ACL-OCL / Base_JSON /prefixI /json /icon /2020.icon-demos.18.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "2020",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T07:30:13.827252Z"
},
"title": "Plagiarism detection tool for Indian Language documents with Special Focus on Punjabi and Hindi Language",
"authors": [
{
"first": "Vishal",
"middle": [],
"last": "Goyal",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "DAV College",
"location": {
"settlement": "Jalandhar"
}
},
"email": "vishal.pup@gmail.com"
},
{
"first": "Rajeev",
"middle": [],
"last": "Puri",
"suffix": "",
"affiliation": {},
"email": "puri.rajeev@gmail.com"
},
{
"first": "Jitesh",
"middle": [],
"last": "Pubreja",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Punjabi University",
"location": {
"settlement": "Patiala"
}
},
"email": "jitesh.pubreja@gmail.com"
},
{
"first": "Jaswinder",
"middle": [],
"last": "Singh",
"suffix": "",
"affiliation": {},
"email": "jaswinder.singh794@gmail.com"
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "Plagiarism is closely linked with Intellectual Property Rights and Copyrights laws, both of which have been formed to protect the ownership of the concept. Most of the available tools for detecting plagiarism when tested with sample Punjabi text, failed to recognise the Punjabi text and the ones, which supported Punjabi text, did a simple string comparison for detecting the suspected copy-paste plagiarism, ignoring the other forms of plagiarism such as word switching, synonym replacement and sentence switching etc.",
"pdf_parse": {
"paper_id": "2020",
"_pdf_hash": "",
"abstract": [
{
"text": "Plagiarism is closely linked with Intellectual Property Rights and Copyrights laws, both of which have been formed to protect the ownership of the concept. Most of the available tools for detecting plagiarism when tested with sample Punjabi text, failed to recognise the Punjabi text and the ones, which supported Punjabi text, did a simple string comparison for detecting the suspected copy-paste plagiarism, ignoring the other forms of plagiarism such as word switching, synonym replacement and sentence switching etc.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "The above discussed problem led to the scope of development of a specialised software that can bridge the gap. The present software tool aims at providing Successful Recognition and Reporting of Plagiarism among Punjabi and Hindi Documents. This tool is mainly aimed for Universities, Colleges or other Academic Institutions, to check the Plagiarism Report for the Submitted work, be a Ph.D. Thesis, M.Phil. Thesis or a Research Paper of some kind.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The software is built using modular approach and open source technologies. The language dependent components are kept separate from the main programme engine, so that the engine could be used with any other compatible languages. (Figure. 1 ). reduces the document to their base words for comparing with repository and online documents.",
"cite_spans": [],
"ref_spans": [
{
"start": 229,
"end": 239,
"text": "(Figure. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "the important keywords from the document, that shortlists the documents having higher probability of matches. 6. The similarity matching engine uses the cosine similarity to predict the extent of match of the query document with the online as well as offline sources. There are Three levels of Users, \"Admin\", \"Manager\" and \"User\".",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Keyword identification module identifies",
"sec_num": "5."
},
{
"text": "The main Responsibilities for \"Admin\" are to Maintain and Configure the various aspects of Site for the optimal use of the System. \"Admin\" can also test the modular systems in isolation to pinpoint the problem if any arises during the Production Environment, which is helpful in Debugging the system down the road without putting it offline.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Keyword identification module identifies",
"sec_num": "5."
},
{
"text": "The \"Manager\" is the Organizational level head, which can add or manage users to the system under their Domain.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Keyword identification module identifies",
"sec_num": "5."
},
{
"text": "A \"User\" is the lowest form of Functional account that can be created on this site. Each User can create jobs that contains the documents, articles, papers etc. that needs to be checked.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Keyword identification module identifies",
"sec_num": "5."
},
{
"text": "The Plagiarism Detection tool is under the process of being trademarked in accordance with MietY, under the title \"ShodhMapak\". The Copyright has been successfully granted, for the same, to Punjabi University, Patiala in conjunction with MietY. The software tool is available online for general public at -",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Keyword identification module identifies",
"sec_num": "5."
