Science.gov

Sample records for code plagiarism detection

  1. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    ERIC Educational Resources Information Center

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  2. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    ERIC Educational Resources Information Center

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  3. A Comparison of Source Code Plagiarism Detection Engines

    ERIC Educational Resources Information Center

    Lancaster, Thomas; Culwin, Fintan

    2004-01-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and…

  4. A Comparison of Source Code Plagiarism Detection Engines

    NASA Astrophysics Data System (ADS)

    Lancaster, Thomas; Culwin, Fintan

    2004-06-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and effective techniques are seen to involve tokenising student submissions then searching pairs of submissions for long common substrings, an example of what is defined to be a paired structural metric. Computing academics are recommended to use one of the two Web-based detection engines, MOSS and JPlag. It is shown that whilst detection is well established there are still places where further research would be useful, particularly where visual support of the investigation process is possible.

  5. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    ERIC Educational Resources Information Center

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  6. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    ERIC Educational Resources Information Center

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  7. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    ERIC Educational Resources Information Center

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  8. Source Code Plagiarism--A Student Perspective

    ERIC Educational Resources Information Center

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  9. Source Code Plagiarism--A Student Perspective

    ERIC Educational Resources Information Center

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  10. Social Network Aided Plagiarism Detection

    ERIC Educational Resources Information Center

    Zrnec, Aljaž; Lavbic, Dejan

    2017-01-01

    The prevalence of different kinds of electronic devices and the volume of content on the Web have increased the amount of plagiarism, which is considered an unethical act. If we want to be efficient in the detection and prevention of these acts, we have to improve today's methods of discovering plagiarism. The paper presents a research study where…

  11. Social Network Aided Plagiarism Detection

    ERIC Educational Resources Information Center

    Zrnec, Aljaž; Lavbic, Dejan

    2017-01-01

    The prevalence of different kinds of electronic devices and the volume of content on the Web have increased the amount of plagiarism, which is considered an unethical act. If we want to be efficient in the detection and prevention of these acts, we have to improve today's methods of discovering plagiarism. The paper presents a research study where…

  12. Plagiarism Detection by Online Solutions.

    PubMed

    Masic, Izet; Begic, Edin; Dobraca, Amra

    2017-01-01

    The problem of plagiarism represents one of the burning issues of the modern scientific world. Detection of plagiarism is a problem that the Editorial Board encounters in their daily work. Software solutions represent a good solution for the detection of plagiarism. The problem of plagiarism will become most discussed topic of the modern scientific world, especially due to the development of standard measures, which rank the work of one author. Investment in education, education of young research personnel about the importance of scientific research, with paying particular attention on ethical behavior, becomes an imperative of academic staff. Editors have to invest additional effort in the development of the base of reviewers team as well as in their proper guidance, because after all, despite the software solutions, they are the best weapon to fight plagiarism. Peer review process should be a key of successful operation of each journal.

  13. Rapid assessment of assignments using plagiarism detection software.

    PubMed

    Bischoff, Whitney R; Abrego, Patricia C

    2011-01-01

    Faculty members most often use plagiarism detection software to detect portions of students' written work that have been copied and/or not attributed to their authors. The rise in plagiarism has led to a parallel rise in software products designed to detect plagiarism. Some of these products are configurable for rapid assessment and teaching, as well as for plagiarism detection.

  14. Automatic Student Plagiarism Detection: Future Perspectives

    ERIC Educational Resources Information Center

    Mozgovoy, Maxim; Kakkonen, Tuomo; Cosma, Georgina

    2010-01-01

    The availability and use of computers in teaching has seen an increase in the rate of plagiarism among students because of the wide availability of electronic texts online. While computer tools that have appeared in recent years are capable of detecting simple forms of plagiarism, such as copy-paste, a number of recent research studies devoted to…

  15. Automatic Student Plagiarism Detection: Future Perspectives

    ERIC Educational Resources Information Center

    Mozgovoy, Maxim; Kakkonen, Tuomo; Cosma, Georgina

    2010-01-01

    The availability and use of computers in teaching has seen an increase in the rate of plagiarism among students because of the wide availability of electronic texts online. While computer tools that have appeared in recent years are capable of detecting simple forms of plagiarism, such as copy-paste, a number of recent research studies devoted to…

  16. Does the Adoption of Plagiarism-Detection Software in Higher Education Reduce Plagiarism?

    ERIC Educational Resources Information Center

    Youmans, Robert J.

    2011-01-01

    In two studies, students at California State University, Northridge wrote papers that were checked for plagiarism using plagiarism-detection software. In the first study, half of the students in two classes were randomly selected and told by the professor that their term papers would be scanned for plagiarism using the software. Students in the…

  17. Does the Adoption of Plagiarism-Detection Software in Higher Education Reduce Plagiarism?

    ERIC Educational Resources Information Center

    Youmans, Robert J.

    2011-01-01

    In two studies, students at California State University, Northridge wrote papers that were checked for plagiarism using plagiarism-detection software. In the first study, half of the students in two classes were randomly selected and told by the professor that their term papers would be scanned for plagiarism using the software. Students in the…

  18. Guidelines on What Constitutes Plagiarism and Electronic Tools to Detect it.

    PubMed

    Luksanapruksa, Panya; Millhouse, Paul W

    2016-04-01

    Plagiarism is a serious ethical problem among scientific publications. There are various definitions of plagiarism, and the major categories include unintentional (unsuitable paraphrasing or improper citations) and intentional. Intentional plagiarism includes mosaic plagiarism, plagiarism of ideas, plagiarism of text, and self-plagiarism. There are many Web sites and software packages that claim to detect plagiarism effectively. A violation of plagiarism laws can lead to serious consequences including author banning, loss of professional reputation, termination of a position, and even legal action.

  19. The Cat-and-Mouse Game of Plagiarism Detection.

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2001-01-01

    Describes how colleges, frustrated by students who use the Internet to plagiarize, are going online to enable professors to fight back. Explains that plagiarism-detection software, available for several years, is increasing in use. (EV)

  20. The Toolbox for Local and Global Plagiarism Detection

    ERIC Educational Resources Information Center

    Butakov, Sergey; Scherbinin, Vladislav

    2009-01-01

    Digital plagiarism is a problem for educators all over the world. There are many software tools on the market for uncovering digital plagiarism. Most of them can work only with text submissions. In this paper, we present a new architecture for a plagiarism detection tool that can work with many different kinds of digital submissions, from plain or…

  1. The Toolbox for Local and Global Plagiarism Detection

    ERIC Educational Resources Information Center

    Butakov, Sergey; Scherbinin, Vladislav

    2009-01-01

    Digital plagiarism is a problem for educators all over the world. There are many software tools on the market for uncovering digital plagiarism. Most of them can work only with text submissions. In this paper, we present a new architecture for a plagiarism detection tool that can work with many different kinds of digital submissions, from plain or…

  2. Intelligent Bar Chart Plagiarism Detection in Documents

    PubMed Central

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Alkawaz, Mohammed Hazim; Saba, Tanzila; Al-Rodhaan, Mznah; Al-Dhelaan, Abdullah

    2014-01-01

    This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR). By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts. PMID:25309952

  3. Intelligent bar chart plagiarism detection in documents.

    PubMed

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Rehman, Amjad; Alkawaz, Mohammed Hazim; Saba, Tanzila; Al-Rodhaan, Mznah; Al-Dhelaan, Abdullah

    2014-01-01

    This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR). By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts.

  4. Online Plagiarism Detection Services--Saviour or Scourge?

    ERIC Educational Resources Information Center

    McKeever, Lucy

    2006-01-01

    Although the exponential growth of the Internet has made it easier than ever to carry out plagiarism, it has also made it much easier to detect. This paper gives an overview of the many different methods of detecting web-based plagiarism which are currently available, assessing practical matters such as cost, functionality and performance.…

  5. Online Plagiarism Detection Services--Saviour or Scourge?

    ERIC Educational Resources Information Center

    McKeever, Lucy

    2006-01-01

    Although the exponential growth of the Internet has made it easier than ever to carry out plagiarism, it has also made it much easier to detect. This paper gives an overview of the many different methods of detecting web-based plagiarism which are currently available, assessing practical matters such as cost, functionality and performance.…

  6. Grade Expectations: Mapping Stakeholder Views of Online Plagiarism Detection

    ERIC Educational Resources Information Center

    Ashe, Diana; Manning, Michelle

    2007-01-01

    Based upon a pilot study of the leading online plagiarism detection service, this article examines the views of faculty and students as the main stakeholders in the controversy over online plagiarism detection. Rather than give advice outside of a specific institutional context, this study offers an understanding of the reasoning that informs the…

  7. Education Improves Plagiarism Detection by Biology Undergraduates

    ERIC Educational Resources Information Center

    Holt, Emily A.

    2012-01-01

    Regrettably, the sciences are not untouched by the plagiarism affliction that threatens the integrity of budding professionals in classrooms around the world. My research, however, suggests that plagiarism training can improve students' recognition of plagiarism. I found that 148 undergraduate ecology students successfully identified plagiarized…

  8. Education Improves Plagiarism Detection by Biology Undergraduates

    ERIC Educational Resources Information Center

    Holt, Emily A.

    2012-01-01

    Regrettably, the sciences are not untouched by the plagiarism affliction that threatens the integrity of budding professionals in classrooms around the world. My research, however, suggests that plagiarism training can improve students' recognition of plagiarism. I found that 148 undergraduate ecology students successfully identified plagiarized…

  9. Realigning the Focus of Plagiarism Detection Using "Plagiarismdetect.com"

    ERIC Educational Resources Information Center

    Sabapathy, Elangkeeran A/L; Rahim, Rozlan Abd; Jusoff, Kamaruzaman

    2009-01-01

    The purpose of this article is to examine the extent to which "plagiarismdetect.com," an internet help/tool to detect plagiarism helps academicians tackle the ever-growing problem of plagiarism. Concerned with term papers, essays and most of the time with full-blown research reports, a tool like "plagiarismdetect.com" may…

  10. Protecting Student Intellectual Property in Plagiarism Detection Process

    ERIC Educational Resources Information Center

    Butakov, Sergey; Barber, Craig

    2012-01-01

    The rapid development of the Internet along with increasing computer literacy has made it easy and tempting for digital natives to copy-paste someone's work. Plagiarism is now a burning issue in education, industry and even in the research community. In this study, the authors concentrate on plagiarism detection with particular focus on the…

  11. Protecting Student Intellectual Property in Plagiarism Detection Process

    ERIC Educational Resources Information Center

    Butakov, Sergey; Barber, Craig

    2012-01-01

    The rapid development of the Internet along with increasing computer literacy has made it easy and tempting for digital natives to copy-paste someone's work. Plagiarism is now a burning issue in education, industry and even in the research community. In this study, the authors concentrate on plagiarism detection with particular focus on the…

  12. A Study of Electronic Detection and Pedagogical Approaches for Reducing Plagiarism

    ERIC Educational Resources Information Center

    Chao, Chia-An; Wilhelm, William J.; Neureuther, Brian D.

    2009-01-01

    Plagiarism is an increasing problem in high schools and universities. To address the issue of how to teach students not to plagiarize, this study examined several pedagogical approaches for reducing plagiarism and the use of Turnitin, an online plagiarism detection software. The study found a significant difference between the control group and…

  13. Plagiarism: Examination of Conceptual Issues and Evaluation of Research Findings on Using Detection Services

    ERIC Educational Resources Information Center

    Konstantinidis, Angelos; Theodosiadou, Dimitra; Pappos, Christos

    2013-01-01

    The purpose of this review is to analyze and evaluate the research findings on using Plagiarism Detection Services (PDS) in universities. In order to do that, conceptual issues about plagiarism are examined and the complex nature of plagiarism is discussed. Subsequently, the pragmatic forms of student plagiarism are listed and PDS strategies on…

  14. A Study of Electronic Detection and Pedagogical Approaches for Reducing Plagiarism

    ERIC Educational Resources Information Center

    Chao, Chia-An; Wilhelm, William J.; Neureuther, Brian D.

    2009-01-01

    Plagiarism is an increasing problem in high schools and universities. To address the issue of how to teach students not to plagiarize, this study examined several pedagogical approaches for reducing plagiarism and the use of Turnitin, an online plagiarism detection software. The study found a significant difference between the control group and…

  15. Combating unethical publications with plagiarism detection services

    PubMed Central

    Garner, H.R.

    2010-01-01

    About 3,000 new citations that are highly similar to citations in previously published manuscripts that appear each year in the biomedical literature (Medline) alone. This underscores the importance for the opportunity for editors and reviewers to have detection system to identify highly similar text in submitted manuscripts so that they can then review them for novelty. New software-based services, both commercial and free, provide this capability. The availability of such tools provides both a way to intercept suspect manuscripts and serve as a deterrent. Unfortunately, the capabilities of these services vary considerably, mainly as a consequence of the availability and completeness of the literature bases to which new queries are compared. Most of the commercial software has been designed for detection of plagiarism in high school and college papers, however, there is at least one fee-based service (CrossRef) and one free service (etblast.org) which are designed to target the needs of the biomedical publication industry. Information on these various services, examples of the type of operability and output, and things that need to be considered by publishers, editors and reviewers before selecting and using these services is provided. PMID:21194644

  16. Combating unethical publications with plagiarism detection services.

    PubMed

    Garner, H R

    2011-01-01

    About 3,000 new citations that are highly similar to citations in previously published manuscripts that appear each year in the biomedical literature (Medline) alone. This underscores the importance for the opportunity for editors and reviewers to have detection system to identify highly similar text in submitted manuscripts so that they can then review them for novelty. New software-based services, both commercial and free, provide this capability. The availability of such tools provides both a way to intercept suspect manuscripts and serve as a deterrent. Unfortunately, the capabilities of these services vary considerably, mainly as a consequence of the availability and completeness of the literature bases to which new queries are compared. Most of the commercial software has been designed for detection of plagiarism in high school and college papers; however, there is at least 1 fee-based service (CrossRef) and 1 free service (etblast.org), which are designed to target the needs of the biomedical publication industry. Information on these various services, examples of the type of operability and output, and things that need to be considered by publishers, editors, and reviewers before selecting and using these services is provided.

  17. Sentence-Based Natural Language Plagiarism Detection

    ERIC Educational Resources Information Center

    White, Daniel R.; Joy, Mike S.

    2004-01-01

    With the increasing levels of access to higher education in the United Kingdom, larger class sizes make it unrealistic for tutors to be expected to identify instances of peer-to-peer plagiarism by eye and so automated solutions to the problem are required. This document details a novel algorithm for comparison of suspect documents at a sentence…

  18. Detecting Plagiarism in MS Access Assignments

    ERIC Educational Resources Information Center

    Singh, Anil

    2013-01-01

    Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…

  19. Detecting Plagiarism in MS Access Assignments

    ERIC Educational Resources Information Center

    Singh, Anil

    2013-01-01

    Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…

  20. An Empirical Research Study of the Efficacy of Two Plagiarism-Detection Applications

    ERIC Educational Resources Information Center

    Hill, Jacob D.; Page, Elaine Fetyko

    2009-01-01

    This article describes a study of the two most popular plagiarism-detection software platforms available on today's market--Turnitin (http://www.turnitin.com/static/index.html) and SafeAssign (http://www.safeassign.com/). After a brief discussion of plagiarism's relevance to librarians, the authors examine plagiarism-detection methodology and…

  1. An Empirical Research Study of the Efficacy of Two Plagiarism-Detection Applications

    ERIC Educational Resources Information Center

    Hill, Jacob D.; Page, Elaine Fetyko

    2009-01-01

    This article describes a study of the two most popular plagiarism-detection software platforms available on today's market--Turnitin (http://www.turnitin.com/static/index.html) and SafeAssign (http://www.safeassign.com/). After a brief discussion of plagiarism's relevance to librarians, the authors examine plagiarism-detection methodology and…

  2. Judge Rules Plagiarism-Detection Tool Falls under "Fair Use"

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2008-01-01

    Judge Claude M. Hilton, of the U.S. District Court in Alexandria, Virginia, in March found that scanning the student papers for the purpose of detecting plagiarism is a "highly transformative" use that falls under the fair-use provision of copyright law. He ruled that the company "makes no use of any work's particular expressive or creative…

  3. Protecting Students' Intellectual Property in the Web Plagiarism Detection Process

    ERIC Educational Resources Information Center

    Butakov, Sergey; Dyagilev, Vadim; Tskhay, Alexander

    2012-01-01

    Learning management systems (LMS) play a central role in communications in online and distance education. In the digital era, with all the information now accessible at students' fingertips, plagiarism detection services (PDS) have become a must-have part of LMS. Such integration provides a seamless experience for users, allowing PDS to check…

  4. Judge Rules Plagiarism-Detection Tool Falls under "Fair Use"

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2008-01-01

    Judge Claude M. Hilton, of the U.S. District Court in Alexandria, Virginia, in March found that scanning the student papers for the purpose of detecting plagiarism is a "highly transformative" use that falls under the fair-use provision of copyright law. He ruled that the company "makes no use of any work's particular expressive or creative…

  5. Hermetic and Web Plagiarism Detection Systems for Student Essays--An Evaluation of the State-of-the-Art

    ERIC Educational Resources Information Center

    Kakkonen, Tuomo; Mozgovoy, Maxim

    2010-01-01

    Plagiarism has become a serious problem in education, and several plagiarism detection systems have been developed for dealing with this problem. This study provides an empirical evaluation of eight plagiarism detection systems for student essays. We present a categorical hierarchy of the most common types of plagiarism that are encountered in…

  6. Hermetic and Web Plagiarism Detection Systems for Student Essays--An Evaluation of the State-of-the-Art

    ERIC Educational Resources Information Center

    Kakkonen, Tuomo; Mozgovoy, Maxim

    2010-01-01

    Plagiarism has become a serious problem in education, and several plagiarism detection systems have been developed for dealing with this problem. This study provides an empirical evaluation of eight plagiarism detection systems for student essays. We present a categorical hierarchy of the most common types of plagiarism that are encountered in…

  7. Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time

    DTIC Science & Technology

    2013-10-01

    Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time Todd Lewellen George J. Silowash...algorithms used in plagiarism detection software—to search the index for bodies of text similar to the text found in the outgoing web request. If the...2. REPORT DATE October 2013 3. REPORT TYPE AND DATES COVERED Final 4. TITLE AND SUBTITLE Insider Threat Control: Using Plagiarism Detection

  8. Using the Google Search Engine to Detect Word-for-Word Plagiarism in Master's Theses: A Preliminary Study

    ERIC Educational Resources Information Center

    McCullough, Mark; Holmberg, Melissa

    2005-01-01

    The purpose of this research was to explore Google's potential for detecting occurrences of word-for-word (1) plagiarism in master's theses. The authors sought answers to these questions:1. Is Google an effective tool for detecting plagiarism in master's theses?2. Is Google an efficient tool for detecting plagiarism in master's theses?The first…

  9. Using the Google Search Engine to Detect Word-for-Word Plagiarism in Master's Theses: A Preliminary Study

    ERIC Educational Resources Information Center

    McCullough, Mark; Holmberg, Melissa

    2005-01-01

    The purpose of this research was to explore Google's potential for detecting occurrences of word-for-word (1) plagiarism in master's theses. The authors sought answers to these questions:1. Is Google an effective tool for detecting plagiarism in master's theses?2. Is Google an efficient tool for detecting plagiarism in master's theses?The first…

  10. An analysis of student privacy rights in the use of plagiarism detection systems.

    PubMed

    Brinkman, Bo

    2013-09-01

    Plagiarism detection services are a powerful tool to help encourage academic integrity. Adoption of these services has proven to be controversial due to ethical concerns about students' rights. Central to these concerns is the fact that most such systems make permanent archives of student work to be re-used in plagiarism detection. This computerization and automation of plagiarism detection is changing the relationships of trust and responsibility between students, educators, educational institutions, and private corporations. Educators must respect student privacy rights when implementing such systems. Student work is personal information, not the property of the educator or institution. The student has the right to be fully informed about how plagiarism detection works, and the fact that their work will be permanently archived as a result. Furthermore, plagiarism detection should not be used if the permanent archiving of a student's work may expose him or her to future harm.

  11. Using an Electronic Text-Matching Tool (Turnitin) to Detect Plagiarism in a New Zealand University

    ERIC Educational Resources Information Center

    Goddard, Robert; Rudzki, Romuald

    2005-01-01

    This paper is concerned with reporting the experience and findings of staff using a commercially-available text-matching tool (Turnitin) to detect plagiarism in a university setting in New Zealand. The use of actual instances of plagiarism revealed through Turnitin in a teaching department is a departure from the more usual self-reporting…

  12. Plagiarism by Adult Learners Online: A Case Study in Detection and Remediation

    ERIC Educational Resources Information Center

    Jocoy, Christine; DiBiase, David

    2006-01-01

    Detecting and combating plagiarism from Web-based sources is a concern for administrators and instructors involved in online distance education. In this paper, we quantify copy-and-paste plagiarism among adult learners in an online geography course offered through Penn State's World Campus Geographic Information Systems (GIS) certificate program.…

  13. Back Translation: An Emerging Sophisticated Cyber Strategy to Subvert Advances in "Digital Age" Plagiarism Detection and Prevention

    ERIC Educational Resources Information Center

    Jones, Michael; Sheridan, Lynnaire

    2015-01-01

    Advances have been made in detecting and deterring the student plagiarism that has accompanied the uptake and development of the internet. Many authors from the late 1990s onwards grappled with plagiarism in the digital age, presenting articles that were provoking and established the foundation for strategies to address cyber plagiarism, including…

  14. Back Translation: An Emerging Sophisticated Cyber Strategy to Subvert Advances in "Digital Age" Plagiarism Detection and Prevention

    ERIC Educational Resources Information Center

    Jones, Michael; Sheridan, Lynnaire

    2015-01-01

    Advances have been made in detecting and deterring the student plagiarism that has accompanied the uptake and development of the internet. Many authors from the late 1990s onwards grappled with plagiarism in the digital age, presenting articles that were provoking and established the foundation for strategies to address cyber plagiarism, including…

  15. Student Plagiarism and the Use of a Plagiarism Detection Tool by Community College Faculty

    ERIC Educational Resources Information Center

    Thurmond, Bradley H.

    2010-01-01

    This study sought to better inform community college administrators and faculty regarding possible factors that contribute to higher levels of student plagiarism and to suggest appropriate preventative or responsive interventions. The specific purpose of the study was to investigate a set of faculty related factors that may be associated with…

  16. Plagiarism in the Context of Education and Evolving Detection Strategies

    PubMed Central

    Nurmashev, Bekaidar; Seksenbayev, Bakhytzhan

    2017-01-01

    Plagiarism may take place in any scientific journals despite currently employed anti-plagiarism tools. The absence of widely acceptable definitions of research misconduct and reliance solely on similarity checks do not allow journal editors to prevent most complex cases of recycling of scientific information and wasteful, or ‘predatory,’ publishing. This article analyses Scopus-based publication activity and evidence on poor writing, lack of related training, emerging anti-plagiarism strategies, and new forms of massive wasting of resources by publishing largely recycled items, which evade the ‘red flags’ of similarity checks. In some non-Anglophone countries ‘copy-and-paste’ writing still plagues pre- and postgraduate education. Poor research management, absence of courses on publication ethics, and limited access to quality sources confound plagiarism as a cross-cultural and multidisciplinary phenomenon. Over the past decade, the advent of anti-plagiarism software checks has helped uncover elementary forms of textual recycling across journals. But such a tool alone proves inefficient for preventing complex forms of plagiarism. Recent mass retractions of plagiarized articles by reputable open-access journals point to critical deficiencies of current anti-plagiarism software that do not recognize manipulative paraphrasing and editing. Manipulative editing also finds its way to predatory journals, ignoring the adherence to publication ethics and accommodating nonsense plagiarized items. The evolving preventive strategies are increasingly relying on intelligent (semantic) digital technologies, comprehensively evaluating texts, keywords, graphics, and reference lists. It is the right time to enforce adherence to global editorial guidance and implement a comprehensive anti-plagiarism strategy by helping all stakeholders of scholarly communication. PMID:28665055

  17. Plagiarism in the Context of Education and Evolving Detection Strategies.

    PubMed

    Gasparyan, Armen Yuri; Nurmashev, Bekaidar; Seksenbayev, Bakhytzhan; Trukhachev, Vladimir I; Kostyukova, Elena I; Kitas, George D

    2017-08-01

    Plagiarism may take place in any scientific journals despite currently employed anti-plagiarism tools. The absence of widely acceptable definitions of research misconduct and reliance solely on similarity checks do not allow journal editors to prevent most complex cases of recycling of scientific information and wasteful, or 'predatory,' publishing. This article analyses Scopus-based publication activity and evidence on poor writing, lack of related training, emerging anti-plagiarism strategies, and new forms of massive wasting of resources by publishing largely recycled items, which evade the 'red flags' of similarity checks. In some non-Anglophone countries 'copy-and-paste' writing still plagues pre- and postgraduate education. Poor research management, absence of courses on publication ethics, and limited access to quality sources confound plagiarism as a cross-cultural and multidisciplinary phenomenon. Over the past decade, the advent of anti-plagiarism software checks has helped uncover elementary forms of textual recycling across journals. But such a tool alone proves inefficient for preventing complex forms of plagiarism. Recent mass retractions of plagiarized articles by reputable open-access journals point to critical deficiencies of current anti-plagiarism software that do not recognize manipulative paraphrasing and editing. Manipulative editing also finds its way to predatory journals, ignoring the adherence to publication ethics and accommodating nonsense plagiarized items. The evolving preventive strategies are increasingly relying on intelligent (semantic) digital technologies, comprehensively evaluating texts, keywords, graphics, and reference lists. It is the right time to enforce adherence to global editorial guidance and implement a comprehensive anti-plagiarism strategy by helping all stakeholders of scholarly communication. © 2017 The Korean Academy of Medical Sciences.

  18. Plagiarism in computer science courses

    SciTech Connect

    Harris, J.K.

    1994-12-31

    Plagiarism of computer programs has long been a problem in higher education. Ease of electronic copying, vague understanding by students as to what constitutes plagiarism, increasing acceptance of plagiarism by students, lack of enforcement by instructors and school administrators, and a whole host of other factors contribute to plagiarism. The first step in curbing plagiarism is prevention, the second (and much less preferable) is detection. History files and software metrics can be used as a tool to aid in detecting possible plagiarism. This paper gives advice concerning how to deal with plagiarism and with using software monitors to detect plagiarism.

  19. Student's Plagiarisms in Higher Learning Institutions in the Era of Improved Internet Access: Case Study of Developing Countries

    ERIC Educational Resources Information Center

    Anney, Vicent Naano; Mosha, Mary Atanas

    2015-01-01

    This study investigated students' plagiarism practices in Tanzania higher learning institutions by involving two universities-one public and one private university as a case study. The universities involved have honour code and policies for plagiarism detection however they do not employ software for checking students' plagiarism. The study…

  20. Plagiarism in Academia

    ERIC Educational Resources Information Center

    Shahabuddin, Syed

    2009-01-01

    Plagiarism sometimes creates legal and ethical problems for students and faculty. It can have serious consequences. Fortunately, there are ways to stop plagiarism. There are many tools available to detect plagiarism, e.g. using software for detecting submitted articles. Also, there are many ways to punish a plagiarist, e.g. banning plagiarists…

  1. Personalized Assessment as a Means to Mitigate Plagiarism

    ERIC Educational Resources Information Center

    Manoharan, Sathiamoorthy

    2017-01-01

    Although every educational institution has a code of academic honesty, they still encounter incidents of plagiarism. These are difficult and time-consuming to detect and deal with. This paper explores the use of personalized assessments with the goal of reducing incidents of plagiarism, proposing a personalized assessment software framework…

  2. Turnitoff: Identifying and Fixing a Hole in Current Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Heather, James

    2010-01-01

    In recent times, "plagiarism detection software" has become popular in universities and colleges, in an attempt to stem the tide of plagiarised student coursework. Such software attempts to detect any copied material and identify its source. The most popular such software is Turnitin, a commercial system used by thousands of institutions…

  3. Turnitoff: Identifying and Fixing a Hole in Current Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Heather, James

    2010-01-01

    In recent times, "plagiarism detection software" has become popular in universities and colleges, in an attempt to stem the tide of plagiarised student coursework. Such software attempts to detect any copied material and identify its source. The most popular such software is Turnitin, a commercial system used by thousands of institutions…

  4. A Comprehensive Definition of Plagiarism.

    ERIC Educational Resources Information Center

    Liddell, Jean

    2003-01-01

    Explains how the internet has made it easy for students to plagiarize papers. Gives definitions for plagiarism. Explains reasons why students plagiarize including the following: they don't understand what it is, they think they won't get caught, etc. Describes ways to detect and prevent plagiarism. (ontains 58 references.)(MZ)

  5. A Comprehensive Definition of Plagiarism.

    ERIC Educational Resources Information Center

    Liddell, Jean

    2003-01-01

    Explains how the internet has made it easy for students to plagiarize papers. Gives definitions for plagiarism. Explains reasons why students plagiarize including the following: they don't understand what it is, they think they won't get caught, etc. Describes ways to detect and prevent plagiarism. (ontains 58 references.)(MZ)

  6. To Cheat or Not to Cheat? A Trial of the JISC Plagiarism Detection Service with Biological Sciences Students

    ERIC Educational Resources Information Center

    Badge, Joanne L.; Cann, Alan J.; Scott, Jon

    2007-01-01

    In the UK, there is great concern about the perceived increase in plagiarized work being submitted by students in higher educations. Although there is much debate, the reasons for the perceived change are not completely clear. Here we present the results of a 2-year trial of the JISC Plagiarism Detection Service (PDS) involving hundreds of…

  7. Student and Staff Perceptions of the Effectiveness of Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Atkinson, Doug; Yeoh, Sue

    2008-01-01

    The aim of this research was to determine student and staff perceptions of the effectiveness of plagiarism detection software. A mixed methods approach was undertaken, using a research model adapted from the literature. Eight hours of interviews were conducted with six students and six teaching staff from Curtin Business School at Curtin…

  8. Student and Staff Perceptions of the Effectiveness of Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Atkinson, Doug; Yeoh, Sue

    2008-01-01

    The aim of this research was to determine student and staff perceptions of the effectiveness of plagiarism detection software. A mixed methods approach was undertaken, using a research model adapted from the literature. Eight hours of interviews were conducted with six students and six teaching staff from Curtin Business School at Curtin…

  9. Turnitin[R]: The Student Perspective on Using Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Dahl, Stephan

    2007-01-01

    Recently there has been an increasing interest in plagiarism detection systems, such as the web-based Turnitin system. However, no study has so far tried to look at how students react towards those systems being used. This exploratory study examines the attitudes of students on a postgraduate module after using Turnitin as their standard way of…

  10. Turnitin[R]: The Student Perspective on Using Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Dahl, Stephan

    2007-01-01

    Recently there has been an increasing interest in plagiarism detection systems, such as the web-based Turnitin system. However, no study has so far tried to look at how students react towards those systems being used. This exploratory study examines the attitudes of students on a postgraduate module after using Turnitin as their standard way of…

  11. The problem of plagiarism.

    PubMed

    Anderson, Melissa S; Steneck, Nicholas H

    2011-01-01

    Plagiarism is a form of research misconduct and a serious violation of the norms of science. It is the misrepresentation of another's ideas or words as one's own, without proper acknowledgement of the original source. Certain aspects of plagiarism make it less straightforward than this definition suggests. Over the past 30 years, the U.S. Federal Government has developed and refined its policies on misconduct, and Federal agencies, as well as research institutions, have established approaches to responding to allegations and instances of plagiarism. At present, efforts to avert plagiarism focus on plagiarism-detection software and instructional strategies. Copyright © 2011 Elsevier Inc. All rights reserved.

  12. How to Act When Research Misconduct Is Not Detected by Software but Revealed by the Author of the Plagiarized Article.

    PubMed

    Baydik, Olga D; Gasparyan, Armen Yuri

    2016-10-01

    The detection of plagiarism in scholarly articles is a complex process. It requires not just quantitative analysis with the similarity recording by anti-plagiarism software but also assessment of the readers' opinion, pointing to the theft of ideas, methodologies, and graphics. In this article we describe a blatant case of plagiarism by Chinese authors, who copied a Russian article from a non-indexed and not widely visible Russian journal, and published their own report in English in an open-access journal indexed by Scopus and Web of Science and archived in PubMed Central. The details of copying in the translated English article were presented by the Russian author to the chief editor of the index journal, consultants from Scopus, anti-plagiarism experts, and the administrator of the Committee on Publication Ethics (COPE). The correspondents from Scopus and COPE pointed to the decisive role of the editors' of the English journal who may consider further actions if plagiarism is confirmed. After all, the chief editor of the English journal retracted the article on grounds of plagiarism and published a retraction note, although no details of the complexity of the case were reported. The case points to the need for combining anti-plagiarism efforts and actively seeking opinion of non-native English-speaking authors and readers who may spot intellectual theft which is not always detected by software.

  13. How to Act When Research Misconduct Is Not Detected by Software but Revealed by the Author of the Plagiarized Article

    PubMed Central

    2016-01-01

    The detection of plagiarism in scholarly articles is a complex process. It requires not just quantitative analysis with the similarity recording by anti-plagiarism software but also assessment of the readers’ opinion, pointing to the theft of ideas, methodologies, and graphics. In this article we describe a blatant case of plagiarism by Chinese authors, who copied a Russian article from a non-indexed and not widely visible Russian journal, and published their own report in English in an open-access journal indexed by Scopus and Web of Science and archived in PubMed Central. The details of copying in the translated English article were presented by the Russian author to the chief editor of the index journal, consultants from Scopus, anti-plagiarism experts, and the administrator of the Committee on Publication Ethics (COPE). The correspondents from Scopus and COPE pointed to the decisive role of the editors’ of the English journal who may consider further actions if plagiarism is confirmed. After all, the chief editor of the English journal retracted the article on grounds of plagiarism and published a retraction note, although no details of the complexity of the case were reported. The case points to the need for combining anti-plagiarism efforts and actively seeking opinion of non-native English-speaking authors and readers who may spot intellectual theft which is not always detected by software. PMID:27550475

  14. Plagiarism: understanding and management.

    PubMed

    Wicker, Paul

    2007-08-01

    An epidemic of plagiarism is sweeping the world. A study carried out in the US suggested that 80% of college students admit to cheating at least once (Ashworth et al 1997). Alternative evidence from an American education and software company, Plagiarism.org, reported that 36% of undergraduates plagiarise written material and that 90% of students believe that cheaters are never caught or disciplined (Plagiarism.org 2005). Closer to home, research carried out in the UK by Clare (1996) suggested that 50% of students copy work and invent data. More recently the Plagiarism Advisory Service, based at Northumbria University, reported that 25% of students plagiarise, while lecturers only detect plagiarism 3% of the time (Plagiarism Advisory Service 2006).

  15. Plagiarism in Grant Proposals

    ERIC Educational Resources Information Center

    Markin, Karen M.

    2012-01-01

    It is not news that software exists to check undergraduate papers for plagiarism. What is less well known is that some federal grant agencies are using technology to detect plagiarism in grant proposals. That variety of research misconduct is a growing problem, according to federal experts. The National Science Foundation, in its most recent…

  16. Changing Attitudes in Learning and Assessment: Cast-Off "Plagiarism Detection" and Cast-On Self-Service Assessment for Learning

    ERIC Educational Resources Information Center

    Chew, Esyin; Ding, Seong Lin; Rowell, Gill

    2015-01-01

    Considering the change of attitudes of plagiarism detection to assessment for learning, it is necessary to explore the effect of the paradigm shift for Turnitin, from "plagiarism detection" to self-service learning aid. Two research questions are explored in the present study: (1) How Turnitin augments self-service skills of students and…

  17. Changing Attitudes in Learning and Assessment: Cast-Off "Plagiarism Detection" and Cast-On Self-Service Assessment for Learning

    ERIC Educational Resources Information Center

    Chew, Esyin; Ding, Seong Lin; Rowell, Gill

    2015-01-01

    Considering the change of attitudes of plagiarism detection to assessment for learning, it is necessary to explore the effect of the paradigm shift for Turnitin, from "plagiarism detection" to self-service learning aid. Two research questions are explored in the present study: (1) How Turnitin augments self-service skills of students and…

  18. A Model for Determining Student Plagiarism: Electronic Detection and Academic Judgement

    ERIC Educational Resources Information Center

    Bretag, Tracey; Mahmud, Saadia

    2009-01-01

    This paper provides insights based on the authors' own practice as university instructors, researchers and arbitrators of student plagiarism. Recognising the difficulty in defining plagiarism while still acknowledging the practical importance of doing so, the authors find the common element between the various types of plagiarism to be the lack of…

  19. The Case of the Pilfered Paper: Implications of Online Writing Assistance and Web-Based Plagiarism Detection Services

    ERIC Educational Resources Information Center

    Morgan, Phoebe; Vaughn, Jacqueline

    2010-01-01

    While there is nothing new about academic dishonesty, how it is committed, prevented, and detected has been dramatically transformed by the advent of online technologies. This article briefly describes the concurrent emergence of online writing assistance services and Web-based plagiarism detection tools and examines the implications of both for…

  20. The Case of the Pilfered Paper: Implications of Online Writing Assistance and Web-Based Plagiarism Detection Services

    ERIC Educational Resources Information Center

    Morgan, Phoebe; Vaughn, Jacqueline

    2010-01-01

    While there is nothing new about academic dishonesty, how it is committed, prevented, and detected has been dramatically transformed by the advent of online technologies. This article briefly describes the concurrent emergence of online writing assistance services and Web-based plagiarism detection tools and examines the implications of both for…

  1. EDITORIAL: On plagiarism

    NASA Astrophysics Data System (ADS)

    Harris, Simon; Webb, Steve; Hendee, William R.

