0% found this document useful (0 votes)
79 views21 pages

Plagiarism Check

The document discusses plagiarism detection and provides an overview of key topics. It defines plagiarism as copying the work of others without proper citation or credit. Plagiarism detection is important for academic institutions to prevent students from cheating by copying content without attribution. The document outlines different types of plagiarism and how to avoid it, as well as tools that can be used for plagiarism detection. It then describes the hardware and software requirements and implementation of a plagiarism detection engine developed by the author.

Uploaded by

AnshayGupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views21 pages

Plagiarism Check

The document discusses plagiarism detection and provides an overview of key topics. It defines plagiarism as copying the work of others without proper citation or credit. Plagiarism detection is important for academic institutions to prevent students from cheating by copying content without attribution. The document outlines different types of plagiarism and how to avoid it, as well as tools that can be used for plagiarism detection. It then describes the hardware and software requirements and implementation of a plagiarism detection engine developed by the author.

Uploaded by

AnshayGupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Plagiarism Detection

Report submitted by

ANSHAY GUPTA
Department of Computer Science and Engineering
H M R Institute of Management and Technology
New Delhi-110036
(Roll No.: 35113307220)

Under the supervision of

Mr. Deepak Kumar Verma


Scientist D
Defence Research and Development Organisation
DELHI - 110054, INDIA

SEPTEMBER 2022
Contents

Abstract iii

Certificate iv

Acknowledgements v

About DRDO and Labs vi

1 Introductions 1
1.1 Why is it called plagiarism? . . . . . . . . . . . . . . . . . . . 1
1.2 Why Plagiarism Detection is Important? . . . . . . . . . . . . 1
1.3 Why is it wrong? . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Types of plagiarism . . . . . . . . . . . . . . . . . . . . . . . . 2
1.5 How one can avoid plagiarism? . . . . . . . . . . . . . . . . . 2
1.6 What are the plagiarism detection tools . . . . . . . . . . . . . 3

2 Technique/Method/Tool Developed 4
2.1 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . 4
2.2 Software Requirements . . . . . . . . . . . . . . . . . . . . . . 4
2.3 Method for Python Installation . . . . . . . . . . . . . . . . . 6
2.4 Project Implementation . . . . . . . . . . . . . . . . . . . . . 7

3 Results and Analysis 11

4 Conclusion and Future Scope 12

ii
Abstract

Plagiarism became a serious issue nowadays due to the presence of vast re-
sources easily available on the web, which makes developing plagiarism de-
tection tools a useful and challenging task due to the scalability issues.
This project is implementing a Plagiarism Detection Engine. The main
parts of the projects are:

ˆ Plagiarism engine checking similarity between the input document and


the database to detect

ˆ Here we use the python and flask software to implement the project
report.

iii
Certificate

I declare that the project work reported in this thesis entitled Plagiarism
Detection for the partial fulfillment of the degree of Bachlor of Technol-
ogy, CSE Branch has been carried out by me under the supervision of Mr.
Deepak Kumar Verma, Scientist D, Defence Research and Development
Organisation, New Delhi, India.
The internship work embodied in this thesis, except where otherwise indi-
cated, is my original work. This thesis has not been submitted by me earlier
in part or full to any other University or Institute for the award of any degree
or diploma. This thesis does not contain other person’s data, graphs or other
information, unless specifically acknowledged.

Date: Sept ,2022 Anshay Gupta


(Candidate)

This is to certify that the above statement made by the candidate is


correct to the best of my knowledge.

Mr. Deepak Kumar Verma


Scientist D, DRDO, New Delhi
110054, India
(Supervisor)

Mr. Ajay Kumar


Scientist E, DRDO, New Delhi
110054, India
(Reviewer)

iv
Acknowledgements

My endless thanks go to my project supervisor Mr. Deepak Kumar Verma,


Scientist D, DRDO for providing me with his valuable time and invaluable
guidance. His hard working nature, constant encouragement, cooperation
and suggestions always motivated me for being perseverant in my efforts.

Thanks are also due to Mr. Ajay Kumar, Scientist E, DRDO for his
valuable advise and help throughout the preperation of this project report.

