and other cyclotron components, during 18F production. The estimate of the source term and the corresponding radiation field was performed from the bombardment of a H{sub 2}{sup 18}O target with protons of 75 μA current and 16.5 MeV of energy. The values of the simulated fluxes were compared with those reported by the accelerator manufacturer (GE Health care Company). Results showed that the fluxes estimated with the MCNPX codes were about 70% lower than the reported by the manufacturer. The mean energies of the neutrons were also different of that reported by GE Health Care. It is recommended to investigate other cross sections data and the use of physical models of the code itself for a complete characterization of the source term of radiation. (Author)

  2. Plagiarism and Academic Integrity in Germany/Plagio e integridad académica en Alemania

    National Research Council Canada - National Science Library

    Germán Ruipérez

    2016-01-01

    ... can be conferred by any German university. This paper presents the most significant progress regarding plagiarism and academic integrity, especially since the 2011 scandal concerning plagiarism in the doctoral thesis of the Minister...

  3. How to Verify Plagiarism of the Paper Written in Macedonian and Translated in Foreign Language?

    Directory of Open Access Journals (Sweden)

    Mirko Spiroski

    2016-02-01

    CONCLUSION: Plagiarism of the original papers written in Macedonian and translated in other languages can be verified after computerised translation in other languages. Later on, original and translated documents can be compared with available software for plagiarism detection.

  4. High frecuency of plagiarism in medical thesis from a peruvian public university

    OpenAIRE

    Saldaña-Gastulo, J Jhan C.; Sociedad Científica de Estudiantes de Medicina de la Universidad Nacional de Piura, facultad de Medicina Humana, Universidad Nacional de Piura. Piura, Perú. Sociedad Científica Médico Estudiantil Peruana, Perú. Interno de Medicina.; Quezada-Osoria, C. Claudia; Sociedad Científica de Estudiantes de Medicina de la Universidad Nacional de Piura, facultad de Medicina Humana, Universidad Nacional de Piura. Piura, Perú. Alumna de Medicina.; Peña-Oscuvilca, Américo; Sociedad Científica Médico Estudiantil Peruana, Perú. Sociedad Científica Huachana de Estudiantes de Medicina, Universidad Nacional José faustino Sánchez Carrión, Huacho, Perú. Hospital Nacional Arzobispo Loayza, Lima, Perú. Interno de medicina.; Mayta-Tristán, Percy; Sociedad Científica Médico Estudiantil Peruana, Perú. Oficina General de Información y Sistemas, Instituto Nacional de Salud. Lima, Perú. Escuela de Medicina, Universidad Peruana de Ciencias Aplicadas. Lima, Perú. Médico.

    2010-01-01

    An observational study was conducted to describe the presence of plagiarism in medical thesis in 2008 performed at a public university in Peru. Search for plagiarism in 33 thesis introductions using a Google search algorithm, characterizes of the study type and we search in electronic form if the thesis mentor have published articles in scientific journals. We found evidence of plagiarism in 27/33 introductions, 37.3% (171/479) of all the paragraphs analyzed had some degree of plagiarism,...

  5. The Plagiarism in the Theses of English Education Students at Kabupaten Bone

    Directory of Open Access Journals (Sweden)