    2008-03-01

    accused authors (all of them), the authors whose work may have been plagiarized, and the copyright holder of the original material. The correspondence will include the alleged plagiarizing language and a copy of the original and suspected work. If all parties agree that plagiarism (whether intentional or unintentional) has occurred, a written letter of apology should be sent promptly by the offending author(s) to the Editor/Publisher and to the authors and copyright holder whose work has been plagiarized. If the offending work has been published, a notice of plagiarism, citing both the plagiarized and the offending articles, will be published in the next available issue of PMB. The plagiarizing authors shall agree that all dissemination of the offending article shall be accompanied by the notice of plagiarism. In the most serious cases of plagiarism, a retraction (erratum) will be published (in accordance with the STM guidelines on 'Preservation of the objective record of science', retraction is favoured over removal in virtually all cases), and further sanctions applied. If the offending work hasn't yet been published (i.e. it is detected by the referees), sanctions will still be applied. If the accused authors deny that plagiarism has occurred, the Editor and Publisher must explore the accusation further. The investigation will also involve the Journals Director and the Chief Scientific Adviser of IOP Publishing (who publish PMB on behalf of IPEM) and also the General Secretary of IPEM. All parties to the allegation will be encouraged to submit corroborating evidence, and the accused authors granted an opportunity (at no expense to the journal) to testify in person to defend themselves against the allegation. The investigation should be concluded as quickly as possible (particularly if the article in question has already been published online or in print). If the investigation of the allegation of plagiarism concludes in support of the allegation, then the process for

  2. Plagiarism Detection: A Comparison of Teaching Assistants and a Software Tool in Identifying Cheating in a Psychology Course

    ERIC Educational Resources Information Center

    Seifried, Eva; Lenhard, Wolfgang; Spinath, Birgit

    2015-01-01

    Essays that are assigned as homework in large classes are prone to cheating via unauthorized collaboration. In this study, we compared the ability of a software tool based on Latent Semantic Analysis (LSA) and student teaching assistants to detect plagiarism in a large group of students. To do so, we took two approaches: the first approach was…

  3. Plagiarism Detection: A Comparison of Teaching Assistants and a Software Tool in Identifying Cheating in a Psychology Course

    ERIC Educational Resources Information Center

    Seifried, Eva; Lenhard, Wolfgang; Spinath, Birgit

    2015-01-01

    Essays that are assigned as homework in large classes are prone to cheating via unauthorized collaboration. In this study, we compared the ability of a software tool based on Latent Semantic Analysis (LSA) and student teaching assistants to detect plagiarism in a large group of students. To do so, we took two approaches: the first approach was…

  4. Local Plagiarisms

    ERIC Educational Resources Information Center

    Borg, Erik

    2009-01-01

    Plagiarism and collusion are significant issues for most lecturers whatever their discipline, and to universities and the higher education sector. Universities respond to these issues by developing institutional definitions of plagiarism, which are intended to apply to all instances of plagiarism and collusion. This article first suggests that…

  5. A Note on Academic Plagiarism.

    ERIC Educational Resources Information Center

    Saunders, David

    1993-01-01

    It is argued that academic plagiarism is not addressed as vigorously as needed because the university code of professional conduct is not fully evolved and does not consider plagiarism as malpractice. In treating the problem, it is suggested that one place to start is teaching proper use of citation and annotation. (MSE)

  6. Detecting and (not) dealing with plagiarism in an engineering paper: beyond CrossCheck-a case study.

    PubMed

    Zhang, Xin-xin; Huo, Zhao-lin; Zhang, Yue-hong

    2014-06-01

    In papers in areas such as engineering and the physical sciences, figures, tables and formulae are the basic elements to communicate the authors' core ideas, workings and results. As a computational text-matching tool, CrossCheck cannot work on these non-textual elements to detect plagiarism. Consequently, when comparing engineering or physical sciences papers, CrossCheck may return a low similarity index even when plagiarism has in fact taken place. A case of demonstrated plagiarism involving engineering papers with a low similarity index is discussed, and editor's experiences and suggestions are given on how to tackle this problem. The case shows a lack of understanding of plagiarism by some authors or editors, and illustrates the difficulty of getting some editors and publishers to take appropriate action. Consequently, authors, journal editors, and reviewers, as well as research institutions all are duty-bound not only to recognize the differences between ethical and unethical behavior in order to protect a healthy research environment, and also to maintain consistent ethical publishing standards.

  7. Avoid the Plague: Tips and Tricks for Preventing and Detecting Plagiarism

    ERIC Educational Resources Information Center

    Bolkan, J. V.

    2006-01-01

    Plagiarism is an ugly word. Copying someone else's work and attempting to claim credit for one's self is an act that involves a number of ethical failings--theft, laziness, coveting, and lying among others. Many educators blame the Internet for what they perceive as the rise of plagiarism. Although the Internet certainly enables more efficient…

  8. Electronic Plagiarism as a College Instructor's Nightmare--Prevention and Detection

    ERIC Educational Resources Information Center

    McLafferty, Charles L.; Foust, Karen M.

    2004-01-01

    Plagiarism, aided by the emergence of massive databases of information on the World Wide Web, has become commonplace on college campuses and in business schools. Because prevention is preferable to policing, in this article the authors (a) present methods for educators to define plagiarism and educate students in appropriate citation and…

  9. Beyond Plagiarism: Transgressive and Nontransgressive Intertextuality

    ERIC Educational Resources Information Center

    Chandrasoma, Ranamukalage; Thompson, Celia; Pennycook, Alastair

    2004-01-01

    The debate about what constitutes plagiarism and how it should be dealt with in the academy continues to gain momentum. The response from many higher education institutions is to channel ever-increasing amounts of resources into plagiarism detection technologies, rather than trying to ascertain why plagiarism might be occurring in the first place.…

  10. Plagiarism, Cheating and Research Integrity: Case Studies from a Masters Program in Peru.

    PubMed

    Carnero, Andres M; Mayta-Tristan, Percy; Konda, Kelika A; Mezones-Holguin, Edward; Bernabe-Ortiz, Antonio; Alvarado, German F; Canelo-Aybar, Carlos; Maguiña, Jorge L; Segura, Eddy R; Quispe, Antonio M; Smith, Edward S; Bayer, Angela M; Lescano, Andres G

    2017-08-01

    Plagiarism is a serious, yet widespread type of research misconduct, and is often neglected in developing countries. Despite its far-reaching implications, plagiarism is poorly acknowledged and discussed in the academic setting, and insufficient evidence exists in Latin America and developing countries to inform the development of preventive strategies. In this context, we present a longitudinal case study of seven instances of plagiarism and cheating arising in four consecutive classes (2011-2014) of an Epidemiology Masters program in Lima, Peru, and describes the implementation and outcomes of a multifaceted, "zero-tolerance" policy aimed at introducing research integrity. Two cases involved cheating in graded assignments, and five cases correspond to plagiarism in the thesis protocol. Cases revealed poor awareness of high tolerance to plagiarism, poor academic performance, and widespread writing deficiencies, compensated with patchwriting and copy-pasting. Depending on the events' severity, penalties included course failure (6/7) and separation from the program (3/7). Students at fault did not engage in further plagiarism. Between 2011 and 2013, the Masters program sequentially introduced a preventive policy consisting of: (i) intensified research integrity and scientific writing education, (ii) a stepwise, cumulative writing process; (iii) honor codes; (iv) active search for plagiarism in all academic products; and (v) a "zero-tolerance" policy in response to documented cases. No cases were detected in 2014. In conclusion, plagiarism seems to be widespread in resource-limited settings and a greater response with educational and zero-tolerance components is needed to prevent it.

  11. Revisiting Information Technology tools serving authorship and editorship: a case-guided tutorial to statistical analysis and plagiarism detection

    PubMed Central

    Bamidis, P D; Lithari, C; Konstantinidis, S T

    2010-01-01

    With the number of scientific papers published in journals, conference proceedings, and international literature ever increasing, authors and reviewers are not only facilitated with an abundance of information, but unfortunately continuously confronted with risks associated with the erroneous copy of another's material. In parallel, Information Communication Technology (ICT) tools provide to researchers novel and continuously more effective ways to analyze and present their work. Software tools regarding statistical analysis offer scientists the chance to validate their work and enhance the quality of published papers. Moreover, from the reviewers and the editor's perspective, it is now possible to ensure the (text-content) originality of a scientific article with automated software tools for plagiarism detection. In this paper, we provide a step-bystep demonstration of two categories of tools, namely, statistical analysis and plagiarism detection. The aim is not to come up with a specific tool recommendation, but rather to provide useful guidelines on the proper use and efficiency of either category of tools. In the context of this special issue, this paper offers a useful tutorial to specific problems concerned with scientific writing and review discourse. A specific neuroscience experimental case example is utilized to illustrate the young researcher's statistical analysis burden, while a test scenario is purpose-built using open access journal articles to exemplify the use and comparative outputs of seven plagiarism detection software pieces. PMID:21487489

  12. Revisiting Information Technology tools serving authorship and editorship: a case-guided tutorial to statistical analysis and plagiarism detection.

    PubMed

    Bamidis, P D; Lithari, C; Konstantinidis, S T

    2010-12-01

    With the number of scientific papers published in journals, conference proceedings, and international literature ever increasing, authors and reviewers are not only facilitated with an abundance of information, but unfortunately continuously confronted with risks associated with the erroneous copy of another's material. In parallel, Information Communication Technology (ICT) tools provide to researchers novel and continuously more effective ways to analyze and present their work. Software tools regarding statistical analysis offer scientists the chance to validate their work and enhance the quality of published papers. Moreover, from the reviewers and the editor's perspective, it is now possible to ensure the (text-content) originality of a scientific article with automated software tools for plagiarism detection. In this paper, we provide a step-bystep demonstration of two categories of tools, namely, statistical analysis and plagiarism detection. The aim is not to come up with a specific tool recommendation, but rather to provide useful guidelines on the proper use and efficiency of either category of tools. In the context of this special issue, this paper offers a useful tutorial to specific problems concerned with scientific writing and review discourse. A specific neuroscience experimental case example is utilized to illustrate the young researcher's statistical analysis burden, while a test scenario is purpose-built using open access journal articles to exemplify the use and comparative outputs of seven plagiarism detection software pieces.

  13. Plagiarism Prevention

    ERIC Educational Resources Information Center

    Probett, Christine

    2011-01-01

    Plagiarism does exist at universities today. In some cases, students are naive with respect to understanding what plagiarism is and how to avoid it. In other cases, students blatantly disregard and disrespect the written work of others, claiming it as their own. Regardless, educators must be vigilant in their efforts to discourage and prevent…

  14. Plagiarism Prevention

    ERIC Educational Resources Information Center

    Probett, Christine

    2011-01-01

    Plagiarism does exist at universities today. In some cases, students are naive with respect to understanding what plagiarism is and how to avoid it. In other cases, students blatantly disregard and disrespect the written work of others, claiming it as their own. Regardless, educators must be vigilant in their efforts to discourage and prevent…

  15. Plagiarism Software: No Magic Bullet!

    ERIC Educational Resources Information Center

    Warn, James

    2006-01-01

    The ready availability of Internet resources has made it easier than ever for students to plagiarize and many higher education institutions have resorted to checking essays with plagiarism detection software. Student behaviour is likely to change in response to this increased scrutiny but not necessarily in the desired direction. Internet…

  16. Avoiding plagiarism in academic writing.

    PubMed

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance.

  17. Plagiarism Software: No Magic Bullet!

    ERIC Educational Resources Information Center

    Warn, James

    2006-01-01

    The ready availability of Internet resources has made it easier than ever for students to plagiarize and many higher education institutions have resorted to checking essays with plagiarism detection software. Student behaviour is likely to change in response to this increased scrutiny but not necessarily in the desired direction. Internet…

  18. Multilayer SOM with tree-structured data for efficient document retrieval and plagiarism detection.

    PubMed

    Chow, Tommy W S; Rahman, M K M

    2009-09-01

    This paper proposes a new document retrieval (DR) and plagiarism detection (PD) system using multilayer self-organizing map (MLSOM). A document is modeled by a rich tree-structured representation, and a SOM-based system is used as a computationally effective solution. Instead of relying on keywords/lines, the proposed scheme compares a full document as a query for performing retrieval and PD. The tree-structured representation hierarchically includes document features as document, pages, and paragraphs. Thus, it can reflect underlying context that is difficult to acquire from the currently used word-frequency information. We show that the tree-structured data is effective for DR and PD. To handle tree-structured representation in an efficient way, we use an MLSOM algorithm, which was previously developed by the authors for the application of image retrieval. In this study, it serves as an effective clustering algorithm. Using the MLSOM, local matching techniques are developed for comparing text documents. Two novel MLSOM-based PD methods are proposed. Detailed simulations are conducted and the experimental results corroborate that the proposed approach is computationally efficient and accurate for DR and PD.

  19. [Plagiarism in medical schools, and its prevention].

    PubMed

    Annane, Djillali; Annane, Frédérique

    2012-09-01

    The plagiarism has become very common in universities and medical school. Undoubtedly, the easy access to a huge amount of electronic documents is one explanation for the increasing prevalence of plagiarism among students. While most of universities and medical school have clear statements and rules about plagiarism, available tools for the detection of plagiarism remain inefficient and dedicate training program for students and teachers too scarce. As lack of time is one reason for students to choose plagiarism, it should be one main target for educational programs. Copyright © 2012. Published by Elsevier Masson SAS.

  20. Prevalence of plagiarism among medical students.

    PubMed

    Bilić-Zulle, Lidija; Frković, Vedran; Turk, Tamara; Azman, Josip; Petrovecki, Mladen

    2005-02-01

    To determine the prevalence of plagiarism among medical students in writing essays. During two academic years, 198 second year medical students attending Medical Informatics course wrote an essay on one of four offered articles. Two of the source articles were available in an electronic form and two in printed form. Two (one electronic and one paper article) were considered less complex and the other two more complex. The essays were examined using plagiarism detection software "WCopyfind," which counted the number of matching phrases with six or more words. Plagiarism rate, expressed as the percentage of the plagiarized text, was calculated as a ratio of the absolute number of matching words and the total number of words in the essay. Only 17 (9%) of students did not plagiarize at all and 68 (34%) plagiarized less than 10% of the text. The average plagiarism rate (% of plagiarized text) was 19% (5-95% percentile=0-88). Students who were strictly warned not to plagiarize had a higher total word count in their essays than students who were not warned (P=0.002) but there was no difference between them in the rate of plagiarism. Students with higher grades in Medical Informatics exam plagiarized less than those with lower grades (P=0.015). Gender, subject source, and complexity had no influence on the plagiarism rate. Plagiarism in writing essays is common among medical students. An explicit warning is not enough to deter students from plagiarism. Detection software can be used to trace and evaluate the rate of plagiarism in written student assays.

  1. Plagiarism: An Egregious Form of Misconduct

    PubMed Central

    Juyal, Deepak; Thawani, Vijay; Thaledi, Shweta

    2015-01-01

    Background: Publishing research papers for academic fraternity has become important for career advancement and promotion. Number of publications in peer reviewed journals and subsequent citations are recognized as measures of scientific success. Non-publishing academicians and researchers are invisible to the scientific community. Discussion: With pressure to publish, misconduct has crept into scientific writing with the result that research misconduct, plagiarism, misappropriation of intellectual property, and substantial unattributed textual copying of another's publication have become common. The Office of Research Integrity, USA, defines research misconduct as “fabrication, falsification or plagiarism in proposing, performing or reviewing research, or in reporting research results.” Although plagiarism is difficult to define in few words, it can be viewed as the stealing of another person's ideas, methods, results, or words without giving proper attribution. The Office of Research Integrity defines plagiarism as being “theft or misappropriation of intellectual property and the substantial unattributed textual copying of another's work.” Plagiarism is one of the most vehemently derided breaches of research integrity as it undermines the original and honest contribution to an existing body of knowledge. Conclusion: Plagiarism has many forms viz. blatant plagiarism, technical plagiarism, patchwork plagiarism, and self-plagiarism. In any form, the plagiarism is a threat to the research integrity and is unacceptable. We do need to detect such acts and effectively prosecute the offenders. PMID:25789254

  2. Plagiarism: an egregious form of misconduct.

    PubMed

    Juyal, Deepak; Thawani, Vijay; Thaledi, Shweta

    2015-02-01

    Publishing research papers for academic fraternity has become important for career advancement and promotion. Number of publications in peer reviewed journals and subsequent citations are recognized as measures of scientific success. Non-publishing academicians and researchers are invisible to the scientific community. With pressure to publish, misconduct has crept into scientific writing with the result that research misconduct, plagiarism, misappropriation of intellectual property, and substantial unattributed textual copying of another's publication have become common. The Office of Research Integrity, USA, defines research misconduct as "fabrication, falsification or plagiarism in proposing, performing or reviewing research, or in reporting research results." Although plagiarism is difficult to define in few words, it can be viewed as the stealing of another person's ideas, methods, results, or words without giving proper attribution. The Office of Research Integrity defines plagiarism as being "theft or misappropriation of intellectual property and the substantial unattributed textual copying of another's work." Plagiarism is one of the most vehemently derided breaches of research integrity as it undermines the original and honest contribution to an existing body of knowledge. Plagiarism has many forms viz. blatant plagiarism, technical plagiarism, patchwork plagiarism, and self-plagiarism. In any form, the plagiarism is a threat to the research integrity and is unacceptable. We do need to detect such acts and effectively prosecute the offenders.

  3. An Institutional Code of Ethics--A Response to Attitude of Israeli Teachers' Education College Students towards Academic Plagiarism

    ERIC Educational Resources Information Center

    Reingold,, Roni; Baratz, Lea

    2011-01-01

    Academic plagiarism becomes very easy due to new opportunities provided by the Internet era (Scrinber, 2003; Underwood & Sazabo, 2003; Ross, 2005). We believe that academic dishonesty is a major issue, because it strikes at the heart of the academic and social values: honesty, trust and integrity. When dealing with education students, the…

  4. Source-Code Plagiarism in Universities: A Comparative Study of Student Perspectives in China and the UK

    ERIC Educational Resources Information Center

    Zhang, Dongyang; Joy, Mike; Cosma, Georgina; Boyatt, Russell; Sinclair, Jane; Yau, Jane

    2014-01-01

    There has been much research and discussion relating to variations in plagiaristic activity observed in students from different demographic backgrounds. Differences in behaviour have been noted in many studies, although the underlying reasons are still a matter of debate. Existing work focuses mainly on textual plagiarism, and most often derives…

  5. Source-Code Plagiarism in Universities: A Comparative Study of Student Perspectives in China and the UK

    ERIC Educational Resources Information Center

    Zhang, Dongyang; Joy, Mike; Cosma, Georgina; Boyatt, Russell; Sinclair, Jane; Yau, Jane

    2014-01-01

    There has been much research and discussion relating to variations in plagiaristic activity observed in students from different demographic backgrounds. Differences in behaviour have been noted in many studies, although the underlying reasons are still a matter of debate. Existing work focuses mainly on textual plagiarism, and most often derives…

  6. Educational approaches for discouraging plagiarism.

    PubMed

    Fischer, Beth A; Zigmond, Michael J

    2011-01-01

    Suggested approaches to reduce the occurrence of plagiarism in academia, particularly among trainees. These include (1) educating individuals as to the definition of plagiarism and its consequences through written guidelines, active discussions, and practice in identifying proper and improper citation practices; (2) distributing checklists that break the writing task into more manageable steps, (3) requiring the submission of an outline and then a first draft prior to the deadline for a paper; (4) making assignments relevant to individual interests; and (5) providing trainees with access to software programs that detect plagiarism. Copyright © 2011 Elsevier Inc. All rights reserved.

  7. University Student Online Plagiarism

    ERIC Educational Resources Information Center

    Wang, Yu-mei

    2008-01-01

    This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

  8. University Student Online Plagiarism

    ERIC Educational Resources Information Center

    Wang, Yu-mei

    2008-01-01

    This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

  9. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  10. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  11. Rethinking Plagiarism

    ERIC Educational Resources Information Center

    Nealy, Chynette

    2011-01-01

    Plagiarism, presenting someone's words or other creative products as one's own, is a mandatory discussion and writing assignment in many undergraduate business communication courses. Class discussions about this topic tend to be lively, ranging from questions about simply omitting identified sources to different standards of ethical behaviors…

  12. Rethinking Plagiarism

    ERIC Educational Resources Information Center

    Nealy, Chynette

    2011-01-01

    Plagiarism, presenting someone's words or other creative products as one's own, is a mandatory discussion and writing assignment in many undergraduate business communication courses. Class discussions about this topic tend to be lively, ranging from questions about simply omitting identified sources to different standards of ethical behaviors…

  13. "Turnitin Said It Wasn't Happy": Can the Regulatory Discourse of Plagiarism Detection Operate as a Change Artefact for Writing Development?

    ERIC Educational Resources Information Center

    Penketh, Claire; Beaumont, Chris

    2014-01-01

    This paper centres on the tensions between the introduction of plagiarism detection software (Turnitin) for student and tutor use at undergraduate level and the aim to promote a developmental approach to writing for assessment at a UK university. Aims to promote developmental models for writing often aim to counteract the effects of the structural…

  14. "Turnitin Said It Wasn't Happy": Can the Regulatory Discourse of Plagiarism Detection Operate as a Change Artefact for Writing Development?

    ERIC Educational Resources Information Center

    Penketh, Claire; Beaumont, Chris

    2014-01-01

    This paper centres on the tensions between the introduction of plagiarism detection software (Turnitin) for student and tutor use at undergraduate level and the aim to promote a developmental approach to writing for assessment at a UK university. Aims to promote developmental models for writing often aim to counteract the effects of the structural…

  15. Turning to Turnitin to Fight Plagiarism among University Students

    ERIC Educational Resources Information Center

    Batane, Tshepo

    2010-01-01

    This paper reports on a pilot project of the Turnitin plagiarism detection software, which was implemented to determine the impact of the software on the level of plagiarism among University of Botswana (UB) students. Students' assignments were first submitted to the software without their knowledge so as to gauge their level of plagiarism. The…

  16. Turning to Turnitin to Fight Plagiarism among University Students

    ERIC Educational Resources Information Center

    Batane, Tshepo

    2010-01-01

    This paper reports on a pilot project of the Turnitin plagiarism detection software, which was implemented to determine the impact of the software on the level of plagiarism among University of Botswana (UB) students. Students' assignments were first submitted to the software without their knowledge so as to gauge their level of plagiarism. The…

  17. Biochemia Medica has started using the CrossCheck plagiarism detection software powered by iThenticate.

    PubMed

    Supak-Smolcić, Vesna; Simundić, Ana-Maria

    2013-01-01

    In February 2013, Biodhemia Medica has joined CrossRef, which enabled us to implement CrossCheck plagiarism detection service. Therefore, all manuscript submitted to Biodchemia Medica are now first assigned to Research integrity editor (RIE), before sending the manuscript for peer-review. RIE submits the text to CrossCheck analysis and is responsible for reviewing the results of the text similarity analysis. Based on the CrossCheck analysis results, RIE subsequently provides a recommendation to the Editor-in-chief (EIC) on whether the manuscript should be forwarded to peer-review, corrected for suspected parts prior to peer-review or immediately rejected. Final decision on the manuscript is, however, with the EIC. We hope that our new policy and manuscript processing algorithm will help us to further increase the overall quality of our Journal.

  18. Biochemia Medica has started using the CrossCheck plagiarism detection software powered by iThenticate

    PubMed Central

    Šupak-Smolčić, Vesna; Šimundić, Ana-Maria

    2013-01-01

    In February 2013, Biochemia Medica has joined CrossRef, which enabled us to implement CrossCheck plagiarism detection service. Therefore, all manuscript submitted to Biochemia Medica are now first assigned to Research integrity editor (RIE), before sending the manuscript for peer-review. RIE submits the text to CrossCheck analysis and is responsible for reviewing the results of the text similarity analysis. Based on the CrossCheck analysis results, RIE subsequently provides a recommendation to the Editor-in-chief (EIC) on whether the manuscript should be forwarded to peer-review, corrected for suspected parts prior to peer-review or immediately rejected. Final decision on the manuscript is, however, with the EIC. We hope that our new policy and manuscript processing algorithm will help us to further increase the overall quality of our Journal. PMID:23894858

  19. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    PubMed

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools.

  20. Plagiarism, Cheating and Research Integrity: Case Studies from a Masters Program in Peru

    PubMed Central

    Carnero, Andres M.; Mayta-Tristan, Percy; Konda, Kelika A.; Mezones-Holguin, Edward; Bernabe-Ortiz, Antonio; Alvarado, German F.; Canelo-Aybar, Carlos; Maguiña, Jorge L.; Segura, Eddy R.; Quispe, Antonio M.; Smith, Edward S.; Bayer, Angela M.; Lescano, Andres G.

    2017-01-01

    Plagiarism is a serious, yet widespread type of research misconduct, and is often neglected in developing countries. Despite its far-reaching implications, plagiarism is poorly acknowledged and discussed in the academic setting, and insufficient evidence exists in Latin America and developing countries to inform the development of preventive strategies. In this context, we present a longitudinal case study of seven instances of plagiarism and cheating arising in four consecutive classes (2011–2014) of an Epidemiology Masters program in Lima, Peru, and describes the implementation and outcomes of a multifaceted, “zero-tolerance” policy aimed at introducing research integrity. Two cases involved cheating in graded assignments, and five cases correspond to plagiarism in the thesis protocol. Cases revealed poor awareness of high tolerance to plagiarism, poor academic performance, and widespread writing deficiencies, compensated with patchwriting and copy-pasting. Depending on the events’ severity, penalties included course failure (6/7) and separation from the program (3/7). Students at fault did not engage in further plagiarism. Between 2011 and 2013, the Masters program sequentially introduced a preventive policy consisting of: (i) intensified research integrity and scientific writing education, (ii) a stepwise, cumulative writing process; (iii) honor codes; (iv) active search for plagiarism in all academic products; and (v) a “zero-tolerance” policy in response to documented cases. No cases were detected in 2014. In conclusion, plagiarism seems to be widespread in resource-limited settings and a greater response with educational and zero-tolerance components is needed to prevent it. PMID:27848191

  1. Plagiarism in research.

    PubMed

    Helgesson, Gert; Eriksson, Stefan

    2015-02-01

    Plagiarism is a major problem for research. There are, however, divergent views on how to define plagiarism and on what makes plagiarism reprehensible. In this paper we explicate the concept of "plagiarism" and discuss plagiarism normatively in relation to research. We suggest that plagiarism should be understood as "someone using someone else's intellectual product (such as texts, ideas, or results), thereby implying that it is their own" and argue that this is an adequate and fruitful definition. We discuss a number of circumstances that make plagiarism more or less grave and the plagiariser more or less blameworthy. As a result of our normative analysis, we suggest that what makes plagiarism reprehensible as such is that it distorts scientific credit. In addition, intentional plagiarism involves dishonesty. There are, furthermore, a number of potentially negative consequences of plagiarism.

  2. Patchwork plagiarism--a jigsaw of stolen puzzle pieces.

    PubMed

    Supak Smolcić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Plagiarism remains at the top in terms of interest to the scientific community. In its many vicious forms, patchwork plagiarism is characterized by numerous unresolved issues and often passes "below the radar" of editors and reviewers. The problem of detecting the complexity of misconduct has been partially resolved by plagiarism detection software. However, interpretation of relevant reports is not always obvious or easy. This article deals with plagiarism in general and patchwork plagiarism in particular, as well as related problems that editors must deal with to maintain the integrity of scientific journals.

  3. Patchwork plagiarism – a jigsaw of stolen puzzle pieces

    PubMed Central

    Smolčić, Vesna Šupak; Bilić-Zulle, Lidija

    2013-01-01

    Plagiarism remains at the top in terms of interest to the scientific community. In its many vicious forms, patchwork plagiarism is characterized by numerous unresolved issues and often passes “below the radar” of editors and reviewers. The problem of detecting the complexity of misconduct has been partially resolved by plagiarism detection software. However, interpretation of relevant reports is not always obvious or easy. This article deals with plagiarism in general and patchwork plagiarism in particular, as well as related problems that editors must deal with to maintain the integrity of scientific journals. PMID:23457762

  4. Knowing and Avoiding Plagiarism During Scientific Writing

    PubMed Central

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, SVVS; Nagasree, M

    2014-01-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing. PMID:25364588

  5. The confounding factors leading to plagiarism in academic writing and some suggested remedies: A systematic review.

    PubMed

    Guraya, Salman Yousuf; Guraya, Shaista Salman

    2017-05-01

    There is a staggering upsurge in the incidence of plagiarism of scientific literature. Literature shows divergent views about the factors that make plagiarism reprehensible. This review explores the causes and remedies for the perennial academic problem of plagiarism. Data sources were searched for full text English language articles published from 2000 to 2015. Data selection was done using medical subject headline (MeSH) terms plagiarism, unethical writing, academic theft, retraction, medical field, and plagiarism detection software. Data extraction was undertaken by selecting titles from retrieved references and data synthesis identified key factors leading to plagiarism such as unawareness of research ethics, poor writing skills and pressure or publish mantra. Plagiarism can be managed by a balance among its prevention, detection by plagiarism detection software, and institutional sanctions against proven plagiarists. Educating researchers about ethical principles of academic writing and institutional support in training writers about academic integrity and ethical publications can curtail plagiarism.

  6. Plagiarism (Coming to Terms).

    ERIC Educational Resources Information Center

    Bowden, Darsie

    1996-01-01

    Explores the origins of the word "plagiarism" and concepts of authorship. Examines a number of current issues concerning plagiarism, for instance, how the term complicates teacher-student relationships and peer cooperation in writing. (TB)

  7. Towards a testbed for malicious code detection

    SciTech Connect

    Lo, R.; Kerchen, P.; Crawford, R.; Ho, W.; Crossley, J.; Fink, G.; Levitt, K.; Olsson, R.; Archer, M. . Div. of Computer Science)

    1991-01-01

    This paper proposes an environment for detecting many types of malicious code, including computer viruses, Trojan horses, and time/logic bombs. This malicious code testbed (MCT) is based upon both static and dynamic analysis tools developed at the University of California, Davis, which have been shown to be effective against certain types of malicious code. The testbed extends the usefulness of these tools by using them in a complementary fashion to detect more general cases of malicious code. Perhaps more importantly, the MCT allows administrators and security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict. 5 refs., 2 figs., 2 tabs.

  8. The plagiarism project.

    PubMed

    Glassman, Nancy R; Sorensen, Karen; Habousha, Racheline G; Minuti, Aurelia; Schwartz, Rachel

    2011-01-01

    Plagiarism has been a problem plaguing academia for centuries. The Internet has made it easier than ever to copy material from one electronic document and paste it into another. Many cases are unintentional, as writers are unaware of the rules regarding plagiarism. This paper provides an overview of plagiarism and describes a project in which librarians partnered with the assistant dean of a graduate science program to educate students about the perils of plagiarism and encourage ethical writing practices.

  9. Helping Students Avoid Plagiarism.

    ERIC Educational Resources Information Center

    Wilhoit, Stephen

    1994-01-01

    Discusses how and why college students commit plagiarism, suggesting techniques that instructors can use to help student avoid plagiarism. Instructors should define and discuss plagiarism thoroughly; discuss hypothetical cases; review the conventions of quoting and documenting material; require multiple drafts of essays; and offer responses…

  10. Antiplagiarism Software Takes on the Honor Code

    ERIC Educational Resources Information Center

    Wasley, Paula

    2008-01-01

    Among the 100-odd colleges with academic honor codes, plagiarism-detection services raise a knotty problem: Is software compatible with a system based on trust? The answer frequently devolves to the size and culture of the university. Colleges with traditional student-run honor codes tend to "forefront" trust, emphasizing it above all else. This…

  11. Pattern of Plagiarism in Novice Students' Generated Programs: An Experimental Approach

    ERIC Educational Resources Information Center

    Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad

    2011-01-01

    Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…

  12. Is It Cheating or Learning the Craft of Writing? Using Turnitin to Help Students Avoid Plagiarism

    ERIC Educational Resources Information Center

    Graham-Matheson, Lynne; Starr, Simon

    2013-01-01

    Plagiarism is a growing problem for universities, many of which are turning to software detection for help in detecting and dealing with it. This paper explores issues around plagiarism and reports on a study of the use of Turnitin in a new university. The purpose of the study was to inform the senior management team about the plagiarism policy…

  13. Is It Cheating or Learning the Craft of Writing? Using Turnitin to Help Students Avoid Plagiarism

    ERIC Educational Resources Information Center

    Graham-Matheson, Lynne; Starr, Simon

    2013-01-01

    Plagiarism is a growing problem for universities, many of which are turning to software detection for help in detecting and dealing with it. This paper explores issues around plagiarism and reports on a study of the use of Turnitin in a new university. The purpose of the study was to inform the senior management team about the plagiarism policy…

  14. Pattern of Plagiarism in Novice Students' Generated Programs: An Experimental Approach

    ERIC Educational Resources Information Center

    Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad

    2011-01-01

    Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…

  15. Student's plagiarism--a challenge for paramedic educators.

    PubMed

    Lass, Piotr; Bandurski, Tomasz; Swietlik, Dariusz; Tomczak, Hanna; Wengler, Lubomira

    2006-01-01

    Student's plagiarism is a growing problem not only in the writing of controlling essays, but above all in the writing in BSc./MSc. diploma theses, which sometimes can be simply bought from ghost-writers. This is a major challenge for medical educators, particularly in paramedic professions. The aim of this paper is to overview the frequency of plagiarism among students, the factors influencing plagiarism, the ways of detecting it and potential countermeasures.

  16. AuDeNTES: Automatic Detection of teNtative Plagiarism According to a rEference Solution

    ERIC Educational Resources Information Center

    Mariani, Leonardo; Micucci, Daniela

    2012-01-01

    In academic courses, students frequently take advantage of someone else's work to improve their own evaluations or grades. This unethical behavior seriously threatens the integrity of the academic system, and teachers invest substantial effort in preventing and recognizing plagiarism. When students take examinations requiring the production of…

  17. AuDeNTES: Automatic Detection of teNtative Plagiarism According to a rEference Solution

    ERIC Educational Resources Information Center

    Mariani, Leonardo; Micucci, Daniela

    2012-01-01

    In academic courses, students frequently take advantage of someone else's work to improve their own evaluations or grades. This unethical behavior seriously threatens the integrity of the academic system, and teachers invest substantial effort in preventing and recognizing plagiarism. When students take examinations requiring the production of…

  18. Automated assistance for detecting malicious code

    SciTech Connect

    Crawford, R.; Kerchen, P.; Levitt, K.; Olsson, R.; Archer, M.; Casillas, M.

    1993-06-18

    This paper gives an update on the continuing work on the Malicious Code Testbed (MCT). The MCT is a semi-automated tool, operating in a simulated, cleanroom environment, that is capable of detecting many types of malicious code, such as viruses, Trojan horses, and time/logic bombs. The MCT allows security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict.

  19. Decreasing Plagiarism: What Works and What Doesn't

    ERIC Educational Resources Information Center

    Houtman, Anne M.; Walker, Sean

    2010-01-01

    The authors tested the predictions of a game theory model of plagiarism, using a test population of student papers submitted to an online plagiarism detection program, over five semesters in a non-majors biology course with multiple sections and high enrollment. Consistent with the model, as the probability of detection and the penalty if caught…

  20. Decreasing Plagiarism: What Works and What Doesn't

    ERIC Educational Resources Information Center

    Houtman, Anne M.; Walker, Sean

    2010-01-01

    The authors tested the predictions of a game theory model of plagiarism, using a test population of student papers submitted to an online plagiarism detection program, over five semesters in a non-majors biology course with multiple sections and high enrollment. Consistent with the model, as the probability of detection and the penalty if caught…

  1. Technology and Plagiarism in the University: Brief Report of a Trial in Detecting Cheating

    ERIC Educational Resources Information Center

    Patton, Rob; Johnson, Diane; Bimber, Bruce; Almeroth, Kevin; Michaels, George

    2004-01-01

    College students exploit information technology to cheat on papers and assignments, but for the most part university faculty employ few technological techniques to detect cheating. This paper reports on a trial of software for the detection of cheating in a large undergraduate survey class. The paper discusses the decision to adopt electronic…

  2. Technology and Plagiarism in the University: Brief Report of a Trial in Detecting Cheating

    ERIC Educational Resources Information Center

    Patton, Rob; Johnson, Diane; Bimber, Bruce; Almeroth, Kevin; Michaels, George

    2004-01-01

    College students exploit information technology to cheat on papers and assignments, but for the most part university faculty employ few technological techniques to detect cheating. This paper reports on a trial of software for the detection of cheating in a large undergraduate survey class. The paper discusses the decision to adopt electronic…

  3. Error-Detecting Identification Codes for Algebra Students.

    ERIC Educational Resources Information Center

    Sutherland, David C.

    1990-01-01

    Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)

  4. Concurrent error detecting codes for arithmetic processors

    NASA Technical Reports Server (NTRS)

    Lim, R. S.

    1979-01-01

    A method of concurrent error detection for arithmetic processors is described. Low-cost residue codes with check-length l and checkbase m = 2 to the l power - 1 are described for checking arithmetic operations of addition, subtraction, multiplication, division complement, shift, and rotate. Of the three number representations, the signed-magnitude representation is preferred for residue checking. Two methods of residue generation are described: the standard method of using modulo m adders and the method of using a self-testing residue tree. A simple single-bit parity-check code is described for checking the logical operations of XOR, OR, and AND, and also the arithmetic operations of complement, shift, and rotate. For checking complement, shift, and rotate, the single-bit parity-check code is simpler to implement than the residue codes.

  5. Stealing or Sharing? Cross-Cultural Issues of Plagiarism in an Open-Source Era

    ERIC Educational Resources Information Center

    Haitch, Russell

    2016-01-01

    More professors and institutions want to move from a detect-and-punish to an educate-and-prevent model for dealing with plagiarism. Understanding the causes of plagiarism, especially among international students, can aid in efforts to educate students and prevent plagiarism. Research points to a confluence of causal factors, such as time pressure,…

  6. Stealing or Sharing? Cross-Cultural Issues of Plagiarism in an Open-Source Era

    ERIC Educational Resources Information Center

    Haitch, Russell

    2016-01-01

    More professors and institutions want to move from a detect-and-punish to an educate-and-prevent model for dealing with plagiarism. Understanding the causes of plagiarism, especially among international students, can aid in efforts to educate students and prevent plagiarism. Research points to a confluence of causal factors, such as time pressure,…

  7. Plagiarism, Cultural Diversity and Metaphor--Implications for Academic Staff Development

    ERIC Educational Resources Information Center

    Leask, Betty

    2006-01-01

    Plagiarism is a complex, culturally loaded concept which causes much anxiety for both academics and students. Exactly what constitutes plagiarism is dependent on a number of contextual factors. Despite the difficulties associated with defining and detecting plagiarism, it is said to be on the increase, and students from "other cultures"…

  8. Plagiarism, Cultural Diversity and Metaphor--Implications for Academic Staff Development

    ERIC Educational Resources Information Center

    Leask, Betty

    2006-01-01

    Plagiarism is a complex, culturally loaded concept which causes much anxiety for both academics and students. Exactly what constitutes plagiarism is dependent on a number of contextual factors. Despite the difficulties associated with defining and detecting plagiarism, it is said to be on the increase, and students from "other cultures"…

  9. Originality Detection Software in a Graduate Policy Course: A Mixed-Methods Evaluation of Plagiarism

    ERIC Educational Resources Information Center

    Dreuth Zeman, Laura; Steen, Julie A.; Metz Zeman, Natalie

    2011-01-01

    The authors used a mixed-methods approach to evaluate the use of Turnitin originality detection software in a graduate social work course. Qualitative analysis of student responses revealed positive and negative spent completing assignments, and the tone of the class. Quantitative analysis of students' originality scores indicated a short-term…

  10. Originality Detection Software in a Graduate Policy Course: A Mixed-Methods Evaluation of Plagiarism

    ERIC Educational Resources Information Center

    Dreuth Zeman, Laura; Steen, Julie A.; Metz Zeman, Natalie

    2011-01-01

    The authors used a mixed-methods approach to evaluate the use of Turnitin originality detection software in a graduate social work course. Qualitative analysis of student responses revealed positive and negative spent completing assignments, and the tone of the class. Quantitative analysis of students' originality scores indicated a short-term…

  11. Plagiarism and Cheating.

    ERIC Educational Resources Information Center

    Mawdsley, Ralph D.; Permuth, Steve

    Plagiarism and cheating can be defined as academic dishonesty and represent policy concerns among all levels of education. Such cases involve academic versus disciplinary decisions and the need to determine the student's understanding of the definition of plagiarism or cheating. This paper analyzes six legal issues raised in court cases and…

  12. Plagiarism and Cheating.

    ERIC Educational Resources Information Center

    Mawdsley, Ralph D.; Permuth, Steve

    Plagiarism and cheating can be defined as academic dishonesty and represent policy concerns among all levels of education. Such cases involve academic versus disciplinary decisions and the need to determine the student's understanding of the definition of plagiarism or cheating. This paper analyzes six legal issues raised in court cases and…

  13. The Plagiarism Polyconundrum

    ERIC Educational Resources Information Center

    Bethany, Reine D.