It is my privilege to thank the Director, HMRIMT for providing me nec-


essary facilities, supportive environment, infrastructure and financial assis-
tantship for this internship work.

Most importantly, I wish to thank my loving and supportive parents, my


family and friends, who provide perpetual inspiration.

Date: -09-2022 Anshay Gupta


Place: N. Delhi, India.

v
About DRDO and Labs

Defence Research & Development Organisation (DRDO) works under De-


partment of Defence Research and Development of Ministry of Defence.
DRDO dedicatedly working towards enhancing self-reliance in Defence Sys-
tems and undertakes design & development leading to production of world
class weapon systems and equipment in accordance with the expressed needs
and the qualitative requirements laid down by the three services.

DRDO is one of the prestigious organizations of the country in the field of Sci-
ence and Technology, which could transform our country’s Defence force into
one of the most modern and powerful force in the world. It was established
by merging together the Scientific and Technical Development Establishment
under three services headquarters in 1958, with the aim of creating an orga-
nization that can take up the challenges of developing and delivering the high
technology in the field of modern warfare, weapon system, avionics and other
scientific aspects of nation’s defence. It has also got mandate to modernize
defence Technology.

DRDO is working in various areas of military technology which include aero-


nautics, armaments, combat vehicles, electronics, instrumentation engineer-
ing systems, missiles, materials, naval systems, advanced computing, sim-
ulation and life sciences. DRDO while striving to meet the Cutting-edge
weapons technology requirements provides ample spinoff benefits to the so-
ciety at large thereby contributing to the nation building.

Vision
Make India prosperous by establishing world-class science and technology
base and provide our Defence Services decisive edge by equipping them with
internationally competitive systems and solutions.

Mission

ˆ Design, develop and lead to production state-of-the-art sensors, weapon

vi
vii

systems, platforms and allied equipment for our Defence Services.

ˆ Provide technological solutions to the Defence Services to optimize


combat effectiveness and to promote well-being of the troops.

ˆ Develop infrastructure and committed quality manpower and build


strong technology base.

ˆ Core Competence

ˆ Department of Defence Research and Development (R & D) is working


for indigenous development of weapons, sensors & platforms required
by the three wings of the Armed Forces. To fulfil this mandate, De-
partment of Defence Research and Development (R & D), is closely
working with academic institutions, Research and Development (R &
D) Centres and production agencies of Science and Technology (S &
T) Ministries/Departments in Public & Civil Sector including Defence
Public Sector Undertakings & Ordnance Factories.
viii 0. About DRDO and Labs
Chapter 1
Introductions

Plagiarism means copying the information from the other persons writing,
communication, ideas, thoughts, etc. This includes copying information from
websites, books, songs, television shows, email messages, interviews, articles,
artworks, and other mediums [4]. Whenever you copy the information from
another person’s works, it should be quoted and cited internally from where
it is taken out. It should be appropriately mentioned in citations and in
reference to avoid plagiarism. Ethical problems in academic research was
discussed in [6], the self-plagiarism issues were discussed in [5].

Some common examples of plagiarism include: Paraphrasing a source


word by word, including a direct quote without quotation marks, copying
elements of different sources, and pasting them into a new document.

1.1 Why is it called plagiarism?


According to the Merriam-Webster online dictionary, to ”plagiarize” means:
to steal and pass off (the ideas or words of another) as one’s own. to use
(another’s production) without crediting the source. to commit literary theft.

1.2 Why Plagiarism Detection is Important?


In some academic enterprises like universities, schools, and institutions, pla-
giarism detection and prevention become one of the educational challenges
because most students or researchers cheat when they do the assigned tasks

1
2 1. Introductions

and projects. This is because a lot of resources can be found on the internet.
It is so easy for them to use one of the search engines to search for any topic
and to cheat from it without citing the owner of the document. So it is bet-
ter and must all academic fields they should have to use plagiarism detection
soft-wares to stop or eliminate students cheating, copying, and modifying
documents when they know that they will be found.

1.3 Why is it wrong?


Actually, people will think it was your idea, but you took it from another
source.