    Rizkariani Sulaiman

    2015-02-01

    Full Text Available The topic of this study is “Plagiarism in the Theses of English Education Students: Forms and Causes. In this study, the researcher limits the discussion by the following research questions: “what are the forms of students’ plagiarism in theses? and what are the causes that make students engage in the plagiarism?”. The objective of the study is specifically to know the forms of students’ plagiarism in theses; and to know the causes that make students engage in the plagiarism. In order to achieve the objective of this study, the researcher applied descriptive quantitative research. The population of this study was the theses of English education students that were submitted in 2011 and lecturers from two colleges. As instrument of the research, plagiarism forms according to government rule No. 17, 2010 and duplichecker application used to investigate the first research question; and questionnaire used to investigate the second research question. The result of the study revealed that plagiarism type 1 was the dominant type occurred in students theses, followed by plagiarism type 2, 3 and 4; chapter 1 and 2 of most of the theses are the most frequent place for plagiarism types occurred; another type of plagiarism found was chained plagiarism; and the causes of students engage in plagiarism can be divided into four main causes: a lack of knowledge in referencing and quoting; b limited access of literature; c attitude; and d plagiarism is not managed yet administratively. In line with the result, the researcher suggests that plagiarism in colleges should be familiarized, socialized and actively founded; the students also should enrich the knowledge of referencing and paraphrasing; and colleges should try to organize the standard rule clearly and firmly and introduce plagiarism detectors to reduce the plagiarism action.

  6. Sistem Pencegahan Plagiarism Tugas Akhir Menggunakan Algoritma Rabin-Karp (Studi Kasus: Sekolah Tinggi Teknik Payakumbuh

    Directory of Open Access Journals (Sweden)

    Siti Ramadhani

    2017-05-01

    Full Text Available AbstrakPlagiarisme merupakan tindakan yang dilarang dan termasuk pelanggaran Hak Cipta. Berdasarkan Peraturan Menteri Pendidikan Nasional Republik Indonesia Tahun 2010, Para pelaku plagiarism dapat dikenakan sangsi berupa teguran hingga pembatalan  ijazah mahasiswa yang telah lulus. Upaya yang ditempuh untuk mencegah terjadinya plagiarisme adalah dengan mendeteksi terjadinya plagiarisme menggunakan algoritma pencocokan string seperti Boyer Moore, Brute Forte, Knuth Moris Pratt (KMP, dan Rabin-Karp. Algoritma yang paling efektif adalah algoritma Rabin-Karp yang menggunakan fungsi k-gram untuk menentukan panjang potongan pola string dan fungsi hash untuk mengubah setiap pola string menjadi nilai numerik kemudian membandingkan tingkat kesamaan source teks dengan teks pembanding. Studi kasus dilakukan di Sekolah Tinggi Teknologi Payakumbuh melalui pengambilan sampel data berupa proposal judul yang diajukan mahasiswa Teknik Komputer. Dalam upaya pendeteksian plagiarime dilakukan dengan membandingkan potongan sampel source dokumen dan potongan sampel dokumen pembanding mewakili proposal yang lengkap untuk menerapkan analisa meggunakan algoritma Rabin-Karp. Proses analisa berlangsung 4 tahap yaitu : preprocessing, tokenizing k-gram, fingerprint dan perhitungan similarity. Hasil pengujian berupa persentase nilai similariy antara teks A dan B serta teks B dan C menggunakan nilai k-gram 3, 4 dan 5 serta penggunaan basis 3, 5 dan 11 yang mana didapatkan nilai perbandingan tertinggi pada nilai k-gram=3 dan basis=3 yaitu 78.16% untuk teks A dan B, 78,79% untuk  teks A dan C. Kata kunci: Algoritma Rabin-Karp, Hashing, K-gram, Fingerprint, Similarity AbstractPlagiarism is prohibited and a violation of copyright. Based on the Regulation of the Minister of National Education, Republic of Indonesia, 2010, whom who done plagiarism may be the subject of punishment in the form of a reprimand to cancellation of diploma students who has graduated. The efforts that

  7. Scientists Admitting to Plagiarism: A Meta-analysis of Surveys.

    Science.gov (United States)

