Poon Yan Horn Jonathan 09/04/2010 School Of Computing National University of Singapore Student Submissions Integrity Diagnosis (SSID) A User-Centric Plagiarism.

Slides:



Advertisements
Similar presentations
Rolls-Royce supported University Technology Centre in Control and Systems Engineering UK e-Science DAME Project Alex Shenfield
Advertisements

LTSN-ICS Plagiarism Workshop 2002 Prevention better than cure? The case for Plagiarism Detection H.C. Davis IAM: Learning Technologies E lectronics and.
Parts Management How enrich enables users to: 1.Eliminate Manual Tasks 2.Control Costs.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Design and Making of Information System at Dentist Work Place By : Advisor : Samuel Budi GAlexander Setiawan, MT Leo Willyanto Industry Engineering.
Query Chains: Learning to Rank from Implicit Feedback Paper Authors: Filip Radlinski Thorsten Joachims Presented By: Steven Carr.
Puzzle Image Processing Sam Bair (Group Leader) Nick Halliday Nathan Malkin Joe Wang.
CS408 CS Project Kuestions?! Uijune Jeong, Jihoon Baek, Rémi Bouchar [TEAM 111] A New Web application for Q&A Kuestions?!
PHP-based Image Recognition and Retrieval of Late 18th Century Artwork Ben Goodwin Handouts are available for students writing summaries for class assignments.
Classifications and CASCOT Ritva Ellison Institute for Employment Research University of Warwick.
Aki Hecht Seminar in Databases (236826) January 2009
Diagnosis on Computational Grids for Detecting Intelligent Cheating Nodes Felipe Martins Rossana M. Andrade Aldri L. dos Santos Bruno SchulzeJosé N. de.
Classroom Interaction with the Tablet PC Richard Anderson, UW Dec 5, 2006 US Air Force Academy.
 Image Search Engine Results now  Focus on GIS image registration  The Technique and its advantages  Internal working  Sample Results  Applicable.
A new way to monitor System Automation configuration file LUDIWAC Helcia Conseil.
A Web-based Intelligent Hybrid System for Fault Diagnosis Gunjan Jha Research Student Nanyang Technological University Singapore.
Online Assessments: SafeAssign + Tips and Pitfalls “Whats” and “Whys” of assessments Assessment types Types of test questions Assignments Rubrics SafeAssign.
Firat Batmaz, Chris Hinde Computer Science Loughborough University A Diagram Drawing Tool For Semi–Automatic Assessment Of Conceptual Database Diagrams.
Plagiarism Detection Techniques. Definition of Plagiarism Detection Plagiarism detection is the process of locating instances of plagiarism within a work.
A web based Project Management and Tracking System Zheng Wang, Yuntian Zhao, Yanhong Li Biostatistics & Statistical programming.
Computer Programming and Basic Software Engineering 4. Basic Software Engineering 1 Writing a Good Program 4. Basic Software Engineering.
The 2nd International Conference of e-Learning and Distance Education, 21 to 23 February 2011, Riyadh, Saudi Arabia Prof. Dr. Torky Sultan Faculty of Computers.
CSC 386 – Computer Security Scott Heggen. Database Security How can we minimize the probability of success by attacks like the one shown in the comic?
Source Code and Text Plagiarism Detection Strategies
CS 501: Software Engineering Fall 1999 Lecture 16 Verification and Validation.
WEB-BASED DEAL LOG DATABASE PROJECT REVIEW Presented to SHEPHERD VENTURES By Sylvia Szubrycht.
Digital Assessment Training Trainer: Name
Core Skills Register Training Tim Grocott Core Skills Programme Junior Doctor Project Manger.
When Experts Agree: Using Non-Affiliated Experts To Rank Popular Topics Meital Aizen.
EZee iCafe System. Contents Introduction Current Scenario Proposed Solution Architecture / Block Diagram Hardware / Software Requirements Features Benefits.
EasyQuerier: A Keyword Interface in Web Database Integration System Xian Li 1, Weiyi Meng 2, Xiaofeng Meng 1 1 WAMDM Lab, RUC & 2 SUNY Binghamton.
Competitive Algorithm Calculation Testing in a Unified System (C.A.C.T.U.S.) Acceptance Test 04/25/2012 Presented By: ExoNET Solutions 1.
Exercise Your your Library ® RefWorks: The Basics October 10, 2006.
Software quality factors
Access Chapter 3-Obtaining Answers to Your Data Questions.
Computer Security coursework 3 (part 1) Dr Alexei Vernitski.
Software Development Problem Analysis and Specification Design Implementation (Coding) Testing, Execution and Debugging Maintenance.
Data Collection. Data Capture This is the first stage involved in getting data into a computer Various input devices are used when getting data to the.
1 Generating Comparative Summaries of Contradictory Opinions in Text (CIKM09’)Hyun Duk Kim, ChengXiang Zhai 2010/05/24 Yu-wen,Hsu.
LogTree: A Framework for Generating System Events from Raw Textual Logs Liang Tang and Tao Li School of Computing and Information Sciences Florida International.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Student Submissions Integrity Diagnosis System (SSID) Min-Yen Kan.
Access Control for Dynamic Virtual Organisations Duncan Russell, Peter Dew & Karim Djemame University of Leeds.
Our MP3 Search Engine Crawler –Searching for Artist Name –Searching for Song Title Website Difficulties Looking Back.
CS130 Visual Basic Project 4 Lecture Fall New topics in project 4 Database, file (table), records, fields. Application that contains menus, submenus,
DataJewel 1 : Tightly Integrating Visualization with Temporal Data Mining Mihael Ankerst, David H. Jones, Anne Kao, Changzhou Wang 1 US patent pending.
EJB Replication Graham, Iman, Santosh, Mark Newcastle University.
CS307P-SYSTEM PRACTICUM CPYNOT. B13107 – Amit Kumar B13141 – Vinod Kumar B13218 – Paawan Mukker.
GROUP PresentsPresents. WEB CRAWLER A visualization of links in the World Wide Web Software Engineering C Semester Two Massey University - Palmerston.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Advisor : Dr. Hsu Graduate : Chun Kai Chen Author : Andrew.
Reflections on the Use of SafeAssign to Prevent and Detect Plagiarism Timothy W. Kirk, PhD Assistant Professor of Philosophy 1© 2010 Timothy W. Kirk.
1 Substructure Similarity Search in Graph Databases R 陳芃安.
Xifeng Yan Philip S. Yu Jiawei Han SIGMOD 2005 Substructure Similarity Search in Graph Databases.
11th Grade: Getting Ready for SOL’s 1 By Woodhouse.
UWave: Accelerometer-based personalized gesture recognition and its applications Tae-min Hwang.
Sensor Calibration Automation Demonstration Presenters: Barbara Benson and David Balsiger (University of Wisconsin) Collaborators: Laurence Choi, Yu Hen.
SOFTWARE TESTING TRAINING TOOLS SUPPORT FOR SOFTWARE TESTING Chapter 6 immaculateres 1.
Experience Report: System Log Analysis for Anomaly Detection
PLM, Document and Workflow Management
Deployment Planning Services
CHU HAI COLLEGE OF HIGHER EDUCATION DEPARTMENT OF COMPUTER SCIENCE Preparation of Mid-Term Progress Report Bachelor of Science in Computer Science.
Tackling Plagiarism with Blended Assessment and Randomisation
Collective Network Linkage across Heterogeneous Social Platforms
دانشگاه شهیدرجایی تهران
Spanish implementation of the New Basel Capital Accord
تعهدات مشتری در کنوانسیون بیع بین المللی
CS639: Data Management for Data Science
Programming Assignment Tutorial
Yining ZHAO Computer Network Information Center,
Presentation transcript:

