• 제목/요약/키워드: 프로그램 표절

Search Result 49, Processing Time 0.022 seconds

A Plagiarism Detection Technique for Source Codes Considering Data Structures (데이터 구조를 고려한 소스코드 표절 검사 기법)

  • Lee, Kihwa;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.6
    • /
    • pp.189-196
    • /
    • 2014
  • Though the plagiarism is illegal and should be avoided, it still occurs frequently. Particularly, the plagiarism of source codes is more frequently committed than others since it is much easier to copy them because of their digital nature. To prevent code plagiarism, there have been reported a variety of studies. However, previous studies for plagiarism detection techniques on source codes do not consider the data structures although a source code consists both of data structures and algorithms. In this paper, a plagiarism detection technique for source codes considering data structures is proposed. Specifically, the data structures of two source codes are represented as sets of trees and compared with each other using Hungarian Method. To show the usefulness of this technique, an experiment has been performed on 126 source codes submitted as homework results in an object-oriented programming course. When both the data structures and the algorithms of the source codes are considered, the precision and the F-measure score are improved 22.6% and 19.3%, respectively, than those of the case where only the algorithms are considered.

Analysis of Domestic.Foreign Trend and Assessment Tools for Programs and Natural Language Plagiarism (프로그램 및 자연어 표절 검출을 위한 국내.외 동향 및 감정 S/W 툴의 분석)

  • 조동욱;신승수;윤미희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1659-1668
    • /
    • 2002
  • It is very important to protect digital copyright such as computer software, digital contents, and others because national power is influenced at present and in the future. This paper deals with the trend of domestic and foreign researches related to digital copyright and the comparative analysis of software tools fur being a systematic judge of the piracy. This paper focuses on the foreign trend of judge business based on JISC and the domestic movement. It also comparatively analyses software tools to judge natural language or program piracy.

  • PDF

S/W Program Plagiarism Inspection Techniques and Analysis of S/W Tools for Protection of Digital Properties (디지털 재산권 보호를 위한 소프트웨어 프로그램 표절 감정 기술과 툴의 분석)

  • 조동욱
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.177-184
    • /
    • 2003
  • Protection of digital properties such as computer S/W, digital contents is the most important topics. For this, this paper describes the domestic and foreign trends for protecting digital properties and S/W tools for inspecting of plagiarism is compared and analyzed. The analysis of research activities of foreign inspection institutes such as JISC and domestic institutes and communities has done. Also, S/W tools for inspecting of natural language plagiarism is analyzed.Having been speed development of The Content Technology,

  • PDF

Enhancing the performance of code-clone detection tools using code2vec (code2vec을 이용한 유사도 감정 도구의 성능 개선)

  • Um, Taeho;Hong, Sung Moon;Yang, Joon Hyuk;Jang, Hyo Seok;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.31-40
    • /
    • 2021
  • Plagiarism refers to the act of using the original data as if it were one's own without revealing the source. The plagiarism of source code causes a variety of problems, including legal disputes. Plagiarism in software projects is usually determined by measuring similarity by comparing every pair of source code within two projects. However, blindly comparing every pair has been a huge computational burden, causing a major factor of not using tools of better accuracy. If we can only compare pairs that are probable to be clones, eliminating pairs that are impossible to be clones, we can concentrate more on improving the accuracy of detection. In this paper, we propose a method of selecting highly probable candidates of clone pairs by pre-classifying suspected source-codes using a machine-learning model called code2vec.

Applying Genomic Sequence Alignment Methodology for Source Codes Plagiarism Detection (유전체 서열의 정렬 기법을 이용한 소스 코드 표절 검사)

  • 강은미;황미녕;조환규
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.352-367
    • /
    • 2003
  • The syntactic and semantic characteristics of a computer program can be represented by the keywords sequence extracted from the source code. Therefore the similarity and the difference between two programs can be clearly figured out by comparing the keyword sequences obtained from the given programs. Various methods for measuring the similarity of two different sequences have been intensively studied already in bioinformatics on biological genetic sequence manipulation. In this paper, we propose a new method for measuring the similarity of two different programs and detecting the partial plagiarism by exploiting the sequence alignment techniques. In order to evaluate the performance of the proposed method, we experimented with the actual Program codes submitted by 70 students attending a Data Structure course )tow 2001. The experimental results show that the proposed method is more effective and powerful than the fingerprint method which is the most commonly used for the Plagiarism detection.