    2016-01-01

    Plagiarism hinders student success because it shortcuts genuine writing practice and incurs penalties when discovered. Although students are aware of its potential consequences, plagiarism continues. This article reflects on the polyconundrum of empathizing with the many hindrances to student writing while deploying strategies to reduce plagiarism…

  14. A Strategy to Reduce Plagiarism in an Undergraduate Course

    ERIC Educational Resources Information Center

    Belter, Ronald W.; du Pre, Athena

    2009-01-01

    This study evaluated how effective an online academic integrity module was at reducing the occurrence of plagiarism in a written assignment for a university course. In a preintervention comparison group, plagiarism was detected in 25.8% of papers submitted, compared with only 6.5% in the group that completed the academic integrity module. The…

  15. The Anatomy of a Plagiarism Initiative: One Library's Campus Collaboration

    ERIC Educational Resources Information Center

    Madray, Amrita

    2008-01-01

    Plagiarism in media and print continues to be a major issue for professors, librarians, and students. Through initiatives and outreach from the B. Davis Memorial Library at the C. W. Post Campus of Long Island University, plagiarism Web sites have been created and workshops and programs continually provided for faculty and students to detect,…

  16. The Anatomy of a Plagiarism Initiative: One Library's Campus Collaboration

    ERIC Educational Resources Information Center

    Madray, Amrita

    2008-01-01

    Plagiarism in media and print continues to be a major issue for professors, librarians, and students. Through initiatives and outreach from the B. Davis Memorial Library at the C. W. Post Campus of Long Island University, plagiarism Web sites have been created and workshops and programs continually provided for faculty and students to detect,…

  17. How to Verify and Manage the Translational Plagiarism?

    PubMed Central

    Wiwanitkit, Viroj

    2016-01-01

    The use of Google translator as a tool for determining translational plagiarism is a big challenge. As noted, plagiarism of the original papers written in Macedonian and translated into other languages can be verified after computerised translation in other languages. Attempts to screen the translational plagiarism should be supported. The use of Google Translate tool might be helpful. Special focus should be on any non-English reference that might be the source of plagiarised material and non-English article that might translate from an original English article, which cannot be detected by simple plagiarism screening tool. It is a hard job for any journal to detect the complex translational plagiarism but the harder job might be how to effectively manage the case. PMID:27703588

  18. Prevalence of plagiarism in recent submissions to the Croatian Medical Journal.

    PubMed

    Baždarić, Ksenija; Bilić-Zulle, Lidija; Brumini, Gordana; Petrovečki, Mladen

    2012-06-01

    To assess the prevalence of plagiarism in manuscripts submitted for publication in the Croatian Medical Journal (CMJ). All manuscripts submitted in 2009-2010 were analyzed using plagiarism detection software: eTBLAST, CrossCheck, and WCopyfind. Plagiarism was suspected in manuscripts with more than 10% of the text derived from other sources. These manuscripts were checked against the Déjà vu database and manually verified by investigators. Of 754 submitted manuscripts, 105 (14%) were identified by the software as suspicious of plagiarism. Manual verification confirmed that 85 (11%) manuscripts were plagiarized: 63 (8%) were true plagiarism and 22 (3%) were self-plagiarism. Plagiarized manuscripts were mostly submitted from China (21%), Croatia (14%), and Turkey (19%). There was no significant difference in the text similarity rate between plagiarized and self-plagiarized manuscripts (25% [95% CI 22-27%] vs. 28% [95% CI 20-33%]; U = 645.50; P = 0.634). Differences in text similarity rate were found between various sections of self-plagiarized manuscripts (H = 12.65, P = 0.013). The plagiarism rate in the Materials and Methods (61% (95% CI 41-68%) was higher than in the Results (23% [95% CI 17-36%], U = 33.50; P = 0.009) or Discussion (25.5 [95% CI 15-35%]; U = 57.50; P < 0.001) sections. Three authors were identified in the Déjà vu database. Plagiarism detection software combined with manual verification may be used to detect plagiarized manuscripts and prevent their publication. The prevalence of plagiarized manuscripts submitted to the CMJ, a journal dedicated to promoting research integrity, was 11% in the 2-year period 2009-2010.

  19. Attitudes towards students who plagiarize: a dental hygiene faculty perspective.

    PubMed

    Patel-Bhakta, Hemali G; Muzzin, Kathleen B; Dewald, Janice P; Campbell, Patricia R; Buschang, Peter H

    2014-01-01

    The purpose of this study was to examine baccalaureate dental hygiene faculty members' attitudes and practices regarding student plagiarism. An email containing a link to a thirty-two-item survey was sent to fifty-two baccalaureate dental hygiene program directors in the United States; thirty of those agreed for their faculty members to participate. Of the 257 faculty members who received the survey link, 106 completed the survey, for a response rate of 41.2 percent. The responding faculty members reported thinking plagiarism is a rising concern in their dental hygiene programs (54.5 percent, 54/99). The majority said they check for plagiarism on student class assignment/projects (67.1 percent, 53/79). For those who did not check for plagiarism, 45.8 percent (11/24) stated it took "too much time to check" or it was "too hard to prove" (16.6 percent, 4/24). The most frequent form of student plagiarism observed by the respondents was "copying directly from a source electronically" (78.0 percent, 39/50). Most respondents reported checking for plagiarism through visual inspection (without technological assistance) (73.0 percent, 38/52). Of those who said they use plagiarism detection software/services, 44.4 percent (16/36) always recommended their students use plagiarism detection software/services to detect unintentional plagiarism. For those faculty members who caught students plagiarizing, 52.9 percent (27/51) reported they "always or often" handled the incident within their dental hygiene department, and 76.5 percent (39/51) said they had never reported the student's violation to an academic review board.

  20. A Pedagogy to Address Plagiarism.

    ERIC Educational Resources Information Center

    Whitaker, Elaine E.

    1993-01-01

    Presents strategies and methods by which writing teachers can openly address the potential problem of plagiarism. Details specific methods used by one teacher to train students how to quote and cite materials without plagiarizing. (HB)

  1. An Evaluation of the Effectiveness of Turnitin.Com as a Tool for Reducing Plagiarism in Graduate Student Term Papers

    ERIC Educational Resources Information Center

    Baker, Russell K.; Thornton, Barry; Adams, Michael

    2008-01-01

    Plagiarism is a continual problem in academia. Plagiarism-detection tools like Turnitin have been used for nearly ten years to help university faculty and administration combat this form of cheating (turnitin.com). This paper evaluates the difference in plagiarism levels in graduate-student term papers when students are not provided access to…

  2. There Was a Crooked Man(uscript): A Not-so-Serious Look at the Serious Subject of Plagiarism

    ERIC Educational Resources Information Center

    McGuire, Kevin T.

    2010-01-01

    The problem of plagiarism by political scientists has not received much attention. The incidence of plagiarism, however, may be greater than one would think. In this article, I offer a humorous look at what happened when a manuscript of mine was plagiarized. Based on my experience, I offer some suggestions on how scholars might detect and prevent…

  3. There Was a Crooked Man(uscript): A Not-so-Serious Look at the Serious Subject of Plagiarism

    ERIC Educational Resources Information Center

    McGuire, Kevin T.

    2010-01-01

    The problem of plagiarism by political scientists has not received much attention. The incidence of plagiarism, however, may be greater than one would think. In this article, I offer a humorous look at what happened when a manuscript of mine was plagiarized. Based on my experience, I offer some suggestions on how scholars might detect and prevent…

  4. An Evaluation of the Effectiveness of Turnitin.Com as a Tool for Reducing Plagiarism in Graduate Student Term Papers

    ERIC Educational Resources Information Center

    Baker, Russell K.; Thornton, Barry; Adams, Michael

    2008-01-01

    Plagiarism is a continual problem in academia. Plagiarism-detection tools like Turnitin have been used for nearly ten years to help university faculty and administration combat this form of cheating (turnitin.com). This paper evaluates the difference in plagiarism levels in graduate-student term papers when students are not provided access to…

  5. Managing Plagiarism: A Preventative Approach

    ERIC Educational Resources Information Center

    Insley, Robert

    2011-01-01

    Plagiarism is a reality in most college classes where some students plagiarize unknowingly and others do so knowingly. This situation requires instructors to decide how to manage the situation. Some may take the easy way out by ignoring the problem, simply pretending that none of their students plagiarize. In contrast, other instructors embrace…

  6. Beyond the Accusation of Plagiarism

    ERIC Educational Resources Information Center

    Gu, Qing; Brooks, Jane

    2008-01-01

    The paper explores the complexity of the notion of plagiarism from sociocultural and psychological perspectives. Plagiarism is a dynamic and multi-layered phenomenon [Russikoff, K., Fucaloro, L., Salkauskiene, D., 2003. "Plagiarism as a cross-cultural phenomenon." "The CAL Poly Pomona Journal of Interdisciplinary Studies" 16, 109-120.…

  7. Beyond the Accusation of Plagiarism

    ERIC Educational Resources Information Center

    Gu, Qing; Brooks, Jane

    2008-01-01

    The paper explores the complexity of the notion of plagiarism from sociocultural and psychological perspectives. Plagiarism is a dynamic and multi-layered phenomenon [Russikoff, K., Fucaloro, L., Salkauskiene, D., 2003. "Plagiarism as a cross-cultural phenomenon." "The CAL Poly Pomona Journal of Interdisciplinary Studies" 16, 109-120.…

  8. A Question of Dialogues: Authorship, Authority, Plagiarism

    ERIC Educational Resources Information Center

    Thompson, Celia; Pennycook, Alastair

    2008-01-01

    In this article, the authors argue that while the term plagiarism has long been used as an unhelpful and moralistic catch-all to describe a range of textual "crimes." educators are moving into an era of both increased diversity of student populations and increased capacity to detect textual borrowings through new forms of software. To rely on the…

  9. Plagiarism: A silent epidemic in scientific writing - Reasons, recognition and remedies.

    PubMed

    Debnath, Jyotindu

    2016-04-01

    Plagiarism is one of the most serious forms of scientific misconduct prevalent today and is an important reason for significant proportion of rejection of manuscripts and retraction of published articles. It is time for the medical fraternity to unanimously adopt a 'zero tolerance' policy towards this menace. While responsibility for ensuring a plagiarism-free manuscript primarily lies with the authors, editors cannot absolve themselves of their accountability. The only way to write a plagiarism-free manuscript for an author is to write an article in his/her own words, literally and figuratively. This article discusses various types of plagiarism, reasons for increasingly reported instances of plagiarism, pros and cons of use of plagiarism detection tools for detecting plagiarism and role of authors and editors in preventing/avoiding plagiarism in a submitted manuscript. Regular usage of professional plagiarism detection tools for similarity checks with critical interpretation by the editorial team at the pre-review stage will certainly help in reducing the menace of plagiarism in submitted manuscripts.

  10. [Plagiarism in scientific publications].

    PubMed

    Reyes B, Humberto

    2009-01-01

    Similar to what occurs in literature, art and other human endeavours, every scientific report is based in previous work done by others. The new paper should add something original but a basic law of scientific honesty demands that any mention ideas, observations or thinking that has been previously proposed or published by others, should be acknowledged properly in the text and in the references. Plagiarism is identified when the authors of a scientific report use ideas or text that belong to others and present them as original, the previous source is concealed or it is referred to in a different context. The authors of a paper that contains plagiarism have the intention to mislead the readers, pretending to be the original authors of an idea that was expressed previously by others, or to be the owners of results shown by them. Plagiarism is a dishonest behaviour and, when discovered, may have dangerous consequences because the editors of the journal may publish a notice of retraction that will be inserted by Medline in both papers: the plagiarized and the plagiarizer, to be noticed by everyone who accesses to either of them in the Internet.

  11. Surveillance in Programming Plagiarism beyond Techniques: An Incentive-Based Fishbone Model

    ERIC Educational Resources Information Center

    Wang, Yanqing; Chen, Min; Liang, Yaowen; Jiang, Yu

    2013-01-01

    Lots of researches have showed that plagiarism becomes a severe problem in higher education around the world, especially in programming learning for its essence. Therefore, an effective strategy for plagiarism surveillance in program learning is much essential. Some literature focus on code similarity algorithm and the related tools can help to…

  12. What is Plagiarism?

    NASA Astrophysics Data System (ADS)

    Vishniac, Ethan T.

    2012-01-01

    Manuscripts submitted to The Astrophysical Journal are required to contain "novel and significant" material and to be free of plagiarism. There is a surprising amount of confusion regarding the definition of plagiarism and what constitutes prior publication. I will discuss the definitions used by the ApJ and the procedures we follow to to support this rule. Individual members of the community frequently show a very different understanding of these standards and are surprised at the conflict. Time allowing, I will briefly discuss some of the other common ethical problems that arise during the preparation and publication of articles.

  13. Plagiarism and scientific writing: a personal commentary.

    PubMed

    Ponniah, Irulandy

    2012-11-01

    There have been a number of papers that have addressed the issue of plagiarism. Nevertheless, the charges of plagiarism usually merit little attention with experts, because it is still not clear what sort of copying actually constitutes plagiarism. Another problem that eludes consensus is whether plagiarism was committed with or without intention. This paper discusses certain issues relating to plagiarism and differentiates between intentional and unintentional forms of plagiarism. © 2011 Blackwell Publishing Asia Pty Ltd.

  14. The Ethics of Plagiarism.

    ERIC Educational Resources Information Center

    Jolly, Peggy

    Within the academy the commonly held definition of plagiarism--using another's words, ideas, or stylistic individuality without attribution--is widespread, appearing on most English course syllabi. Judicial guidelines are followed: neither stealing nor ignorance of the law is to be sanctioned. Furthermore, penalties for students can be severe: a…

  15. Legal Aspects of Plagiarism.

    ERIC Educational Resources Information Center

    Mawdsley, Ralph D.

    The prohibition of student plagiarism by educational institutions creates problems associated with: (1) communicating acceptable practices for citing the works of others; (2) establishing appropriate penalties for those who do not follow the announced standards; (3) ensuring, through due process, the protection of the rights of those accused of…

  16. Plagiarism and Costs

    ERIC Educational Resources Information Center

    Liebler, Robert

    2009-01-01

    It is costly for faculty to deal with cheating. Keith-Spiegel et al. (1998) identified several of these costs and argued that they can be grouped into four categories: emotionality, difficult, fear, and denial. I argue that the emotional and fear costs for faculty make it unlikely that the common approaches to dealing with plagiarism will be…

  17. Plagiarism: A case history.

    PubMed

    Sadler, L L

    1977-03-01

    A case of plagiarism involving duplication of the author's drawings is discussed. The chronology of events leading to an out-of-court settlement is reviewed and an attempt is made to clarify certain often misunderstood points in the Copyright Law as it applies to illustrators.

  18. Student plagiarism and professional practice.

    PubMed

    Kenny, Deborah

    2007-01-01

    With the ever-increasing availability and accessibility of the Internet, students are able to access a multitude of resources in support of their studies. However, this has also led to an increase in their ability to cheat through plagiarising text and claiming it as their own. Increased pressures of balancing work and study have contributed to this rise. Not only confined to the student population, some academics are also guilty of engaging in this practice providing a less than favourable role model for their students. Of increasing concern is the links of this practice to professionalism or indeed in this case unprofessionalism. Both pre- and post-registration nursing students who plagiarise risk bringing the reputation of the profession into disrepute. There are a number of methods that may be used to detect plagiarism but often the penalties are menial and inconsistently applied. Overall it is essential that academic institutions foster a culture of honesty and integrity amongst its academic community. A culture that clearly emphasises that plagiarism in any form is unacceptable.

  19. Undergraduate and Postgraduate Pharmacy Students' Perceptions of Plagiarism and Academic Honesty

    PubMed Central

    Bonanno, Helen; Krass, Ines; Scouller, Karen; Smith, Lorraine

    2009-01-01

    Objectives To assess undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty. Methods A questionnaire was administered to undergraduate and postgraduate pharmacy students to determine their levels of awareness of university policy concerning academic honesty; attitudes to plagiarism by rating the acceptability of a range of plagiarizing and cheating practices; and choice of appropriate penalties for a first and second occurrence. The choice of behaviors in response to a scenario about the preparation of a reading-based written assignment and the strategies that students would be prepared to use in order to submit the assignment on time were also assessed. Results Findings indicated widespread deficiencies in student knowledge of, and attitudes towards, plagiarism. Students did not perceive plagiarism as a serious issue and the use of inappropriate strategies for sourcing and acknowledging material was common. Conclusions The study highlights the importance of achieving a balance among the 3 dimensions of plagiarism management: prevention, detection and penalty. PMID:19885074

  20. Undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty.

    PubMed

    Ryan, Greg; Bonanno, Helen; Krass, Ines; Scouller, Karen; Smith, Lorraine

    2009-10-01

    To assess undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty. A questionnaire was administered to undergraduate and postgraduate pharmacy students to determine their levels of awareness of university policy concerning academic honesty; attitudes to plagiarism by rating the acceptability of a range of plagiarizing and cheating practices; and choice of appropriate penalties for a first and second occurrence. The choice of behaviors in response to a scenario about the preparation of a reading-based written assignment and the strategies that students would be prepared to use in order to submit the assignment on time were also assessed. Findings indicated widespread deficiencies in student knowledge of, and attitudes towards, plagiarism. Students did not perceive plagiarism as a serious issue and the use of inappropriate strategies for sourcing and acknowledging material was common. The study highlights the importance of achieving a balance among the 3 dimensions of plagiarism management: prevention, detection and penalty.

  1. Combating plagiarism: a shared responsibility.

    PubMed

    Rathod, Sujit D

    2010-01-01

    Scientific progress depends on the free dissemination of original thinking and research. With the evidence base formed by publication, investigators develop and implement additional studies, and policy makers propose new laws and regulations. The ramifications of this evidence can affect millions of lives and reallocate considerable resources for programmes or research. As such, it is incumbent on investigators to conduct rigorous research, which precludes engaging in scientific misconduct such as falsification, fabrication and plagiarism. This article addresses the causes and consequences of plagiarism and the processes by which plagiarism is discovered. It concludes by considering the responsibilities of members of the research community in preventing and addressing plagiarism.

  2. Plagiarism: a case study of quality improvement in a taught postgraduate programme.

    PubMed

    Marshall, Tom; Taylor, Beck; Hothersall, Ellie; Pérez-Martín, Leticia

    2011-01-01

    Plagiarism is a common issue in education. Software can detect plagiarism but little is known about prevention. To identify ways to reduce the incidence of plagiarism in a postgraduate programme. From 2006, all student assignments were monitored using plagiarism detection software (Turn It In) to produce percentage text matches for each assignment. In 2007, students were advised software was being used, and that plagiarism would result in penalties. In 2008, students attending a key module took part in an additional interactive seminar on plagiarism. A separate cohort of students did not attend the seminar, allowing comparison between attendees and non-attendees. Between 2006 and 2007, mean percentage text match values were consistent with a stable process, indicating advice and warnings were ineffective. Control chart analysis revealed that between 2007 and 2008, mean percentage text match changes showed a reduced text match in all nine modules, where students attended the interactive seminar, but none where students did not. This indicated that the interactive seminar had an effect. In 2008, there were no occurrences of plagiarism. Improvements were maintained in 2009. Advice and warnings against plagiarism were ineffective but a subsequent interactive seminar was effective at reducing plagiarism.

  3. The algorithm of malicious code detection based on data mining

    NASA Astrophysics Data System (ADS)

    Yang, Yubo; Zhao, Yang; Liu, Xiabi

    2017-08-01

    Traditional technology of malicious code detection has low accuracy and it has insufficient detection capability for new variants. In terms of malicious code detection technology which is based on the data mining, its indicators are not accurate enough, and its classification detection efficiency is relatively low. This paper proposed the information gain ratio indicator based on the N-gram to choose signature, this indicator can accurately reflect the detection weight of the signature, and helped by C4.5 decision tree to elevate the algorithm of classification detection.

  4. PLAGIARISM IN SCIENTIFIC PUBLISHING

    PubMed Central

    Masic, Izet

    2012-01-01

    Scientific publishing is the ultimate product of scientist work. Number of publications and their quoting are measures of scientist success while unpublished researches are invisible to the scientific community, and as such nonexistent. Researchers in their work rely on their predecessors, while the extent of use of one scientist work, as a source for the work of other authors is the verification of its contributions to the growth of human knowledge. If the author has published an article in a scientific journal it cannot publish the article in any other journal h with a few minor adjustments or without quoting parts of the first article, which are used in another article. Copyright infringement occurs when the author of a new article with or without the mentioning the author used substantial portions of previously published articles, including tables and figures. Scientific institutions and universities should,in accordance with the principles of Good Scientific Practice (GSP) and Good Laboratory Practices (GLP) have a center for monitoring,security, promotion and development of quality research. Establish rules and compliance to rules of good scientific practice are the obligations of each research institutions,universities and every individual-researchers,regardless of which area of science is investigated. In this way, internal quality control ensures that a research institution such as a university, assume responsibility for creating an environment that promotes standards of excellence, intellectual honesty and legality. Although the truth should be the aim of scientific research, it is not guiding fact for all scientists. The best way to reach the truth in its study and to avoid the methodological and ethical mistakes is to consistently apply scientific methods and ethical standards in research. Although variously defined plagiarism is basically intended to deceive the reader’s own scientific contribution. There is no general regulation of control of

  5. Plagiarism in scientific publishing.

    PubMed

    Masic, Izet

    2012-12-01

    Scientific publishing is the ultimate product of scientist work. Number of publications and their quoting are measures of scientist success while unpublished researches are invisible to the scientific community, and as such nonexistent. Researchers in their work rely on their predecessors, while the extent of use of one scientist work, as a source for the work of other authors is the verification of its contributions to the growth of human knowledge. If the author has published an article in a scientific journal it cannot publish the article in any other journal h with a few minor adjustments or without quoting parts of the first article, which are used in another article. Copyright infringement occurs when the author of a new article with or without the mentioning the author used substantial portions of previously published articles, including tables and figures. Scientific institutions and universities should,in accordance with the principles of Good Scientific Practice (GSP) and Good Laboratory Practices (GLP) have a center for monitoring,security, promotion and development of quality research. Establish rules and compliance to rules of good scientific practice are the obligations of each research institutions,universities and every individual-researchers,regardless of which area of science is investigated. In this way, internal quality control ensures that a research institution such as a university, assume responsibility for creating an environment that promotes standards of excellence, intellectual honesty and legality. Although the truth should be the aim of scientific research, it is not guiding fact for all scientists. The best way to reach the truth in its study and to avoid the methodological and ethical mistakes is to consistently apply scientific methods and ethical standards in research. Although variously defined plagiarism is basically intended to deceive the reader's own scientific contribution. There is no general regulation of control of

  6. [High frequency of plagiarism in medical thesis from a Peruvian public university].

    PubMed

    Saldaña-Gastulo, J Jhan C; Quezada-Osoria, C Claudia; Peña-Oscuvilca, Américo; Mayta-Tristán, Percy

    2010-03-01

    An observational study was conducted to describe the presence of plagiarism in medical thesis in 2008 performed at a public university in Peru. Search for plagiarism in 33 thesis introductions using a Google search algorithm, characterizes of the study type and we search in electronic form if the thesis mentor have published articles in scientific journals. We found evidence of plagiarism in 27/33 introductions, 37.3% (171/479) of all the paragraphs analyzed had some degree of plagiarism, literal plagiarism was the most frequent (20/27) and journals were the most common sources of plagiarism (19/27). The characteristics of the studies were observational (32/33), cross-sectional (30/33), descriptive (25/33) and retrospective (19/33). None of the authors had published in a scientific journal, and only nine of his tutors of them had at least one publication. No association was found between the characteristics of the thesis and the presence of plagiarism. In conclusion, we found a high frequency of plagiarism in theses analyzed. Is responsibility of medical schools take the necessary actions to detect and avoid plagiarism among their students.

  7. Can Paraphrasing Practice Help Students Define Plagiarism?

    ERIC Educational Resources Information Center

    Barry, Elaine S.

    2006-01-01

    Plagiarism is the new dirty word on campus, and college instructors are increasingly interested in teaching students how to prevent committing plagiarism. In this study, college students wrote definitions of plagiarism before and after 6 weeks of practice paraphrasing and citing original sources. Students' definitions of plagiarism were evaluated…

  8. Error-Detection Codes: Algorithms and Fast Implementation

    DTIC Science & Technology

    2005-01-01

    information on this or any other computing topic, please visit our Digital Library at www.computer.org/publications/ dlib . NGUYEN: ERROR-DETECTION CODES: ALGORITHMS AND FAST IMPLEMENTATION 11 ...in Appendix C (which can be found on the Computer Society Digital Library at http:// computer.org/tc/archives.htm). In this paper, we focus on code...the Computer Society Digital Library at http://computer.org/ tc/archives.htm) that include theoremproofs, code segments implemented in C programming

  9. Undergraduate Plagiarism: A Pedagogical Perspective

    ERIC Educational Resources Information Center

    Ellery, Karen

    2008-01-01

    Student plagiarism is a pervasive and increasing problem at all levels of study in tertiary institutions. This study attempted explicitly and implicitly to address issues of plagiarism within the broad context of an academic writing framework in tutorials in a first-year module at the University of KwaZulu-Natal in South Africa. Despite these…

  10. The Illusory Dichotomy of Plagiarism

    ERIC Educational Resources Information Center

    Stuhmcke, Anita; Booth, Tracey; Wangmann, Jane

    2016-01-01

    Plagiarism has been characterised as a "major problem" for universities. While tensions between students and universities are inevitable, the problem with the existing system of plagiarism management and prevention is that it operates to problematise the relationship between the university and the student, rather than address the core…

  11. The Illusory Dichotomy of Plagiarism

    ERIC Educational Resources Information Center

    Stuhmcke, Anita; Booth, Tracey; Wangmann, Jane

    2016-01-01

    Plagiarism has been characterised as a "major problem" for universities. While tensions between students and universities are inevitable, the problem with the existing system of plagiarism management and prevention is that it operates to problematise the relationship between the university and the student, rather than address the core…

  12. Exploring Student Self-Plagiarism

    ERIC Educational Resources Information Center

    Halupa, Colleen M.

    2014-01-01

    Student self-plagiarism is a confusing issue for both faculty and students alike. This problem is compounded because both groups perceive the concept very differently. Recent literature regarding these perceptions is reviewed and some brief preliminary results of an exploratory multi-university study of student perceptions of self-plagiarism are…

  13. The Scarlet "P": Plagiarism, Panopticism, and the Rhetoric of Academic Integrity

    ERIC Educational Resources Information Center

    Zwagerman, Sean

    2008-01-01

    This article is a rhetorical analysis of the anxious and outraged discourse employed in response to the "rising tide" of cheating and plagiarism. This discourse invites actions that are antithetical to the goals of education and the roles of educators, as exemplified by the proliferation of plagiarism-detection technologies. (Contains 15 notes.)

  14. Single Sourcing, Boilerplates, and Re-Purposing: Plagiarism and Technical Writing

    ERIC Educational Resources Information Center

    Louch, Michelle O'Brien

    2016-01-01

    In academia, plagiarism adheres to the traditional definition: utilizing another person's words or ideas without proper credit. Students are taught to cite everything, while instructors are given tools to detect plagiarism. This ultimately creates an atmosphere of paranoia, where students fear accusation and teachers are convinced that plagiarism…

  15. An Evaluation of the Cloze Procedure as a Test for Plagiarism.

    ERIC Educational Resources Information Center

    Standing, Lionel; Gorassini, Donald

    1986-01-01

    Reports the results of two experiments which evaluated the effectiveness of the cloze test as a method for detecting plagiarism. In both studies, the cloze performance of students was significantly better in nonplagiarizing than plagiarizing situations. Concludes that when used with caution, the cloze procedure appears to be potentially helpful in…

  16. The Scarlet "P": Plagiarism, Panopticism, and the Rhetoric of Academic Integrity

    ERIC Educational Resources Information Center

    Zwagerman, Sean

    2008-01-01

    This article is a rhetorical analysis of the anxious and outraged discourse employed in response to the "rising tide" of cheating and plagiarism. This discourse invites actions that are antithetical to the goals of education and the roles of educators, as exemplified by the proliferation of plagiarism-detection technologies. (Contains 15 notes.)

  17. Cheaters: A Case Study of Plagiarism in Composition Classrooms

    ERIC Educational Resources Information Center

    Yadgir, Sheri A.

    2013-01-01

    This study sought to find a better understanding of plagiarism in the university writing classroom; specifically, institutional and departmental honor codes and policies were looked at--as was the tendency of individual instructors to follow those policies versus creating their own. The narrow purpose of the study was to investigate plagiarism…

  18. Cheaters: A Case Study of Plagiarism in Composition Classrooms

    ERIC Educational Resources Information Center

    Yadgir, Sheri A.

    2013-01-01

    This study sought to find a better understanding of plagiarism in the university writing classroom; specifically, institutional and departmental honor codes and policies were looked at--as was the tendency of individual instructors to follow those policies versus creating their own. The narrow purpose of the study was to investigate plagiarism…

  19. Coded excitation plane wave imaging for shear wave motion detection.

    PubMed

    Song, Pengfei; Urban, Matthew W; Manduca, Armando; Greenleaf, James F; Chen, Shigao

    2015-07-01

    Plane wave imaging has greatly advanced the field of shear wave elastography thanks to its ultrafast imaging frame rate and the large field-of-view (FOV). However, plane wave imaging also has decreased penetration due to lack of transmit focusing, which makes it challenging to use plane waves for shear wave detection in deep tissues and in obese patients. This study investigated the feasibility of implementing coded excitation in plane wave imaging for shear wave detection, with the hypothesis that coded ultrasound signals can provide superior detection penetration and shear wave SNR compared with conventional ultrasound signals. Both phase encoding (Barker code) and frequency encoding (chirp code) methods were studied. A first phantom experiment showed an approximate penetration gain of 2 to 4 cm for the coded pulses. Two subsequent phantom studies showed that all coded pulses outperformed the conventional short imaging pulse by providing superior sensitivity to small motion and robustness to weak ultrasound signals. Finally, an in vivo liver case study on an obese subject (body mass index = 40) demonstrated the feasibility of using the proposed method for in vivo applications, and showed that all coded pulses could provide higher SNR shear wave signals than the conventional short pulse. These findings indicate that by using coded excitation shear wave detection, one can benefit from the ultrafast imaging frame rate and large FOV provided by plane wave imaging while preserving good penetration and shear wave signal quality, which is essential for obtaining robust shear elasticity measurements of tissue.

  20. Plagiarism in Student Research: Responsibility of the Supervisors and Suggestions to Ensure Plagiarism Free Research.

    PubMed

    Krishan, Kewal; Kanchan, Tanuj; Baryah, Neha; Mukhra, Richa

    2017-08-01

    Plagiarism is a serious threat plaguing the research in publication of science globally. There is an increasing need to address the issue of plagiarism especially among young researchers in the developing part of the world. Plagiarism needs to be earnestly discouraged to ensure a plagiarism free research environment. We provide further suggestions to combat student plagiarism at Master's level and the regulations/guidelines regarding plagiarism in India.

  1. Plagiarism in graduate medical education.

    PubMed

    Cole, Ariel Forrester

    2007-06-01

    The act of overt plagiarism by graduates of accredited residency programs represents a failure in personal integrity. It also indicates a lack of professionalism, one of the six Accreditation Council for Graduate Medical Education (ACGME) competencies for graduate medical education. A recent experience at one geriatric fellowship indicates that the problem of plagiarism may be more prevalent than previously recognized. A situation was discovered at the geriatric medicine fellowship at Florida Hospital Family Medicine Residency Program in Orlando, Fla, in which three of the personal statements included in a total of 26 applications to the fellowship in the past 2 years contained portions plagiarized from a single Web site. The aim in documenting this plagiarism is to raise awareness among medical educators about the availability of online sources of content and ease of electronic plagiarism. Some students and residents may not recognize copying other resources verbatim as plagiarism. Residency programs should evaluate their own need for education about plagiarism and include this in the training of the competency of professionalism.

  2. DROP: Detecting Return-Oriented Programming Malicious Code

    NASA Astrophysics Data System (ADS)

    Chen, Ping; Xiao, Hai; Shen, Xiaobin; Yin, Xinchun; Mao, Bing; Xie, Li

    Return-Oriented Programming (ROP) is a new technique that helps the attacker construct malicious code mounted on x86/SPARC executables without any function call at all. Such technique makes the ROP malicious code contain no instruction, which is different from existing attacks. Moreover, it hides the malicious code in benign code. Thus, it circumvents the approaches that prevent control flow diversion outside legitimate regions (such as W ⊕ X ) and most malicious code scanning techniques (such as anti-virus scanners). However, ROP has its own intrinsic feature which is different from normal program design: (1) uses short instruction sequence ending in "ret", which is called gadget, and (2) executes the gadgets contiguously in specific memory space, such as standard GNU libc. Based on the features of the ROP malicious code, in this paper, we present a tool DROP, which is focused on dynamically detecting ROP malicious code. Preliminary experimental results show that DROP can efficiently detect ROP malicious code, and have no false positives and negatives.

  3. Coded Excitation Plane Wave Imaging for Shear Wave Motion Detection

    PubMed Central

    Song, Pengfei; Urban, Matthew W.; Manduca, Armando; Greenleaf, James F.; Chen, Shigao

    2015-01-01

    Plane wave imaging has greatly advanced the field of shear wave elastography thanks to its ultrafast imaging frame rate and the large field-of-view (FOV). However, plane wave imaging also has decreased penetration due to lack of transmit focusing, which makes it challenging to use plane waves for shear wave detection in deep tissues and in obese patients. This study investigated the feasibility of implementing coded excitation in plane wave imaging for shear wave detection, with the hypothesis that coded ultrasound signals can provide superior detection penetration and shear wave signal-to-noise-ratio (SNR) compared to conventional ultrasound signals. Both phase encoding (Barker code) and frequency encoding (chirp code) methods were studied. A first phantom experiment showed an approximate penetration gain of 2-4 cm for the coded pulses. Two subsequent phantom studies showed that all coded pulses outperformed the conventional short imaging pulse by providing superior sensitivity to small motion and robustness to weak ultrasound signals. Finally, an in vivo liver case study on an obese subject (Body Mass Index = 40) demonstrated the feasibility of using the proposed method for in vivo applications, and showed that all coded pulses could provide higher SNR shear wave signals than the conventional short pulse. These findings indicate that by using coded excitation shear wave detection, one can benefit from the ultrafast imaging frame rate and large FOV provided by plane wave imaging while preserving good penetration and shear wave signal quality, which is essential for obtaining robust shear elasticity measurements of tissue. PMID:26168181

  4. The detection and extraction of interleaved code segments

    NASA Technical Reports Server (NTRS)

    Rugaber, Spencer; Stirewalt, Kurt; Wills, Linda M.

    1995-01-01

    This project is concerned with a specific difficulty that arises when trying to understand and modify computer programs. In particular, it is concerned with the phenomenon of 'interleaving' in which one section of a program accomplishes several purposes, and disentangling the code responsible for each purposes is difficult. Unraveling interleaved code involves discovering the purpose of each strand of computation, as well as understanding why the programmer decided to interleave the strands. Increased understanding improve the productivity and quality of software maintenance, enhancement, and documentation activities. It is the goal of the project to characterize the phenomenon of interleaving as a prerequisite for building tools to detect and extract interleaved code fragments.

  5. Organic Text Authors Charge Plagiarism.

    ERIC Educational Resources Information Center

    Chemical and Engineering News, 1979

    1979-01-01

    Reports on the recent controversy involving two organic chemistry textbooks. The charge of plagiarism and the court litigations are the object of interest in the chemical community since many prominant scientists are planned as witnesses. (SA)

  6. Organic Text Authors Charge Plagiarism.

    ERIC Educational Resources Information Center

    Chemical and Engineering News, 1979

    1979-01-01

    Reports on the recent controversy involving two organic chemistry textbooks. The charge of plagiarism and the court litigations are the object of interest in the chemical community since many prominant scientists are planned as witnesses. (SA)

  7. Plagiarism in residency application essays.

    PubMed

    Segal, Scott; Gelfand, Brian J; Hurwitz, Shelley; Berkowitz, Lori; Ashley, Stanley W; Nadel, Eric S; Katz, Joel T

    2010-07-20

    Anecdotal reports suggest that some residency application essays contain plagiarized content. To determine the prevalence of plagiarism in a large cohort of residency application essays. Retrospective cohort study. 4975 application essays submitted to residency programs at a single large academic medical center between 1 September 2005 and 22 March 2007. Specialized software was used to compare residency application essays with a database of Internet pages, published works, and previously submitted essays and the percentage of the submission matching another source was calculated. A match of more than 10% to an existing work was defined as evidence of plagiarism. Evidence of plagiarism was found in 5.2% (95% CI, 4.6% to 5.9%) of essays. The essays of non-U.S. citizens were more likely to demonstrate evidence of plagiarism. Other characteristics associated with the prevalence of plagiarism included medical school location outside the United States and Canada; previous residency or fellowship; lack of research experience, volunteer experience, or publications; a low United States Medical Licensing Examination Step 1 score; and non-membership in the Alpha Omega Alpha Honor Medical Society. The software database is probably incomplete, the 10%-match threshold for defining plagiarism has not been statistically validated, and the study was confined to applicants to 1 institution. Evidence of matching content in an essay cannot be used to infer the applicant's intent and is not sensitive to variations in the cultural context of copying in some societies. Evidence of plagiarism in residency application essays is more common in international applicants but was found in those by applicants to all specialty programs, from all medical school types, and even among applicants with significant academic honors. No external funding.

  8. Study on detection techniques for laser fuze using pseudorandom code

    NASA Astrophysics Data System (ADS)

    Yan, Xiaopeng; Li, Ping; Jia, Ruili; Chen, Huimin

    2008-03-01

    With the development of semiconductor laser technology, laser proximity fuzes have been widely used in various kinds of guided missiles and routine ammunitions. An approach to pulsed laser fuze based on pseudorandom code is presented in this paper. Based on the principle of laser fuze using pseudorandom code, the system has been divided into emitting module, receiving module, optical system and information processing module. The different modules have been analyzed in details and principles for selecting the parameters of the modules are given. The testing shows that laser fuze based on pseudorandom code has a better ability of detection and a higher resistance to interference. The theoretic foundation is provided for scientifically designing pulsed laser fuze of pseudorandom code.