    Pupovac, Vanja; Fanelli, Daniele

    2015-10-01

    We conducted a systematic review and meta-analysis of anonymous surveys asking scientists whether they ever committed various forms of plagiarism. From May to December 2011 we searched 35 bibliographic databases, five grey literature databases and hand searched nine journals for potentially relevant studies. We included surveys that asked scientists if, in a given recall period, they had committed or knew of a colleague who committed plagiarism, and from each survey extracted the proportion of those who reported at least one case. Studies that focused on academic (i.e. student) plagiarism were excluded. Literature searches returned 12,460 titles from which 17 relevant survey studies were identified. Meta-analysis of studies reporting committed (N = 7) and witnessed (N = 11) plagiarism yielded a pooled estimate of, respectively, 1.7% (95% CI 1.2-2.4) and 30% (95% CI 17-46). Basic methodological factors, including sample size, year of survey, delivery method and whether survey questions were explicit rather than indirect made a significant difference on survey results. Even after controlling for these methodological factors, between-study differences in admission rates were significantly above those expected by sampling error alone and remained largely unexplained. Despite several limitations of the data and of this meta-analysis, we draw three robust conclusions: (1) The rate at which scientists report knowing a colleague who committed plagiarism is higher than for data fabrication and falsification; (2) The rate at which scientists report knowing a colleague who committed plagiarism is correlated to that of fabrication and falsification; (3) The rate at which scientists admit having committed either form of misconduct (i.e. fabrication, falsification and plagiarism) in surveys has declined over time.

  8. Publication misconduct and plagiarism retractions: a systematic, retrospective study.

    Science.gov (United States)

    Stretton, Serina; Bramich, Narelle J; Keys, Janelle R; Monk, Julie A; Ely, Julie A; Haley, Cassandra; Woolley, Mark J; Woolley, Karen L

    2012-10-01

    To investigate whether plagiarism is more prevalent in publications retracted from the medical literature when first authors are affiliated with lower-income countries versus higher-income countries. Secondary objectives included investigating other factors associated with plagiarism (e.g., national language of the first author's country affiliation, publication type, journal ranking). Systematic, controlled, retrospective, bibliometric study. Retracted publications dataset in MEDLINE (search filters: English, human, January 1966-February 2008). Retracted misconduct publications were classified according to the first author's country affiliation, country income level, and country national language, publication type, and ranking of the publishing journal. Standardised definitions and data collection tools were used; data were analysed (odds ratio [OR], 95% confidence limits [CL], chi-squared tests) by an independent academic statistician. Of the 213 retracted misconduct publications, 41.8% (89/213) were retracted for plagiarism, 52.1% (111/213) for falsification/fabrication, 2.3% (5/213) for author disputes, 2.3% (5/213) for ethical issues, and 1.4% (3/213) for unknown reasons. The OR (95% CL) of plagiarism retractions (other misconduct retractions as reference) were higher (P 1 retraction) with publications retracted for plagiarism (11.5%, 9/78) than other types of misconduct (28.9%, 24/83). This is the first study to demonstrate that publications retracted for plagiarism are significantly associated with first authors affiliated with lower-income countries. These findings have implications for developing appropriate evidence-based strategies and allocation of resources to help mitigate plagiarism misconduct.

  9. Is It Cheating or Learning the Craft of Writing? Using Turnitin to Help Students Avoid Plagiarism

    Science.gov (United States)

    Graham-Matheson, Lynne; Starr, Simon

    2013-01-01

    Plagiarism is a growing problem for universities, many of which are turning to software detection for help in detecting and dealing with it. This paper explores issues around plagiarism and reports on a study of the use of Turnitin in a new university. The purpose of the study was to inform the senior management team about the plagiarism policy…

  10. Policing--Or, at Least, Policying--Plagiarism at One Australian University

    Science.gov (United States)

    O'Regan, Kerry

    2006-01-01

    How universities and university people deal with plagiarism is articulated in universities' plagiarism policies. Universities, policies and people are all located in a bigger context, one which is being increasingly shaped by global issues. Some global issues of particular relevance to plagiarism are associated with the Internet and its attendant…

  11. "It's Not Fair": Policy Discourses and Students' Understandings of Plagiarism in a New Zealand University

    Science.gov (United States)