}
],
"back_matter": [],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "Computer-Based Plagiarism Detection Methods and Tools: An Overview",
"authors": [
{
"first": "R",
"middle": [],
"last": "Lukashenko",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Graudina",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Grundspenk",
"suffix": ""
}
],
"year": 2007,
"venue": "International Conference on Computer Systems and Technologies",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. Lukashenko, V. Graudina and J. Grundspenk, \"Computer-Based Plagiarism Detection Methods and Tools: An Overview,\" in International Conference on Computer Systems and Technologies, 2007.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Plagiarism: a misplaced emphasis",
"authors": [
{
"first": "B",
"middle": [],
"last": "Martin",
"suffix": ""
}
],
"year": 1994,
"venue": "Journal of Information Ethics",
"volume": "3",
"issue": "2",
"pages": "36--47",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "B. Martin, \"Plagiarism: a misplaced emphasis,\" Journal of Information Ethics, vol. 3, no. 2, pp. 36- 47, 1994.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Plagiarism -A Survey",
"authors": [
{
"first": "H",
"middle": [],
"last": "Maurer",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "Kappe",
"suffix": ""
},
{
"first": "B",
"middle": [],
"last": "Zaka",
"suffix": ""
}
],
"year": 2006,
"venue": "Journal of Universal Computer Science",
"volume": "12",
"issue": "8",
"pages": "1050--1084",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "H. Maurer, F. Kappe and B. Zaka, \"Plagiarism -A Survey,\" Journal of Universal Computer Science, vol. 12, no. 8, pp. 1050-1084, 2006.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Plagiarism: Words and ideas",
"authors": [
{
"first": "Mathieu",
"middle": [],
"last": "Bouville",
"suffix": ""
}
],
"year": 2008,
"venue": "Journal of Science and Engineering Ethics",
"volume": "14",
"issue": "3",
"pages": "311--322",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bouville and Mathieu, \"Plagiarism: Words and ideas,\" Journal of Science and Engineering Ethics, vol. 14, no. 3, pp. 311-322, 2008.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Efficient randomized pattern-matching algorithms",
"authors": [
{
"first": "R",
"middle": [
"M"
],
"last": "Karp",
"suffix": ""
},
{
"first": "M",
"middle": [
"O"
],
"last": "Rabin",
"suffix": ""
}
],
"year": 1987,
"venue": "IBM Journal of Research and Development",
"volume": "31",
"issue": "2",
"pages": "249--260",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. M. Karp and M. O. Rabin, \"Efficient randomized pattern-matching algorithms,\" IBM Journal of Research and Development, vol. 31, no. 2, pp. 249- 260, 1987.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Fast Pattern Matching in Strings",
"authors": [
{
"first": "D",
"middle": [],
"last": "Knuth",
"suffix": ""
},
{
"first": "J",
"middle": [
"H"
],
"last": "Morris",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Pratt",
"suffix": ""
}
],
"year": 1977,
"venue": "SIAM Journal on Computing",
"volume": "6",
"issue": "2",
"pages": "323--350",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "D. Knuth, J. H. Morris and V. Pratt, \"Fast Pattern Matching in Strings,\" SIAM Journal on Computing, vol. 6, no. 2, pp. 323-350, 1977.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "A Fast String Searching Algorithm",
"authors": [
{
"first": "R",
"middle": [
"S"
],
"last": "Boyer",
"suffix": ""
},
{
"first": "J",
"middle": [
"S"
],
"last": "Moore",
"suffix": ""
}
],
"year": 1977,
"venue": "Comm. ACM. NewYork",
"volume": "20",
"issue": "10",
"pages": "762--772",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R.S.Boyer and J.S.Moore, \"A Fast String Searching Algorithm,\" Comm. ACM. NewYork, NY, USA: Association for Computing Machinery, vol. 20, no. 10, pp. 762-772, 1977.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "A faster algorithm for approximate string matching",
"authors": [
{
"first": "R",
"middle": [],
"last": "Baeza-Yates",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Navarro",
"suffix": ""
}
],
"year": 1996,
"venue": "Combinatorial Pattern Matching",
"volume": "1075",
"issue": "",
"pages": "1--23",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. Baeza-Yates and G. Navarro., \"A faster algorithm for approximate string matching,\" Combinatorial Pattern Matching, vol. LNCS 1075, pp. 1-23, 1996. \"Turnitin.com User Guides,\" iParadigm LLC, [Online]. Available: http://guides.turnitin.com. [Accessed December 2013].",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "jPlag -Detecting Software Plagiarism",
"authors": [],
"year": 1996,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "\"jPlag -Detecting Software Plagiarism,\" 1996. [Online].",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "University of Virginia",
"authors": [
{
"first": "L",
"middle": [],
"last": "Bloomfield",
"suffix": ""
}
],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "L. Bloomfield, \"wCopyFind,\" University of Virginia, [Online].",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Dupli Checker -Free Online Software for Plagiarism Detection",
"authors": [],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "\"Dupli Checker -Free Online Software for Plagiarism Detection,\" Dupli Checker, [Online]. Available: http://www.duplichecker.com. [Accessed 22 10 2015].",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Online plagiarism detection through exploiting lexical, syntactic, and semantic information",
"authors": [
{
"first": "W.-Y",
"middle": [],
"last": "Lin",
"suffix": ""
},
{
"first": "N",
"middle": [],
"last": "Peng",
"suffix": ""
},
{
"first": "C.-C",
"middle": [],
"last": "Yen",