  9. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person,Suzette; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (1) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows that SPA can detect porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points.

  10. Rethinking Plagiarism in the Digital Age

    ERIC Educational Resources Information Center

    Evering, Lea Calvert; Moorman, Gary

    2012-01-01

    Plagiarism is a complex issue in need of reexamination. A common misconception is there is consensus on what constitute plagiarism, and general agreement that engaging in plagiarism and other forms of academic dishonesty is a major breech of ethics. There seems to be little concern for differentiating degrees of seriousness; the intentional…

  11. Plagiarism: Moving from Punitive to Proactive Approaches

    ERIC Educational Resources Information Center

    Eaton, Sarah Elaine; Guglielmin, Melanie; Otoo, Benedict Kojo

    2017-01-01

    Plagiarism continues to be an issue in postsecondary contexts. This paper discusses how educators can take a proactive stance to prevent plagiarism and cultivate students' sense of honour and academic integrity, rather than focusing on punitive consequences after plagiarism has already occurred. Strategies include assessment design, formative…

  12. Rethinking Plagiarism in the Digital Age

    ERIC Educational Resources Information Center

    Evering, Lea Calvert; Moorman, Gary

    2012-01-01

    Plagiarism is a complex issue in need of reexamination. A common misconception is there is consensus on what constitute plagiarism, and general agreement that engaging in plagiarism and other forms of academic dishonesty is a major breech of ethics. There seems to be little concern for differentiating degrees of seriousness; the intentional…

  13. Plagiarism Due to Misunderstanding: Online Instructor Perceptions

    ERIC Educational Resources Information Center

    Greenberger, Scott; Holbeck, Rick; Steele, John; Dyer, Thomas

    2016-01-01

    Plagiarism is an ongoing problem in higher education. This problem exists in both online and face-to-face modalities. The literature indicates that there are three ways higher education institutions define plagiarism, which includes theft, deception, and misunderstanding. Plagiarism due to misunderstanding has received less attention in the…

  14. Sexuality, Textuality: The Cultural Work of Plagiarism.

    ERIC Educational Resources Information Center

    Howard, Rebecca Moore

    2000-01-01

    Considers how plagiarism continues to elude definition because teachers cannot possibly formulate and act on a definition of plagiarism that articulates both its textual and sexual work. Discusses linking sexual property to textual transgression and rejecting metaphors in relationship to rejecting plagiarism. Suggests educators stop using the term…

  15. Editors, Teachers Disagree about Definition of Plagiarism.

    ERIC Educational Resources Information Center

    Chaney, Jerry; Duncan, Tom

    1985-01-01

    Describes a study of plagiarism policies in journalism schools and newsrooms. Concludes that instructors felt educating students about plagiarism was one of the most important services journalism schools offer, but editors felt that plagiarism standards must be set in the real world of the newsroom. (HTH)

  16. Students' Perceptions of Plagiarism

    ERIC Educational Resources Information Center

    Fish, Reva; Hura, Gerri

    2013-01-01

    While plagiarism by college students is a serious problem that must be addressed, students generally overestimate the frequency of plagiarism at their schools and blame students they do not know for the majority of incidents. This study looked at students' estimations of the frequency of plagiarism at a large urban college and explored how…

  17. Staff and Student Attitudes to Plagiarism at University College Northampton

    ERIC Educational Resources Information Center

    Pickard, Jill

    2006-01-01

    University College Northampton (UCN) provides undergraduate and postgraduate courses in a wide range of subjects. In the past, instances of plagiarism were considered rare and were dealt with by academic staff on a case-by-case basis. However, the increase in instances detected by staff has led to a need to address the issue more consistently. The…

  18. Policy, Preparation, and Prevention: Proactive Minimization of Student Plagiarism

    ERIC Educational Resources Information Center

    Devlin, Marcia

    2006-01-01

    Countless cases of plagiarism are detected across the Australian higher education sector each year. Generally speaking, policy and other responses to the issue focus on punitive, rather than on educative, measures. Recently, a subtle shift is discernable. As well as ensuring appropriate consequences for plagiarists, several universities are…

  19. Staff and Student Attitudes to Plagiarism at University College Northampton

    ERIC Educational Resources Information Center

    Pickard, Jill

    2006-01-01

    University College Northampton (UCN) provides undergraduate and postgraduate courses in a wide range of subjects. In the past, instances of plagiarism were considered rare and were dealt with by academic staff on a case-by-case basis. However, the increase in instances detected by staff has led to a need to address the issue more consistently. The…

  20. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  1. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person, Suzette J.; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (I) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows thai SPA can dell-oct porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points

  2. The Ethics and Politics of Policing Plagiarism: A Qualitative Study of Faculty Views on Student Plagiarism and Turnitin®

    ERIC Educational Resources Information Center

    Bruton, Samuel; Childers, Dan

    2016-01-01

    Recently, the usage of plagiarism detection software such as Turnitin® has increased dramatically among university instructors. At the same time, academic criticism of this software's employment has also increased. We interviewed 23 faculty members from various departments at a medium-sized, public university in the southeastern US to determine…

  3. The Ethics and Politics of Policing Plagiarism: A Qualitative Study of Faculty Views on Student Plagiarism and Turnitin®

    ERIC Educational Resources Information Center

    Bruton, Samuel; Childers, Dan

    2016-01-01

    Recently, the usage of plagiarism detection software such as Turnitin® has increased dramatically among university instructors. At the same time, academic criticism of this software's employment has also increased. We interviewed 23 faculty members from various departments at a medium-sized, public university in the southeastern US to determine…

  4. Multiple symbol differential detection of uncoded and trellis coded MPSK

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush; Simon, Marvin K.; Shahshahani, Mehrdad

    1989-01-01

    A differential detection for MPSK, which uses a multiple symbol observation interval, is presented and its performance analyzed and simulated. The technique makes use of maximum-likelihood sequence estimation of the transmitted phases rather than symbol-by-symbol detection as in conventional differential detection. As such the performance of this multiple symbol detection scheme fills the gap between conventional (two-symbol observation) differentially coherent detection of MPSK and ideal coherent of MPSK with differential encoding. The amount of improvement gained over conventional differential detection depends on the number of phases, M, and the number of additional symbol intervals added to the observation. What is particularly interesting is that substantial performance improvement can be obtained for only one or two additional symbol intervals of observation. The analysis and simulation results presented are for uncoded and trellis coded MPSK.

  5. Plagiarism in law and medicine: challenges for scholarship, academia, publishers and regulators.

    PubMed

    Freckelton, Ian

    2010-05-01

    The phenomenon of plagiarism has evolved as a major problem in many fields with the increasing accessibility of material on the internet. It poses dilemmas for those involved in secondary and tertiary education, as well as for book publishers and those who edit journals. This editorial reviews important recent decisions in the United Kingdom, Canada and Australia by courts and regulatory bodies in respect of doctors and lawyers who have engaged in plagiarism in various ways both while undergraduates and in the course of their professional careers. It reflects on the phenomenon of plagiarism, the challenges involved in its detection and the steps that can be taken to reduce its incidence.

  6. Detection and Characterization of Phase-Coded Radar Signals

    DTIC Science & Technology

    2007-11-02

    Detection and Characterization of Phase-Coded Radar Signals 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5d. TASK NUMBER 6. AUTHOR( S ) Dr...Ernest R. Adams 5e. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Cranfield University (RMCS) Shrivenham SN6 8LA United...Kingdom 8. PERFORMING ORGANIZATION REPORT NUMBER N/A 10. SPONSOR/MONITOR’S ACRONYM( S ) 9. SPONSORING/MONITORING AGENCY NAME( S ) AND

  7. Authors, editors, and the signs, symptoms and causes of plagiarism

    PubMed Central

    Shashok, Karen

    2011-01-01

    Plagiarism and inadequate citing appear to have reached epidemic proportions in research publication. This article discusses how plagiarism is defined and suggests some possible causes for the increase in the plagiarism disease. Most editors do not have much tolerance for text re-use with inadequate citation regardless of reasons why words are copied from other sources without correct attribution. However, there is now some awareness that re-use of words in research articles to improve the writing or “the English” (which has become a common practice) should be distinguished from intentional deceit for the purpose of stealing other authors’ ideas (which appears to remain a very rare practice). Although it has become almost as easy for editors to detect duplicate text as it is for authors to re-use text from other sources, editors often fail to consider the reasons why researchers resort to this strategy, and tend to consider any text duplication as a symptom of serious misconduct. As a result, some authors may be stigmatized unfairly by being labeled as plagiarists. The article concludes with practical advice for researchers on how to improve their writing and citing skills and thus avoid accusations of plagiarism. PMID:21957412

  8. Roles for Coincidence Detection in Coding Amplitude-Modulated Sounds.

    PubMed

    Ashida, Go; Kretzberg, Jutta; Tollin, Daniel J

    2016-06-01

    Many sensory neurons encode temporal information by detecting coincident arrivals of synaptic inputs. In the mammalian auditory brainstem, binaural neurons of the medial superior olive (MSO) are known to act as coincidence detectors, whereas in the lateral superior olive (LSO) roles of coincidence detection have remained unclear. LSO neurons receive excitatory and inhibitory inputs driven by ipsilateral and contralateral acoustic stimuli, respectively, and vary their output spike rates according to interaural level differences. In addition, LSO neurons are also sensitive to binaural phase differences of low-frequency tones and envelopes of amplitude-modulated (AM) sounds. Previous physiological recordings in vivo found considerable variations in monaural AM-tuning across neurons. To investigate the underlying mechanisms of the observed temporal tuning properties of LSO and their sources of variability, we used a simple coincidence counting model and examined how specific parameters of coincidence detection affect monaural and binaural AM coding. Spike rates and phase-locking of evoked excitatory and spontaneous inhibitory inputs had only minor effects on LSO output to monaural AM inputs. In contrast, the coincidence threshold of the model neuron affected both the overall spike rates and the half-peak positions of the AM-tuning curve, whereas the width of the coincidence window merely influenced the output spike rates. The duration of the refractory period affected only the low-frequency portion of the monaural AM-tuning curve. Unlike monaural AM coding, temporal factors, such as the coincidence window and the effective duration of inhibition, played a major role in determining the trough positions of simulated binaural phase-response curves. In addition, empirically-observed level-dependence of binaural phase-coding was reproduced in the framework of our minimalistic coincidence counting model. These modeling results suggest that coincidence detection of excitatory

  9. Roles for Coincidence Detection in Coding Amplitude-Modulated Sounds

    PubMed Central

    Ashida, Go; Kretzberg, Jutta; Tollin, Daniel J.

    2016-01-01

    Many sensory neurons encode temporal information by detecting coincident arrivals of synaptic inputs. In the mammalian auditory brainstem, binaural neurons of the medial superior olive (MSO) are known to act as coincidence detectors, whereas in the lateral superior olive (LSO) roles of coincidence detection have remained unclear. LSO neurons receive excitatory and inhibitory inputs driven by ipsilateral and contralateral acoustic stimuli, respectively, and vary their output spike rates according to interaural level differences. In addition, LSO neurons are also sensitive to binaural phase differences of low-frequency tones and envelopes of amplitude-modulated (AM) sounds. Previous physiological recordings in vivo found considerable variations in monaural AM-tuning across neurons. To investigate the underlying mechanisms of the observed temporal tuning properties of LSO and their sources of variability, we used a simple coincidence counting model and examined how specific parameters of coincidence detection affect monaural and binaural AM coding. Spike rates and phase-locking of evoked excitatory and spontaneous inhibitory inputs had only minor effects on LSO output to monaural AM inputs. In contrast, the coincidence threshold of the model neuron affected both the overall spike rates and the half-peak positions of the AM-tuning curve, whereas the width of the coincidence window merely influenced the output spike rates. The duration of the refractory period affected only the low-frequency portion of the monaural AM-tuning curve. Unlike monaural AM coding, temporal factors, such as the coincidence window and the effective duration of inhibition, played a major role in determining the trough positions of simulated binaural phase-response curves. In addition, empirically-observed level-dependence of binaural phase-coding was reproduced in the framework of our minimalistic coincidence counting model. These modeling results suggest that coincidence detection of excitatory

  10. Pluralizing Plagiarism: Identities, Contexts, Pedagogies

    ERIC Educational Resources Information Center

    Howard, Rebecca Moore; Robillard, Amy

    2008-01-01

    Recent cases have demonstrated that plagiarism is a hot-button issue. It is also pervasive, occurring in universities, four-year colleges, community colleges, secondary schools, graduate programs, international classrooms, multicultural classrooms, writing centers, writing-across-the-curriculum programs, scholarly publications and the popular…

  11. Plagiarism: What's the Big Deal?

    ERIC Educational Resources Information Center

    Hansen, Brittney; Stith, Danica; Tesdell, Lee S.

    2011-01-01

    In academic culture, plagiarism is considered to be a form of cheating and therefore unethical. Understandably, instructors try to eliminate this kind of unethical behavior from their courses. But what if they designed their assignments and exams in such a way that students would find no reason to cheat? The authors think that it is possible, at…

  12. Plagiarism: What's the Big Deal?

    ERIC Educational Resources Information Center

    Hansen, Brittney; Stith, Danica; Tesdell, Lee S.

    2011-01-01

    In academic culture, plagiarism is considered to be a form of cheating and therefore unethical. Understandably, instructors try to eliminate this kind of unethical behavior from their courses. But what if they designed their assignments and exams in such a way that students would find no reason to cheat? The authors think that it is possible, at…

  13. Plagiarism: Can It Be Stopped?

    ERIC Educational Resources Information Center

    Christensen, G. Jay

    2011-01-01

    Plagiarism can be controlled, not stopped. The more appropriate question to ask is: What can be done to encourage students to "cheat" correctly by doing the assignment the way it was intended? Cheating by college students continues to reach epidemic proportions on selected campuses, as witnessed by the recent episode at Central Florida University,…

  14. Pluralizing Plagiarism: Identities, Contexts, Pedagogies

    ERIC Educational Resources Information Center

    Howard, Rebecca Moore; Robillard, Amy

    2008-01-01

    Recent cases have demonstrated that plagiarism is a hot-button issue. It is also pervasive, occurring in universities, four-year colleges, community colleges, secondary schools, graduate programs, international classrooms, multicultural classrooms, writing centers, writing-across-the-curriculum programs, scholarly publications and the popular…

  15. How to Verify Plagiarism of the Paper Written in Macedonian and Translated in Foreign Language?

    PubMed Central

    Spiroski, Mirko

    2016-01-01

    AIM: The aim of this study was to show how to verify plagiarism of the paper written in Macedonian and translated in foreign language. MATERIAL AND METHODS: Original article “Ethics in Medical Research Involving Human Subjects”, written in Macedonian, was submitted as an assay-2 for the subject Ethics and published by Ilina Stefanovska, PhD candidate from the Iustinianus Primus Faculty of Law, Ss Cyril and Methodius University of Skopje (UKIM), Skopje, Republic of Macedonia in Fabruary, 2013. Suspected article for plagiarism was published by Prof. Dr. Gordana Panova from the Faculty of Medical Sciences, University Goce Delchev, Shtip, Republic of Macedonia in English with the identical title and identical content in International scientific on-line journal “SCIENCE & TECHNOLOGIES”, Publisher “Union of Scientists - Stara Zagora”. RESULTS: Original document (written in Macedonian) was translated with Google Translator; suspected article (published in English pdf file) was converted into Word document, and compared both documents with several programs for plagiarism detection. It was found that both documents are identical in 71%, 78% and 82%, respectively, depending on the computer program used for plagiarism detection. It was obvious that original paper was entirely plagiarised by Prof. Dr. Gordana Panova, including six references from the original paper. CONCLUSION: Plagiarism of the original papers written in Macedonian and translated in other languages can be verified after computerised translation in other languages. Later on, original and translated documents can be compared with available software for plagiarism detection. PMID:27275319

  16. CrossCheck plagiarism screening : Experience of the Journal of Epidemiology

    NASA Astrophysics Data System (ADS)

    Hashimoto, Katsumi

    Due to technological advances in the past two decades, researchers now have unprecedented access to a tremendous amount of useful information. However, because of the extreme pressure to publish, this abundance of information can sometimes tempt researchers to commit scientific misconduct. A serious form of such misconduct is plagiarism. Editors are always concerned about the possibility of publishing plagiarized manuscripts. The plagiarism detection tool CrossCheck allows editors to scan and analyze manuscripts effectively. The Journal of Epidemiology took part in a trial of CrossCheck, and this article discusses the concerns journal editors might have regarding the use of CrossCheck and its analysis. In addition, potential problems identified by CrossCheck, including self-plagiarism, are introduced.

  17. Penguins and Plagiarism: Stemming the Tide of Plagiarism in Elementary School

    ERIC Educational Resources Information Center

    Mitchell, Sara

    2007-01-01

    Plagiarism is on the rise on high school and college campuses. There are many reasons why students tend to plagiarize. One of these is that many students are interested in the shortest possible route through a course. Some students also fear that their writing ability is inadequate. If student plagiarism and lack of academic integrity are…

  18. Penguins and Plagiarism: Stemming the Tide of Plagiarism in Elementary School

    ERIC Educational Resources Information Center

    Mitchell, Sara

    2007-01-01

    Plagiarism is on the rise on high school and college campuses. There are many reasons why students tend to plagiarize. One of these is that many students are interested in the shortest possible route through a course. Some students also fear that their writing ability is inadequate. If student plagiarism and lack of academic integrity are…

  19. Local graph regularized coding for salient object detection

    NASA Astrophysics Data System (ADS)

    Huo, Lina; Yang, Shuyuan; Jiao, Licheng; Wang, Shuang; Shi, Jiao

    2016-07-01

    Subspace segmentation based salient object detection has received increasing interests in recent years. To preserve the locality and similarity of regions, a grouping effect of representation is introduced to segment the salient object and background in subspace. Then a new saliency map is calculated by incorporating this local graph regularizer into coding, which explicitly explores the data self-representation model and thus locate more accurate salient regions. Moreover, a heuristic object-based dictionary from background superpixels is obtained in border set removing the image regions within the potential object regions. Experimental results on four large benchmark databases demonstrate that the proposed method performs favorably against eight recent state-of-the-art methods in terms of three evaluation criterions, with a reduction of MAE by 19.8% than GR and 29.3% than CB in the two SED datasets, respectively. Meanwhile, our method also runs faster than the comparative detection approaches.

  20. Measuring students' perceptions of plagiarism: modification and Rasch validation of a plagiarism attitude scale.

    PubMed

    Howard, Steven J; Ehrich, John F; Walton, Russell

    2014-01-01

    Plagiarism is a significant area of concern in higher education, given university students' high self-reported rates of plagiarism. However, research remains inconsistent in prevalence estimates and suggested precursors of plagiarism. This may be a function of the unclear psychometric properties of the measurement tools adopted. To investigate this, we modified an existing plagiarism scale (to broaden its scope), established its psychometric properties using traditional (EFA, Cronbach's alpha) and modern (Rasch analysis) survey evaluation approaches, and examined results of well-functioning items. Results indicated that traditional and modern psychometric approaches differed in their recommendations. Further, responses indicated that although most respondents acknowledged the seriousness of plagiarism, these attitudes were neither unanimous nor consistent across the range of issues assessed. This study thus provides rigorous psychometric testing of a plagiarism attitude scale and baseline data from which to begin a discussion of contextual, personal, and external factors that influence students' plagiarism attitudes.

  1. Plagiarism in nursing education: an integrative review.

    PubMed

    Lynch, Joan; Everett, Bronwyn; Ramjan, Lucie M; Callins, Renee; Glew, Paul; Salamonson, Yenna

    2017-10-01

    To identify the prevalence and antecedents of plagiarism within nursing education and approaches to prevention and management. There has been growing media attention highlighting the prevalence of plagiarism in universities, including the academic integrity of undergraduate nursing students. A breach of academic integrity among nursing students also raises further concern with the potential transfer of this dishonest behaviour to the clinical setting. Integrative review. A systematic search of five electronic databases including CINAHL, MEDLINE, SCOPUS, ProQuest Nursing & Allied Health Source, and ERIC was undertaken. Only primary studies related to plagiarism and nursing students (undergraduate or postgraduate) studying at a tertiary education institution or nursing faculty were included. Both qualitative and quantitative study designs were included. Twenty studies were included in this review with six key themes identified: (1) prevalence; (2) knowledge, understanding and attitudes; (3) types of plagiarism; (4) antecedents to plagiarism; (5) interventions to reduce or prevent plagiarism; and (6) the relationship between academic honesty and professional integrity. Plagiarism is common among university nursing students, with a difference in perception of this behaviour between students and academics. The review also highlighted the importance of distinguishing between inadvertent and deliberate plagiarism, with differing strategies suggested to address this behaviour. Nevertheless, interventions to reduce plagiarism have not been shown to be effective. The current punitive approach to plagiarism within nursing faculties has not reduced its occurrence. There is a need to promote awareness, knowledge and provide students with the appropriate referencing skills, to reduce the significant amount of inadvertent plagiarism. The importance of promoting honesty and academic integrity in nursing education is highlighted. Cheating within the academic setting has been

  2. [Is there protection against copying? Thoughts about plagiarism].

    PubMed

    Schubert, András; Glänzel, Wolfgang

    2015-12-13

    There are at least two reasons why more and more cases of suspected plagiarism are perceived in the scientific literature. On one hand, the ever increasing pressure for publication makes it easier for authors, reviewers and editors to infringe or overlook this serious ethical misdemeanor; on the other hand, with the development of text analysis software, detecting text similarities has become a simple task. The judgement of actual cases, however, requires well-grounded professional knowledge and prudent human decisions.

  3. Coded-aperture Raman imaging for standoff explosive detection

    NASA Astrophysics Data System (ADS)

    McCain, Scott T.; Guenther, B. D.; Brady, David J.; Krishnamurthy, Kalyani; Willett, Rebecca

    2012-06-01

    This paper describes the design of a deep-UV Raman imaging spectrometer operating with an excitation wavelength of 228 nm. The designed system will provide the ability to detect explosives (both traditional military explosives and home-made explosives) from standoff distances of 1-10 meters with an interrogation area of 1 mm x 1 mm to 200 mm x 200 mm. This excitation wavelength provides resonant enhancement of many common explosives, no background fluorescence, and an enhanced cross-section due to the inverse wavelength scaling of Raman scattering. A coded-aperture spectrograph combined with compressive imaging algorithms will allow for wide-area interrogation with fast acquisition rates. Coded-aperture spectral imaging exploits the compressibility of hyperspectral data-cubes to greatly reduce the amount of acquired data needed to interrogate an area. The resultant systems are able to cover wider areas much faster than traditional push-broom and tunable filter systems. The full system design will be presented along with initial data from the instrument. Estimates for area scanning rates and chemical sensitivity will be presented. The system components include a solid-state deep-UV laser operating at 228 nm, a spectrograph consisting of well-corrected refractive imaging optics and a reflective grating, an intensified solar-blind CCD camera, and a high-efficiency collection optic.

  4. Experiences of experts about the instances of plagiarism

    PubMed Central

    Keyvanara, Mahmod; Ojaghi, Rezvan; Sohrabi, Mozafar Cheshmeh; Papi, Ahmad

    2013-01-01

    Introduction: Plagiarism is defined as intentional deceiving or lack of honesty, which deprives others from both material and spiritual possessions. Ethics is considered as one of the most important aspects of evaluating the quality of higher education. Moreover, scientific ethics should be reflected from university values, as a specialized institution, rather than being a reflection of the others cares. Therefore, the main aim of the present study is explore of expert experiences about plagiarism in Isfahan University of Medical Sciences. Materials and Methods: This study employed qualitative method with using in-deep interview. The research participants consisted of 21, who tend to this work. Semi structure interview were conducted and recorded. The method of analyzing data was ‘thematic analysis’. The data were transcribed and saved on computer after each interview. Themes and sub-themes were extracted. Finally, relevant sub-themes were arranged in a category and suggested were presented. Result: Analyzing data showed 600 primary codes, 40 sub-themes and 6 themes. The main themes included repeated works, non-normative adoption, non-normative adaptation, shares distribution, forging, and profit-seeking, each of which consisted of one or several subgroups. Conclusion: The findings of this study show that since, there are numerous ways of cheating, the universities’ research committees must create institutions in order to educate the individuals how to avoid plagiarism. In addition, providing information about different types of scientific violations, as well as their following punishments might lead to the decrease of such misbehaviors. PMID:24083282

  5. Experiences of experts about the instances of plagiarism.

    PubMed

    Keyvanara, Mahmod; Ojaghi, Rezvan; Sohrabi, Mozafar Cheshmeh; Papi, Ahmad

    2013-01-01

    Plagiarism is defined as intentional deceiving or lack of honesty, which deprives others from both material and spiritual possessions. Ethics is considered as one of the most important aspects of evaluating the quality of higher education. Moreover, scientific ethics should be reflected from university values, as a specialized institution, rather than being a reflection of the others cares. Therefore, the main aim of the present study is explore of expert experiences about plagiarism in Isfahan University of Medical Sciences. This study employed qualitative method with using in-deep interview. The research participants consisted of 21, who tend to this work. Semi structure interview were conducted and recorded. The method of analyzing data was 'thematic analysis'. The data were transcribed and saved on computer after each interview. Themes and sub-themes were extracted. Finally, relevant sub-themes were arranged in a category and suggested were presented. Analyzing data showed 600 primary codes, 40 sub-themes and 6 themes. The main themes included repeated works, non-normative adoption, non-normative adaptation, shares distribution, forging, and profit-seeking, each of which consisted of one or several subgroups. The findings of this study show that since, there are numerous ways of cheating, the universities' research committees must create institutions in order to educate the individuals how to avoid plagiarism. In addition, providing information about different types of scientific violations, as well as their following punishments might lead to the decrease of such misbehaviors.

  6. Judging Plagiarism: A Problem of Morality and Convention

    ERIC Educational Resources Information Center

    East, Julianne

    2010-01-01

    This paper considers the problem of plagiarism as an issue of morality. Outrage about student plagiarism in universities positions it as dishonesty and a transgression of standards. Despite this, there has been little work analysing the implications of positioning plagiarism as a moral matter in the making of judgments about plagiarism and…

  7. Judging Plagiarism: A Problem of Morality and Convention

    ERIC Educational Resources Information Center

    East, Julianne

    2010-01-01

    This paper considers the problem of plagiarism as an issue of morality. Outrage about student plagiarism in universities positions it as dishonesty and a transgression of standards. Despite this, there has been little work analysing the implications of positioning plagiarism as a moral matter in the making of judgments about plagiarism and…

  8. An ELT's Solution to Combat Plagiarism: "Birth" of CALL.

    ERIC Educational Resources Information Center

    Sabieh, Christine

    One English-as-a Second-Language professor fought plagiarism using computer assisted language learning (CALL). She succeeded in getting half of her class to write documented research papers free of plagiarism. Although all of the students claimed to know how to avoid plagiarizing, 35 percent presented the work with minor traces of plagiarism. The…

  9. Online Plagiarism Training Falls Short in Biology Classrooms

    ERIC Educational Resources Information Center

    Holt, Emily A.; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework…

  10. Online Plagiarism Training Falls Short in Biology Classrooms

    ERIC Educational Resources Information Center

    Holt, Emily A.; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework…

  11. Plagiarism: Presenting Someone Else's Creation as One's Own.

    ERIC Educational Resources Information Center

    Hiestand, Mike

    1994-01-01

    Explains that "plagiarism" does not have a commonly agreed-upon definition. Claims that plagiarism is not a legal term. Describes plagiarism as a term for an academic crime, for which each institution has its own definition. Notes that copyright law (a crime with a specific legal definition) is a cousin of plagiarism. (PA)

  12. Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3

    NASA Technical Reports Server (NTRS)

    Fujiwara, Toru; Kasami, Tadao; Lin, Shu

    1989-01-01

    The error-detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3 are investigated. These codes are also used for error detection in the data link layer of the Ethernet, a local area network. The weight distributions for various code lengths are calculated to obtain the probability of undetectable error and that of detectable error for a binary symmetric channel with bit-error rate between 0.00001 and 1/2.

  13. Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3

    NASA Technical Reports Server (NTRS)

    Fujiwara, Toru; Kasami, Tadao; Lin, Shu

    1989-01-01

    The error-detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3 are investigated. These codes are also used for error detection in the data link layer of the Ethernet, a local area network. The weight distributions for various code lengths are calculated to obtain the probability of undetectable error and that of detectable error for a binary symmetric channel with bit-error rate between 0.00001 and 1/2.

  14. Methodology for fast detection of false sharing in threaded scientific codes

    DOEpatents

    Chung, I-Hsin; Cong, Guojing; Murata, Hiroki; Negishi, Yasushi; Wen, Hui-Fang

    2014-11-25

    A profiling tool identifies a code region with a false sharing potential. A static analysis tool classifies variables and arrays in the identified code region. A mapping detection library correlates memory access instructions in the identified code region with variables and arrays in the identified code region while a processor is running the identified code region. The mapping detection library identifies one or more instructions at risk, in the identified code region, which are subject to an analysis by a false sharing detection library. A false sharing detection library performs a run-time analysis of the one or more instructions at risk while the processor is re-running the identified code region. The false sharing detection library determines, based on the performed run-time analysis, whether two different portions of the cache memory line are accessed by the generated binary code.

  15. Decreasing Plagiarism Using Critical Thinking Skills.

    ERIC Educational Resources Information Center

    Hall, Ann W.

    A practicum project emphasizing critical thinking skills was undertaken in an eighth grade history class to make students aware of the nature and seriousness of plagiarism. The 10-week unit was preceded by a reading comprehension test and an essay assignment on a major Civil War battle. Plagiarized portions of the essays were highlighted and the…

  16. Scientific Misconduct and the Plagiarism Cases.

    ERIC Educational Resources Information Center

    Parrish, Debra

    1995-01-01

    Discussion of scientific misconduct, particularly plagiarism, explores the legal issues and compares the processes by which the Office of Research Integrity and the National Science Foundation conduct investigations and evaluate misconduct allegations. Relationships between allegations of plagiarism, copyright infringement, and theft of…

  17. Chinese University EFL Teachers' Perceptions of Plagiarism

    ERIC Educational Resources Information Center

    Lei, Jun; Hu, Guangwei

    2015-01-01

    Although Chinese university students' perceptions of plagiarism have been extensively investigated, those of their teachers have been surprisingly under-researched. This study sought to address this gap by investigating 112 Chinese university English teachers' knowledge of and attitudes towards plagiarism. While 57 participating teachers had…

  18. Exploring Staff Perceptions of Student Plagiarism

    ERIC Educational Resources Information Center

    Flint, Abbi; Clegg, Sue; Macdonald, Ranald

    2006-01-01

    This paper presents analysis of qualitative data from a research project looking at staff perceptions of plagiarism at a post-1992 university. Twenty-six members of staff from departments and academic schools from across the university took part in open and semi-structured interviews. Analysis shows that variable definitions of plagiarism exist;…

  19. Plagiarism in Second-Language Writing

    ERIC Educational Resources Information Center

    Pecorari, Diane; Petric, Bojana

    2014-01-01

    Plagiarism is a broad and multidisciplinary field of study, and within second-language (L2) writing, research on the topic goes back to the mid-1980s. In this review article we first discuss the received view of plagiarism as a transgressive act and alternative understandings which have been presented in the L1 and L2 writing literature. We then…

  20. Chinese University EFL Teachers' Perceptions of Plagiarism

    ERIC Educational Resources Information Center

    Lei, Jun; Hu, Guangwei

    2015-01-01

    Although Chinese university students' perceptions of plagiarism have been extensively investigated, those of their teachers have been surprisingly under-researched. This study sought to address this gap by investigating 112 Chinese university English teachers' knowledge of and attitudes towards plagiarism. While 57 participating teachers had…

  1. Plagiarism in Second-Language Writing

    ERIC Educational Resources Information Center

    Pecorari, Diane; Petric, Bojana

    2014-01-01

    Plagiarism is a broad and multidisciplinary field of study, and within second-language (L2) writing, research on the topic goes back to the mid-1980s. In this review article we first discuss the received view of plagiarism as a transgressive act and alternative understandings which have been presented in the L1 and L2 writing literature. We then…

  2. Plagiarisms, Authorships, and the Academic Death Penalty.

    ERIC Educational Resources Information Center

    Howard, Rebecca Moore

    1995-01-01

    Suggests a plagiarism policy that would respect present concerns and discipline but would allow for an enlarged range of definitions of and motivations for plagiarism. Brings to bear contemporary theoretical approaches that take issue with authoring as an autonomous, individual, original act. (TB)

  3. Plagiarisms, Authorships, and the Academic Death Penalty.

    ERIC Educational Resources Information Center

    Howard, Rebecca Moore

    1995-01-01

    Suggests a plagiarism policy that would respect present concerns and discipline but would allow for an enlarged range of definitions of and motivations for plagiarism. Brings to bear contemporary theoretical approaches that take issue with authoring as an autonomous, individual, original act. (TB)

  4. Viewpoint of Undergraduate Engineering Students on Plagiarism

    ERIC Educational Resources Information Center

    Starovoytova, Diana; Namango, Saul Sitati

    2016-01-01

    Undoubtedly, plagiarism has been a global concern, especially so, in institutions of higher learning. Furthermore, over the past decades, cases of student plagiarism, in higher education, have increased, substantially. This issue cannot be taken, without due consideration, and it is crucial for educators, and universities, at large, to find the…

  5. The challenges for scientists in avoiding plagiarism.

    PubMed

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required.

  6. JOURNAL CLUB: Plagiarism in Manuscripts Submitted to the AJR: Development of an Optimal Screening Algorithm and Management Pathways.

    PubMed

    Taylor, Donna B

    2017-04-01

    The objective of this study was to investigate the incidence of plagiarism in a sample of manuscripts submitted to the AJR using CrossCheck, develop an algorithm to identify significant plagiarism, and formulate management pathways. A sample of 110 of 1610 (6.8%) manuscripts submitted to AJR in 2014 in the categories of Original Research or Review were analyzed using CrossCheck and manual assessment. The overall similarity index (OSI), highest similarity score from a single source, whether duplication was from single or multiple origins, journal section, and presence or absence of referencing the source were recorded. The criteria outlined by the International Committee of Medical Journal Editors were the reference standard for identifying manuscripts containing plagiarism. Statistical analysis was used to develop a screening algorithm to maximize sensitivity and specificity for the detection of plagiarism. Criteria for defining the severity of plagiarism and management pathways based on the severity of the plagiarism were determined. Twelve manuscripts (10.9%) contained plagiarism. Nine had an OSI excluding quotations and references of less than 20%. In seven, the highest similarity score from a single source was less than 10%. The highest similarity score from a single source was the work of the same author or authors in nine. Common sections for duplication were the Materials and Methods, Discussion, and abstract. Referencing the original source was lacking in 11. Plagiarism was undetected at submission in five of these 12 articles; two had been accepted for publication. The most effective screening algorithm was to average the OSI including quotations and references and the highest similarity score from a single source and to submit manuscripts with an average value of more than 12% for further review. The current methods for detecting plagiarism are suboptimal. A new screening algorithm is proposed.

  7. Error Detecting and Error Correcting Codes: The New Mathematics of Shopping.

    ERIC Educational Resources Information Center

    Stacey, Kaye

    1998-01-01

    Outlines the embedded mathematics in which important but hidden calculations are being done for communications in commerce. Explains two key concepts, error detecting codes and error correcting codes. Illustrates these ideas using two familiar examples, barcodes and ISBN numbers. (ASK)

  8. Evaluation and Testing of the ADVANTG Code on SNM Detection

    SciTech Connect

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; Hayes, John W.

    2013-09-24

    Pacific Northwest National Laboratory (PNNL) has been tasked with evaluating the effectiveness of ORNL’s new hybrid transport code, ADVANTG, on scenarios of interest to our NA-22 sponsor, specifically of detection of diversion of special nuclear material (SNM). PNNL staff have determined that acquisition and installation of ADVANTG was relatively straightforward for a code in its phase of development, but probably not yet sufficient for mass distribution to the general user. PNNL staff also determined that with little effort, ADVANTG generated weight windows that typically worked for the problems and generated results consistent with MCNP. With slightly greater effort of choosing a finer mesh around detectors or sample reaction tally regions, the figure of merit (FOM) could be further improved in most cases. This does take some limited knowledge of deterministic transport methods. The FOM could also be increased by limiting the energy range for a tally to the energy region of greatest interest. It was then found that an MCNP run with the full energy range for the tally showed improved statistics in the region used for the ADVANTG run. The specific case of interest chosen by the sponsor is the CIPN project from Las Alamos National Laboratory (LANL), which is an active interrogation, non-destructive assay (NDA) technique to quantify the fissile content in a spent fuel assembly and is also sensitive to cases of material diversion. Unfortunately, weight windows for the CIPN problem cannot currently be properly generated with ADVANTG due to inadequate accommodations for source definition. ADVANTG requires that a fixed neutron source be defined within the problem and cannot account for neutron multiplication. As such, it is rendered useless in active interrogation scenarios. It is also interesting to note that this is a difficult problem to solve and that the automated weight windows generator in MCNP actually slowed down the problem. Therefore, PNNL had determined

  9. A dual-sided coded-aperture radiation detection system

    NASA Astrophysics Data System (ADS)

    Penny, R. D.; Hood, W. E.; Polichar, R. M.; Cardone, F. H.; Chavez, L. G.; Grubbs, S. G.; Huntley, B. P.; Kuharski, R. A.; Shyffer, R. T.; Fabris, L.; Ziock, K. P.; Labov, S. E.; Nelson, K.

    2011-10-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5×5×50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  10. Social influences on unconscious plagiarism and anti-plagiarism.

    PubMed

    Hollins, Timothy J; Lange, Nicholas; Dennis, Ian; Longmore, Christopher A

    2016-08-01

    People are more likely to unconsciously plagiarise ideas from a same-sex partner than a different-sex partner, and more likely to unconsciously plagiarise if recalling alone rather than in the presence of their partner [Macrae, C. N., Bodenhausen, G. V., & Calvini, G. (1999). Contexts of cryptomnesia: May the source be with you. Social Cognition, 17, 273-297. doi: 10.1521/soco.1999.17.3.273 ]. Two sets of experiments explore these phenomena, using extensions of the standard unconscious plagiarism paradigm. In Experiment 1A participants worked together in same- or different-sex dyads before trying to recall their own ideas or their partner's ideas. More source errors were evident for same-sex dyads (Experiment 1A), but this effect was absent when participants recalled from both sources simultaneously (Experiment 1B). In Experiment 2A, participants recalled ideas from a single source either alone or in the presence of the partner, using an extended-recall task. Partner presence did not affect the availability of ideas, but did reduce the propensity to report them as task compliant, relative to a partner-present condition. Simultaneous recall from both sources removed this social effect (Experiment 2B). Thus social influences on unconscious plagiarism are apparent, but are influenced by the salience of the alternate source at retrieval.