    Adam, Lee; Anderson, Vivienne; Spronken-Smith, Rachel

    2017-01-01

    Plagiarism is a concept that is difficult to define. Although most higher education institutions have policies aimed at minimising and addressing student plagiarism, little research has examined the ways in which plagiarism is discursively constructed in university policy documents, or the connections and disconnections between institutional and…

  12. An Empirical Research Study of the Efficacy of Two Plagiarism-Detection Applications

    Science.gov (United States)

    Hill, Jacob D.; Page, Elaine Fetyko

    2009-01-01

    This article describes a study of the two most popular plagiarism-detection software platforms available on today's market--Turnitin (http://www.turnitin.com/static/index.html) and SafeAssign (http://www.safeassign.com/). After a brief discussion of plagiarism's relevance to librarians, the authors examine plagiarism-detection methodology and…

  13. Pattern of Plagiarism in Novice Students' Generated Programs: An Experimental Approach

    Science.gov (United States)

    Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad

    2011-01-01

    Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…

  14. A Safe Place: The Role of Librarians and Writing Centers in Addressing Citation Practices and Plagiarism

    Science.gov (United States)

    Buranen, Lise

    2009-01-01

    In American colleges and universities, plagiarism is a hot topic: teachers wail and moan about the rise in student plagiarism (though often without evidence to demonstrate this supposed rise); they complain that the Web has "caused" plagiarism; and at the same time, many believe that technology is the key to "solving" the problem of student…

  15. First-Year University Science and Engineering Students' Understanding of Plagiarism

    Science.gov (United States)

    Yeo, Shelley

    2007-01-01

    This paper is a case study of first-year science and engineering students' understandings of plagiarism. Students were surveyed for their views on scenarios illustrating instances of plagiarism in the context of the academic work and assessment of science and engineering students. The aim was to explore their understandings of plagiarism and their…

  16. An Integrated Academic Literacy Approach to Improving Students' Understanding of Plagiarism in an Accounting Course

    Science.gov (United States)

    Powell, Lisa; Singh, Nishani

    2016-01-01

    Plagiarism in higher education is a widespread and complex issue. Students' understanding of plagiarism differs as a result of combining their prior learning about referencing with their current experience of institutional policies and generic resources. Plagiarism was identified as a major learning issue in a core second-year undergraduate…

  17. The Effect of Enrollment Status on Plagiarism among Traditional and Non-Traditional Students

    Science.gov (United States)

    Roth, Robert

    2017-01-01

    Previous research has consistently shown that plagiarism in higher education exists. Most of the previous research had measured the number of incidents of plagiarism at different institutions of higher learning. Recently, research has tried to identify incidents of plagiarism in relation to student demographics or academic discipline. With the…

  18. Placing the Library at the Heart of Plagiarism Prevention: The University of Bradford Experience

    Science.gov (United States)

    George, Sarah; Costigan, Anne; O'hara, Maria

    2013-01-01

    Plagiarism is a vexing issue for Higher Education, affecting student transition, retention, and attainment. This article reports on two initiatives from the University of Bradford library aimed at reducing student plagiarism. The first initiative is an intensive course for students who have contravened plagiarism regulations. The second course…

  19. A Model for Determining Student Plagiarism: Electronic Detection and Academic Judgement

    Science.gov (United States)

    Bretag, Tracey; Mahmud, Saadia

    2009-01-01

    This paper provides insights based on the authors' own practice as university instructors, researchers and arbitrators of student plagiarism. Recognising the difficulty in defining plagiarism while still acknowledging the practical importance of doing so, the authors find the common element between the various types of plagiarism to be the lack of…

  20. Is Cheating Always Intentional? The Perception of College Students toward the Issues of Plagiarism

    Science.gov (United States)

    Tabor, Erin L.