1.4 Types of plagiarism


The different types plagiarism which may occur in an ethical paper/report
are indicated below:
Attribution It means to provide a proper acknowledgement if the work is
taken from some other source.
Bibliography It is a list of papers, thesis and projects of others, which are
used for our work, should be provided at the end of the report/paper/work.
Common knowledge Using common knowledge like “Taj Mehal is situated
in Agra”, this is called a common phrase and can be used in the work.
Copy right Refer IPR for copy right act, any copy right issues may be in-
fringement, know the fair use of copy right.
Paraphrase A restatement of a text or passage in other words, note para-
phrase is not that restate the words of the original information. If the original
idea is misrepresent then it is punishable.

For details, we refer the readers to [4].

1.5 How one can avoid plagiarism?


One can avoid plagiarism in some of the following ways:

ˆ It is used to give credit to the original author by citing their work in


the references/bibliography.
1.6 What are the plagiarism detection tools 3

ˆ Plagiarism may result in receiving a failing grade or zero for the as-
signment. Plagiarism could result in a disciplinary referral. Students
caught plagiarizing may be denied admittance to or removal from the
National Honor Society.

1.6 What are the plagiarism detection tools


Plagiarism Detection Tools. In the past two decades, several plagiarism de-
tection tools have been developed. Some of these tools are discussed in brief
here. Also, we have analyzed their pros and cons (see [1], [3]).

1. Grammarly Online Plagiarism CheckerThis is by far the best on-


line Plagiarism checker tool which you can use. Grammarly is a well-known
tool among writers and also who need to quickly check if an article is original
or copied from other places.
If you are a professor and need to check if the research paper is original or
copied from multiple sources online, this tool is perfect for you. See in the
above screenshot how easy it is to use the plagiarism feature of Grammarly.
This is a multi-feature tool for webmasters to check the originality of the
content, check Grammar, and Check the spelling of the article. I have been
using it for a while, and I highly recommend it to you.

2. Unicheck If you are looking for a solid paid option, then Unicheck
could be the right tool for you. The interface is sleek, and it checks the pages
really fast. This is a perfect tool for corporates and professors who don’t
mind paying a little for higher accuracy.

3. Turnitin It is a web-based plagiarism prevention system used by most


universities in the world. There are three main features of the Turnitin:

ˆ To act as a deterrent against plagiarism.

ˆ To provide reports which can help identify occurrences of plagiarism.

ˆ To provide students with a tool to identify and correct possible oc-


currences of plagiarism in their own work and improve their academic
writing.
Chapter 2
Technique/Method/Tool Developed

Here we indicate the techniques, methods and tools, which we used to im-
plement this project report. The following minimum hardware and software
requirements we need:

2.1 Hardware Requirements


To complete this task, we need the following features:
ˆ Processor:Intel core i3 or above
ˆ Memory:At least 6 GB RAM
ˆ An Ethernet connection

2.2 Software Requirements


ˆ Python 3.9 or above
ˆ Windows 7 or above
ˆ Mac OS X 10.11 or higher, 64-bit
ˆ We require the following libraries:

1. Flask
Flask has a wide range of code libraries and extensions that trans-
form the web framework from a microframework into a full-featured
web application creation tool.

4
2.2 Software Requirements 5

2. Pandas
Pandas is defined as an open-source library that provides high-
performance data manipulation in Python. The name Pandas
is derived from the word Panel Data, which means Econometrics
from Multidimensional data. It is used for data analysis in Python
and was developed by Wes McKinney in 2008.
3. Numpy
NumPy is a Python library used for working with arrays. It also
has functions for working in the domain of linear algebra, Fourier
transform, and matrices. NumPy was created in 2005 by Travis
Oliphant. It is an open-source project, and you can use it freely.
4. Scikit-learn
Scikit-learn is probably the most helpful library for machine learn-
ing in Python. The sklearn library contains a lot of efficient tools
for machine learning and statistical modeling, including classifica-
tion, regression, clustering, and dimensionality reduction.
5. Urllib3
urllib3 is a powerful, user-friendly HTTP client for Python. Much
of the Python ecosystem already uses urllib3. Urllib3 has many
critical features missing from the Python standard libraries: Thread
safety. Connection pooling.
6. mysql-connector-python
MySQL provides standards-based drivers for JDBC, ODBC, and
.Net enabling developers to build database applications in their
language of choice. In addition, a native C library allows develop-
ers to embed MySQL directly into their applications. Developed
by MySQL. ADO.NET Driver for MySQL (Connector/NET).
7. matplot
Matplotlib is a python library used to create 2D graphs and plots
by using python scripts. It has a module named pyplot, which
makes things easy for plotting by providing a feature to control
line styles, font properties, formatting axes, etc.
8. cosine-similarity
The cosine similarity measures the similarity between vector lists
by calculating the cosine angle between the two vector lists. Con-
sidering the cosine function, its value at 0 degrees is 1 and -1 at 180
degrees. This means that for two overlapping vectors, the cosine
6 2. Technique/Method/Tool Developed