An Adaptive Algorithm for Plagiarism Detection in a Controlled Program Source Set (제한된 프로그램 소스 집합에서 표절 탐색을 위한 적응적 알고리즘)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.12
    • /
    • pp.1090-1102
    • /
    • 2006
  • This paper suggests a new algorithm for detecting the plagiarism among a set of source codes, constrained to be functionally equivalent, such are submitted for a programming assignment or for a programming contest problem. The typical algorithms largely exploited up to now are based on Greedy-String Tiling, which seeks for a perfect match of substrings, and analysis of similarity between strings based on the local alignment of the two strings. This paper introduces a new method for detecting the similar interval of the given programs based on an adaptive similarity matrix, each entry of which is the logarithm of the probabilities of the keywords based on the frequencies of them in the given set of programs. We experimented this method using a set of programs submitted for more than 10 real programming contests. According to the experimental results, we can find several advantages of this method compared to the previous one which uses fixed similarity matrix(+1 for match, -1 for mismatch, -2 for gap) and also can find that the adaptive similarity matrix can be used for detecting various plagiarism cases.

A Survey of Plagiarism Inspection Method for Efficient Protecting of Intellectual Properties and Proposal of Art works Plagiarism Inspection (지적재산권의 효율적 보호를 위한 표절 감정 기법의 고찰 및 예술품의 위작 감정 방법의 제안)

  • 조동욱
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.72-78
    • /
    • 2003
  • In this paper, survey of technical methods for protecting intellectual properties and proposal of art works plagiarism detection are accomplished. For this, in this paper, a survey of technical methods for inspecting of program source code plagiarism, analysis of natural languages plagiarism types and existing inspection methods are accomplished Also, author verification system and plagiarism detection about ancient literatures or art works is proposed because of ancient literatures or art work are important in the aspect of cultural properties control, protecting of author's intellectual property and owner's property estimation.

  • PDF

Android plagiarism detection through Dalvik instruction similarity comparison (Dalvik명령어 유사도 비교를 통한 안드로이드 표절 탐지 기법)

  • Choi, Sung-ha;Hwang, Na-hyun;Park, Heewan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.796-799
    • /
    • 2012
  • 스마트폰 애플리케이션 중에서 안드로이드 앱은 자바를 기반으로 한다. 따라서 자바 프로그램과 마찬가지로 디컴파일러 도구를 활용하여 원본 소스 코드를 얻어낼 수 있기 때문에 코드 도용에 대해서 매우 취약하다. 본 논문에서는 안드로이드에 대한 코드 도용과 표절을 막기 위한 기법을 제안한다. 효과적인 코드 도용 및 표절 여부를 탐지하기 위한 방법으로서, 안드로이드 달빅(Dalvik) 코드에 대해서 요약 단계를 거친 후 유사도를 측정하는 방법을 사용한다. 기존의 안드로이드 유사도 비교 연구에서는 달빅 코드가 정확하게 일치해야만 유사도가 높게 측정될 수 있었지만, 요약 단계를 통해서 변환된 달빅 코드를 비교하면 코드 도용시 일부 코드의 의도적인 수정이 있더라도 유사도가 높게 측정된다. 그 결과, 본 논문에서 제안하는 표절 탐지 기법이 기존 연구와 비교하여 표절에 대한 탐지 능력이 우수함을 확인하였다.

A Study on Undergraduates' Citation Use and Plagiarism Awareness (대학생들의 인용 및 표절에 관한 인식연구)

  • Rhee, Hey-Young;Nam, Tae-Woo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.3
    • /
    • pp.175-198
    • /
    • 2010
  • The study investigated undergraduates' citation use and plagiarism awareness. A questionnaire method was used and was given to undergraduates in a university located in Seoul. Upon investigation, undergraduates recognized the importance and the need of citation and were partly applying citations. However, upon further investigation of undergraduates' citation learning with citation questions, very few of respondents had knowledge of correct citation usage. Undergraduates mostly cited print materials and information from the internet. They used books in case of print materials and web materials provided by academic institutions. They suggested that the university should teach citation usage through a citation and plagiarism awareness program. It is necessary for library use education (information literacy education) as well as university to teach citation education including citation type and how to write it.

Hierarchical Clustering Methodology for Source Code Plagiarism Detection (계층적 군집화 기법을 이용한 소스 코드 표절 검사)

  • Sohn, Ki-Rack;Moon, Seung-Mi
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.1
    • /
    • pp.91-98
    • /
    • 2007
  • Plagiarism is a serious problem in school education due to current technologies such as the internet and word processors. This paper presents how to detect source code plagiarism using similarity based on string comparison methods. The main contribution is to use hierarchical agglomerative clustering technique to classify plagiarism groups, which are then visualized as a dendrogram. Graders can set an empirical threshold to the dendrogram to navigate plagiarism groups. We evaluated the performance of the presented method with a real world data. The result showed the usefulness and applicability of this method.

  • PDF