    2013-01-01

    The definition of plagiarism that is used in university handbooks is a simple one, and policies along with tiers of disciplinary strategies are used by faculty members in higher education to deter students from committing a plagiarism infraction based on this simple definition. However, plagiarism still occurs on college campuses, and this may be…

  1. Measuring Plagiarism: Researching What Students Do, Not What They Say They Do

    Science.gov (United States)

    Walker, John

    2010-01-01

    Student plagiarism in colleges and universities has become a controversial issue in recent years. A key problem has been the lack of reliable empirical data on the frequency, nature and extent of plagiarism in student assignments. The aim of the study described here was to provide this data. Patterns of plagiarism were tracked in two university…

  2. Plagiarism Awareness among Students: Assessing Integration of Ethics Theory into Library Instruction

    Science.gov (United States)

    Strittmatter, Connie; Bratton, Virginia K.

    2014-01-01

    The library literature on plagiarism instruction focuses on students' understanding of what plagiarism is and is not. This study evaluates the effect of library instruction from a broader perspective by examining the pre- and posttest (instruction) levels of students' perceptions toward plagiarism ethics. Eighty-six students completed a pre- and…

  3. Technical and Non-Technical Programme Students' Attitudes and Reasons for Plagiarism

    Science.gov (United States)

    Harji, Madhubala Bava; Ismail, Zalina; Chetty, Thiba Naraina; Letchumanan, Krishnaveni

    2017-01-01

    To date, plagiarism continues to be a widespread problem in higher education. Deemed to be endemic, researchers continue to examine various aspects of plagiarism, including students' perception, practices, attitudes and reasons for plagiarism, in addressing this growing concern. Most studies, however, tend to examine these aspects independently.…

  4. Analysing Renewable Energy Source Impacts on Power System National Network Code

    Directory of Open Access Journals (Sweden)

    Georgiana Balaban

    2017-08-01

    Full Text Available This paper analyses the impact on renewable energy sources integrated into the Romanian power system on the electrical network operation considering the reduction of electricity consumption with respect to the 1990s. This decrease has led to increased difficulties in integrating the renewable energy sources into the power system (network reinforcements, as well as issues concerning the balance of production/consumption. Following the excess of certain proportions of the energy mix, intermittent renewable energy sources require the expansion of networks, storage, back-up capacities and efforts for a flexible consumption, in the absence of which renewable energy sources cannot be used or the grid can be overloaded. To highlight the difficulty of connecting some significant capacities installed in wind power plants and photovoltaic installation, the paper presents a case study for Dobrogea area that has the most installed capacity from renewable energy sources in operation.

  5. Hermetic and Web Plagiarism Detection Systems for Student Essays--An Evaluation of the State-of-the-Art

    Science.gov (United States)

    Kakkonen, Tuomo; Mozgovoy, Maxim

    2010-01-01

    Plagiarism has become a serious problem in education, and several plagiarism detection systems have been developed for dealing with this problem. This study provides an empirical evaluation of eight plagiarism detection systems for student essays. We present a categorical hierarchy of the most common types of plagiarism that are encountered in…

  6. Beyond the Cut Set Bound: Uncertainty Computations in Network Coding with Correlated Sources

    CERN Document Server

    Gohari, Amin Aminzadeh; Jaggi, Sidharth

    2011-01-01

    Cut-set bounds on achievable rates for network communication protocols are not in general tight. In this paper we introduce a new technique for proving converses for the problem of transmission of correlated sources in networks, that results in bounds that are tighter than the corresponding cut-set bounds. The technique works as follows: on one hand we show that if the communication problem is solvable, the uncertainty of certain random variables in the network with respect to imaginary parties that have partial knowledge of the sources must satisfy some constraints that depend on the network architecture. On the other hand, the same uncertainties have to satisfy constraints that only depend on the joint distribution of the sources. Matching these two leads to restrictions on the statistical joint distribution of the sources in communication problems that are solvable over a given network architecture.