"suffix": ""
},
{
"first": "S.-D",
"middle": [],
"last": "Lin",
"suffix": ""
}
],
"year": 2012,
"venue": "Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "W.-Y. Lin, N. Peng, C.-C. Yen and S.-d. Lin, \"Online plagiarism detection through exploiting lexical, syntactic, and semantic information,\" in Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Jeju, Republic of Korea, 2012.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Winnowing: local algorithms for document fingerprinting",
"authors": [
{
"first": "S",
"middle": [],
"last": "Schleimer",
"suffix": ""
},
{
"first": "D",
"middle": [
"S"
],
"last": "Wilkerson",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Aiken",
"suffix": ""
}
],
"year": 2003,
"venue": "SIGMOD",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "S. Schleimer, D. S. Wilkerson and A. Aiken, \"Winnowing: local algorithms for document fingerprinting,\" in SIGMOD, San Diego, 2003.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "SNITCH-A Software Tool for Detecting Cut and Paste Plagiarism",
"authors": [
{
"first": "S",
"middle": [],
"last": "Niezgoda",
"suffix": ""
},
{
"first": "T",
"middle": [
"P"
],
"last": "Way",
"suffix": ""
}
],
"year": 2006,
"venue": "37th SIGCSE technical symposium on Computer science education",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "S. Niezgoda and T.P.Way, \"SNITCH-A Software Tool for Detecting Cut and Paste Plagiarism,\" in 37th SIGCSE technical symposium on Computer science education, 2006.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Preprocessing Phase of Punjabi Language Text Summarization",
"authors": [
{
"first": "V",
"middle": [],
"last": "Gupta",
"suffix": ""
},
{
"first": "G",
"middle": [
"S"
],
"last": "",
"suffix": ""
}
],
"year": 2011,
"venue": "Communications in Computer and Information Science",
"volume": "139",
"issue": "",
"pages": "250--253",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "V. Gupta and G. S. Lehal, \"Preprocessing Phase of Punjabi Language Text Summarization,\" Communications in Computer and Information Science, vol. 139, pp. 250-253, 2011.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Features Selection and Weight learning for Punjabi Text Summarization",
"authors": [
{
"first": "V",
"middle": [],
"last": "Gupta",
"suffix": ""
},
{
"first": "G",
"middle": [
"S"
],
"last": "",
"suffix": ""
}
],
"year": 2011,
"venue": "International Journal of Engineering Trends and Technology",
"volume": "2",
"issue": "2",
"pages": "45--48",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "V. Gupta and G. S. Lehal, \"Features Selection and Weight learning for Punjabi Text Summarization,\" International Journal of Engineering Trends and Technology, vol. 2, no. 2, pp. 45-48, 2011.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Plagiarism Detection in Regional Languages -Its challenges in context to Punjabi documents",
"authors": [
{
"first": "R",
"middle": [],
"last": "Puri",
"suffix": ""
},
{
"first": "R",
"middle": [
"P S"
],
"last": "Bedi",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Goyal",
"suffix": ""
}
],
"year": 2011,
"venue": "Research Cell: An International Journal Of Engineering Science",
"volume": "5",
"issue": "",
"pages": "296--304",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. Puri, R. P. S. Bedi and V. Goyal, \"Plagiarism Detection in Regional Languages -Its challenges in context to Punjabi documents,\" Research Cell: An International Journal Of Engineering Science, vol. 5, pp. 296-304, 2011.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Automated Stopwords Identification in Punjabi Documents",
"authors": [
{
"first": "R",
"middle": [],
"last": "Puri",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Bedi",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Goyal",
"suffix": ""
}
],
"year": 2013,
"venue": "Research Cell: An International Journal of Engineering Sciences",
"volume": "8",
"issue": "",
"pages": "119--125",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. Puri, R. Bedi and V. Goyal, \"Automated Stopwords Identification in Punjabi Documents,\" Research Cell: An International Journal of Engineering Sciences, vol. 8, no. June 2013, pp. 119-125, 2013.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "Punjabi Stemmer using Punjabi WordNet database",
"authors": [
{
"first": "R",
"middle": [],
"last": "Puri",
"suffix": ""
},
{
"first": "R",
"middle": [
"P S"
],
"last": "Bedi",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Goyal",
"suffix": ""
}
],
"year": 2015,
"venue": "Indian Journal of Science and Technology",
"volume": "8",
"issue": "27",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. Puri, R. P. S. Bedi and V. Goyal, \"Punjabi Stemmer using Punjabi WordNet database,\" Indian Journal of Science and Technology, vol. 8, no. 27, October 2015.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Indradhanush WordNet",
"authors": [],
"year": null,
"venue": "Dept. of Information technology",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "\"Indradhanush WordNet,\" Dept. of Information technology, Ministry of Communication, Govt. of India.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "Automatic Keywords Extraction for Punjabi Language",
"authors": [
{
"first": "V",
"middle": [],
"last": "Gupta",
"suffix": ""
},
{
"first": "G",
"middle": [
"S"
],
"last": "",
"suffix": ""
}
],
"year": 2011,
"venue": "IJCSI International Journal of Computer Science Issues",
"volume": "8",
"issue": "5",
"pages": "327--331",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "V. Gupta and G. S. Lehal, \"Automatic Keywords Extraction for Punjabi Language,\" IJCSI International Journal of Computer Science Issues, vol. 8, no. 5, pp. 327-331, 2011.",
"links": null
}
},
"ref_entries": {}
}
}