Poon Yan Horn Jonathan 09/04/2010 School Of Computing National University of Singapore Student Submissions Integrity Diagnosis (SSID) A User-Centric Plagiarism Checking System

Plagiarism in SoC In 2000, 98 cases in the first assignment of CS1102. (Cheang, Kurnia, Lim & Oon, 2005) In 2004, 181 students admitted to committing plagiarism. (Ooi & Tan, 2005)

How to Detect Plagiarism Manually…? Achieve the maximum accuracy But… time-consuming and tedious… Ask the computer to do it? Give up on some accuracy… Comparison done automatically

How to Prevent Plagiarism Factors of Plagiarism: o Fear of failure o Difficulty of work Solution: set up learning groups

SSID: A User-Centric Plagiarism Detecting System Features: Pairwise plagiarism detection Plagiarism cluster detection But also… Reporting suspicious and recording plagiarism cases Logging system Visuals

How SSID works? Pairwise plagiarism detection engine Clustering engine (DBSCAN) User Interface Database

Pairwise Comparison: Improvements Based on the Greedy-String-Tiling algorithm (Wise, 1993) 4 improvements: Usage of indexing – JPlag (Prechelt, Malpohl, & Phlippsen, 2000) Counting of statements Excluding skeleton code Providing more accurate making of tokens

Pairwise Comparisons: Accuracy Experiment 3 Assignments 28 participants 84 copies of plagiarism submissions Identified attacks – 20 types F-measure = 1

Demonstration Link to SSID

Conclusion Limitations Can be defeated by some attacks Not deployed in real life situation Future Work Approximate Matching Deploy in real life situation

Questions? All questions are welcome!

Thank you for your attention