  7. Combating unethical publications with plagiarism detection services.

    Science.gov (United States)

    Garner, H R

    2011-01-01

    About 3,000 new citations that are highly similar to citations in previously published manuscripts that appear each year in the biomedical literature (Medline) alone. This underscores the importance for the opportunity for editors and reviewers to have detection system to identify highly similar text in submitted manuscripts so that they can then review them for novelty. New software-based services, both commercial and free, provide this capability. The availability of such tools provides both a way to intercept suspect manuscripts and serve as a deterrent. Unfortunately, the capabilities of these services vary considerably, mainly as a consequence of the availability and completeness of the literature bases to which new queries are compared. Most of the commercial software has been designed for detection of plagiarism in high school and college papers; however, there is at least 1 fee-based service (CrossRef) and 1 free service (etblast.org), which are designed to target the needs of the biomedical publication industry. Information on these various services, examples of the type of operability and output, and things that need to be considered by publishers, editors, and reviewers before selecting and using these services is provided. Copyright © 2011 Elsevier Inc. All rights reserved.

  8. Combating unethical publications with plagiarism detection services

    Science.gov (United States)

    Garner, H.R.

    2010-01-01

    About 3,000 new citations that are highly similar to citations in previously published manuscripts that appear each year in the biomedical literature (Medline) alone. This underscores the importance for the opportunity for editors and reviewers to have detection system to identify highly similar text in submitted manuscripts so that they can then review them for novelty. New software-based services, both commercial and free, provide this capability. The availability of such tools provides both a way to intercept suspect manuscripts and serve as a deterrent. Unfortunately, the capabilities of these services vary considerably, mainly as a consequence of the availability and completeness of the literature bases to which new queries are compared. Most of the commercial software has been designed for detection of plagiarism in high school and college papers, however, there is at least one fee-based service (CrossRef) and one free service (etblast.org) which are designed to target the needs of the biomedical publication industry. Information on these various services, examples of the type of operability and output, and things that need to be considered by publishers, editors and reviewers before selecting and using these services is provided. PMID:21194644

  9. An intervention aimed at reducing plagiarism in undergraduate nursing students.

    Science.gov (United States)

    Smedley, Alison; Crawford, Tonia; Cloete, Linda

    2015-05-01

    Plagiarism is a current and developing problem in the tertiary education sector where students access information and reproduce it as their own. It is identified as occurring in many tertiary level degrees including nursing and allied health profession degrees. Nursing specifically, is a profession where standards and ethics are required and honesty is paramount. The aim of this study was to evaluate the change in nursing student's knowledge and understanding of plagiarism before and after an educational intervention in their first semester of the Bachelor of nursing degree at a private college of higher education in Sydney, Australia. This study concluded that an educational intervention can increase knowledge and awareness of plagiarism among nursing students. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. SMILEI: A collaborative, open-source, multi-purpose PIC code for the next generation of super-computers

    Science.gov (United States)

    Grech, Mickael; Derouillat, J.; Beck, A.; Chiaramello, M.; Grassi, A.; Niel, F.; Perez, F.; Vinci, T.; Fle, M.; Aunai, N.; Dargent, J.; Plotnikov, I.; Bouchard, G.; Savoini, P.; Riconda, C.

    2016-10-01

    Over the last decades, Particle-In-Cell (PIC) codes have been central tools for plasma simulations. Today, new trends in High-Performance Computing (HPC) are emerging, dramatically changing HPC-relevant software design and putting some - if not most - legacy codes far beyond the level of performance expected on the new and future massively-parallel super computers. SMILEI is a new open-source PIC code co-developed by both plasma physicists and HPC specialists, and applied to a wide range of physics-related studies: from laser-plasma interaction to astrophysical plasmas. It benefits from an innovative parallelization strategy that relies on a super-domain-decomposition allowing for enhanced cache-use and efficient dynamic load balancing. Beyond these HPC-related developments, SMILEI also benefits from additional physics modules allowing to deal with binary collisions, field and collisional ionization and radiation back-reaction. This poster presents the SMILEI project, its HPC capabilities and illustrates some of the physics problems tackled with SMILEI.

