• Title/Summary/Keyword: Program Plagiarism

Search Result 42, Processing Time 0.023 seconds

A Method for Detecting Program Plagiarism Comparing Class Structure Graphs (클래스 구조 그래프 비교를 통한 프로그램 표절 검사 방법)

  • Kim, Yeoneo;Lee, Yun-Jung;Woo, Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.37-47
    • /
    • 2013
  • Recently, lots of research results on program comparison have been reported since the code theft become frequent as the increase of code mobility. This paper proposes a plagiarism detection method using class structures. The proposed method constructs a graph representing the referential relationship between the member variables and the methods. This relationship is shown as a bipartite graph and the test for graph isomorphism is applied on the set of graphs to measure the similarity of the programs. In order to measure the effectiveness of this method, an experiment was conducted on the test set, the set of Java source codes submitted as solutions for the programming assignments in Object-Oriented Programming course of Pusan National University in 2012. In order to evaluate the accuracy of the proposed method, the F-measure is compared to those of JPlag and Stigmata. According to the experimental result, the F-measure of the proposed method is higher than those of JPlag and Stigmata by 0.17 and 0.34, respectively.

A Study on Undergraduates' Citation Use and Plagiarism Awareness (대학생들의 인용 및 표절에 관한 인식연구)

  • Rhee, Hey-Young;Nam, Tae-Woo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.3
    • /
    • pp.175-198
    • /
    • 2010
  • The study investigated undergraduates' citation use and plagiarism awareness. A questionnaire method was used and was given to undergraduates in a university located in Seoul. Upon investigation, undergraduates recognized the importance and the need of citation and were partly applying citations. However, upon further investigation of undergraduates' citation learning with citation questions, very few of respondents had knowledge of correct citation usage. Undergraduates mostly cited print materials and information from the internet. They used books in case of print materials and web materials provided by academic institutions. They suggested that the university should teach citation usage through a citation and plagiarism awareness program. It is necessary for library use education (information literacy education) as well as university to teach citation education including citation type and how to write it.

Cases of Ethical Violation in Research Publications: Through Editorial Decision Making Process (편집심사업무 관점에서 학술지 윤리강화를 위한 표절 검증사례)

  • Hwang, Hee-Joong;Lee, Jung-Wan;Kim, Dong-Ho;Shin, Dong-Jin;Kim, Byoung-Goo;Kim, Tae-Joong;Lee, Yong-Ki;Kim, Wan-Ki;Youn, Myoung-Kil
    • Journal of Distribution Science
    • /
    • v.15 no.5
    • /
    • pp.49-52
    • /
    • 2017
  • Purpose - To improve and strengthen existing publication and research ethics, KODISA has identified and presented various cases which have violated publication and research ethics and principles in recent years. The editorial office of KODISA has been providing and continues to provide advice and feedback on publication ethics to researchers during peer review and editorial decision making process. Providing advice and feedback on publication ethics will ensure researchers to have an opportunity to correct their mistakes or make appropriate decisions and avoid any violations in research ethics. The purpose of this paper is to identify different cases of ethical violation in research and inform and educate researchers to avoid any violations in publication and research ethics. Furthermore, this article will demonstrate how KODISA journals identify and penalize ethical violations and strengthens its publication ethics and practices. Research design, data and methodology - This paper examines different types of ethical violation in publication and research ethics. The paper identifies and analyzes all ethical violations in research and combines them into five general categories. Those five general types of ethical violations are thoroughly examined and discussed. Results - Ethical violations of research occur in various forms at regular intervals; in other words, unethical researchers tend to commit different types of ethical violations repeatedly at same time. The five categories of ethical violation in research are as follows: (1) Arbitrary changes or additions in author(s) happen frequently in thesis/dissertation related publications. (2) Self plagiarism, submitting same work or mixture of previous works with or without using proper citations, also occurs frequently, but the most common type of plagiarism is changing the statistical results and using them to present as the results of the empirical analysis; (3) Translation plagiarism, another ethical violation in publication, is difficult to detect but occurs frequently; (4) Fabrication of data or statistical analysis also occurs frequently. KODISA requires authors to submit the results of the empirical analysis of the paper (the output of the statistical program) to prevent this type of ethical violation; (5) Mashup or aggregator plagiarism, submitting a mix of several different works with or without proper citations without alterations, is very difficult to detect, and KODISA journals consider this type of plagiarism as the worst ethical violation. Conclusions - There are some individual cases of ethical violation in research and publication that could not be included in the five categories presented throughout the paper. KODISA and its editorial office should continue to develop, revise, and strengthen their publication ethics, to learn and share different ways to detect any ethical violations in research and publication, to train and educate its editorial members and researchers, and to analyze and share different cases of ethical violations with the scholarly community.