  11. Codon Distribution in Error-Detecting Circular Codes

    PubMed Central

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-01

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick’s hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C3 and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C3 codes to maximal self-complementary circular codes. PMID:26999215

  12. Codon Distribution in Error-Detecting Circular Codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-03-15

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick's hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C³ and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C(3) codes to maximal self-complementary circular codes.

  13. Principles of error detection and error correction codes

    NASA Technical Reports Server (NTRS)

    Perlman, M.

    1971-01-01

    Report is reviewed which considers theoretical basis of groups, rings, fields, and vector spaces, and their relationship to algebraic coding theory. Report serves as summary for engineers and scientists involved in data handling and processing systems.

  14. The Effects of GPS M-Code on Radar Detection

    DTIC Science & Technology

    2003-03-25

    abbreviated as BOC (10,5)). BOC modulation details are sufficiently covered in [5]. Mathematically the transmitted M-code signal can be written as...2 −1 0 1 2 Time (sec) S W (t ) P N 5( t) Figure 2.1 Example of the M-code PN Sequence 2-2 The main result of the BOC (10,5) modulation is that the...MHz) P ow er S pe ct ra l D en si ty ( dB W /H z) f c Figure 2.2 PSD of BOC (10,5) M-Code Modulation Figure 2.3 illustrates a comparison of the M-code

  15. Plagiarism: the Internet makes it easy.

    PubMed

    Logue, Roger

    This article examines the issue of plagiarism by nursing students and academics in British universities and highlights how electronic developments such as the Internet and word processing have made it easier. It describes how some websites support plagiarism and how, for a price, a qualification up to and including higher degree level may be gained without the recipient of the award having to do any coursework.

  16. Text-based plagiarism in scientific publishing: issues, developments and education.

    PubMed

    Li, Yongyan

    2013-09-01

    Text-based plagiarism, or copying language from sources, has recently become an issue of growing concern in scientific publishing. Use of CrossCheck (a computational text-matching tool) by journals has sometimes exposed an unexpected amount of textual similarity between submissions and databases of scholarly literature. In this paper I provide an overview of the relevant literature, to examine how journal gatekeepers perceive textual appropriation, and how automated plagiarism-screening tools have been developed to detect text matching, with the technique now available for self-check of manuscripts before submission; I also discuss issues around English as an additional language (EAL) authors and in particular EAL novices being the typical offenders of textual borrowing. The final section of the paper proposes a few educational directions to take in tackling text-based plagiarism, highlighting the roles of the publishing industry, senior authors and English for academic purposes professionals.

  17. Bar Coding Platforms for Nucleic Acid and Protein Detection

    NASA Astrophysics Data System (ADS)

    Müller, Uwe R.

    A variety of novel bar coding systems has been developed as multiplex testing platforms for applications in biological, chemical, and biomedical diagnostics. Instead of identifying a target through capture at a specific locus on an array, target analytes are captured by a bar coded tag, which then uniquely identifies the target, akin to putting a UPC bar code on a product. This requires an appropriate surface functionalization to ensure that the correct target is captured with high efficiency. Moreover the tag, or bar code, has to be readable with minimal error and at high speed, typically by flow analysis. For quantitative assays the target may be labeled separately, or the tag may also serve as the label. A great variety of materials and physicochemical principles has been exploited to generate this plethora of novel bar coding platforms. Their advantages compared to microarray-based assay platforms include in-solution binding kinetics, flexibility in assay design, compatibility with microplate-based assay automation, high sample throughput, and with some assay formats, increased sensitivity.

  18. "You Fail": Plagiarism, the Ownership of Writing, and Transnational Conflicts

    ERIC Educational Resources Information Center

    Lyon, Arabella

    2009-01-01

    Responding to cultural concerns about the ownership of writing and the nature of plagiarism, this article examines discourses about plagiarism by ESL students and argues for a plurality of approaches to understanding the ownership of language and textual appropriation. First, it uses speech act theory to explain the dynamics of plagiarism; second,…

  19. Technology Enhanced Learning and Plagiarism in Entrepreneurship Education

    ERIC Educational Resources Information Center

    Risquez, Angelica; O'Dwyer, Michele; Ledwith, Ann

    2011-01-01

    Purpose: This paper seeks to explore the relationship between entrepreneurship students' ethical views on plagiarism, their self reported engagement in plagiarism and their participation in an online plagiarism prevention tutorial. Design/methodology/approach: The study is based on a questionnaire administered to 434 undergraduate university…

  20. Inoculating against Pro-Plagiarism Justifications: Rational and Affective Strategies

    ERIC Educational Resources Information Center

    Compton, Josh; Pfau, Michael

    2008-01-01

    Student plagiarism continues to threaten academic integrity. This investigation assessed whether an inoculation message strategy could combat university plagiarism by protecting student attitudes against pro-plagiarism justification arguments. Additionally, we sought theoretical confirmation of previous findings on involvement and accessibility in…

  1. Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing

    ERIC Educational Resources Information Center

    Bakhtiyari, Kaveh; Salehi, Hadi; Embi, Mohamed Amin; Shakiba, Masoud; Zavvari, Azam; Shahbazi-Moghadam, Masoomeh; Ebrahim, Nader Ale; Mohammadjafari, Marjan

    2014-01-01

    This paper discusses plagiarism origins, and the ethical solutions to prevent it. It also reviews some unethical approaches, which may be used to decrease the plagiarism rate in academic writings. We propose eight ethical techniques to avoid unconscious and accidental plagiarism in manuscripts without using online systems such as Turnitin and/or…

  2. Perceptions about Plagiarism between Faculty and Undergraduate Students

    ERIC Educational Resources Information Center

    Pritchett, Serene

    2010-01-01

    The problem. Through observation and the review of literature, students often receive inconsistent and vague messages about plagiarism from faculty. Marcoux (2002) and Roig (2001) found a lack of consensus between faculty concerning definitions and forms of plagiarism. Although some students develop skills in order to avoid plagiarism, almost half…

  3. Technology Enhanced Learning and Plagiarism in Entrepreneurship Education

    ERIC Educational Resources Information Center

    Risquez, Angelica; O'Dwyer, Michele; Ledwith, Ann

    2011-01-01

    Purpose: This paper seeks to explore the relationship between entrepreneurship students' ethical views on plagiarism, their self reported engagement in plagiarism and their participation in an online plagiarism prevention tutorial. Design/methodology/approach: The study is based on a questionnaire administered to 434 undergraduate university…

  4. Perceptions about Plagiarism between Faculty and Undergraduate Students

    ERIC Educational Resources Information Center

    Pritchett, Serene

    2010-01-01

    The problem. Through observation and the review of literature, students often receive inconsistent and vague messages about plagiarism from faculty. Marcoux (2002) and Roig (2001) found a lack of consensus between faculty concerning definitions and forms of plagiarism. Although some students develop skills in order to avoid plagiarism, almost half…

  5. Failure To Teach: Due Process and Law School Plagiarism.

    ERIC Educational Resources Information Center

    LeClercq, Terri

    1999-01-01

    Reports on a survey of 177 law schools which identified widespread institutional indifference to plagiarism and large disparities in law schools' definitions of and punishments for plagiarism. Finds law schools have failed to teach students the rudiments of proper attribution and offers a definition of plagiarism, suggested disciplinary sanctions,…

  6. The Issue of (Software) Plagiarism: A Student View

    ERIC Educational Resources Information Center

    Chuda, D.; Navrat, P.; Kovacova, B.; Humay, P.

    2012-01-01

    The issue of plagiarism is discussed in the context of university education in disciplines related to computing. The focus is therefore mainly on software plagiarism. First, however, a case is made for the claim that the most important reason that plagiarism cannot be tolerated lies in the essence of the concept of a university as it is rooted in…

  7. Rational Ignorance in Education: A Field Experiment in Student Plagiarism

    ERIC Educational Resources Information Center

    Dee, Thomas S.; Jacob, Brian A.

    2012-01-01

    Plagiarism appears to be a common problem among college students, yet there is little evidence on the effectiveness of interventions designed to minimize plagiarism. This study presents the results of a field experiment that evaluated the effects of a web-based educational tutorial in reducing plagiarism. We found that assignment to the treatment…

  8. "You Fail": Plagiarism, the Ownership of Writing, and Transnational Conflicts

    ERIC Educational Resources Information Center

    Lyon, Arabella

    2009-01-01

    Responding to cultural concerns about the ownership of writing and the nature of plagiarism, this article examines discourses about plagiarism by ESL students and argues for a plurality of approaches to understanding the ownership of language and textual appropriation. First, it uses speech act theory to explain the dynamics of plagiarism; second,…

  9. Rational Ignorance in Education: A Field Experiment in Student Plagiarism

    ERIC Educational Resources Information Center

    Dee, Thomas S.; Jacob, Brian A.

    2012-01-01

    Plagiarism appears to be a common problem among college students, yet there is little evidence on the effectiveness of interventions designed to minimize plagiarism. This study presents the results of a field experiment that evaluated the effects of a web-based educational tutorial in reducing plagiarism. We found that assignment to the treatment…

  10. Understanding Plagiarism and How It Differs from Copyright Infringement

    ERIC Educational Resources Information Center

    Dames, K. Matthew

    2007-01-01

    Plagiarism has become the new piracy. Just as piracy was a few years ago, plagiarism has become the hot, new crime du jour--an act that suggests immorality and often scandal at once. What's more, plagiarism allegations feed into the society's "Candid Camera" mentality--the seemingly insatiable need to uncover wrongdoing. One of the biggest…

  11. Inoculating against Pro-Plagiarism Justifications: Rational and Affective Strategies

    ERIC Educational Resources Information Center

    Compton, Josh; Pfau, Michael

    2008-01-01

    Student plagiarism continues to threaten academic integrity. This investigation assessed whether an inoculation message strategy could combat university plagiarism by protecting student attitudes against pro-plagiarism justification arguments. Additionally, we sought theoretical confirmation of previous findings on involvement and accessibility in…

  12. The Crime of Plagiarism: A Critique of Literary Property Law.

    ERIC Educational Resources Information Center

    Hatch, Gary Layne

    Understanding the history of plagiarism may put scholars in a position to define plagiarism more precisely and to decide plagiarism disputes involving students and scholars more fairly. The origins of literary property are found in ritual and religious drama. In classical Greece and Rome, literary property began to hold some value for the author.…

  13. The Issue of (Software) Plagiarism: A Student View

    ERIC Educational Resources Information Center

    Chuda, D.; Navrat, P.; Kovacova, B.; Humay, P.

    2012-01-01

    The issue of plagiarism is discussed in the context of university education in disciplines related to computing. The focus is therefore mainly on software plagiarism. First, however, a case is made for the claim that the most important reason that plagiarism cannot be tolerated lies in the essence of the concept of a university as it is rooted in…

  14. Examining Students' Perceptions of Plagiarism: A Cross-Cultural Study at Tertiary Level

    ERIC Educational Resources Information Center

    Kayaoglu, M. Naci; Erbay, Sakire; Flitner, Cristina; Saltas, Dogan

    2016-01-01

    Plagiarism continues to dominate the academic world as one of its greatest challenges, and the existing literature suggests cross-cultural investigation of this critical issue may help all shareholders who detect, are confronted by and struggle with this issue to address it. Therefore, the present study, drawing upon a cross-cultural investigation…

  15. Using Anti-Plagiarism Software to Promote Academic Honesty in the Context of Peer Reviewed Assignments

    ERIC Educational Resources Information Center

    Ledwith, Ann; Risquez, Angelica

    2008-01-01

    A variety of free and commercial software applications designed to detect plagiarism from Internet sources has appeared in recent years. However, their effectiveness and impact on student behaviour has been assumed rather than confirmed. The study presented here explores the responses and perceptions of a group of first year students at an Irish…

  16. Using Anti-Plagiarism Software to Promote Academic Honesty in the Context of Peer Reviewed Assignments

    ERIC Educational Resources Information Center

    Ledwith, Ann; Risquez, Angelica

    2008-01-01

    A variety of free and commercial software applications designed to detect plagiarism from Internet sources has appeared in recent years. However, their effectiveness and impact on student behaviour has been assumed rather than confirmed. The study presented here explores the responses and perceptions of a group of first year students at an Irish…

  17. Examining Students' Perceptions of Plagiarism: A Cross-Cultural Study at Tertiary Level

    ERIC Educational Resources Information Center

    Kayaoglu, M. Naci; Erbay, Sakire; Flitner, Cristina; Saltas, Dogan

    2016-01-01

    Plagiarism continues to dominate the academic world as one of its greatest challenges, and the existing literature suggests cross-cultural investigation of this critical issue may help all shareholders who detect, are confronted by and struggle with this issue to address it. Therefore, the present study, drawing upon a cross-cultural investigation…

  18. An Approach for Detecting Inconsistencies between Behavioral Models of the Software Architecture and the Code

    SciTech Connect

    Ciraci, Selim; Sozer, Hasan; Tekinerdogan, Bedir

    2012-07-16

    In practice, inconsistencies between architectural documentation and the code might arise due to improper implementation of the architecture or the separate, uncontrolled evolution of the code. Several approaches have been proposed to detect the inconsistencies between the architecture and the code but these tend to be limited for capturing inconsistencies that might occur at runtime. We present a runtime verification approach for detecting inconsistencies between the dynamic behavior of the architecture and the actual code. The approach is supported by a set of tools that implement the architecture and the code patterns in Prolog, and support the automatic generation of runtime monitors for detecting inconsistencies. We illustrate the approach and the toolset for a Crisis Management System case study.

  19. Alamouti-Type Space-Time Coding for Free-Space Optical Communication with Direct Detection

    NASA Astrophysics Data System (ADS)

    Simon, M. K.; Vilnrotter, V.

    2003-11-01

    In optical communication systems employing direct detection at the receiver, intensity modulations such as on-off keying (OOK) or pulse-position modulation (PPM) are commonly used to convey the information. Consider the possibility of applying space-time coding in such a scenario, using, for example, an Alamouti-type coding scheme [1]. Implicit in the Alamouti code is the fact that the modulation that defines the signal set is such that it is meaningful to transmit and detect both the signal and its negative. While modulations such as phase-shift keying (PSK) and quadrature amplitude modulation (QAM) naturally fall into this class, OOK and PPM do not since the signal polarity (phase) would not be detected at the receiver. We investigate a modification of the Alamouti code to be used with such modulations that has the same desirable properties as the conventional Alamouti code but does not rely on the necessity of transmitting the negative of a signal.

  20. An accurate and reliable circular coded target detection algorithm for vision measurement

    NASA Astrophysics Data System (ADS)

    Chen, Ran; Zhong, Kai; Li, Zhongwei; Liu, Meng; Zhan, Guomin

    2016-11-01

    Distributing coded targets on the measured object is a reliable and common method for achieving optimum target location and accurate matching of corresponding targets among multi-view images. The circular coded targets which based on a central circular target surrounded by a coded band is widely used in vision measurement. However, it is difficult to decode the coded target while the number of pixels in the coded band is small or the projection angle is large. Aiming at solve this problem, a detection algorithm using the gray gradient to get the central angles of each coded section was proposed. In this algorithm, an accurate ellipse detection which can get sub-pixel locations was adopted to extract ellipse centers, and some false ellipses whose error in the fit of best fit is large will be rejected. Then, gray gradients in the coded band are calculated to get the central angle of each coded section, and the coded target will be decoded accurately. The experiment results show that the algorithm can locate and identify coded targets accurately under complex measurement conditions.

  1. International Perspectives on Plagiarism and Considerations for Teaching International Trainees

    PubMed Central

    Heitman, Elizabeth; Litewka, Sergio

    2010-01-01

    In the increasingly global community of biomedical science and graduate science education, many US academic researchers work with international trainees whose views on scientific writing and plagiarism can be strikingly different from US norms. Although a growing number of countries and international professional organizations identify plagiarism as research misconduct, many international trainees come from research environments where plagiarism is ill-defined and even commonly practiced. Two research-ethics educators consider current perspectives on plagiarism around the world and contend that US research-training programs should focus on trainees’ scientific writing skills and acculturation, not simply on preventing plagiarism. PMID:21194646

  2. International perspectives on plagiarism and considerations for teaching international trainees.

    PubMed

    Heitman, Elizabeth; Litewka, Sergio

    2011-01-01

    In the increasingly global community of biomedical science and graduate science education, many US academic researchers work with international trainees whose views on scientific writing and plagiarism can be strikingly different from US norms. Although a growing number of countries and international professional organizations identify plagiarism as research misconduct, many international trainees come from research environments where plagiarism is ill-defined and even commonly practiced. Two research-ethics educators consider current perspectives on plagiarism around the world and contend that US research-training programs should focus on trainees' scientific writing skills and acculturation, not simply on preventing plagiarism.

  3. Detecting Aspects of Critical Thinking by Cleaning Online Message Transcript through Code-Recode

    ERIC Educational Resources Information Center

    Oriogun, Peter K.

    2009-01-01

    In this article, the community of inquiry cognitive presence model was mapped to a recently developed semistructured approach to online discourse called SQUAD to detect aspects of critical or higher-order thinking online by cleaning online message transcript through the use of code-recode. It is argued that using code-recode in the way suggested…

  4. Flow-Based Detection of Bar Coded Particles

    SciTech Connect

    Rose, K A; Dougherty, G M; Santiago, J G

    2005-06-24

    We have developed methods for flow control, electric field alignment, and readout of colloidal Nanobarcodes{copyright}. Our flow-based detection scheme leverages microfluidics and alternate current (AC) electric fields to align and image particles in a well-defined image plane. Using analytical models of the particle rotation in electric fields we can optimize the field strength and frequency necessary to align the particles. This detection platform alleviates loss of information in solution-based assays due to particle clumping during detection.

  5. Plagiarism: A Shared Responsibility of All, Current Situation, and Future Actions in Yemen.

    PubMed

    Muthanna, Abdulghani

    2016-01-01

    As combating plagiarism is a shared responsibility of all, this article focuses on presenting the current situation of higher education in Yemen. The critical review of four implementable policy documents and interviews revealed the absence of research ethics code, research misconduct policy, and institutional policies in the country. This led to the presence of several acts of research dishonesty. The article concludes with an initiative for necessary future actions in the nation.

  6. Foreign-Educated Graduate Nursing Students and Plagiarism.

    PubMed

    Knowlton, Mary; Collins, Shawn Bryant

    2017-04-01

    Plagiarism is a concern related to students educated in countries other than the United States, where English is not the first language spoken. The authors' experience with plagiarism by a foreign-educated nursing student prompted an investigation into this topic. This article focuses on the occurrence of unintentional plagiarism, a common focus with foreign-educated students, addressing linguistic, as well as cultural, viewpoints. The findings from the literature on plagiarism among foreign-educated students are elicited and the article discusses strategies to help foreign-educated students learn about plagiarism and how to properly cite and reference sources. A variety of proactive strategies exist that can be used by both faculty and students to mitigate the occurrence of plagiarism by foreign-educated nursing students in higher education, starting with a clearer understanding of some of the antecedents to the problem of plagiarism. [J Nurs Educ. 2017;56(4):211-214.]. Copyright 2017, SLACK Incorporated.

  7. Different hue coding underlying figure segregation and region detection tasks.

    PubMed

    Nagai, Takehiro; Uchikawa, Keiji

    2009-08-28

    Figure segregation from its background is one of the important functions of color vision for our visual system because it is a preliminary to shape recognition. However, little is known about the chromatic mechanisms underlying figure segregation as opposed to those underlying mere color discrimination and detection. We investigated whether there are differences in color difference thresholds between a shape discrimination task (involving figure segregation) and a simple region detection task. In the shape discrimination task the observer discriminated the shapes of two figures, which could be segregated from their background on the basis of a color direction (hue) difference. In the region detection task the observer simply detected a square region against its background. Thresholds of color direction differences from a range of background color directions were measured for each task. In addition, we added saturation variation in one condition to investigate the involvement of the cone-opponent channels in those tasks. First, the results showed that the saturation variation increased the thresholds evenly for all background color directions. This suggests that higher-order color mechanisms rather than the early cone-opponent mechanisms are involved in both of the two tasks. Second, the shapes of the background color direction-threshold functions were different between the two tasks and these shape differences were consistent across all observers. This finding suggests that hue information may be encoded differently for shape discrimination and region detection. Furthermore, differences in spatial frequency components and in the requirement for orientation extraction rarely affected the shapes of the threshold functions in additional experiments, suggesting the possibility that hue encoding for shape discrimination differs from encoding for region detection at a late stage of form processing where local orientation signals are globally integrated.

  8. Avoiding plagiarism: guidance for nursing students.

    PubMed

    Price, Bob

    The pressures of study, diversity of source materials, past assumptions relating to good writing practice, ambiguous writing guidance on best practice and students' insecurity about their reasoning ability, can lead to plagiarism. With the use of source checking software, there is an increased chance that plagiarised work will be identified and investigated, and penalties given. In extreme cases, plagiarised work may be reported to the Nursing and Midwifery Council and professional as well as academic penalties may apply. This article provides information on how students can avoid plagiarism when preparing their coursework for submission.

  9. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-04-01

    From the Board of Editors: on Plagiarism

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission: Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism

  10. Multiplexed fluorescence readout using time responses of color coded signals for biomolecular detection

    PubMed Central

    Nishimura, Takahiro; Ogura, Yusuke; Tanida, Jun

    2016-01-01

    Fluorescence readout is an important technique for detecting biomolecules. In this paper, we present a multiplexed fluorescence readout method using time varied fluorescence signals. To generate the fluorescence signals, coded strands and a set of universal molecular beacons are introduced. Each coded strand represents the existence of an assigned target molecule. The coded strands have coded sequences to generate temporary fluorescence signals through binding to the molecular beacons. The signal generating processes are modeled based on the reaction kinetics between the coded strands and molecular beacons. The model is used to decode the detected fluorescence signals using maximum likelihood estimation. Multiplexed fluorescence readout was experimentally demonstrated with three molecular beacons. Numerical analysis showed that the readout accuracy was enhanced by the use of time-varied fluorescence signals. PMID:28018742

  11. Multiplexed fluorescence readout using time responses of color coded signals for biomolecular detection.

    PubMed

    Nishimura, Takahiro; Ogura, Yusuke; Tanida, Jun

    2016-12-01

    Fluorescence readout is an important technique for detecting biomolecules. In this paper, we present a multiplexed fluorescence readout method using time varied fluorescence signals. To generate the fluorescence signals, coded strands and a set of universal molecular beacons are introduced. Each coded strand represents the existence of an assigned target molecule. The coded strands have coded sequences to generate temporary fluorescence signals through binding to the molecular beacons. The signal generating processes are modeled based on the reaction kinetics between the coded strands and molecular beacons. The model is used to decode the detected fluorescence signals using maximum likelihood estimation. Multiplexed fluorescence readout was experimentally demonstrated with three molecular beacons. Numerical analysis showed that the readout accuracy was enhanced by the use of time-varied fluorescence signals.

  12. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-05-01

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission: Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism and plagiarism from others' works. Self-plagiarism is the publication of substantially

  13. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-04-01

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission: Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism and plagiarism from others' works. Self-plagiarism is the publication of substantially

  14. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-03-01

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism and plagiarism from others' works. Self-plagiarism is the publication of substantially similar scientific content

  15. Attitude toward plagiarism among Iranian medical faculty members.

    PubMed

    Ghajarzadeh, Mahsa; Norouzi-Javidan, Abbas; Hassanpour, Kiana; Aramesh, Kiarash; Emami-Razavi, Seyed Hassan

    2012-01-01

    The goal of this study was to assess attitude towards plagiarism in faculty members of Medical School at Tehran University of Medical Sciences. One hundred and twenty medical faculty members of Tehran University of Medical Sciences were enrolled in this cross-sectional study. They were asked to answer to valid and reliable Persian version of attitude towards plagiarism questionnaire. Attitude toward plagiarism, positive attitude toward self-plagiarism and plagiarism acceptance were assessed. Eighty seven filled-up questionnaires were collected. Mean total number of correct answers was 11.6±3.1. Mean number of correct answers to questions evaluating self-plagiarism was 1.7±0.4 and mean number of correct answers to questions evaluating plagiarism acceptance was 1.4±0.2. There was no significant correlation between plagiarism acceptance and self-plagiarism (r=0.17, P=0.1). It is essential to provide materials (such as workshops, leaflets and mandatory courses) to make Iranian medical faculty members familiar with medical research ethics issues such as plagiarism.

  16. Neural coding and perceptual detection in the primate somatosensory thalamus

    PubMed Central

    Vázquez, Yuriria; Zainos, Antonio; Alvarez, Manuel; Salinas, Emilio; Romo, Ranulfo

    2012-01-01

    The contribution of the sensory thalamus to perception and decision making is not well understood. We addressed this problem by recording single neurons in the ventral posterior lateral (VPL) nucleus of the somatosensory thalamus while trained monkeys judged the presence or absence of a vibrotactile stimulus of variable amplitude applied to the skin of a fingertip. We found that neurons in the VPL nucleus modulated their firing rate as a function of stimulus amplitude, and that such modulations accounted for the monkeys’ overall psychophysical performance. These neural responses did not predict the animals' decision reports in individual trials, however. Moreover, the sensitivity to changes in stimulus amplitude was similar when the monkeys’ performed the detection task and when they were not required to report stimulus detection. These results suggest that the primate somatosensory thalamus likely provides a reliable neural representation of the sensory input to the cerebral cortex, where sensory information is transformed and combined with other cognitive components associated with behavioral performance. PMID:22927423

  17. Accuracy comparison among different machine learning techniques for detecting malicious codes

    NASA Astrophysics Data System (ADS)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  18. Methods for Identifying Versioned and Plagiarized Documents.

    ERIC Educational Resources Information Center

    Hoad, Timothy C.; Zobel, Justin

    2003-01-01

    Describes research that was conducted to develop and evaluate techniques for identifying plagiarism, revisions, and different versions of online documents. Highlights include ranking; parsing; similarity measures; identity measures; fingerprinting documents; measuring effectiveness via recall and precision; and experiments on two document…

  19. Education: Solomons Winner in Lengthy Plagiarism Trial.

    ERIC Educational Resources Information Center

    Stinson, Steve

    1980-01-01

    Reports the outcome of a plagiarism suit against organic chemistry professor T. W. Graham Solomons by two emeritus professors at New York University. The ruling of not guilty leaves the way open for Solomons' counterclaim that he lost sales of the book because of the suit. (Author/SA)

  20. Reflections on the Cultural Climate of Plagiarism

    ERIC Educational Resources Information Center

    Willen, Matthew S.

    2004-01-01

    If frequiency of e-mail distribution is any indication, college professors and administrators indeed took notice of last fall's article in the New York Times, "A Campus Fad That's Being Copied: Internet Plagiarism" (Rimer 2003), on Rutgers Professor Donald L. McCabe's recent study of cheating in college and universities. Four copies of the…

  1. Plagiarism: Do Students Know What It Is?

    ERIC Educational Resources Information Center

    Dawson, Maureen M.; Overfield, Joyce A.

    2006-01-01

    The ability of students to plagiarise coursework assessments has been a topic of much debate in recent years. The consequences of plagiarism for students may be devastating, since their failure to learn and use appropriate study skills will affect both their university experience and their subsequent career. This project set out to investigate…

  2. Unintended Lessons: Plagiarism and the University

    ERIC Educational Resources Information Center

    Thompson, Carol C.

    2006-01-01

    Plagiarism, like other ethical problems, flourishes in atmospheres with few consequences. The finding by one survey that only 27% of college students thought cutting and pasting someone else's work was "serious cheating" is troubling evidence of student inclination to cut corners ethically. Papers are easily copied from the Internet, and adult…

  3. Classrooms that Discourage Plagiarism and Welcome Technology

    ERIC Educational Resources Information Center

    Pearson, Nancy Guillot

    2011-01-01

    The key to establishing a defense against plagiarism is understanding the reasons that students engage in the process in the first place. Many students enter new grade levels academically unprepared for new challenges. When students encounter gaps between knowledge and the expectations of the classroom, some engage in unethical practices to propel…

  4. Academic Integrity and Plagiarism: Australasian Perspectives

    ERIC Educational Resources Information Center

    Joyce, Donald

    2007-01-01

    This paper reviews nearly 80 published items concerned with promoting academic integrity and reducing plagiarism. Nearly all of them were published in the last seven years and have authors based in Australasia. Most of them have authors from computing departments and many were published in computing journals or presented at computing conferences.…

  5. Plagiarism under a Magnifying-Glass

    ERIC Educational Resources Information Center

    Starovoytova, Diana

    2017-01-01

    This paper embodies the findings from a small part, of a larger study on plagiarism, at the School of Engineering (SOE). The study is a cross-sectional survey, conducted in an institutional setting. 15 senior academic members of staff (N = 15), from SOE were invited to complete a questionnaire. The questioner was pre-tested, to ensure its validity…

  6. Plagiarism: What Don't They Know?

    ERIC Educational Resources Information Center

    Voelker, Troy A.; Love, Leonard G.; Pentina, Iryna

    2012-01-01

    The present economic environment is beneficial for universities and schools of business that are experiencing significant enrollment increases. But just as the U.S. economy is suffering from an economic recession, universities increasingly suffer from an integrity recession. Student academic misconduct, particularly plagiarism, is at an all-time…

  7. Methods for Identifying Versioned and Plagiarized Documents.

    ERIC Educational Resources Information Center

    Hoad, Timothy C.; Zobel, Justin

    2003-01-01

    Describes research that was conducted to develop and evaluate techniques for identifying plagiarism, revisions, and different versions of online documents. Highlights include ranking; parsing; similarity measures; identity measures; fingerprinting documents; measuring effectiveness via recall and precision; and experiments on two document…

  8. Plagiarism: What Don't They Know?

    ERIC Educational Resources Information Center

    Voelker, Troy A.; Love, Leonard G.; Pentina, Iryna

    2012-01-01

    The present economic environment is beneficial for universities and schools of business that are experiencing significant enrollment increases. But just as the U.S. economy is suffering from an economic recession, universities increasingly suffer from an integrity recession. Student academic misconduct, particularly plagiarism, is at an all-time…

  9. Education: Solomons Winner in Lengthy Plagiarism Trial.

    ERIC Educational Resources Information Center

    Stinson, Steve

    1980-01-01

    Reports the outcome of a plagiarism suit against organic chemistry professor T. W. Graham Solomons by two emeritus professors at New York University. The ruling of not guilty leaves the way open for Solomons' counterclaim that he lost sales of the book because of the suit. (Author/SA)

  10. An Investigation of Plagiarism in Developmental Literacy

    ERIC Educational Resources Information Center

    Hammer, Emily Grace Ehrlich; Agnello, Mary Frances; Kiser, Michelle; Osaghae, Osariemen

    2012-01-01

    The purpose of higher education is to prepare students for the workforce. In order to prepare students for the workforce, many life lessons must be learned specifically respect for others' work. One of the invaluable lessons that a student can learn regarding respect for others' work is to appreciate originality and avoid of plagiarism. To be…

  11. An Investigation of Plagiarism in Developmental Literacy

    ERIC Educational Resources Information Center

    Hammer, Emily Grace Ehrlich; Agnello, Mary Frances; Kiser, Michelle; Osaghae, Osariemen

    2012-01-01

    The purpose of higher education is to prepare students for the workforce. In order to prepare students for the workforce, many life lessons must be learned specifically respect for others' work. One of the invaluable lessons that a student can learn regarding respect for others' work is to appreciate originality and avoid of plagiarism. To be…

  12. Value of ICD-9 coded chief complaints for detection of epidemics.

    PubMed Central

    Tsui, F. C.; Wagner, M. M.; Dato, V.; Chang, C. C.

    2001-01-01

    To assess the value of ICD-9 coded chief complaints for early detection of epidemics, we measured sensitivity, positive predictive value, and timeliness of Influenza detection using a respiratory set (RS) of ICD-9 codes and an Influenza set (IS). We also measured inherent timeliness of these data using the cross-correlation function. We found that, for a one-year period, the detectors had sensitivity of 100% (1/1 epidemic) and positive predictive values of 50% (1/2) for RS and 25% (1/4) for IS. The timeliness of detection using ICD-9 coded chief complaints was one week earlier than the detection using Pneumonia and Influenza deaths (the gold standard). The inherent timeliness of ICD-9 data measured by the cross-correlation function was two weeks earlier than the gold standard. PMID:11825278

  13. Value of ICD-9-Coded Chief Complaints for Detection of Epidemics

    PubMed Central

    Tsui, Fu-Chiang; Wagner, Michael M.; Dato, Virginia; Chang, Chung-Chou Ho

    2002-01-01

    To assess the value of ICD-9-coded chief complaints for early detection of epidemics, we measured sensitivity, positive predictive value, and timeliness of Influenza detection using a respiratory set (RS) of ICD-9 codes and an Influenza set (IS). We also measured inherent timeliness of these data using the cross-correlation function. We found that, for a one-year period, the detectors had sensitivity of 100% (1/1 epidemic) and positive predictive values of 50% (1/2) for RS and 25% (1/4) for IS. The timeliness of detection using ICD-9-coded chief complaints was one week earlier than the detection using Pneumonia and Influenza deaths (the gold standard). The inherent timeliness of ICD-9 data measured by the cross-correlation function was two weeks earlier than the gold standard.

  14. Demonstration of a quantum error detection code using a square lattice of four superconducting qubits

    PubMed Central

    Córcoles, A.D.; Magesan, Easwar; Srinivasan, Srikanth J.; Cross, Andrew W.; Steffen, M.; Gambetta, Jay M.; Chow, Jerry M.

    2015-01-01

    The ability to detect and deal with errors when manipulating quantum systems is a fundamental requirement for fault-tolerant quantum computing. Unlike classical bits that are subject to only digital bit-flip errors, quantum bits are susceptible to a much larger spectrum of errors, for which any complete quantum error-correcting code must account. Whilst classical bit-flip detection can be realized via a linear array of qubits, a general fault-tolerant quantum error-correcting code requires extending into a higher-dimensional lattice. Here we present a quantum error detection protocol on a two-by-two planar lattice of superconducting qubits. The protocol detects an arbitrary quantum error on an encoded two-qubit entangled state via quantum non-demolition parity measurements on another pair of error syndrome qubits. This result represents a building block towards larger lattices amenable to fault-tolerant quantum error correction architectures such as the surface code. PMID:25923200

  15. Strategies to promote a climate of academic integrity and minimize student cheating and plagiarism.

    PubMed

    Scanlan, Craig L

    2006-01-01

    Student academic misconduct is a growing problem for colleges and universities, including those responsible for preparing health professionals. Although the implementation of honor codes has had a positive impact on this problem, further reduction in student cheating and plagiarism can be achieved only via a comprehensive strategy that promotes an institutional culture of academic integrity. Such a strategy must combine efforts both to deter and detect academic misconduct, along with fair but rigorous application of sanctions against such behaviors. Methods useful in preventing or deterring dishonest behaviors among students include early integrity training complemented with course-level reinforcement, faculty role-modeling, and the application of selected testing/assignment preventive strategies, including honor pledges and honesty declarations. Giving students more responsibility for oversight of academic integrity also may help address this problem and better promote the culture needed to uphold its principles. Successful enforcement requires that academic administration provide strong and visible support for upholding academic integrity standards, including the provision of a clear and fair process and the consistent application of appropriate sanctions against those whose conduct is found to violate these standards.

  16. Multiplexed Detection of Cytokines Based on Dual Bar-Code Strategy and Single-Molecule Counting.

    PubMed

    Li, Wei; Jiang, Wei; Dai, Shuang; Wang, Lei

    2016-02-02

    Cytokines play important roles in the immune system and have been regarded as biomarkers. While single cytokine is not specific and accurate enough to meet the strict diagnosis in practice, in this work, we constructed a multiplexed detection method for cytokines based on dual bar-code strategy and single-molecule counting. Taking interferon-γ (IFN-γ) and tumor necrosis factor-α (TNF-α) as model analytes, first, the magnetic nanobead was functionalized with the second antibody and primary bar-code strands, forming a magnetic nanoprobe. Then, through the specific reaction of the second antibody and the antigen that fixed by the primary antibody, sandwich-type immunocomplex was formed on the substrate. Next, the primary bar-code strands as amplification units triggered multibranched hybridization chain reaction (mHCR), producing nicked double-stranded polymers with multiple branched arms, which were served as secondary bar-code strands. Finally, the secondary bar-code strands hybridized with the multimolecule labeled fluorescence probes, generating enhanced fluorescence signals. The numbers of fluorescence dots were counted one by one for quantification with epi-fluorescence microscope. By integrating the primary and secondary bar-code-based amplification strategy and the multimolecule labeled fluorescence probes, this method displayed an excellent sensitivity with the detection limits were both 5 fM. Unlike the typical bar-code assay that the bar-code strands should be released and identified on a microarray, this method is more direct. Moreover, because of the selective immune reaction and the dual bar-code mechanism, the resulting method could detect the two targets simultaneously. Multiple analysis in human serum was also performed, suggesting that our strategy was reliable and had a great potential application in early clinical diagnosis.

  17. Code System to Detect Recurring Loss of Special Nuclear Materials.

    SciTech Connect

    PICARD, R. R.

    2001-08-23

    Version 00 NRCPAGE is used in safeguards applications to detect a recurring loss of special nuclear material by frequent evaluation (sequential analysis) of accountability data. Standard sequential testing procedures are traditionally based on sequences of independent and normally distributed measurements. This same approach can be applied to materials balance (MB) data. Here, the term materials balance has a meaning similar to inventory difference and represents a materials loss indicator localized in time and space. However, distinct Mbs cannot be reasonably treated as statistically independent and may not always be reasonably treated as normally distributed. Furthermore, the covariance structure associated with a given MB sequence is not known and must be estimated. Nonindependence is treated by converting the MB sequence to the innovation sequence, sometimes called the ITMUF sequence or the sequence of MUF residuals, which are statistically independent and amenable to sequential test procedures. A one-sided page's test, effective for a wide range of recurring loss scenarios, is applied to the standardized innovation sequence. The program can be easily modified to suit particular needs; the models for the assumption of multivariate normality for MBs when computing the innovation sequence or the test procedure can be changed as can the input/output format, dimensioning, local error checking, and simulation work. Input files can be sequentially constructed using local text editors to update existing files. Output files can be read by graphics, report writer, or other stand-alone utility routines.

  18. An application of soft-decision to error-detecting codes

    NASA Astrophysics Data System (ADS)

    Kobayashi, H.; Yanagidaira, H.; Kawai, K.

    This paper presents a decoding algorithm based upon soft decision, which gives the capability of error correction in the conventional-error-detecting system. The algorithm may be applied to the multi-PSK, multi-QAM, and any other digital modulation, including even the case where the differential coding is employed. In this paper, an investigation is performed for the application of the proposed algorithm to the 4-DPSK system which introduces a scheme of single parity check code, and the Automatic Repeat-Request (ARQ) system using a cyclic-redundancy check code (CRC). In addition, the experimental results from the trial equipment of the 4-DPSK system is briefly described.