  11. Bug-Fixing and Code-Writing: The Private Provision of Open Source Software

    DEFF Research Database (Denmark)

    Bitzer, Jürgen; Schröder, Philipp

    2002-01-01

    Open source software (OSS) is a public good. A self-interested individual would consider providing such software, if the benefits he gained from having it justified the cost of programming. Nevertheless each agent is tempted to free ride and wait for others to develop the software instead...

  12. The Big Effects of Short-term Efforts: Mentorship and Code Integration in Open Source Scientific Software

    Directory of Open Access Journals (Sweden)

    Erik H Trainer

    2014-07-01

    Full Text Available Scientific progress relies crucially on software, yet in practice there are significant challenges to scientific software production and maintenance. We conducted a case study of a bioinformatics software library called Biopython to investigate the promise of Google Summer of Code (GSoC, a program that pays students to work on open-source projects for the summer, for addressing these challenges. We find three positive outcomes of GSoC in the Biopython community: the addition of new features to the Biopython codebase, training, and personal development. We also find, however, that mentors face several challenges related to GSoC project selection and ranking. We believe that because GSoC provides an occasion to extend the software with capabilities that can be used to produce new knowledge, and to train successive generations of potential contributors to the software, it can play a vital role in the sustainability of open-source scientific software.

  13. ON CODE REFACTORING OF THE DIALOG SUBSYSTEM OF CDSS PLATFORM FOR THE OPEN-SOURCE MIS OPENMRS

    Directory of Open Access Journals (Sweden)

    A. V. Semenets

    2016-08-01

    The open-source MIS OpenMRS developer tools and software API are reviewed. The results of code refactoring of the dialog subsystem of the CDSS platform which is made as module for the open-source MIS OpenMRS are presented. The structure of information model of database of the CDSS dialog subsystem was updated according with MIS OpenMRS requirements. The Model-View-Controller (MVC based approach to the CDSS dialog subsystem architecture was re-implemented with Java programming language using Spring and Hibernate frameworks. The MIS OpenMRS Encounter portlet form for the CDSS dialog subsystem integration is developed as an extension. The administrative module of the CDSS platform is recreated. The data exchanging formats and methods for interaction of OpenMRS CDSS dialog subsystem module and DecisionTree GAE service are re-implemented with help of AJAX technology via jQuery library

  14. Society for Academic Emergency Medicine Statement on Plagiarism.

    Science.gov (United States)

    Asher, Shellie L; Iserson, Kenneth V; Merck, Lisa H

    2017-10-01

    The integrity of the research enterprise is of the utmost importance for the advancement of safe and effective medical practice for patients and for maintaining the public trust in health care. Academic societies and editors of journals are key participants in guarding scientific integrity. Avoiding and preventing plagiarism helps to preserve the scientific integrity of professional presentations and publications. The Society for Academic Emergency Medicine (SAEM) Ethics Committee discusses current issues in scientific publishing integrity and provides a guideline to avoid plagiarism in SAEM presentations and publications. © 2017 by the Society for Academic Emergency Medicine.

  15. Investigation of Dosimetric Parameters of $^{192}$Ir MicroSelectron v2 HDR Brachytherapy Source Using EGSnrc Monte Carlo Code