A Similarity Measurement and Visualization Method for the Analysis of Program Code (프로그램 코드 분석을 위한 유사도 측정 및 가시화 기법)

  • Lee, Youngjoo;Lee, Jeongjin
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.7
    • /
    • pp.802-809
    • /
    • 2013
  • In this paper, we propose the similarity measurement method between two program codes by counting the frequency and length of continuous patterns of specifiers and keywords, which exist in two program codes. In addition, we propose the visualization method of this analysis result by formal concept analysis. Proposed method considers adjacencies of specifiers or keywords, which have not been considered in the previous similarity measurements. Proposed method can detect the plagiarism by analyzing the pattern in each function regardless of the order of function call and execution. In addition, the result of the similarity measurement is visualized by the lattice of formal concept analysis to increase the user understanding about the relations between program codes. Experimental results showed that proposed method succeeded in 96% plagiarism detections. Our method could be applied into the analysis of general documents.

Tuning the Performance of Haskell Parallel Programs Using GC-Tune (GC-Tune을 이용한 Haskell 병렬 프로그램의 성능 조정)

  • Kim, Hwamok;An, Hyungjun;Byun, Sugwoo;Woo, Gyun
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.459-465
    • /
    • 2017
  • Although the performance of computer hardware is increasing due to the development of manycore technologies, software lacking a proportional increase in throughput. Functional languages can be a viable alternative to improve the performance of parallel programs since such languages have an inherent parallelism in evaluating pure expressions without side-effects. Specifically, Haskell is notably popular for parallel programming because it provides easy-to-use parallel constructs based on monads. However, the scalability of parallel programs in Haskell tends to fluctuate as the number of cores increases, and the garbage collector is suspected to be the source of this fluctuations because it affects both the space and the time needed to execute the programs. This paper uses the tuning tool, GC-Tune, to improve the scalability of the performance. Our experiment was conducted with a parallel plagiarism detection program, and the scalability improved. Specifically, the fluctuation range of the speedup was narrowed down by 39% compared to the original execution of the program without any tuning.

The Survey of Gifted Students' Scientific Integrity and Perception of Scientific Misconduct in R&E Program (R&E 수행과정에서 과학영재고 학생의 연구윤리 준수 실태 조사)

  • Lee, Jiwon;Kim, Jung Bog
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.4
    • /
    • pp.565-580
    • /
    • 2015
  • We investigated gifted students' scientific integrity, perception of scientific misconduct and needs for research ethics education. For this study, 267 science academy students who have participated in R&E program responded to questionnaire of those three parts. The major findings are as follows: First, 45.31% of gifted students answered that they had one or more experiences in five categories; fabrication, falsification, plagiarism, unfair authorship, and connivance of scientific misconduct. Second, almost 90% of gifted students responded that statements of questions are scientific misconduct except the self plagiarism. Third, 28.83% of gifted students needed to study research ethics and all of them were 1st graders. Fourth, they wanted to know specifically the limit of apt citation, writing skills of research notes, specific examples of scientific misconduct, and concrete acting method for scientific integrity, etc. In order to get gifted students to conduct their research responsibly, educators have to consider and reflect the voice of gifted students.

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.

A Program Similarity Evaluation Algorithm (프로그램 유사도 평가 알고리즘)

  • Kim Young-Chul;Hwang Seog-Chan;Choi Jaeyoung
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.51-64
    • /
    • 2005
  • In this paper, we introduce a system for evaluating similarity of C program source code using method which compares syntax-trees each others. This method supposes two characteristic features as against other systems. It is not sensitive for program style such as indentation, white space, and comments, and changing order of control structure like sentences, code block, procedures, and so on. Another is that it can detect a syntax-error cause of using paring technique, We introduce algorithms for similarity evaluation method and grouping method that reduces the number of comparison, In the examination section, we show a test result of program similarity evaluation and its reduced iteration by grouping algorithm.

  • PDF

Performance Comparison between Haskell Eval Monad and Cloud Haskell (Haskell Eval 모나드와 Cloud Haskell 간의 성능 비교)

  • Kim, Yeoneo;An, Hyungjun;Byun, Sugwoo;Woo, Gyun
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.791-802
    • /
    • 2017
  • Competition in the modern CPU market has shifted from speeding up the clock speed of a single core to increasing the number of cores. As such, there is a growing interest in parallel programming to maximize the use of resources of many core processors. In this paper, we propose parallel programming models in Haskell to find an advisable parallel programming model for many-core environments. Specifically, we used Eval monad and Cloud Haskell to develop two versions of parallel programs: plagiarism detection and K-means. Then, we evaluated the performance of the developed programs in 32-core and 120-core environments. The results of our experiment show that the Eval monad is highly efficient in an environment with a small number of cores. On the other hand, the Cloud Haskell runtime shows 37% improvement over Eval monad and the scalability shows a 134% improvement over Eval monad as the number of cores increases.