  19. Detection and Location of Gamma-Ray Sources with a Modulating Coded Mask

    SciTech Connect

    Anderson, Dale N.; Stromswold, David C.; Wunschel, Sharon C.; Peurrung, Anthony J.; Hansen, Randy R.

    2006-01-31

    This paper presents methods of detecting and locating a concelaed nuclear gamma-ray source with a coded aperture mask. Energetic gamma rays readily penetrate moderate amounts of shielding material and can be detected at distances of many meters. The detection of high energy gamma-ray sources is vitally important to national security for several reasons, including nuclear materials smuggling interdiction, monitoring weapon components under treaties, and locating nuclear weapons and materials in the possession terrorist organizations.

  20. How do we handle self-plagiarism in submitted manuscripts?

    PubMed Central

    Šupak-Smolčić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms of self-plagiarism in scientific writing and then present good editorial policy toward questionable material. The importance of dealing with self-plagiarism is emphasized by the recently published proposal of Text Recycling Guidelines by the Committee on Publication Ethics (COPE). PMID:23894861

  1. How do we handle self-plagiarism in submitted manuscripts?

    PubMed

    Supak-Smocić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms of self-plagiarism in scientific writing and then present good editorial policy toward questionable material. The importance of dealing with self-plagiarism is emphasized by the recently published proposal of Text Recycling Guidelines by the Committee on Publication Ethics (COPE).

  2. Digital plagiarism - The web giveth and the web shall taketh

    PubMed Central

    Presti, David E

    2000-01-01

    Publishing students' and researchers' papers on the World Wide Web (WWW) facilitates the sharing of information within and between academic communities. However, the ease of copying and transporting digital information leaves these authors' ideas open to plagiarism. Using tools such as the Plagiarism.org database, which compares submissions to reports and papers available on the Internet, could discover instances of plagiarism, revolutionize the peer review process, and raise the quality of published research everywhere. PMID:11720925

  3. Improved shear wave motion detection using coded excitation for transient elastography

    PubMed Central

    He, Xiao-Nian; Diao, Xian-Fen; Lin, Hao-Ming; Zhang, Xin-Yu; Shen, Yuan-Yuan; Chen, Si-Ping; Qin, Zheng-Di; Chen, Xin

    2017-01-01

    Transient elastography (TE) is well adapted for use in studying liver elasticity. However, because the shear wave motion signal is extracted from the ultrasound signal, the weak ultrasound signal can significantly deteriorate the shear wave motion tracking process and make it challenging to detect the shear wave motion in a severe noise environment, such as within deep tissues and within obese patients. This paper, therefore, investigated the feasibility of implementing coded excitation in TE for shear wave detection, with the hypothesis that coded ultrasound signals can provide robustness to weak ultrasound signals compared with traditional short pulse. The Barker 7, Barker 13, and short pulse were used for detecting the shear wave in the TE application. Two phantom experiments and one in vitro liver experiment were done to explore the performances of the coded excitation in TE measurement. The results show that both coded pulses outperform the short pulse by providing superior shear wave signal-to-noise ratios (SNR), robust shear wave speed measurement, and higher penetration intensity. In conclusion, this study proved the feasibility of applying coded excitation in shear wave detection for TE application. The proposed method has the potential to facilitate robust shear elasticity measurements of tissue. PMID:28295027

  4. Improved shear wave motion detection using coded excitation for transient elastography.

    PubMed

    He, Xiao-Nian; Diao, Xian-Fen; Lin, Hao-Ming; Zhang, Xin-Yu; Shen, Yuan-Yuan; Chen, Si-Ping; Qin, Zheng-Di; Chen, Xin

    2017-03-15

    Transient elastography (TE) is well adapted for use in studying liver elasticity. However, because the shear wave motion signal is extracted from the ultrasound signal, the weak ultrasound signal can significantly deteriorate the shear wave motion tracking process and make it challenging to detect the shear wave motion in a severe noise environment, such as within deep tissues and within obese patients. This paper, therefore, investigated the feasibility of implementing coded excitation in TE for shear wave detection, with the hypothesis that coded ultrasound signals can provide robustness to weak ultrasound signals compared with traditional short pulse. The Barker 7, Barker 13, and short pulse were used for detecting the shear wave in the TE application. Two phantom experiments and one in vitro liver experiment were done to explore the performances of the coded excitation in TE measurement. The results show that both coded pulses outperform the short pulse by providing superior shear wave signal-to-noise ratios (SNR), robust shear wave speed measurement, and higher penetration intensity. In conclusion, this study proved the feasibility of applying coded excitation in shear wave detection for TE application. The proposed method has the potential to facilitate robust shear elasticity measurements of tissue.

  5. Low-Complexity Saliency Detection Algorithm for Fast Perceptual Video Coding

    PubMed Central

    Liu, Pengyu; Jia, Kebin

    2013-01-01

    A low-complexity saliency detection algorithm for perceptual video coding is proposed; low-level encoding information is adopted as the characteristics of visual perception analysis. Firstly, this algorithm employs motion vector (MV) to extract temporal saliency region through fast MV noise filtering and translational MV checking procedure. Secondly, spatial saliency region is detected based on optimal prediction mode distributions in I-frame and P-frame. Then, it combines the spatiotemporal saliency detection results to define the video region of interest (VROI). The simulation results validate that the proposed algorithm can avoid a large amount of computation work in the visual perception characteristics analysis processing compared with other existing algorithms; it also has better performance in saliency detection for videos and can realize fast saliency detection. It can be used as a part of the video standard codec at medium-to-low bit-rates or combined with other algorithms in fast video coding. PMID:24489495

  6. Microfluidic CODES: a scalable multiplexed electronic sensor for orthogonal detection of particles in microfluidic channels.

    PubMed

    Liu, Ruxiu; Wang, Ningquan; Kamili, Farhan; Sarioglu, A Fatih

    2016-04-21

    Numerous biophysical and biochemical assays rely on spatial manipulation of particles/cells as they are processed on lab-on-a-chip devices. Analysis of spatially distributed particles on these devices typically requires microscopy negating the cost and size advantages of microfluidic assays. In this paper, we introduce a scalable electronic sensor technology, called microfluidic CODES, that utilizes resistive pulse sensing to orthogonally detect particles in multiple microfluidic channels from a single electrical output. Combining the techniques from telecommunications and microfluidics, we route three coplanar electrodes on a glass substrate to create multiple Coulter counters producing distinct orthogonal digital codes when they detect particles. We specifically design a digital code set using the mathematical principles of Code Division Multiple Access (CDMA) telecommunication networks and can decode signals from different microfluidic channels with >90% accuracy through computation even if these signals overlap. As a proof of principle, we use this technology to detect human ovarian cancer cells in four different microfluidic channels fabricated using soft lithography. Microfluidic CODES offers a simple, all-electronic interface that is well suited to create integrated, low-cost lab-on-a-chip devices for cell- or particle-based assays in resource-limited settings.

  7. The effects of pulse rate, power, width and coding on signal detectability

    NASA Technical Reports Server (NTRS)

    Carter, D. A.

    1983-01-01

    The effects on the signal detectability of varying the pulse repetition rate (PRF), peak pulse power (p(pk)) and pulse width (tau(p)) (tp) are examined. Both coded and uncoded pulses are considered. The following quantities are assumed to be constant; (1) antenna area, (z)echo reflectivity, (3) Doppler shift, (4) spectral width, (5) spectral resolution, (6) effective sampling rate, and (7) total incoherent spectral averagaing time. The detectability is computed for two types of targets.

  8. Quantum-capacity-approaching codes for the detected-jump channel

    SciTech Connect

    Grassl, Markus; Wei Zhaohui; Ji Zhengfeng; Zeng Bei

    2010-12-15

    The quantum-channel capacity gives the ultimate limit for the rate at which quantum data can be reliably transmitted through a noisy quantum channel. Degradable quantum channels are among the few channels whose quantum capacities are known. Given the quantum capacity of a degradable channel, it remains challenging to find a practical coding scheme which approaches capacity. Here we discuss code designs for the detected-jump channel, a degradable channel with practical relevance describing the physics of spontaneous decay of atoms with detected photon emission. We show that this channel can be used to simulate a binary classical channel with both erasures and bit flips. The capacity of the simulated classical channel gives a lower bound on the quantum capacity of the detected-jump channel. When the jump probability is small, it almost equals the quantum capacity. Hence using a classical capacity-approaching code for the simulated classical channel yields a quantum code which approaches the quantum capacity of the detected-jump channel.

  9. Threshold-Based OSIC Detection Algorithm for Per-Antenna-Coded TIMO-OFDM Systems

    NASA Astrophysics Data System (ADS)

    Wang, Xinzheng; Chen, Ming; Zhu, Pengcheng

    Threshold-based ordered successive interference cancellation (OSIC) detection algorithm is proposed for per-antenna-coded (PAC) two-input multiple-output (TIMO) orthogonal frequency division multiplexing (OFDM) systems. Successive interference cancellation (SIC) is performed selectively according to channel conditions. Compared with the conventional OSIC algorithm, the proposed algorithm reduces the complexity significantly with only a slight performance degradation.

  10. Plagiarism Continues to Affect Scholarly Journals.

    PubMed

    Hong, Sung Tae

    2017-02-01

    I have encountered 3 cases of plagiarism as editor of the Journal of Korean Medical Science (JKMS). The first one was copying figures from a JKMS article without citation, the second was submission of a copied manuscript of a published article to JKMS, and the third was publishing a copied JKMS article in another journal. The first and third cases violated copyrights of JKMS, but the violating journals made no action on the misconduct. The second and third cases were slightly modified copies of the source articles but similarity check by the Crosscheck could not identify the text overlap initially and after one year reported 96% overlap for the second case. The similarity of the third case was reported 3%. The Crosscheck must upgrade its system for better reliable screening of text plagiarism. The copy of the second case was committed by a corrupt Chinese editing company and also by some unethical researchers. In conclusion, plagiarism still threatens the trustworthiness of the publishing enterprises and is a cumbersome burden for editors of scholarly journals. We require a better system to increase the vigilance and to prevent the misconduct.

  11. Plagiarism Continues to Affect Scholarly Journals

    PubMed Central

    2017-01-01

    I have encountered 3 cases of plagiarism as editor of the Journal of Korean Medical Science (JKMS). The first one was copying figures from a JKMS article without citation, the second was submission of a copied manuscript of a published article to JKMS, and the third was publishing a copied JKMS article in another journal. The first and third cases violated copyrights of JKMS, but the violating journals made no action on the misconduct. The second and third cases were slightly modified copies of the source articles but similarity check by the Crosscheck could not identify the text overlap initially and after one year reported 96% overlap for the second case. The similarity of the third case was reported 3%. The Crosscheck must upgrade its system for better reliable screening of text plagiarism. The copy of the second case was committed by a corrupt Chinese editing company and also by some unethical researchers. In conclusion, plagiarism still threatens the trustworthiness of the publishing enterprises and is a cumbersome burden for editors of scholarly journals. We require a better system to increase the vigilance and to prevent the misconduct. PMID:28049227

  12. Addressing Plagiarism in Online Programmes at a Health Sciences University: A Case Study

    ERIC Educational Resources Information Center

    Ewing, Helen; Anast, Ade; Roehling, Tamara

    2016-01-01

    Plagiarism continues to be a concern for all educational institutions. To build a solid foundation for high academic standards and best practices at a graduate university, aspects of plagiarism were reviewed to develop better management processes for reducing plagiarism. Specifically, the prevalence of plagiarism and software programmes for…

  13. Legality, Quality Assurance and Learning: Competing Discourses of Plagiarism Management in Higher Education

    ERIC Educational Resources Information Center

    Sutherland-Smith, Wendy

    2014-01-01

    In universities around the world, plagiarism management is an ongoing issue of quality assurance and risk management. Plagiarism management discourses are often framed by legal concepts of authorial rights, and plagiarism policies outline penalties for infringement. Learning and teaching discourses argue that plagiarism management is, and should…

  14. Addressing Plagiarism in Online Programmes at a Health Sciences University: A Case Study

    ERIC Educational Resources Information Center

    Ewing, Helen; Anast, Ade; Roehling, Tamara

    2016-01-01

    Plagiarism continues to be a concern for all educational institutions. To build a solid foundation for high academic standards and best practices at a graduate university, aspects of plagiarism were reviewed to develop better management processes for reducing plagiarism. Specifically, the prevalence of plagiarism and software programmes for…

  15. Legality, Quality Assurance and Learning: Competing Discourses of Plagiarism Management in Higher Education

    ERIC Educational Resources Information Center

    Sutherland-Smith, Wendy

    2014-01-01

    In universities around the world, plagiarism management is an ongoing issue of quality assurance and risk management. Plagiarism management discourses are often framed by legal concepts of authorial rights, and plagiarism policies outline penalties for infringement. Learning and teaching discourses argue that plagiarism management is, and should…

  16. Plagiarism Charges against a Scholar Can Divide Experts, Perplex Scholarly Societies, and Raise Intractable Questions.

    ERIC Educational Resources Information Center

    Mooney, Carolyn J.

    1992-01-01

    A case of suspected scholarly plagiarism by Charles P. Gallmeier is reported and used to illustrate issues in plagiarism, including the definition of plagiarism, the role of motive in defining plagiarism, the appropriate investigative body, appropriate due process and punishment, and the academic community's responsibility to inform members of…

  17. Arresting Student Plagiarism: Are We Investigators or Educators?

    ERIC Educational Resources Information Center

    Davis, Lajuan

    2011-01-01

    Managing student plagiarism can cause instructors to feel as if they are serving educational institutions in the role of investigator rather than educator. Since many educators continue to struggle with the issue of student plagiarism, the author interviewed some of her colleagues. In this article, she shares her and her colleagues' antiplagiarism…

  18. ESL Writers Discuss Plagiarism: The Social Construction of Ideologies.

    ERIC Educational Resources Information Center

    Evans, Faun Bernbach; Youmans, Madeleine

    2000-01-01

    Examined group discussions among English as a Second Language college students and teachers regarding plagiarism. Through negotiation with more experienced peers and instructors, students negotiated and co-constructed notions of plagiarism by working in their zones of proximal development. Concludes that such socially situated discourse is…

  19. Application of Plagiarism Screening Software in the Chemical Engineering Curriculum

    ERIC Educational Resources Information Center

    Cooper, Matthew E.; Bullard, Lisa G.

    2014-01-01

    Plagiarism is an area of increasing concern for written ChE assignments, such as laboratory and design reports, due to ease of access to text and other materials via the internet. This study examines the application of plagiarism screening software to four courses in a university chemical engineering curriculum. The effectiveness of plagiarism…

  20. Application of Plagiarism Screening Software in the Chemical Engineering Curriculum

    ERIC Educational Resources Information Center

    Cooper, Matthew E.; Bullard, Lisa G.

    2014-01-01

    Plagiarism is an area of increasing concern for written ChE assignments, such as laboratory and design reports, due to ease of access to text and other materials via the internet. This study examines the application of plagiarism screening software to four courses in a university chemical engineering curriculum. The effectiveness of plagiarism…

  1. Don't Let Students "Overlook" Internet Plagiarism

    ERIC Educational Resources Information Center

    Bugeja, Michael

    2004-01-01

    Plagiarism involves stealing or closely imitating another's written, creative, electronic, photographed, taped, or promotional or research work, identifying it as your own without permission or authorization. In this article, the author presents a primer discussion of plagiarism prevention in middle school throughout high school. Among other…

  2. Students' Perceptions of Cheating and Plagiarism in Higher Institutions

    ERIC Educational Resources Information Center

    Owunwanne, Daniel; Rustagi, Narendra; Dada, Remi

    2010-01-01

    There is a growing body of evidence that cheating and plagiarism are prominent problems in many universities. In informal conversations, it seems that different students perceive plagiarism differently. In this paper, we conducted a survey at Howard University to examine or to follow up with this growing trend. Specifically, team leaders in school…

  3. Instructor Perceptions of Plagiarism: Are We Finding Common Ground?

    ERIC Educational Resources Information Center

    Bennett, Kymberley K.; Behrendt, Linda S.; Boothby, Jennifer L.

    2011-01-01

    This study examined instructor views of what constitutes plagiarism. The authors collected questionnaire data from 158 participants recruited through three teaching-related electronic listservs. Results showed that most participants agreed that behaviors that claim credit for someone else's work constituted plagiarism. Instructors differed in…

  4. Instructor Perceptions of Plagiarism: Are We Finding Common Ground?

    ERIC Educational Resources Information Center

    Bennett, Kymberley K.; Behrendt, Linda S.; Boothby, Jennifer L.

    2011-01-01

    This study examined instructor views of what constitutes plagiarism. The authors collected questionnaire data from 158 participants recruited through three teaching-related electronic listservs. Results showed that most participants agreed that behaviors that claim credit for someone else's work constituted plagiarism. Instructors differed in…

  5. Turnitin Systems: A Deterrent to Plagiarism in College Classrooms

    ERIC Educational Resources Information Center

    Heckler, Nina C.; Rice, Margaret; Bryan, C. Hobson

    2013-01-01

    Computer technology and the Internet now make plagiarism an easier enterprise. As a result, faculty must be more diligent in their efforts to mitigate the practice of academic integrity, and institutions of higher education must provide the leadership and support to ensure the context for it. This study explored the use of a plagiarism detection…

  6. Don't Let Students "Overlook" Internet Plagiarism

    ERIC Educational Resources Information Center

    Bugeja, Michael

    2004-01-01

    Plagiarism involves stealing or closely imitating another's written, creative, electronic, photographed, taped, or promotional or research work, identifying it as your own without permission or authorization. In this article, the author presents a primer discussion of plagiarism prevention in middle school throughout high school. Among other…

  7. Plagiarism, Enclosure, and the Commons of the Mind.

    ERIC Educational Resources Information Center

    Scurrah, William L.

    When discussing plagiarism and cheating these days, college faculty seem to find themselves using the rhetoric of crime and punishment ("It's easier to steal from the Internet") on their students rather than a rhetoric more attuned to their actual mission. A short overview in this paper of the history of plagiarism and the development of the…

  8. Plagiarism Litigation Trends in the USA and Australia

    ERIC Educational Resources Information Center

    Mawdsley, Ralph D.; Cumming, J. Joy

    2008-01-01

    In this article we explore the increasing complexity of plagiarism litigation in the USA and Australia. Plagiarism has always been a serious academic issue and academic staff and students have wrestled with its definition and appropriate penalties for some time. However, the advent of the Internet and more freely accessible information resources,…

  9. Plagiarism in the Japanese Universities: Truly a Cultural Matter?

    ERIC Educational Resources Information Center

    Wheeler, Greg

    2009-01-01

    Although plagiarism is considered among western academic circles as one of the worst "crimes" a student can commit, many scholars suggest that these attitudes do not apply to students from areas outside this sphere. They believe that in many countries, plagiarism is considered culturally acceptable. As such, ESL or EFL instructors in…

  10. Using Computer Simulations and Games to Prevent Student Plagiarism

    ERIC Educational Resources Information Center

    Bradley, Elizabeth G.

    2015-01-01

    In this increasingly digital age, student plagiarism is rampant. Roughly half of college students admit to plagiarizing using content found online, directly copying and pasting the work of others. Digital technology and social media have greatly changed the landscape of how knowledge is acquired and disseminated; thus, students must be explicitly…

  11. Online Plagiarism Training Falls Short in Biology Classrooms

    PubMed Central

    Holt, Emily A.; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework assignment) and their impacts on students’ ability to accurately discriminate plagiarism from text that is properly quoted, paraphrased, and attributed. Using pre- and postsurveys of 173 undergraduate students in three general ecology courses, we found that students given the homework assignment had far greater success in identifying plagiarism or the lack thereof compared with students given no training. In general, students trained with the homework assignment more successfully identified plagiarism than did students trained with the online tutorial. We also found that the summative assessment associated with the plagiarism-avoidance training formats (i.e., homework grade and online tutorial assessment score) did not correlate with student improvement on surveys through time. PMID:24591507

  12. Non-Native University Students' Perception of Plagiarism

    ERIC Educational Resources Information Center

    Ahmad, Ummul Khair; Mansourizadeh, Kobra; Ai, Grace Koh Ming

    2012-01-01

    Plagiarism is a complex issue especially among non-native students and it has received a lot of attention from researchers and scholars of academic writing. Some scholars attribute this problem to cultural perceptions and different attitudes toward texts. This study evaluates student perception of different aspects of plagiarism. A small group of…

  13. ESL Writers Discuss Plagiarism: The Social Construction of Ideologies.

    ERIC Educational Resources Information Center

    Evans, Faun Bernbach; Youmans, Madeleine

    2000-01-01

    Examined group discussions among English as a Second Language college students and teachers regarding plagiarism. Through negotiation with more experienced peers and instructors, students negotiated and co-constructed notions of plagiarism by working in their zones of proximal development. Concludes that such socially situated discourse is…

  14. Good intentions: providing students with skills to avoid accidental plagiarism.

    PubMed

    Zafron, Michelle L

    2012-01-01

    This article explores one librarian's experience with creating and implementing a plagiarism seminar as part of the library liaison program to the School of Public Health and Health Professions at the University at Buffalo. The changes and evolution of the seminar over several iterations are described. This article also examines student perceptions, misperceptions, and reactions to the plagiarism workshop.

  15. Online plagiarism training falls short in biology classrooms.

    PubMed

    Holt, Emily A; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework assignment) and their impacts on students' ability to accurately discriminate plagiarism from text that is properly quoted, paraphrased, and attributed. Using pre- and postsurveys of 173 undergraduate students in three general ecology courses, we found that students given the homework assignment had far greater success in identifying plagiarism or the lack thereof compared with students given no training. In general, students trained with the homework assignment more successfully identified plagiarism than did students trained with the online tutorial. We also found that the summative assessment associated with the plagiarism-avoidance training formats (i.e., homework grade and online tutorial assessment score) did not correlate with student improvement on surveys through time.

  16. Factors Associated with Student Plagiarism in a Post-1992 University

    ERIC Educational Resources Information Center

    Bennett, Roger

    2005-01-01

    A model intended to explain the incidence of plagiarism among undergraduates in the Business Studies department of a post-1992 university was constructed and tested on a sample of 249 students completing Business Studies units at a post-1992 university in Greater London. It was hypothesised that the occurrence of plagiarism could be predicted via…

  17. Arresting Student Plagiarism: Are We Investigators or Educators?

    ERIC Educational Resources Information Center

    Davis, Lajuan

    2011-01-01

    Managing student plagiarism can cause instructors to feel as if they are serving educational institutions in the role of investigator rather than educator. Since many educators continue to struggle with the issue of student plagiarism, the author interviewed some of her colleagues. In this article, she shares her and her colleagues' antiplagiarism…

  18. Pandora's Box: Academic Perceptions of Student Plagiarism in Writing

    ERIC Educational Resources Information Center

    Sutherland-Smith, Wendy

    2005-01-01

    Plagiarism is viewed by many academics as a kind of Pandora's box--the elements contained inside are too frightening to allow escape for fear of the havoc that may result. Reluctance by academic members of staff to discuss student plagiarism openly may contribute to the often untenable situations we, as teachers, face when dealing with student…

  19. Turnitin Systems: A Deterrent to Plagiarism in College Classrooms

    ERIC Educational Resources Information Center

    Heckler, Nina C.; Rice, Margaret; Bryan, C. Hobson

    2013-01-01

    Computer technology and the Internet now make plagiarism an easier enterprise. As a result, faculty must be more diligent in their efforts to mitigate the practice of academic integrity, and institutions of higher education must provide the leadership and support to ensure the context for it. This study explored the use of a plagiarism detection…

  20. Student Plagiarism in Higher Education in Vietnam: An Empirical Study

    ERIC Educational Resources Information Center

    Do Ba, Khang; Do Ba, Khai; Lam, Quoc Dung; Le, Dao Thanh Binh An; Nguyen, Phuong Lien; Nguyen, Phuong Quynh; Pham, Quoc Loc

    2017-01-01

    This paper assesses and compares the prevalence of plagiarism across different student and assignment characteristics at a university in Vietnam, using the similarity index reported by the text-matching software Turnitin as a proxy measure of plagiarism on a sample of 681 student papers. The findings present a level of match higher than reported…

  1. Preventing Unintentional Plagiarism: A Method for Strengthening Paraphrasing Skills

    ERIC Educational Resources Information Center

    Walker, Angela L.

    2008-01-01

    Plagiarism may result from faulty cognitive processing and thereby be unintentional (Marsh, Landau, & Hicks, 1997). The current study tested the effectiveness of paraphrasing training designed to prevent unintentional plagiarism. Thirty-six students enrolled in research methods participated, one group received paraphrasing training; a control…

  2. Applying an Employee-Motivation Model to Prevent Student Plagiarism.

    ERIC Educational Resources Information Center

    Malouff, John M.; Sims, Randi L.

    1996-01-01

    A model based on Vroom's expectancy theory of employee motivation posits that instructors can prevent plagiarism by ensuring that students understand the rules of ethical writing, expect assignments to be manageable and have personal benefits, and expect plagiarism to be difficult and have important personal costs. (SK)

  3. Plagiarism Litigation Trends in the USA and Australia

    ERIC Educational Resources Information Center

    Mawdsley, Ralph D.; Cumming, J. Joy

    2008-01-01

    In this article we explore the increasing complexity of plagiarism litigation in the USA and Australia. Plagiarism has always been a serious academic issue and academic staff and students have wrestled with its definition and appropriate penalties for some time. However, the advent of the Internet and more freely accessible information resources,…

  4. Using Computer Simulations and Games to Prevent Student Plagiarism

    ERIC Educational Resources Information Center

    Bradley, Elizabeth G.

    2015-01-01

    In this increasingly digital age, student plagiarism is rampant. Roughly half of college students admit to plagiarizing using content found online, directly copying and pasting the work of others. Digital technology and social media have greatly changed the landscape of how knowledge is acquired and disseminated; thus, students must be explicitly…

  5. Reducing Plagiarism by Using Online Software: An Experimental Study

    ERIC Educational Resources Information Center

    Kose, Ozgur; Arikan, Arda

    2011-01-01

    This action research attempts to explore the perceptions of Turkish university students on plagiarism while evaluating the effectiveness of an online application used to deter plagiarism. The participants were 40 first year university students studying in two different sections of an academic writing class. The findings show that the participants…

  6. Factors Associated with Student Plagiarism in a Post-1992 University

    ERIC Educational Resources Information Center

    Bennett, Roger

    2005-01-01

    A model intended to explain the incidence of plagiarism among undergraduates in the Business Studies department of a post-1992 university was constructed and tested on a sample of 249 students completing Business Studies units at a post-1992 university in Greater London. It was hypothesised that the occurrence of plagiarism could be predicted via…

  7. Fighting Plagiarism: Taking the Work out of Homework

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    This article discusses the rise of cut-and-paste plagiarism in schools. Students are constantly searching for essays online, however, they did not know that their teachers are using the same technology to catch them cheating. Plagiarism is happening on campuses nationwide. Yet, with veritable libraries at their fingertips, students see nothing…

  8. The Thieves of Academe: Plagiarism in the University System.

    ERIC Educational Resources Information Center

    Hawley, Christopher S.

    1984-01-01

    The problem of literary piracy at the collegiate level was examined in an exploratory study. Forms of plagiarism, especially term paper mills; student attitudes toward plagiarism; approaches to dealing with the problem; and measures educators can take to address the problem in the classroom are discussed. (MLW)

  9. Pandora's Box: Academic Perceptions of Student Plagiarism in Writing

    ERIC Educational Resources Information Center

    Sutherland-Smith, Wendy

    2005-01-01

    Plagiarism is viewed by many academics as a kind of Pandora's box--the elements contained inside are too frightening to allow escape for fear of the havoc that may result. Reluctance by academic members of staff to discuss student plagiarism openly may contribute to the often untenable situations we, as teachers, face when dealing with student…

  10. Optimal Multicarrier Phase-Coded Waveform Design for Detection of Extended Targets

    SciTech Connect

    Sen, Satyabrata; Glover, Charles Wayne

    2013-01-01

    We design a parametric multicarrier phase-coded (MCPC) waveform that achieves the optimal performance in detecting an extended target in the presence of signal-dependent interference. Traditional waveform design techniques provide only the optimal energy spectral density of the transmit waveform and suffer a performance loss in the synthesis process of the time-domain signal. Therefore, we opt for directly designing an MCPC waveform in terms of its time-frequency codes to obtain the optimal detection performance. First, we describe the modeling assumptions considering an extended target buried within the signal-dependent clutter with known power spectral density, and deduce the performance characteristics of the optimal detector. Then, considering an MCPC signal transmission, we express the detection characteristics in terms of the phase-codes of the MCPC waveform and propose to optimally design the MCPC signal by maximizing the detection probability. Our numerical results demonstrate that the designed MCPC signal attains the optimal detection performance and requires a lesser computational time than the other parametric waveform design approach.

  11. A general-purpose contact detection algorithm for nonlinear structural analysis codes

    SciTech Connect

    Heinstein, M.W.; Attaway, S.W.; Swegle, J.W.; Mello, F.J.

    1993-05-01

    A new contact detection algorithm has been developed to address difficulties associated with the numerical simulation of contact in nonlinear finite element structural analysis codes. Problems including accurate and efficient detection of contact for self-contacting surfaces, tearing and eroding surfaces, and multi-body impact are addressed. The proposed algorithm is portable between dynamic and quasi-static codes and can efficiently model contact between a variety of finite element types including shells, bricks, beams and particles. The algorithm is composed of (1) a location strategy that uses a global search to decide which slave nodes are in proximity to a master surface and (2) an accurate detailed contact check that uses the projected motions of both master surface and slave node. In this report, currently used contact detection algorithms and their associated difficulties are discussed. Then the proposed algorithm and how it addresses these problems is described. Finally, the capability of the new algorithm is illustrated with several example problems.

  12. Plagiarism: Why is it such a big issue for medical writers?

    PubMed Central

    Das, Natasha; Panjabi, Monica

    2011-01-01

    Plagiarism is the wrongful presentation of somebody else‘s work or idea as one’s own without adequately attributing it to the source. Most authors know that plagiarism is an unethical publication practice. Yet, it is a serious problem in the medical writing arena. Plagiarism is perhaps the commonest ethical issue plaguing medical writing. In this article, we highlight the different types of plagiarism and address the issues of plagiarism of text, plagiarism of ideas, mosaic plagiarism, self-plagiarism, and duplicate publication. An act of plagiarism can have several repercussions for the author, the journal in question and the publication house as a whole. Sometimes, strict disciplinary action is also taken against the plagiarist. The article cites examples of retraction of articles, suspension of authors, apology letters from journal editors, and other such actions against plagiarism. PMID:21731858

  13. Improvement of the predicted aural detection code ICHIN (I Can Hear It Now)

    NASA Technical Reports Server (NTRS)

    Mueller, Arnold W.; Smith, Charles D.; Lemasurier, Phillip

    1993-01-01

    Acoustic tests were conducted to study the far-field sound pressure levels and aural detection ranges associated with a Sikorsky S-76A helicopter in straight and level flight at various advancing blade tip Mach numbers. The flight altitude was nominally 150 meters above ground level. This paper compares the normalized predicted aural detection distances, based on the measured far-field sound pressure levels, to the normalized measured aural detection distances obtained from sound jury response measurements obtained during the same test. Both unmodified and modified versions of the prediction code ICHIN-6 (I Can Hear It Now) were used to produce the results for this study.

  14. Pharmacy students' ability to identify plagiarism after an educational intervention.

    PubMed

    Degeeter, Michelle; Harris, Kira; Kehr, Heather; Ford, Carolyn; Lane, Daniel C; Nuzum, Donald S; Compton, Cynthia; Gibson, Whitney

    2014-03-12

    Objective. To determine if an educational intervention in a doctor of pharmacy (PharmD) degree program increases pharmacy students' ability to identify plagiarism. Methods. First-year (P1), second-year (P2), and third-year (P3) pharmacy students attended an education session during which types of plagiarism and methods for avoiding plagiarism were reviewed. Students completed a preintervention assessment immediately prior to the session and a postintervention assessment the following semester to measure their ability. Results. Two hundred fifty-two students completed both preintervention and postintervention assessments. There was a 4% increase from preintervention to postintervention in assessment scores for the overall student sample (p<0.05). The mean change was greatest for P1 and P2 students (5% and 4.8%, respectively). Conclusion. An educational intervention about plagiarism can significantly improve students' ability to identify plagiarism.

  15. Pharmacy Students’ Ability to Identify Plagiarism After an Educational Intervention

    PubMed Central

    Harris, Kira; Kehr, Heather; Ford, Carolyn; Lane, Daniel C.; Nuzum, Donald S.; Compton, Cynthia; Gibson, Whitney

    2014-01-01

    Objective. To determine if an educational intervention in a doctor of pharmacy (PharmD) degree program increases pharmacy students’ ability to identify plagiarism. Methods. First-year (P1), second-year (P2), and third-year (P3) pharmacy students attended an education session during which types of plagiarism and methods for avoiding plagiarism were reviewed. Students completed a preintervention assessment immediately prior to the session and a postintervention assessment the following semester to measure their ability. Results. Two hundred fifty-two students completed both preintervention and postintervention assessments. There was a 4% increase from preintervention to postintervention in assessment scores for the overall student sample (p<0.05). The mean change was greatest for P1 and P2 students (5% and 4.8%, respectively). Conclusion. An educational intervention about plagiarism can significantly improve students’ ability to identify plagiarism. PMID:24672066

  16. Bio-bar-code functionalized magnetic nanoparticle label for ultrasensitive flow injection chemiluminescence detection of DNA hybridization.

    PubMed

    Bi, Sai; Zhou, Hong; Zhang, Shusheng

    2009-10-07

    A signal amplification strategy based on bio-bar-code functionalized magnetic nanoparticles as labels holds promise to improve the sensitivity and detection limit of the detection of DNA hybridization and single-nucleotide polymorphisms by flow injection chemiluminescence assays.

  17. Automatic detection of inconsistencies between free text and coded data in Sarcoma discharge letters.

    PubMed

    Rinott, Ruty; Torresani, Michele; Bertulli, Rossella; Goldsteen, Abigail; Casali, Paolo; Carmeli, Boaz; Slonim, Noam

    2012-01-01

    Discordance between data stored in Electronic Health Records (EHR) may have a harmful effect on patient care. Automatic identification of such situations is an important yet challenging task, especially when the discordance involves information stored in free text fields. Here we present a method to automatically detect inconsistencies between data stored in free text and related coded fields. Using EHR data we train an ensemble of classifiers to predict the value of coded fields from the free text fields. Cases in which the classifiers predict with high confidence a code different from the clinicians' choice are marked as potential inconsistencies. Experimental results over discharge letters of sarcoma patients, verified by a domain expert, demonstrate the validity of our method.

  18. The Limits of Coding with Joint Constraints on Detected and Undetected Error Rates

    NASA Technical Reports Server (NTRS)

    Dolinar, Sam; Andrews, Kenneth; Pollara, Fabrizio; Divsalar, Dariush

    2008-01-01

    We develop a remarkably tight upper bound on the performance of a parameterized family of bounded angle maximum-likelihood (BA-ML) incomplete decoders. The new bound for this class of incomplete decoders is calculated from the code's weight enumerator, and is an extension of Poltyrev-type bounds developed for complete ML decoders. This bound can also be applied to bound the average performance of random code ensembles in terms of an ensemble average weight enumerator. We also formulate conditions defining a parameterized family of optimal incomplete decoders, defined to minimize both the total codeword error probability and the undetected error probability for any fixed capability of the decoder to detect errors. We illustrate the gap between optimal and BA-ML incomplete decoding via simulation of a small code.

  19. Quantum error correction and detection: Quantitative analysis of a coherent-state amplitude-damping code

    NASA Astrophysics Data System (ADS)

    Wickert, Ricardo; van Loock, Peter

    2014-05-01

    We reexamine a non-Gaussian quantum error-correction code designed to protect optical coherent-state qubits against errors due to an amplitude-damping channel. We improve on a previous result [R. Wickert, N. K. Bernardes, and P. van Loock, Phys. Rev. A 81, 062344 (2010), 10.1103/PhysRevA.81.062344] by providing a tighter upper bound on the performance attained when considering realistic assumptions, which constrain the operation of the gates employed in the scheme. The quantitative characterization is performed through measures of fidelity and concurrence, the latter obtained by employing the code as an entanglement distillation protocol. We find that, when running the code in fully deterministic error-correction mode, direct transmission can only be beaten for certain combinations of channel and input state parameters. In contrast, in error-detection mode, the usage of higher repetition encodings remains beneficial throughout, however, at the expense of diminishing success probabilities.

  20. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  1. A coded aperture compressive imaging array and its visual detection and tracking algorithms for surveillance systems.

    PubMed

    Chen, Jing; Wang, Yongtian; Wu, Hanxiao

    2012-10-29

    In this paper, we propose an application of a compressive imaging system to the problem of wide-area video surveillance systems. A parallel coded aperture compressive imaging system is proposed to reduce the needed high resolution coded mask requirements and facilitate the storage of the projection matrix. Random Gaussian, Toeplitz and binary phase coded masks are utilized to obtain the compressive sensing images. The corresponding motion targets detection and tracking algorithms directly using the compressive sampling images are developed. A mixture of Gaussian distribution is applied in the compressive image space to model the background image and for foreground detection. For each motion target in the compressive sampling domain, a compressive feature dictionary spanned by target templates and noises templates is sparsely represented. An l(1) optimization algorithm is used to solve the sparse coefficient of templates. Experimental results demonstrate that low dimensional compressed imaging representation is sufficient to determine spatial motion targets. Compared with the random Gaussian and Toeplitz phase mask, motion detection algorithms using a random binary phase mask can yield better detection results. However using random Gaussian and Toeplitz phase mask can achieve high resolution reconstructed image. Our tracking algorithm can achieve a real time speed that is up to 10 times faster than that of the l(1) tracker without any optimization.

  2. Who Has Read the Policy on Plagiarism? Unpacking Students' Understanding of Plagiarism

    ERIC Educational Resources Information Center

    Gullifer, J. M.; Tyson, G. A.

    2014-01-01

    Research has established that the term "plagiarism" is open to different interpretations, resulting in confusion among students and staff alike. University policy on academic integrity/misconduct defines the behaviours that all stakeholders must abide by, and the parameters for reporting, investigating and penalising infringements. These…

  3. Who Has Read the Policy on Plagiarism? Unpacking Students' Understanding of Plagiarism

    ERIC Educational Resources Information Center

    Gullifer, J. M.; Tyson, G. A.