    CERN Document Server

    Naeem, Hamza; Zheng, Huaqing; Cao, Ruifen; Pei, Xi; Hu, Liqin; Wu, Yican

    2016-01-01

    The $^{192}$Ir sources are widely used for high dose rate (HDR) brachytherapy treatments. The aim of this study is to simulate $^{192}$Ir MicroSelectron v2 HDR brachytherapy source and calculate the air kerma strength, dose rate constant, radial dose function and anisotropy function established in the updated AAPM Task Group 43 protocol. The EGSnrc Monte Carlo (MC) code package is used to calculate these dosimetric parameters, including dose contribution from secondary electron source and also contribution of bremsstrahlung photons to air kerma strength. The Air kerma strength, dose rate constant and radial dose function while anisotropy functions for the distance greater than 0.5 cm away from the source center are in good agreement with previous published studies. Obtained value from MC simulation for air kerma strength is $9.762\\times 10^{-8} \\textrm{UBq}^{-1}$and dose rate constant is $1.108\\pm 0.13\\%\\textrm{cGyh}^{-1} \\textrm{U}^{-1}$.

  16. Personalized reminiscence therapy M-health application for patients living with dementia: Innovating using open source code repository.

    Science.gov (United States)

    Zhang, Melvyn W B; Ho, Roger C M

    2017-01-01

    Dementia is known to be an illness which brings forth marked disability amongst the elderly individuals. At times, patients living with dementia do also experience non-cognitive symptoms, and these symptoms include that of hallucinations, delusional beliefs as well as emotional liability, sexualized behaviours and aggression. According to the National Institute of Clinical Excellence (NICE) guidelines, non-pharmacological techniques are typically the first-line option prior to the consideration of adjuvant pharmacological options. Reminiscence and music therapy are thus viable options. Lazar et al. [3] previously performed a systematic review with regards to the utilization of technology to delivery reminiscence based therapy to individuals who are living with dementia and has highlighted that technology does have benefits in the delivery of reminiscence therapy. However, to date, there has been a paucity of M-health innovations in this area. In addition, most of the current innovations are not personalized for each of the person living with Dementia. Prior research has highlighted the utility for open source repository in bioinformatics study. The authors hoped to explain how they managed to tap upon and make use of open source repository in the development of a personalized M-health reminiscence therapy innovation for patients living with dementia. The availability of open source code repository has changed the way healthcare professionals and developers develop smartphone applications today. Conventionally, a long iterative process is needed in the development of native application, mainly because of the need for native programming and coding, especially so if the application needs to have interactive features or features that could be personalized. Such repository enables the rapid and cost effective development of application. Moreover, developers are also able to further innovate, as less time is spend in the iterative process.

  17. Computer Program Plagiarism Detection: The Limits of the Halstead Metric.

    Science.gov (United States)

    Berghel, H. L.; Sallach, David L.

    1985-01-01

    Discusses two alternative metrics to detect computer software plagiarism: the Halstead metric drawn from the software science discipline and an ad hoc method drawn from program grading experience and identified by factor analysis. Possible explanations as to why the ad hoc method is more useful in identical-task environments are considered.…

  18. Strategies to Help Legal Studies Students Avoid Plagiarism

    Science.gov (United States)

    Samuels, Linda B.; Bast, Carol M.

    2006-01-01

    Plagiarism is certainly not new to academics, but it may be on the rise with easy access to the vast quantities of information available on the Internet. Students researching on the Internet do not have to take handwritten or typewritten notes. They can simply print out or copy and save whatever they find. They are even spared the tedium of having…

  19. Exploring University Students' Perceptions of Plagiarism: A Focus Group Study

    Science.gov (United States)

    Gullifer, Judith; Tyson, Graham A.

    2010-01-01

    Plagiarism is perceived to be a growing problem and universities are being required to devote increasing time and resources to combating it. Theory and research in psychology show that a thorough understanding of an individual's view of an issue or problem is an essential requirement for successful change of that person's attitudes and behaviour.…

  20. Anti-plagiarism certification be an academic mandate

    Digital Repository Service at National Institute of Oceanography (India)

    Lakshminarayana, S.

    .Journal of American Society for Information Science and Technology, 54(3), 203–215. Martin, B.R.(2007).Keeping plagiarism at bay—A salutary tale.Research Policy, 36(7), 905–911. Ottenstein, K.J. (1976). An algorithmic approach to the detection and prevention...