value will be maximum and minimum for two precisely opposite


vectors.
9. jupyter
The Jupyter Notebook is an open-source web application that
you can use to create and share documents that contain live code,
equations, visualizations, and text. The people maintain the Jupyter
Notebook at Project Jupyter.

2.3 Method for Python Installation


Pip install flask:

Pip install pandas:


2.4 Project Implementation 7

Pip install scikit-learn:

2.4 Project Implementation


The present project report entitled ”Plagiarism Detection” is based on the
software python with flask. The project details are given below:

Figure 2.1: flask code

Figure 2.2: flask code.


8 2. Technique/Method/Tool Developed

Figure 2.3: python main file.

Figure 2.4: python main file

Figure 2.5: python main file


2.4 Project Implementation 9

Figure 2.6: upload file

Figure 2.7: upload file.

Figure 2.8: output file

Figure 2.9: output file


10 2. Technique/Method/Tool Developed

Figure 2.10: output file

Figure 2.11: output file


Chapter 3
Results and Analysis

This Project is designed for similarity check that need to manage results
across multiple branches and students that need to track, manage and re-
port/thesis/paper results. The main advantage of this project report is that
one can run this on any kind of operating system. At a time, we can see all
the years result in a single sheet and we can see the individual candidate’s
results separately. The Project can read the Result in the brouser itself and
generate the report. Report generated provides the percentage of similarity.

Therefore this project provides an alternate approach to detect plagiarism


with the help of the software python. It may be treated as a useful application
of python. Although in this project we have provided an attempt to check
the similarity. Here we have taken a file and check the similarity for the
already existing files in that folder. We may get the percentage of similarity
from other’s work.

11
Chapter 4
Conclusion and Future Scope

The project/thesis/paper writing works carried out to be followed the anti


plagiarism. In this way it may be helpful to get the original idea among
our shelves. After removing plagiarism it also increases the quality among
research works. Providing proper information to the users are important for
librarian, as a librarian one should know what is plagiarism and how it works
in producing a quality research.

12
Bibliography

[1] Asim M. El Tahir Ali, Hussam M. Dahwa Abdulla, and Václav Snásel
(2011). Overview and Comparison of Plagiarism Detection Tools, 161-
172.

[2] Haworth, G. M. (2006) Student projects: plagiarism and assess-


ment. In: JISC 2nd International Plagiarism Conference 2006, 19th
- 21st May, 2006, The sage, Gateshead, Newcastle. Available at
http://centaur.reading.ac.uk/4558/

[3] Patil, S. S., and Yeole, H. (2019). Overview of Plagia-


rism Checkers and Plagiarism Detection Tools: A Study,
https://www.researchgate.net/publication/331062965

[4] Radha, L., Alias Nagalakshmi (2014). Usage of Anti-Plagiarism for


Writing Ethical Research by Academic Institutions: An Overview. Sch.
J. Arts Humanit. Soc. Sci. 2(2B), 252-253.

[5] Schein, M. (2001). Redundant publications: From self-plagiarism to


“Salami-Slicing”. New Surgery, 1, 139-140.

[6] Swazey, J.P., Anderson, M.S., Lewis, K.S. (1993). Ethical problems in
academic research. American Scientist, 81, 542-553.

13

You might also like