    2014-01-01

    Research has established that the term "plagiarism" is open to different interpretations, resulting in confusion among students and staff alike. University policy on academic integrity/misconduct defines the behaviours that all stakeholders must abide by, and the parameters for reporting, investigating and penalising infringements. These…

  4. Design and control of a ferromagnetic coded micro-carrier biochip sensor for multiplex detection of antibodies.

    PubMed

    Chang, Rong-Seng; Tsai, Jang-Zern; Li, Tung-Yen

    2011-01-01

    This paper describes a method for producing a novel type of ferromagnetic coded micro-carrier. The ferromagnetic coded micro-carriers are about 200 μm in length, 200 μm in width and 50 μm in thickness, and contain eight code elements with two distinguishable codes (hollow and solid), allowing for 2(8) unique codes. The code shapes include rectangle, circle, etc. Differently shaped coded micro-carriers could carry different antigens for detection of its complementary antibody. These many shapes of coded micro-carriers would be used simultaneously allowing us to make multiple detections for different antibodies at the same time. A molding process is applied for fabrication of the ferromagnetically coded micro-carriers where Fe material (Fe powder mixed with binder) is shaped in many tiny molds to produce the coded shapes used for identification of the bio-molecules. Magnetic force is used to control the movement and location of the ferromagnetic coded micro-carriers to prevent the loss during the hybridization process. The results of image process and analysis system testing are satisfactory. The results of our micro-carrier detection system for two sets of R and B color analysis are proportional to those obtained from ELISA antibody detection.

  5. Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching.

    PubMed

    Jenadeleh, Mohsen; Ebrahimi Moghaddam, Mohsen

    2016-05-01

    Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy-move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy-move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy-move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method.

  6. Detection of multiple, novel reverse transcriptase coding sequences in human nucleic acids: relation to primate retroviruses

    SciTech Connect

    Shih, A.; Misra, R.; Rush, M.G.

    1989-01-01

    A variety of chemically synthesized oligonucleotides designed on the basis of amino acid and/or nucleotide sequence data were used to detect a large number of novel reverse transcriptase coding sequences in human and mouse DNAs. Procedures involving Southern blotting, library screening, and the polymerase chain reaction were all used to detect such sequences; the polymerase chain reaction was the most rapid and productive approach. In the polymerase chain reaction, oligonucleotide mixtures based on consensus sequence homologies to reverse transcriptase coding sequences and unique oligonucleotides containing perfect homology to the coding sequences of human T-cell leukemia virus types I and II were both effective in amplifying reverse transcriptase-related DNA. It is shown that human DNA contains a wide spectrum of retrovirus-related reverse transcriptase coding sequences, including some that are clearly related to human T-cell leukemia virus types I and II, some that are related to the L-1 family of long interspersed nucleotide sequences, and others that are related to previously described human endogenous proviral DNAs. In addition, human T-cell leukemia virus type I-related sequences appear to be transcribed in both normal human T cells and in a cell line derived from a human teratocarcinoma.

  7. Contour coding based rotating adaptive model for human detection and tracking in thermal catadioptric omnidirectional vision.

    PubMed

    Tang, Yazhe; Li, Youfu

    2012-09-20

    In this paper, we introduce a novel surveillance system based on thermal catadioptric omnidirectional (TCO) vision. The conventional contour-based methods are difficult to be applied to the TCO sensor for detection or tracking purposes due to the distortion of TCO vision. To solve this problem, we propose a contour coding based rotating adaptive model (RAM) that can extract the contour feature from the TCO vision directly as it takes advantage of the relative angle based on the characteristics of TCO vision to change the sequence of sampling automatically. A series of experiments and quantitative analyses verify that the performance of the proposed RAM-based contour coding feature for human detection and tracking are satisfactory in TCO vision.

  8. Improved coded exposure for enhancing imaging quality and detection accuracy of moving targets

    NASA Astrophysics Data System (ADS)

    Mao, Baoqi; Chen, Li; Han, Lin; Shen, Weimin

    2016-09-01

    The blur due to the rapidly relative motion between scene and camera during exposure has the well-known influence on the quality of acquired image and then target detection. An improved coded exposure is introduced in this paper to remove the image blur and obtain high quality image, so that the test accuracy of the surface defect and edge contour of motion objects can be enhanced. The improved exposure method takes advantage of code look-up table to control exposure process and image restoration. The restored images have higher Peak Signal-to-Noise Ratio (PSNR) and Structure SIMilarity (SSIM) than traditional deblur algorithm such as Wiener and regularization filter methods. The edge contour and defect of part samples, which move at constant speed relative to the industry camera used in our experiment, are detected with Sobel operator from the restored images. Experimental results verify that the improved coded exposure is better suitable for imaging moving object and detecting moving target than the traditional.

  9. Improved SISO MMSE Detection for Joint Coded-Precoded OFDM under Imperfect Channel Estimation

    NASA Astrophysics Data System (ADS)

    Zhang, Guomei; Zhu, Shihua; Li, Feng; Ren, Pinyi

    An improved soft-input soft-output (SISO) minimum mean-squared error (MMSE) detection method is proposed for joint coding and precoding OFDM systems under imperfect channel estimation. Compared with the traditional mismatched detection which uses the channel estimate as its exact value, the signal model of the proposed detector is more accurate and the influence of channel estimation error (CEE) can be effectively mitigated. Simulations indicate that the proposed scheme can improve the bit error rate (BER) performance with fewer pilot symbols.

  10. Improving the detection task performance of a LWIR imaging system through the use of wavefront coding

    NASA Astrophysics Data System (ADS)

    Gross, Kevin A.; Kubala, Kenny

    2007-04-01

    In a traditional optical system the imaging performance is maximized at a single point in the operational space. This characteristic leads to maximizing the probability of detection if the object is on axis, at the designed conjugate, with the designed operational temperature and if the system components are manufactured without error in form and alignment. Due to the many factors that influence the system's image quality the probability of detection will decrease away from this peak value. An infrared imaging system is presented that statistically creates a higher probability of detection over the complete operational space for the Hotelling observer. The system is enabled through the use of wavefront coding, a computational imaging technology in which optics, mechanics, detection and signal processing are combined to enable LWIR imaging systems to be realized with detection task performance that is difficult or impossible to obtain in the optical domain alone. The basic principles of statistical decision theory will be presented along with a specific example of how wavefront coding technology can enable improved performance and reduced sensitivity to some of the fundamental constraints inherent in LWIR systems.

  11. Do medical students require education on issues related to plagiarism?

    PubMed

    Varghese, Joe; Jacob, Molly

    2015-01-01

    In the course of our professional experience, we have seen that many medical students plagiarise. We hypothesised that they do so out of ignorance and that they require formal education on the subject. With this objective in mind, we conducted a teaching session on issues related to plagiarism. As a part of this, we administered a quiz to assess their baseline knowledge on plagiarism and a questionnaire to determine their attitudes towards it. We followed this up with an interactive teaching session, in which we discussed various aspects of plagiarism. We subjected the data obtained from the quiz and questionnaire to bivariate and multivariate analysis. A total of 423 medical students participated in the study. Their average score for the quiz was 4.96±1.67 (out of 10). Age, gender and years in medical school were not significantly associated with knowledge regarding plagiarism. The knowledge scores were negatively correlated with permissive attitudes towards plagiarism and positively correlated with attitudes critical of the practice. Men had significantly higher scores on permissive attitudes compared to women . In conclusion, we found that the medical students' knowledge regarding plagiarism was limited. Those with low knowledge scores tended to have permissive attitudes towards plagiarism and were less critical of the practice. We recommend the inclusion of formal instruction on this subject in the medical curriculum, so that this form of academic misconduct can be tackled.

  12. [Scientific stealing (Plagiarism) in medical journals].

    PubMed

    Enöz, Murat

    2007-01-01

    The obligation to publish academic papers in order to get academic rank has made medical doctors more ambitious to publish faster and more papers. According to the ethical and legal rules in our country and in the world, if an idea or technical methods of another person is used in a medical journal, the owner of the method or idea and its publication has to be cited. If an idea, information or a technical method of another scientist is published without citation as if it was one's own idea it's called "Plagiarism". Despite the prohibitive laws and rules, this scientific stealing has become an increasing problem for medical journals worldwide.

  13. Automatic Detection of Frontal Face Midline by Chain-coded Merlin-Farber Hough Trasform

    NASA Astrophysics Data System (ADS)

    Okamoto, Daichi; Ohyama, Wataru; Wakabayashi, Tetsushi; Kimura, Fumitaka

    We propose a novel approach for detection of the facial midline (facial symmetry axis) from a frontal face image. The facial midline has several applications, for instance reducing computational cost required for facial feature extraction (FFE) and postoperative assessment for cosmetic or dental surgery. The proposed method detects the facial midline of a frontal face from an edge image as the symmetry axis using the Merlin-Faber Hough transformation. And a new performance improvement scheme for midline detection by MFHT is present. The main concept of the proposed scheme is suppression of redundant vote on the Hough parameter space by introducing chain code representation for the binary edge image. Experimental results on the image dataset containing 2409 images from FERET database indicate that the proposed algorithm can improve the accuracy of midline detection from 89.9% to 95.1 % for face images with different scales and rotation.

  14. Analysis of a Coded, M-ary Orthogonal Input Optical Channel with Random-gain Photomultiplier Detection

    NASA Technical Reports Server (NTRS)

    Lee, P. J.

    1984-01-01

    Performance of two coding systems is analyzed for a noisy optical channel with M(=2(L)-ary orthogonal signaling and random gain photomultiplier detection. The considered coding systems are the Reed Solomon (RS) coding with error only correction decoding and the interleaved binary convolutional system with soft decision Viterbi decoding. The required average number of received signal photons per information bit, N sub b, for a desired bit error of 0.000001 is found for a set of commonly used parameters and with a high background noise level. We find that the interleaved binary convolutional coding system is preferable to the RS coding system in performance complexity tradeoffs.

  15. Coded aperture coherent scatter imaging for breast cancer detection: a Monte Carlo evaluation

    NASA Astrophysics Data System (ADS)

    Lakshmanan, Manu N.; Morris, Robert E.; Greenberg, Joel A.; Samei, Ehsan; Kapadia, Anuj J.

    2016-03-01

    It is known that conventional x-ray imaging provides a maximum contrast between cancerous and healthy fibroglandular breast tissues of 3% based on their linear x-ray attenuation coefficients at 17.5 keV, whereas coherent scatter signal provides a maximum contrast of 19% based on their differential coherent scatter cross sections. Therefore in order to exploit this potential contrast, we seek to evaluate the performance of a coded- aperture coherent scatter imaging system for breast cancer detection and investigate its accuracy using Monte Carlo simulations. In the simulations we modeled our experimental system, which consists of a raster-scanned pencil beam of x-rays, a bismuth-tin coded aperture mask comprised of a repeating slit pattern with 2-mm periodicity, and a linear-array of 128 detector pixels with 6.5-keV energy resolution. The breast tissue that was scanned comprised a 3-cm sample taken from a patient-based XCAT breast phantom containing a tomosynthesis- based realistic simulated lesion. The differential coherent scatter cross section was reconstructed at each pixel in the image using an iterative reconstruction algorithm. Each pixel in the reconstructed image was then classified as being either air or the type of breast tissue with which its normalized reconstructed differential coherent scatter cross section had the highest correlation coefficient. Comparison of the final tissue classification results with the ground truth image showed that the coded aperture imaging technique has a cancerous pixel detection sensitivity (correct identification of cancerous pixels), specificity (correctly ruling out healthy pixels as not being cancer) and accuracy of 92.4%, 91.9% and 92.0%, respectively. Our Monte Carlo evaluation of our experimental coded aperture coherent scatter imaging system shows that it is able to exploit the greater contrast available from coherently scattered x-rays to increase the accuracy of detecting cancerous regions within the breast.

  16. Capacity, cutoff rate, and coding for a direct-detection optical channel

    NASA Technical Reports Server (NTRS)

    Massey, J. L.

    1980-01-01

    It is shown that Pierce's pulse position modulation scheme with 2 to the L pulse positions used on a self-noise-limited direct detection optical communication channel results in a 2 to the L-ary erasure channel that is equivalent to the parallel combination of L completely correlated binary erasure channels. The capacity of the full channel is the sum of the capacities of the component channels, but the cutoff rate of the full channel is shown to be much smaller than the sum of the cutoff rates. An interpretation of the cutoff rate is given that suggests a complexity advantage in coding separately on the component channels. It is shown that if short-constraint-length convolutional codes with Viterbi decoders are used on the component channels, then the performance and complexity compare favorably with the Reed-Solomon coding system proposed by McEliece for the full channel. The reasons for this unexpectedly fine performance by the convolutional code system are explored in detail, as are various facets of the channel structure.

  17. APPS's stance on self-plagiarism: Just say no.

    PubMed

    Culley, Theresa M

    2014-07-01

    Should authors be able to reuse the same text in multiple papers without citing the earlier source? Known as self-plagiarism, this practice is strongly discouraged in Applications in Plant Sciences (APPS) because it violates professional standards, is potentially deceptive, and lacks originality. The most frequent form of self-plagiarism in APPS submissions is text recycling, which depending on the extent and location of copied text, has consequences ranging from authors being required to rewrite duplicated text or add citations, to automatic rejection of a manuscript without review. Ultimately, avoidance of self-plagiarism will result in original articles that improve upon, and do not simply replicate, the existing literature.

  18. Simultaneous Detection of Different MicroRNA Types Using the ZIP-Code Array System

    PubMed Central

    Weishaupt, Sonja U.; Rupp, Steffen

    2013-01-01

    MicroRNAs (miRNAs) are important negative regulators of gene expression. Their implication in tumorigenesis is based on their dysregulation in many human cancer diseases. Interestingly, in tumor cells, an altered ratio of precursor and mature miRNA levels has been described. Consequently, differences in miRNA type levels have a high potential as biomarkers and comparative high-throughput-based detection might permit a more accurate characterization of subtypes, especially in the case of very heterogeneous tumor entities. Several molecular methods exist for the detection of mature and precursor miRNAs. DNA microarrays are predestinated as a high-throughput method for comprehensive miRNA detection in tumors. However, the simultaneous array-based detection of both these miRNA types is limited because the mature miRNA sequence is identically present in both forms. Here we present a ZIP-code DNA microarray-based system in combination with a novel labeling approach, which enables the simultaneous detection of precursor and mature miRNAs in one single experiment. Using synthetic miRNA templates, we demonstrate the specificity of the method for the different miRNA types, as well as the detection range up to four orders of magnitude. Moreover, mature and precursor miRNAs were detected and validated in human tumor cells. PMID:24078866

  19. Direct-detection optical communication with color coded pulse position modulation signaling

    NASA Technical Reports Server (NTRS)

    Davidson, F.

    1985-01-01

    The performance characteristics of a direct-detection optical communication system which is based on a laser transmitter which produces single light pulses at selected nonoverlapping optical center frequencies are discussed. The signal format, called color coded pulse position modulation (CCPPM), uses more of the total available response bandwidth characteristics of the photodetector than does ordinary PPM signaling. The advantages of CCPPM signaling are obtained at the expense of an increased optical bandwidth of the transmitted signal and a more complicated transmitter and receiver structure. When the signal format is used in conjunction with block length Reed-Solomon codes, high data rates and reliable high-speed optical communications under conditions of optimal energy efficiency are obtained.

  20. Direct-detection optical communication with color coded pulse position modulation signaling

    NASA Technical Reports Server (NTRS)

    Davidson, F.

    1985-01-01

    The performance characteristics of a direct-detection optical communication system which is based on a laser transmitter which produces single light pulses at selected nonoverlapping optical center frequencies are discussed. The signal format, called color coded pulse position modulation (CCPPM), uses more of the total available response bandwidth characteristics of the photodetector than does ordinary PPM signaling. The advantages of CCPPM signaling are obtained at the expense of an increased optical bandwidth of the transmitted signal and a more complicated transmitter and receiver structure. When the signal format is used in conjunction with block length Reed-Solomon codes, high data rates and reliable high-speed optical communications under conditions of optimal energy efficiency are obtained.

  1. Detection of code spread OFDM based on 0-1 integer quadratic programming

    NASA Astrophysics Data System (ADS)

    Elghariani, Ali; Zoltowski, Michael D.

    2012-05-01

    In this paper we introduce Integer Quadratic Programming (MIQP) approach to optimally detect QPSK Code Spread OFDM (CS-OFDM) by formulating the problem as a combinatorial optimization problem. The Branch and Bound (BB) algorithm is utilized to solve this integer quadratic programming problem. Furthermore, we propose combined preprocessing steps that can be applied prior to BB so that the computational complexity of the optimum receiver is reduced. The first step in this combination is to detect as much as possible symbols using procedures presented in [9], which is basically based on the gradient of quadratic function. The second step detects the undetected symbols from the first step using MMSE estimator. The result of the latter step will be used to predict the initial upper bound of the BB algorithm. Simulation results show that the proposed preprocessing combination when applied prior to BB provides optimal performance with a significantly reduced computational complexity.

  2. Ethical conduct for research : a code of scientific ethics

    Treesearch

    Marcia Patton-Mallory; Kathleen Franzreb; Charles Carll; Richard Cline

    2000-01-01

    The USDA Forest Service recently developed and adopted a code of ethical conduct for scientific research and development. The code addresses issues related to research misconduct, such as fabrication, falsification, or plagiarism in proposing, performing, or reviewing research or in reporting research results, as well as issues related to professional misconduct, such...

  3. Supersensitive detection and discrimination of enantiomers by dorsal olfactory receptors: evidence for hierarchical odour coding.

    PubMed

    Sato, Takaaki; Kobayakawa, Reiko; Kobayakawa, Ko; Emura, Makoto; Itohara, Shigeyoshi; Kizumi, Miwako; Hamana, Hiroshi; Tsuboi, Akio; Hirono, Junzo

    2015-09-11

    Enantiomeric pairs of mirror-image molecular structures are difficult to resolve by instrumental analyses. The human olfactory system, however, discriminates (-)-wine lactone from its (+)-form rapidly within seconds. To gain insight into receptor coding of enantiomers, we compared behavioural detection and discrimination thresholds of wild-type mice with those of ΔD mice in which all dorsal olfactory receptors are genetically ablated. Surprisingly, wild-type mice displayed an exquisite "supersensitivity" to enantiomeric pairs of wine lactones and carvones. They were capable of supersensitive discrimination of enantiomers, consistent with their high detection sensitivity. In contrast, ΔD mice showed selective major loss of sensitivity to the (+)-enantiomers. The resulting 10(8)-fold differential sensitivity of ΔD mice to (-)- vs. (+)-wine lactone matched that observed in humans. This suggests that humans lack highly sensitive orthologous dorsal receptors for the (+)-enantiomer, similarly to ΔD mice. Moreover, ΔD mice showed >10(10)-fold reductions in enantiomer discrimination sensitivity compared to wild-type mice. ΔD mice detected one or both of the (-)- and (+)-enantiomers over a wide concentration range, but were unable to discriminate them. This "enantiomer odour discrimination paradox" indicates that the most sensitive dorsal receptors play a critical role in hierarchical odour coding for enantiomer identification.

  4. Supersensitive detection and discrimination of enantiomers by dorsal olfactory receptors: evidence for hierarchical odour coding

    PubMed Central

    Sato, Takaaki; Kobayakawa, Reiko; Kobayakawa, Ko; Emura, Makoto; Itohara, Shigeyoshi; Kizumi, Miwako; Hamana, Hiroshi; Tsuboi, Akio; Hirono, Junzo

    2015-01-01

    Enantiomeric pairs of mirror-image molecular structures are difficult to resolve by instrumental analyses. The human olfactory system, however, discriminates (−)-wine lactone from its (+)-form rapidly within seconds. To gain insight into receptor coding of enantiomers, we compared behavioural detection and discrimination thresholds of wild-type mice with those of ΔD mice in which all dorsal olfactory receptors are genetically ablated. Surprisingly, wild-type mice displayed an exquisite “supersensitivity” to enantiomeric pairs of wine lactones and carvones. They were capable of supersensitive discrimination of enantiomers, consistent with their high detection sensitivity. In contrast, ΔD mice showed selective major loss of sensitivity to the (+)-enantiomers. The resulting 108-fold differential sensitivity of ΔD mice to (−)- vs. (+)-wine lactone matched that observed in humans. This suggests that humans lack highly sensitive orthologous dorsal receptors for the (+)-enantiomer, similarly to ΔD mice. Moreover, ΔD mice showed >1010-fold reductions in enantiomer discrimination sensitivity compared to wild-type mice. ΔD mice detected one or both of the (−)- and (+)-enantiomers over a wide concentration range, but were unable to discriminate them. This “enantiomer odour discrimination paradox” indicates that the most sensitive dorsal receptors play a critical role in hierarchical odour coding for enantiomer identification. PMID:26361056

  5. An Exercise To Teach Bioscience Students about Plagiarism.

    ERIC Educational Resources Information Center

    Willmott, Chris J. R.; Harrison, Tim M.

    2003-01-01

    Plagiarism is an issue of increasing concern to educators, yet students are not always clear on the boundaries between acceptable and unacceptable practice. Presents an exercise to help bioscience students make this important distinction. (Author/SOE)

  6. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  7. Ultrasonic array for obstacle detection based on CDMA with Kasami codes.

    PubMed

    Diego, Cristina; Hernández, Alvaro; Jiménez, Ana; Alvarez, Fernando J; Sanz, Rebeca; Aparicio, Joaquín

    2011-01-01

    This paper raises the design of an ultrasonic array for obstacle detection based on Phased Array (PA) techniques, which steers the acoustic beam through the environment by electronics rather than mechanical means. The transmission of every element in the array has been encoded, according to Code Division for Multiple Access (CDMA), which allows multiple beams to be transmitted simultaneously. All these features together enable a parallel scanning system which does not only improve the image rate but also achieves longer inspection distances in comparison with conventional PA techniques.

  8. Some implications of TCM for optical direct-detection channels. [trellis coded modulation

    NASA Technical Reports Server (NTRS)

    Georghiades, Costas N.

    1989-01-01

    Consideration is given to the optical direct-detection channel, and it is shown how simple trellis-coded modulation (TCM) can be used to improve performance or increase throughput (in bits per second) without bandwidth expansion or performance loss. In fact, a modest performance gain can be achieved. Although the approach can be used with other signal constellations, the authors concentrate on signals derived from the pulse-position modulation (PPM) format by allowing overlap. Theoretical motivation for using this signal set, known as overlapping PPM (OPPM), was recently given by David and Kaplan (1984), who showed a capacity gain when overlap is introduced.

  9. Ultrasonic Array for Obstacle Detection Based on CDMA with Kasami Codes

    PubMed Central

    Diego, Cristina; Hernández, Álvaro; Jiménez, Ana; Álvarez, Fernando J.; Sanz, Rebeca; Aparicio, Joaquín

    2011-01-01

    This paper raises the design of an ultrasonic array for obstacle detection based on Phased Array (PA) techniques, which steers the acoustic beam through the environment by electronics rather than mechanical means. The transmission of every element in the array has been encoded, according to Code Division for Multiple Access (CDMA), which allows multiple beams to be transmitted simultaneously. All these features together enable a parallel scanning system which does not only improve the image rate but also achieves longer inspection distances in comparison with conventional PA techniques. PMID:22247675

  10. Construction of knowledge, attitude and practice questionnaire for assessing plagiarism.

    PubMed

    Poorolajal, J; Cheraghi, P; Irani, A Doosti; Cheraghi, Z; Mirfakhraei, M

    2012-01-01

    This study was conducted to develop a questionnaire in order to evaluate knowledge, attitude and practice (KAP) of the faculty members and students toward plagiarism. A KAP study was conducted from June to October 2011 enrolling 390 volunteers anonymously (response rate 96%). The questionnaire included the following four parts: (a) general characteristics like gender, academic degree and education level; (b) nine questions regarding knowledge (Min=0, Max=9); (c) nine questions regarding attitude (Min=9, Max=27); and (d) eight questions regarding practice (Min=0, Max=8). A pilot study was conducted to assess reliability of the questions regarding knowledge and attitude. Cronbach's alpha coefficient for the knowledge and attitude questions was 0.70 and 0.74 respectively. The overall prevalence of at least once plagiarism commission was 38% (SD=0.035). The overall mean score of knowledge, attitude and practice was 5.94 (SD=1.66), 24.12 (SD=2.99), and 0.66 (SD=1.15) respectively. Knowledge of plagiarism was significantly higher among higher academic degrees and females. Their negative attitude toward plagiarism was stronger too. No statistically significant difference regarding plagiarism commission was observed among different academic degrees in both sexes. According to linear regression analysis, plagiarism commission decreased 13% per one unit increase in score of knowledge (P=0.005) and 16% per one unit increase in score of attitude (P<0.001). This knowledge, attitude, and practice (KAP) questionnaire was developed as a standard tool in order to assess perception of subjects toward plagiarism and to estimate the prevalence and the type of plagiarism commission.

  11. Construction of Knowledge, Attitude and Practice Questionnaire for Assessing Plagiarism

    PubMed Central

    Poorolajal, J; Cheraghi, P; Irani, A Doosti; Cheraghi, Z; Mirfakhraei, M

    2012-01-01

    Background This study was conducted to develop a questionnaire in order to evaluate knowledge, attitude and practice (KAP) of the faculty members and students toward plagiarism. Methods: A KAP study was conducted from June to October 2011 enrolling 390 volunteers anonymously (response rate 96%). The questionnaire included the following four parts: (a) general characteristics like gender, academic degree and education level; (b) nine questions regarding knowledge (Min=0, Max=9); (c) nine questions regarding attitude (Min=9, Max=27); and (d) eight questions regarding practice (Min=0, Max=8). A pilot study was conducted to assess reliability of the questions regarding knowledge and attitude. Cronbach’s alpha coefficient for the knowledge and attitude questions was 0.70 and 0.74 respectively. Results: The overall prevalence of at least once plagiarism commission was 38% (SD=0.035). The overall mean score of knowledge, attitude and practice was 5.94 (SD=1.66), 24.12 (SD=2.99), and 0.66 (SD=1.15) respectively. Knowledge of plagiarism was significantly higher among higher academic degrees and females. Their negative attitude toward plagiarism was stronger too. No statistically significant difference regarding plagiarism commission was observed among different academic degrees in both sexes. According to linear regression analysis, plagiarism commission decreased 13% per one unit increase in score of knowledge (P=0.005) and 16% per one unit increase in score of attitude (P<0.001). Conclusions: This knowledge, attitude, and practice (KAP) questionnaire was developed as a standard tool in order to assess perception of subjects toward plagiarism and to estimate the prevalence and the type of plagiarism commission. PMID:23304676

  12. Iranian academia: evolution after revolution and plagiarism as a disorder.

    PubMed

    Ghazinoory, Sepehr; Ghazinoori, Soroush; Azadegan-Mehr, Mandana

    2011-06-01

    Recently, a few of scientific journals raise serious questions about scientific ethics and moral judgment of some of the Iranian government's senior executives in their papers. Plagiarism, under any circumstances is not justified, and we do not intend to justify it in this note. However, we find it useful in understanding why otherwise respected, responsible individuals may engage in plagiarism by terse review of the history Iranian academia.

  13. Combating plagiarism: the role of the health librarian.

    PubMed

    Spring, Hannah; Adams, Rachel

    2013-12-01

    This feature looks at the issue of plagiarism in health care students and the role of the health librarian in combating the problem. In particular, consideration is given to how plagiarism can occur and provides some examples from two UK universities of approaches health librarians can take in supporting students to avoid these common pitfalls. © 2013 The authors. Health Information and Libraries Journal © 2013 Health Libraries Group.

  14. A local multiple alignment method for detection of non-coding RNA sequences.

    PubMed

    Tabei, Yasuo; Asai, Kiyoshi

    2009-06-15

    Non-coding RNAs (ncRNAs) show a unique evolutionary process in which the substitutions of distant bases are correlated in order to conserve the secondary structure of the ncRNA molecule. Therefore, the multiple alignment method for the detection of ncRNAs should take into account both the primary sequence and the secondary structure. Recently, there has been intense focus on multiple alignment investigations for the detection of ncRNAs; however, most of the proposed methods are designed for global multiple alignments. For this reason, these methods are not appropriate to identify locally conserved ncRNAs among genomic sequences. A more efficient local multiple alignment method for the detection of ncRNAs is required. We propose a new local multiple alignment method for the detection of ncRNAs. This method uses a local multiple alignment construction procedure inspired by ProDA, which is a local multiple aligner program for protein sequences with repeated and shuffled elements. To align sequences based on secondary structure information, we propose a new alignment model which incorporates secondary structure features. We define the conditional probability of an alignment via a conditional random field and use a gamma-centroid estimator to align sequences. The locally aligned subsequences are clustered into blocks of approximately globally alignable subsequences between pairwise alignments. Finally, these blocks are multiply aligned via MXSCARNA. In benchmark experiments, we demonstrate the high ability of the implemented software, SCARNA_LM, for local multiple alignment for the detection of ncRNAs. The C++ source code for SCARNA_LM and its experimental datasets are available at http://www.ncrna.org/software/scarna_lm/download. Supplementary data are available at Bioinformatics online.

  15. Non-coding RNA detection methods combined to improve usability, reproducibility and precision.

    PubMed

    Raasch, Peter; Schmitz, Ulf; Patenge, Nadja; Vera, Julio; Kreikemeyer, Bernd; Wolkenhauer, Olaf

    2010-09-29

    Non-coding RNAs gain more attention as their diverse roles in many cellular processes are discovered. At the same time, the need for efficient computational prediction of ncRNAs increases with the pace of sequencing technology. Existing tools are based on various approaches and techniques, but none of them provides a reliable ncRNA detector yet. Consequently, a natural approach is to combine existing tools. Due to a lack of standard input and output formats combination and comparison of existing tools is difficult. Also, for genomic scans they often need to be incorporated in detection workflows using custom scripts, which decreases transparency and reproducibility. We developed a Java-based framework to integrate existing tools and methods for ncRNA detection. This framework enables users to construct transparent detection workflows and to combine and compare different methods efficiently. We demonstrate the effectiveness of combining detection methods in case studies with the small genomes of Escherichia coli, Listeria monocytogenes and Streptococcus pyogenes. With the combined method, we gained 10% to 20% precision for sensitivities from 30% to 80%. Further, we investigated Streptococcus pyogenes for novel ncRNAs. Using multiple methods--integrated by our framework--we determined four highly probable candidates. We verified all four candidates experimentally using RT-PCR. We have created an extensible framework for practical, transparent and reproducible combination and comparison of ncRNA detection methods. We have proven the effectiveness of this approach in tests and by guiding experiments to find new ncRNAs. The software is freely available under the GNU General Public License (GPL), version 3 at http://www.sbi.uni-rostock.de/moses along with source code, screen shots, examples and tutorial material.

  16. Two-stage sparse coding of region covariance via Log-Euclidean kernels to detect saliency.

    PubMed

    Zhang, Ying-Ying; Yang, Cai; Zhang, Ping

    2017-05-01

    In this paper, we present a novel bottom-up saliency detection algorithm from the perspective of covariance matrices on a Riemannian manifold. Each superpixel is described by a region covariance matrix on Riemannian Manifolds. We carry out a two-stage sparse coding scheme via Log-Euclidean kernels to extract salient objects efficiently. In the first stage, given background dictionary on image borders, sparse coding of each region covariance via Log-Euclidean kernels is performed. The reconstruction error on the background dictionary is regarded as the initial saliency of each superpixel. In the second stage, an improvement of the initial result is achieved by calculating reconstruction errors of the superpixels on foreground dictionary, which is extracted from the first stage saliency map. The sparse coding in the second stage is similar to the first stage, but is able to effectively highlight the salient objects uniformly from the background. Finally, three post-processing methods-highlight-inhibition function, context-based saliency weighting, and the graph cut-are adopted to further refine the saliency map. Experiments on four public benchmark datasets show that the proposed algorithm outperforms the state-of-the-art methods in terms of precision, recall and mean absolute error, and demonstrate the robustness and efficiency of the proposed method.

  17. Construction and Validation of Attitudes Toward Plagiarism Questionnaire

    PubMed Central

    Mavrinac, Martina; Brumini, Gordana; Bilić-Zulle, Lidija; Petrovečki, Mladen

    2010-01-01

    Aim To develop and test the psychometric characteristics of a questionnaire measuring attitudes toward plagiarism. Methods Participants were 227 undergraduates and graduate students from three Croatian universities, with a median age of 21 years (range 18 to 48). Research was conducted from March to June 2009. For the purpose of construction of the first version of the questionnaire, 67 statements (items) were developed. The statements were based on the relevant literature and were developed following rules and recommendations for questionnaire writing, and 36 items were chosen for final validation. Factor analysis was used to find out the factor structure of the questionnaire and to measure construct validity. Results The final version of the questionnaire consisted of 29 items divided into a three-factor structure: factor I – positive attitude toward plagiarism (12 items); factor II – negative attitude toward plagiarism (7 items); and factor III – subjective norms toward plagiarism (10 items). Cronbach α was calculated to confirm the reliability of the scale: factor I – α = 0.83; factor II – α = 0.79; and factor III – α = 0.85. Correlations between factors were: -0.37 between I and II, -0.41 between I and III, and +0.31 between II and III. Conclusion Attitudes Toward Plagiarism questionnaire was developed, with good psychometric characteristics. It will be used in future research as a standardized tool for measuring attitudes toward plagiarism. PMID:20564761

  18. Construction and validation of attitudes toward plagiarism questionnaire.

    PubMed

    Mavrinac, Martina; Brumini, Gordana; Bilić-Zulle, Lidija; Petrovecki, Mladen

    2010-06-01

    To develop and test the psychometric characteristics of a questionnaire measuring attitudes toward plagiarism. Participants were 227 undergraduates and graduate students (128 women and 99 men) from three Croatian universities, with a median age of 21 years (range 18 to 48). Research was conducted from March to June 2009. For the purpose of construction of the first version of the questionnaire, 67 statements (items) were developed. The statements were based on the relevant literature and were developed following rules and recommendations for questionnaire writing, and 36 items were chosen for final validation. Factor analysis was used to find out the factor structure of the questionnaire and to measure construct validity. The final version of the questionnaire consisted of 29 items divided into a three-factor structure: factor I - positive attitude toward plagiarism (12 items); factor II - negative attitude toward plagiarism (7 items); and factor III - subjective norms toward plagiarism (10 items). Cronbach alpha was calculated to confirm the reliability of the scale: factor I - alpha=0.83; factor II - alpha=0.79; and factor III - alpha=0.85. Correlations between factors were: -0.37 between I and II, -0.41 between I and III, and +0.31 between II and III. Attitudes Toward Plagiarism questionnaire was developed, with good psychometric characteristics. It will be used in future research as a standardized tool for measuring attitudes toward plagiarism.

  19. Plagiarism governance in nurse education; dispositions, dimensions and tensions.

    PubMed

    Welsh, Marion

    2017-08-08

    The reality of managing plagiarism in nurse education is indicative of multilayered and cumulative governance processes, which exist to fit with the needs of both the higher education institution and that of the Professional Statutory and Regulatory Body. However, the relationship between these entities is diffuse, particularly when this involves major plagiarism by post-qualified learners. This study sought to explore the strategic governance of plagiarism in Scottish higher education institutions offering nurse education and its articulation with the professional requirements of nurse education. The design involved a retrospective quantitative documentary analysis of plagiarism policies within 11 Scottish higher education institutions and a national on-line survey involving nurse educators with an active teaching role (n = 187). The documentary analysis demonstrated deficits and variations in how Scottish higher education institutions communicated the dimensions of plagiarism, and its subsequent management. Statistically significant findings from the on-line survey provided a clear mandate for educational providers to make visible the connectivity between organisational and professional governance processes to support responsive and proportional approaches to managing plagiarism by nurse learners. Significant findings also confirmed role implications and responsibilities, which nurse educators in this study, viewed as primarily pedagogical but crucially remain professionally centric. Copyright © 2017. Published by Elsevier Ltd.

  20. Auditory detection of ultrasonic coded transmitters by seals and sea lions.

    PubMed

    Cunningham, Kane A; Hayes, Sean A; Michelle Wargo Rub, A; Reichmuth, Colleen

    2014-04-01

    Ultrasonic coded transmitters (UCTs) are high-frequency acoustic tags that are often used to conduct survivorship studies of vulnerable fish species. Recent observations of differential mortality in tag control studies suggest that fish instrumented with UCTs may be selectively targeted by marine mammal predators, thereby skewing valuable survivorship data. In order to better understand the ability of pinnipeds to detect UCT outputs, behavioral high-frequency hearing thresholds were obtained from a trained harbor seal (Phoca vitulina) and a trained California sea lion (Zalophus californianus). Thresholds were measured for extended (500 ms) and brief (10 ms) 69 kHz narrowband stimuli, as well as for a stimulus recorded directly from a Vemco V16-3H UCT, which consisted of eight 10 ms, 69 kHz pure-tone pulses. Detection thresholds for the harbor seal were as expected based on existing audiometric data for this species, while the California sea lion was much more sensitive than predicted. Given measured detection thresholds of 113 dB re 1 μPa and 124 dB re 1 μPa, respectively, both species are likely able to detect acoustic outputs of the Vemco V16-3H under water from distances exceeding 200 m in typical natural conditions, suggesting that these species are capable of using UCTs to detect free-ranging fish.

  1. Transformation of the neural code for tactile detection from thalamus to cortex

    PubMed Central

    Vázquez, Yuriria; Salinas, Emilio; Romo, Ranulfo

    2013-01-01

    To understand how sensory-driven neural activity gives rise to perception, it is essential to characterize how various relay stations in the brain encode stimulus presence. Neurons in the ventral posterior lateral (VPL) nucleus of the somatosensory thalamus and in primary somatosensory cortex (S1) respond to vibrotactile stimulation with relatively slow modulations (∼100 ms) of their firing rate. In addition, faster modulations (∼10 ms) time-locked to the stimulus waveform are observed in both areas, but their contribution to stimulus detection is unknown. Furthermore, it is unclear whether VPL and S1 neurons encode stimulus presence with similar accuracy and via the same response features. To address these questions, we recorded single neurons while trained monkeys judged the presence or absence of a vibrotactile stimulus of variable amplitude, and their activity was analyzed with a unique decoding method that is sensitive to the time scale of the firing rate fluctuations. We found that the maximum detection accuracy of single neurons is similar in VPL and S1. However, VPL relies more heavily on fast rate modulations than S1, and as a consequence, the neural code in S1 is more tolerant: its performance degrades less when the readout method or the time scale of integration is suboptimal. Therefore, S1 neurons implement a more robust code, one less sensitive to the temporal integration window used to infer stimulus presence downstream. The differences between VPL and S1 responses signaling the appearance of a stimulus suggest a transformation of the neural code from thalamus to cortex. PMID:23798408

  2. Performance improvement of hybrid subcarrier multiplexing optical spectrum code division multiplexing system using spectral direct decoding detection technique

    NASA Astrophysics Data System (ADS)

    Sahbudin, R. K. Z.; Abdullah, M. K.; Mokhtar, M.

    2009-06-01

    This paper proposes a hybrid subcarrier multiplexing/optical spectrum code division multiplexing (SCM/OSCDM) system for the purpose of combining the advantages of both techniques. Optical spectrum code division multiple-access (OSCDMA) is one of the multiplexing techniques that is becoming popular because of the flexibility in the allocation of channels, ability to operate asynchronously, enhanced privacy and increased capacity in bursty nature networks. On the other hand, subcarrier multiplexing (SCM) technique is able to enhance the channel data rate of OSCDMA systems. In this paper, a newly developed detection technique for the OSCDM called spectral direct decoding (SDD) detection technique is compared mathematically with the AND subtraction detection technique. The system utilizes a new unified code construction named KS (Khazani-Syed) code. The results characterizing the bit-error-rate (BER) show that SDD offers a significant improved performance at BER of 10 -9.

  3. Passive Copy-Move Forgery Detection Using Halftoning-based Block Truncation Coding Feature

    NASA Astrophysics Data System (ADS)

    Harjito, Bambang; Prasetyo, Heri

    2017-06-01

    This paper presents a new method on passive copy-move forgery detection by exploiting the effectiveness and usability of Halftoning-based Block Truncation Coding (HBTC) image feature. Copy-move forgery detection precisely locates the large size or flat tampered regions of an image. On our method, the tampered input image is firstly divided into several overlapping image blocks to construct the image feature descriptors. Each image block is further divided into several non-overlapping image blocks for processing HBTC. Two image feature descriptors, namely Color Feature (CF) and Bit Pattern Feature (BF) are computed from the HBTC compressed data-stream of each image block. Lexicography sorting rearranges the image feature descriptors in ascending manner for whole image. The similarity between some tampered image regions is measured based on their CF and BF under specific shift frequency threshold. As documented in the experimental results, the proposed method yields a promising result for detecting the tampered or copy-move forgery regions. It has proved that the HBTC is not only suitable for image compression, but it can also be used in the copy-move forgery detection.

  4. Real Time PCR to detect hazelnut allergen coding sequences in processed foods.

    PubMed

    Iniesto, Elisa; Jiménez, Ana; Prieto, Nuria; Cabanillas, Beatriz; Burbano, Carmen; Pedrosa, Mercedes M; Rodríguez, Julia; Muzquiz, Mercedes; Crespo, Jesús F; Cuadrado, Carmen; Linacero, Rosario

    2013-06-01

    A quantitative RT-PCR method, employing novel primer sets designed on Cor a 9, Cor a 11 and Cor a 13 allergen-coding sequences has been setup and validated. Its specificity, sensitivity and applicability have been compared. The effect of processing on detectability of these hazelnut targets in complex food matrices was also studied. The DNA extraction method based on CTAB-phenol-chloroform was the best for hazelnut. RT-PCR using primers for Cor a 9, 11 and 13 allowed a specific and accurate amplification of these sequences. The limit of detection was 1 ppm of raw hazelnut. The method sensitivity and robustness were confirmed with spiked samples. Thermal treatments (roasting and autoclaving) reduced yield and amplificability of hazelnut DNA, however, high-hydrostatic pressure did not affect. Compared with an ELISA assay, this RT-PCR showed higher sensitivity to detected hazelnut traces in commercial foodstuffs. The RT-PCR method described is the most sensitive of those reported for the detection of hazelnut traces in processed foods.

  5. Detection and reconstruction of error control codes for engineered and biological regulatory systems.

    SciTech Connect

    May, Elebeoba Eni; Rintoul, Mark Daniel; Johnston, Anna Marie; Pryor, Richard J.; Hart, William Eugene; Watson, Jean-Paul

    2003-10-01

    A fundamental challenge for all communication systems, engineered or living, is the problem of achieving efficient, secure, and error-free communication over noisy channels. Information theoretic principals have been used to develop effective coding theory algorithms to successfully transmit information in engineering systems. Living systems also successfully transmit biological information through genetic processes such as replication, transcription, and translation, where the genome of an organism is the contents of the transmission. Decoding of received bit streams is fairly straightforward when the channel encoding algorithms are efficient and known. If the encoding scheme is unknown or part of the data is missing or intercepted, how would one design a viable decoder for the received transmission? For such systems blind reconstruction of the encoding/decoding system would be a vital step in recovering the original message. Communication engineers may not frequently encounter this situation, but for computational biologists and biotechnologist this is an immediate challenge. The goal of this work is to develop methods for detecting and reconstructing the encoder/decoder system for engineered and biological data. Building on Sandia's strengths in discrete mathematics, algorithms, and communication theory, we use linear programming and will use evolutionary computing techniques to construct efficient algorithms for modeling the coding system for minimally errored engineered data stream and genomic regulatory DNA and RNA sequences. The objective for the initial phase of this project is to construct solid parallels between biological literature and fundamental elements of communication theory. In this light, the milestones for FY2003 were focused on defining genetic channel characteristics and providing an initial approximation for key parameters, including coding rate, memory length, and minimum distance values. A secondary objective addressed the question of

  6. Literacy & Identity: Trust, Betrayal, and Authorship: Plagiarism and How We Perceive Students

    ERIC Educational Resources Information Center

    Williams, Bronwyn T.

    2007-01-01

    Emotional responses to plagiarism are rarely addressed in professional literature that focuses on ethics and good teaching practices. Yet, the emotions that are unleashed by cases of plagiarism, or suspicions of plagiarism, influence how we perceive our students and how we approach teaching them. Such responses have been complicated by online…

  7. Is It Happening? How to Avoid the Deleterious Effects of Plagiarism and Cheating in Your Courses

    ERIC Educational Resources Information Center

    Hall, Susan E.

    2011-01-01

    Plagiarism can be "plaguing" if it is not discussed, understood, and enforced by the professor right at the beginning of the course and throughout the semester. Students usually don't "have" to cheat or plagiarize; they do so mainly because "they can." Professors who turn a deaf ear or a blind eye to students who plagiarize create deleterious…

  8. Is Cheating Always Intentional? The Perception of College Students toward the Issues of Plagiarism

    ERIC Educational Resources Information Center

    Tabor, Erin L.

    2013-01-01

    The definition of plagiarism that is used in university handbooks is a simple one, and policies along with tiers of disciplinary strategies are used by faculty members in higher education to deter students from committing a plagiarism infraction based on this simple definition. However, plagiarism still occurs on college campuses, and this may be…

  9. Plagiarism Awareness among Students: Assessing Integration of Ethics Theory into Library Instruction

    ERIC Educational Resources Information Center

    Strittmatter, Connie; Bratton, Virginia K.

    2014-01-01

    The library literature on plagiarism instruction focuses on students' understanding of what plagiarism is and is not. This study evaluates the effect of library instruction from a broader perspective by examining the pre- and posttest (instruction) levels of students' perceptions toward plagiarism ethics. Eighty-six students completed a pre- and…

  10. The Use of Technology to Combat Plagiarism in Business Communication Classes

    ERIC Educational Resources Information Center

    Stowers, Robert H.; Hummel, Julie Y.

    2011-01-01

    Some have called plagiarism literary theft. Plagiarizing is akin to stealing the intellect of another person. At times, plagiarism occurs because of ignorance, sloppy authorship, or lack of knowledge about proper sourcing. Sometimes, it is done purposefully. Experts have suggested that the concept of intellectual ownership is limited to Western…

  11. Measuring Plagiarism: Researching What Students Do, Not What They Say They Do

    ERIC Educational Resources Information Center

    Walker, John

    2010-01-01

    Student plagiarism in colleges and universities has become a controversial issue in recent years. A key problem has been the lack of reliable empirical data on the frequency, nature and extent of plagiarism in student assignments. The aim of the study described here was to provide this data. Patterns of plagiarism were tracked in two university…

  12. A Safe Place: The Role of Librarians and Writing Centers in Addressing Citation Practices and Plagiarism

    ERIC Educational Resources Information Center

    Buranen, Lise

    2009-01-01

    In American colleges and universities, plagiarism is a hot topic: teachers wail and moan about the rise in student plagiarism (though often without evidence to demonstrate this supposed rise); they complain that the Web has "caused" plagiarism; and at the same time, many believe that technology is the key to "solving" the problem of student…

  13. When Emotion Stands to Reason: A Phenomenological Study of Composition Instructors' Emotional Responses to Plagiarism

    ERIC Educational Resources Information Center

    Biswas, Ann E.

    2015-01-01

    Plagiarism has been the focus of considerable scholarly research in recent decades, much of which has examined the number of students who are plagiarizing, why they plagiarize, and what instructors can do to teach students to effectively and ethically integrate their own words and ideas with those of their sources. Overlooked in this scholarship…

  14. When Emotion Stands to Reason: A Phenomenological Study of Composition Instructors' Emotional Responses to Plagiarism

    ERIC Educational Resources Information Center

    Biswas, Ann E.

    2015-01-01

    Plagiarism has been the focus of considerable scholarly research in recent decades, much of which has examined the number of students who are plagiarizing, why they plagiarize, and what instructors can do to teach students to effectively and ethically integrate their own words and ideas with those of their sources. Overlooked in this scholarship…

  15. An Integrated Academic Literacy Approach to Improving Students' Understanding of Plagiarism in an Accounting Course

    ERIC Educational Resources Information Center

    Powell, Lisa; Singh, Nishani

    2016-01-01

    Plagiarism in higher education is a widespread and complex issue. Students' understanding of plagiarism differs as a result of combining their prior learning about referencing with their current experience of institutional policies and generic resources. Plagiarism was identified as a major learning issue in a core second-year undergraduate…

  16. First-Year University Science and Engineering Students' Understanding of Plagiarism

    ERIC Educational Resources Information Center

    Yeo, Shelley

    2007-01-01

    This paper is a case study of first-year science and engineering students' understandings of plagiarism. Students were surveyed for their views on scenarios illustrating instances of plagiarism in the context of the academic work and assessment of science and engineering students. The aim was to explore their understandings of plagiarism and their…

  17. "It's Not Fair": Policy Discourses and Students' Understandings of Plagiarism in a New Zealand University

    ERIC Educational Resources Information Center

    Adam, Lee; Anderson, Vivienne; Spronken-Smith, Rachel

    2017-01-01

    Plagiarism is a concept that is difficult to define. Although most higher education institutions have policies aimed at minimising and addressing student plagiarism, little research has examined the ways in which plagiarism is discursively constructed in university policy documents, or the connections and disconnections between institutional and…

  18. Placing the Library at the Heart of Plagiarism Prevention: The University of Bradford Experience

    ERIC Educational Resources Information Center

    George, Sarah; Costigan, Anne; O'hara, Maria

    2013-01-01

    Plagiarism is a vexing issue for Higher Education, affecting student transition, retention, and attainment. This article reports on two initiatives from the University of Bradford library aimed at reducing student plagiarism. The first initiative is an intensive course for students who have contravened plagiarism regulations. The second course…

  19. Is Cheating Always Intentional? The Perception of College Students toward the Issues of Plagiarism

    ERIC Educational Resources Information Center

    Tabor, Erin L.

    2013-01-01

    The definition of plagiarism that is used in university handbooks is a simple one, and policies along with tiers of disciplinary strategies are used by faculty members in higher education to deter students from committing a plagiarism infraction based on this simple definition. However, plagiarism still occurs on college campuses, and this may be…

  20. An Integrated Academic Literacy Approach to Improving Students' Understanding of Plagiarism in an Accounting Course

    ERIC Educational Resources Information Center

    Powell, Lisa; Singh, Nishani

    2016-01-01

    Plagiarism in higher education is a widespread and complex issue. Students' understanding of plagiarism differs as a result of combining their prior learning about referencing with their current experience of institutional policies and generic resources. Plagiarism was identified as a major learning issue in a core second-year undergraduate…

  1. Is It Happening? How to Avoid the Deleterious Effects of Plagiarism and Cheating in Your Courses

    ERIC Educational Resources Information Center

    Hall, Susan E.

    2011-01-01

    Plagiarism can be "plaguing" if it is not discussed, understood, and enforced by the professor right at the beginning of the course and throughout the semester. Students usually don't "have" to cheat or plagiarize; they do so mainly because "they can." Professors who turn a deaf ear or a blind eye to students who plagiarize create deleterious…

  2. Plagiarism Awareness among Students: Assessing Integration of Ethics Theory into Library Instruction

    ERIC Educational Resources Information Center

    Strittmatter, Connie; Bratton, Virginia K.

    2014-01-01

    The library literature on plagiarism instruction focuses on students' understanding of what plagiarism is and is not. This study evaluates the effect of library instruction from a broader perspective by examining the pre- and posttest (instruction) levels of students' perceptions toward plagiarism ethics. Eighty-six students completed a pre- and…

  3. A Safe Place: The Role of Librarians and Writing Centers in Addressing Citation Practices and Plagiarism

    ERIC Educational Resources Information Center

    Buranen, Lise

    2009-01-01

    In American colleges and universities, plagiarism is a hot topic: teachers wail and moan about the rise in student plagiarism (though often without evidence to demonstrate this supposed rise); they complain that the Web has "caused" plagiarism; and at the same time, many believe that technology is the key to "solving" the problem of student…

  4. Measuring Plagiarism: Researching What Students Do, Not What They Say They Do

    ERIC Educational Resources Information Center

    Walker, John

    2010-01-01

    Student plagiarism in colleges and universities has become a controversial issue in recent years. A key problem has been the lack of reliable empirical data on the frequency, nature and extent of plagiarism in student assignments. The aim of the study described here was to provide this data. Patterns of plagiarism were tracked in two university…

  5. The Use of Technology to Combat Plagiarism in Business Communication Classes

    ERIC Educational Resources Information Center

    Stowers, Robert H.; Hummel, Julie Y.

    2011-01-01

    Some have called plagiarism literary theft. Plagiarizing is akin to stealing the intellect of another person. At times, plagiarism occurs because of ignorance, sloppy authorship, or lack of knowledge about proper sourcing. Sometimes, it is done purposefully. Experts have suggested that the concept of intellectual ownership is limited to Western…

  6. Literacy & Identity: Trust, Betrayal, and Authorship: Plagiarism and How We Perceive Students

    ERIC Educational Resources Information Center

    Williams, Bronwyn T.

    2007-01-01

    Emotional responses to plagiarism are rarely addressed in professional literature that focuses on ethics and good teaching practices. Yet, the emotions that are unleashed by cases of plagiarism, or suspicions of plagiarism, influence how we perceive our students and how we approach teaching them. Such responses have been complicated by online…

  7. Placing the Library at the Heart of Plagiarism Prevention: The University of Bradford Experience

    ERIC Educational Resources Information Center

    George, Sarah; Costigan, Anne; O'hara, Maria

    2013-01-01

    Plagiarism is a vexing issue for Higher Education, affecting student transition, retention, and attainment. This article reports on two initiatives from the University of Bradford library aimed at reducing student plagiarism. The first initiative is an intensive course for students who have contravened plagiarism regulations. The second course…

  8. Scientists Admitting to Plagiarism: A Meta-analysis of Surveys.

    PubMed

    Pupovac, Vanja; Fanelli, Daniele

    2015-10-01

    We conducted a systematic review and meta-analysis of anonymous surveys asking scientists whether they ever committed various forms of plagiarism. From May to December 2011 we searched 35 bibliographic databases, five grey literature databases and hand searched nine journals for potentially relevant studies. We included surveys that asked scientists if, in a given recall period, they had committed or knew of a colleague who committed plagiarism, and from each survey extracted the proportion of those who reported at least one case. Studies that focused on academic (i.e. student) plagiarism were excluded. Literature searches returned 12,460 titles from which 17 relevant survey studies were identified. Meta-analysis of studies reporting committed (N = 7) and witnessed (N = 11) plagiarism yielded a pooled estimate of, respectively, 1.7% (95% CI 1.2-2.4) and 30% (95% CI 17-46). Basic methodological factors, including sample size, year of survey, delivery method and whether survey questions were explicit rather than indirect made a significant difference on survey results. Even after controlling for these methodological factors, between-study differences in admission rates were significantly above those expected by sampling error alone and remained largely unexplained. Despite several limitations of the data and of this meta-analysis, we draw three robust conclusions: (1) The rate at which scientists report knowing a colleague who committed plagiarism is higher than for data fabrication and falsification; (2) The rate at which scientists report knowing a colleague who committed plagiarism is correlated to that of fabrication and falsification; (3) The rate at which scientists admit having committed either form of misconduct (i.e. fabrication, falsification and plagiarism) in surveys has declined over time.

  9. Coded excitation speeds up the detection of the fundamental flexural guided wave in coated tubes

    NASA Astrophysics Data System (ADS)

    Song, Xiaojun; Moilanen, Petro; Zhao, Zuomin; Ta, Dean; Pirhonen, Jalmari; Salmi, Ari; Hæeggström, Edward; Myllylä, Risto; Timonen, Jussi; Wang, Weiqi

    2016-09-01

    The fundamental flexural guided wave (FFGW) permits ultrasonic assessment of the wall thickness of solid waveguides, such as tubes or, e.g., long cortical bones. Recently, an optical non-contact method was proposed for ultrasound excitation and detection with the aim of facilitating the FFGW reception by suppressing the interfering modes from the soft coating. This technique suffers from low SNR and requires iterative physical scanning across the source-receiver distance for 2D-FFT analysis. This means that SNR improvement achieved by temporal averaging becomes time-consuming (several minutes) which reduces the applicability of the technique, especially in time-critical applications such as clinical quantitative ultrasound. To achieve sufficient SNR faster, an ultrasonic excitation by a base-sequence-modulated Golay code (BSGC, 64-bit code pair) on coated tube samples (1-5 mm wall thickness and 5 mm soft coating layer) was used. This approach improved SNR by 21 dB and speeded up the measurement by a factor of 100 compared to using a classical pulse excitation with temporal averaging. The measurement now took seconds instead of minutes, while the ability to determine the wall thickness of the phantoms was maintained. The technique thus allows rapid noncontacting assessment of the wall thickness in coated solid tubes, such as the human bone.

  10. Selective Capture and Quick Detection of Targeting Cells with SERS-Coding Microsphere Suspension Chip.

    PubMed

    Li, Dian; Zhang, Yuting; Li, Ruimin; Guo, Jia; Wang, Changchun; Tang, Chuanbing

    2015-05-13

    Circulating tumor cells (CTCs) captured from blood fluid represent recurrent cancers and metastatic lesions to monitor the situation of cancers. We develop surface-enhanced Raman scattering (SERS)-coding microsphere suspension chip as a new strategy for fast and efficient capture, recovery, and detection of targeting cancer cells. Using HeLa cells as model CTCs, we first utilize folate as a recognition molecule to be immobilized in magnetic composite microspheres for capturing HeLa cells and attaining high capturing efficacy (up to 95%). After capturing cells, the composite microsphere, which utilizes a disulfide bond as crosslinker in the polymer shell and as a spacer for linking folate, can recycle 90% cells within 20 min eluted by glutathion solution. Taking advantage of the SERS with fingerprint features, we characterize captured/recovered cells with the unique signal of report-molecule 4-aminothiophenol through introducing the SERS-coding microsphere suspension chip to CTCs. Finally, the exploratory experiment of sieving cells shows that the magnetic composite microspheres can selectively capture the HeLa cells from samples of mixed cells, indicating that these magnetic composite microspheres have potential in real blood samples for capturing CTCs.

  11. Sub-Nyquist sampling and detection in Costas coded pulse compression radars

    NASA Astrophysics Data System (ADS)

    Hanif, Adnan; Mansoor, Atif Bin; Imran, Ali Shariq

    2016-12-01

    Modern pulse compression radar involves digital signal processing of high bandwidth pulses modulated with different coding schemes. One of the limiting factors in the radar's design to achieve desired target range and resolution is the need of high rate analog-to-digital (A/D) conversion fulfilling the Nyquist sampling criteria. The high sampling rates necessitate huge storage capacity, more power consumption, and extra processing requirement. We introduce a new approach to sample wideband radar waveform modulated with Costas sequence at a sub-Nyquist rate based upon the concept of compressive sensing (CS). Sub-Nyquist measurements of Costas sequence waveform are performed in an analog-to-information (A/I) converter based upon random demodulation replacing traditional A/D converter. The novel work presents an 8-order Costas coded waveform with sub-Nyquist sampling and its reconstruction. The reconstructed waveform is compared with the conventionally sampled signal and depicts high-quality signal recovery from sub-Nyquist sampled signal. Furthermore, performance of CS-based detections after reconstruction are evaluated in terms of receiver operating characteristic (ROC) curves and compared with conventional Nyquist-rate matched filtering scheme.

  12. Detection by real time PCR of walnut allergen coding sequences in processed foods.

    PubMed

    Linacero, Rosario; Ballesteros, Isabel; Sanchiz, Africa; Prieto, Nuria; Iniesto, Elisa; Martinez, Yolanda; Pedrosa, Mercedes M; Muzquiz, Mercedes; Cabanillas, Beatriz; Rovira, Mercè; Burbano, Carmen; Cuadrado, Carmen

    2016-07-01

    A quantitative real-time PCR (RT-PCR) method, employing novel primer sets designed on Jug r 1, Jug r 3, and Jug r 4 allergen-coding sequences, was set up and validated. Its specificity, sensitivity, and applicability were evaluated. The DNA extraction method based on CTAB-phenol-chloroform was best for walnut. RT-PCR allowed a specific and accurate amplification of allergen sequence, and the limit of detection was 2.5pg of walnut DNA. The method sensitivity and robustness were confirmed with spiked samples, and Jug r 3 primers detected up to 100mg/kg of raw walnut (LOD 0.01%, LOQ 0.05%). Thermal treatment combined with pressure (autoclaving) reduced yield and amplification (integrity and quality) of walnut DNA. High hydrostatic pressure (HHP) did not produce any effect on the walnut DNA amplification. This RT-PCR method showed greater sensitivity and reliability in the detection of walnut traces in commercial foodstuffs compared with ELISA assays.

  13. Efficient postprocessing scheme for block-coded images based on multiscale edge detection

    NASA Astrophysics Data System (ADS)

    Wu, Shuanhu; Yan, Hong; Tan, Zheng

    2001-09-01

    The block discrete cosine transform (BDCT) is the most widely used technique for the compression of both still and moving images, a major problem related with the BDCT techniques is that the decoded images, especially at low bit rate, exhibit visually annoying blocking effects. In this paper, based on Mallets multiscale edge detection, we proposed an efficient deblocking algorithm to further improved the coding performance. The advantage of our algorithm is that it can efficiently preserve texture structure in the original decompressed images. Our method is similar to that of Z. Xiong's, where the Z.Xiong's method is not suitable for images with a large portion of texture; for instance, the Barbara Image. The difference of our method and the Z.Xiong's is that our method adopted a new thresholding scheme for multi-scale edge detection instead of exploiting cross-scale correlation for edge detection. Numerical experiment results show that our scheme not only outperforms Z.Xiong's for various images in the case of the same computational complexity, but also preserve texture structure in the decompressed images at the same time. Compared with the best iterative-based method (POCS) reported in the literature, our algorithm can achieve the same peak signal-to-noise ratio (PSNR) improvement and give visually very pleasing images as well.

  14. Nanoparticle-Based Bio-Bar Codes for the Ultrasensitive Detection of Proteins

    NASA Astrophysics Data System (ADS)

    Nam, Jwa-Min; Shad Thaxton, C.; Mirkin, Chad A.

    2003-09-01

    An ultrasensitive method for detecting protein analytes has been developed. The system relies on magnetic microparticle probes with antibodies that specifically bind a target of interest [prostate-specific antigen (PSA) in this case] and nanoparticle probes that are encoded with DNA that is unique to the protein target of interest and antibodies that can sandwich the target captured by the microparticle probes. Magnetic separation of the complexed probes and target followed by dehybridization of the oligonucleotides on the nanoparticle probe surface allows the determination of the presence of the target protein by identifying the oligonucleotide sequence released from the nanoparticle probe. Because the nanoparticle probe carries with it a large number of oligonucleotides per protein binding event, there is substantial amplification and PSA can be detected at 30 attomolar concentration. Alternatively, a polymerase chain reaction on the oligonucleotide bar codes can boost the sensitivity to 3 attomolar. Comparable clinically accepted conventional assays for detecting the same target have sensitivity limits of ~3 picomdar, six orders of magnitude less sensitive than what is observed with this method.

  15. Assessment of absolute added correlative coding in optical intensity modulation and direct detection channels

    NASA Astrophysics Data System (ADS)

    Dong-Nhat, Nguyen; Elsherif, Mohamed A.; Malekmohammadi, Amin

    2016-06-01

    The performance of absolute added correlative coding (AACC) modulation format with direct detection has been numerically and analytically reported, targeting metro data center interconnects. Hereby, the focus lies on the performance of the bit error rate, noise contributions, spectral efficiency, and chromatic dispersion tolerance. The signal space model of AACC, where the average electrical and optical power expressions are derived for the first time, is also delineated. The proposed modulation format was also compared to other well-known signaling, such as on-off-keying (OOK) and four-level pulse-amplitude modulation, at the same bit rate in a directly modulated vertical-cavity surface-emitting laser-based transmission system. The comparison results show a clear advantage of AACC in achieving longer fiber delivery distance due to the higher dispersion tolerance.

  16. Cooperative multi-user detection and ranging based on pseudo-random codes

    NASA Astrophysics Data System (ADS)

    Morhart, C.; Biebl, E. M.

    2009-05-01

    We present an improved approach for a Round Trip Time of Flight distance measurement system. The system is intended for the usage in a cooperative localisation system for automotive applications. Therefore, it is designed to address a large number of communication partners per measurement cycle. By using coded signals in a time divison multiple access order, we can detect a large number of pedestrian sensors with just one car sensor. We achieve this by using very short transmit bursts in combination with a real time correlation algorithm. Futhermore, the correlation approach offers real time data, concerning the time of arrival, that can serve as a trigger impulse for other comunication systems. The distance accuracy of the correlation result was further increased by adding a fourier interpolation filter. The system performance was checked with a prototype at 2.4 GHz. We reached a distance measurement accuracy of 12 cm at a range up to 450 m.

  17. Modulated pulse laser with pseudorandom coding capabilities for underwater ranging, detection, and imaging.

    PubMed

    Cochenour, Brandon; Mullen, Linda; Muth, John

    2011-11-20

    Optical detection, ranging, and imaging of targets in turbid water is complicated by absorption and scattering. It has been shown that using a pulsed laser source with a range-gated receiver or an intensity modulated source with a coherent RF receiver can improve target contrast in turbid water. A blended approach using a modulated-pulse waveform has been previously suggested as a way to further improve target contrast. However only recently has a rugged and reliable laser source been developed that is capable of synthesizing such a waveform so that the effect of the underwater environment on the propagation of a modulated pulse can be studied. In this paper, we outline the motivation for the modulated-pulse (MP) concept, and experimentally evaluate different MP waveforms: single-tone MP and pseudorandom coded MP sequences.

  18. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.

    PubMed

    Al-Dmour, Hayat; Al-Ani, Ahmed

    2016-04-01

    The present work has the goal of developing a secure medical imaging information system based on a combined steganography and cryptography technique. It attempts to securely embed patient's confidential information into his/her medical images. The proposed information security scheme conceals coded Electronic Patient Records (EPRs) into medical images in order to protect the EPRs' confidentiality without affecting the image quality and particularly the Region of Interest (ROI), which is essential for diagnosis. The secret EPR data is converted into ciphertext using private symmetric encryption method. Since the Human Visual System (HVS) is less sensitive to alterations in sharp regions compared to uniform regions, a simple edge detection method has been introduced to identify and embed in edge pixels, which will lead to an improved stego image quality. In order to increase the embedding capacity, the algorithm embeds variable number of bits (up to 3) in edge pixels based on the strength of edges. Moreover, to increase the efficiency, two message coding mechanisms have been utilized to enhance the ±1 steganography. The first one, which is based on Hamming code, is simple and fast, while the other which is known as the Syndrome Trellis Code (STC), is more sophisticated as it attempts to find a stego image that is close to the cover image through minimizing the embedding impact. The proposed steganography algorithm embeds the secret data bits into the Region of Non Interest (RONI), where due to its importance; the ROI is preserved from modifications. The experimental results demonstrate that the proposed method can embed large amount of secret data without leaving a noticeable distortion in the output image. The effectiveness of the proposed algorithm is also proven using one of the efficient steganalysis techniques. The proposed medical imaging information system proved to be capable of concealing EPR data and producing imperceptible stego images with minimal

  19. Decoding of DBEC-TBED Reed-Solomon codes. [Double-Byte-Error-Correcting, Triple-Byte-Error-Detecting

    NASA Technical Reports Server (NTRS)

    Deng, Robert H.; Costello, Daniel J., Jr.

    1987-01-01

    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. In LSI and VLSI technology, memories are often organized on a multiple bit (or byte) per chip basis. For example, some 256 K bit DRAM's are organized in 32 K x 8 bit-bytes. Byte-oriented codes such as Reed-Solomon (RS) codes can provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. The paper presents a special decoding technique for double-byte-error-correcting, triple-byte-error-detecting RS codes which is capable of high-speed operation. This technique is designed to find the error locations and the error values directly from the syndrome without having to use the iterative algorithm to find the error locator polynomial.

  20. Decoding of DBEC-TBED Reed-Solomon codes. [Double-Byte-Error-Correcting, Triple-Byte-Error-Detecting

    NASA Technical Reports Server (NTRS)

    Deng, Robert H.; Costello, Daniel J., Jr.

    1987-01-01

    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. In LSI and VLSI technology, memories are often organized on a multiple bit (or byte) per chip basis. For example, some 256 K bit DRAM's are organized in 32 K x 8 bit-bytes. Byte-oriented codes such as Reed-Solomon (RS) codes can provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. The paper presents a special decoding technique for double-byte-error-correcting, triple-byte-error-detecting RS codes which is capable of high-speed operation. This technique is designed to find the error locations and the error values directly from the syndrome without having to use the iterative algorithm to find the error locator polynomial.

  1. PCR-free quantitative detection of genetically modified organism from raw materials. An electrochemiluminescence-based bio bar code method.

    PubMed

    Zhu, Debin; Tang, Yabing; Xing, Da; Chen, Wei R

    2008-05-15

    A bio bar code assay based on oligonucleotide-modified gold nanoparticles (Au-NPs) provides a PCR-free method for quantitative detection of nucleic acid targets. However, the current bio bar code assay requires lengthy experimental procedures including the preparation and release of bar code DNA probes from the target-nanoparticle complex and immobilization and hybridization of the probes for quantification. Herein, we report a novel PCR-free electrochemiluminescence (ECL)-based bio bar code assay for the quantitative detection of genetically modified organism (GMO) from raw materials. It consists of tris-(2,2'-bipyridyl) ruthenium (TBR)-labeled bar code DNA, nucleic acid hybridization using Au-NPs and biotin-labeled probes, and selective capture of the hybridization complex by streptavidin-coated paramagnetic beads. The detection of target DNA is realized by direct measurement of ECL emission of TBR. It can quantitatively detect target nucleic acids with high speed and sensitivity. This method can be used to quantitatively detect GMO fragments from real GMO products.

  2. An intervention aimed at reducing plagiarism in undergraduate nursing students.

    PubMed

    Smedley, Alison; Crawford, Tonia; Cloete, Linda

    2015-05-01

    Plagiarism is a current and developing problem in the tertiary education sector where students access information and reproduce it as their own. It is identified as occurring in many tertiary level degrees including nursing and allied health profession degrees. Nursing specifically, is a profession where standards and ethics are required and honesty is paramount. The aim of this study was to evaluate the change in nursing student's knowledge and understanding of plagiarism before and after an educational intervention in their first semester of the Bachelor of nursing degree at a private college of higher education in Sydney, Australia. This study concluded that an educational intervention can increase knowledge and awareness of plagiarism among nursing students. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Society for Academic Emergency Medicine Statement on Plagiarism.

    PubMed

    Asher, Shellie L; Iserson, Kenneth V; Merck, Lisa H

    2017-06-19

    The integrity of the research enterprise is of the utmost importance for the advancement of safe and effective medical practice for patients and for maintaining the public trust in health care. Academic societies and editors of journals are key participants in guarding scientific integrity. Avoiding and preventing plagiarism helps to preserve the scientific integrity of professional presentations and publications. The Society for Academic Emergency Medicine (SAEM) Ethics Committee discusses current issues in scientific publishing integrity and provides a guideline to avoid plagiarism in SAEM presentations and publications. © 2017 by the Society for Academic Emergency Medicine.

  4. Real-time detection of natural objects using AM-coded spectral matching imager

    NASA Astrophysics Data System (ADS)

    Kimachi, Akira

    2004-12-01

    This paper describes application of the amplitude-modulation (AM)-coded spectral matching imager (SMI) to real-time detection of natural objects such as human beings, animals, vegetables, or geological objects or phenomena, which are much more liable to change with time than artificial products while often exhibiting characteristic spectral functions associated with some specific activity states. The AM-SMI produces correlation between spectral functions of the object and a reference at each pixel of the correlation image sensor (CIS) in every frame, based on orthogonal amplitude modulation (AM) of each spectral channel and simultaneous demodulation of all channels on the CIS. This principle makes the SMI suitable to monitoring dynamic behavior of natural objects in real-time by looking at a particular spectral reflectance or transmittance function. A twelve-channel multispectral light source was developed with improved spatial uniformity of spectral irradiance compared to a previous one. Experimental results of spectral matching imaging of human skin and vegetable leaves are demonstrated, as well as a preliminary feasibility test of imaging a reflective object using a test color chart.

  5. Real-time detection of natural objects using AM-coded spectral matching imager

    NASA Astrophysics Data System (ADS)

    Kimachi, Akira

    2005-01-01

    This paper describes application of the amplitude-modulation (AM)-coded spectral matching imager (SMI) to real-time detection of natural objects such as human beings, animals, vegetables, or geological objects or phenomena, which are much more liable to change with time than artificial products while often exhibiting characteristic spectral functions associated with some specific activity states. The AM-SMI produces correlation between spectral functions of the object and a reference at each pixel of the correlation image sensor (CIS) in every frame, based on orthogonal amplitude modulation (AM) of each spectral channel and simultaneous demodulation of all channels on the CIS. This principle makes the SMI suitable to monitoring dynamic behavior of natural objects in real-time by looking at a particular spectral reflectance or transmittance function. A twelve-channel multispectral light source was developed with improved spatial uniformity of spectral irradiance compared to a previous one. Experimental results of spectral matching imaging of human skin and vegetable leaves are demonstrated, as well as a preliminary feasibility test of imaging a reflective object using a test color chart.

  6. An Implementation of Privacy Protection for a Surveillance Camera Using ROI Coding of JPEG2000 with Face Detection

    NASA Astrophysics Data System (ADS)

    Muneyasu, Mitsuji; Odani, Shuhei; Kitaura, Yoshihiro; Namba, Hitoshi

    On the use of a surveillance camera, there is a case where privacy protection should be considered. This paper proposes a new privacy protection method by automatically degrading the face region in surveillance images. The proposed method consists of ROI coding of JPEG2000 and a face detection method based on template matching. The experimental result shows that the face region can be detected and hidden correctly.

  7. Assessing Domestic vs. International Student Perceptions and Attitudes of Plagiarism

    ERIC Educational Resources Information Center

    Doss, Daniel Adrian; Henley, Russ; Gokaraju, Balakrishna; McElreath, David; Lackey, Hilliard; Hong, Qiuqi; Miller, Lauren

    2016-01-01

    The authors examined students' perceptions of plagiarism from a higher education teaching institution within the U.S. southeast. This study employed a five-point Likert-scale to examine differences of perceptions between domestic versus international students. Statistically significant outcomes were observed regarding the notions that plagiarism…

  8. Plagiarism Isn't Just an Issue for Students

    ERIC Educational Resources Information Center

    Reed, Deborah K.

    2011-01-01

    Everyone is appalled at reports of rampant cheating among high school and college students, primarily by cutting and pasting from the Internet without providing citations. There are situations in real life where an individual suffered serious consequences for plagiarizing work. Many schools incorporate such scenarios in character education…

  9. A Reflection on Plagiarism, Patchwriting, and the Engineering Master's Thesis

    ERIC Educational Resources Information Center

    Eckel, Edward J.

    2010-01-01

    Early in his career as an engineering librarian, the author saw plagiarism in completely black and white terms. However, digging into the scholarly literature, he finds ample evidence that there are other factors at work in student writing besides a lack of ethics or the intent to cheat. In this article, he briefly highlights some of these…

  10. Plagiarism Isn't Just an Issue for Students

    ERIC Educational Resources Information Center

    Reed, Deborah K.

    2011-01-01

    Everyone is appalled at reports of rampant cheating among high school and college students, primarily by cutting and pasting from the Internet without providing citations. There are situations in real life where an individual suffered serious consequences for plagiarizing work. Many schools incorporate such scenarios in character education…

  11. Lessons on Plagiarism: Issues for Teachers and Learners

    ERIC Educational Resources Information Center

    Anyanwu, Regina

    2004-01-01

    While student difficulty with academic referencing is not new, it is apparent that many tertiary students are not skilled in following referencing conventions, are confused about what does and does not constitute plagiarism in the eyes of academics, and are fearful of the consequences. This paper begins by examining the cases of a number of…

  12. Using Bloom's Taxonomy to Teach Students about Plagiarism

    ERIC Educational Resources Information Center

    Vosen, Melissa A.

    2008-01-01

    Melissa A. Vosen outlines a unit she has designed to help students comprehend the often unclear boundaries and issues surrounding plagiarism. Using Bloom's taxonomy of the cognitive domain, students complete increasingly complex tasks, learning to construct a works cited page and assess scholarly opinions. They also research the consequences of…

  13. Loss, Responsibility, Blame? Staff Discourses of Student Plagiarism

    ERIC Educational Resources Information Center

    Gourlay, Lesley; Deane, Janis

    2012-01-01

    Student plagiarism and difficulties with writing have been widely investigated in the literature, but there has been less research on staff perspectives. A Joint Information Services Committee (JISC)-funded questionnaire (n = 80) and focus group study investigated the views of lecturers, librarians and study advisors at a UK post-92 university,…

  14. Staff and Student Perceptions of Plagiarism and Cheating

    ERIC Educational Resources Information Center

    Wilkinson, Jenny

    2009-01-01

    Cheating, plagiarism, and other forms of academic misconduct are a significant issue in higher education. In this study, the attitudes of academic staff and students in a 3 year undergraduate nursing program to various forms of academic misconduct were assessed and compared. Forty-nine percent of staff and 39% of students thought that cheating on…

  15. Ensuring Effective Student Support in Higher Education Alleged Plagiarism Cases

    ERIC Educational Resources Information Center

    Baird, Craig; Dooey, Patricia

    2014-01-01

    Plagiarism and other forms of academic misconduct are matters of great concern at all levels of study worldwide. This is especially so for students in higher education institutions, where higher degrees and publications are key focus activities. Ready access to internet based resources assist academic writing practices. However, the unintentional,…

  16. Loss, Responsibility, Blame? Staff Discourses of Student Plagiarism

    ERIC Educational Resources Information Center

    Gourlay, Lesley; Deane, Janis

    2012-01-01

    Student plagiarism and difficulties with writing have been widely investigated in the literature, but there has been less research on staff perspectives. A Joint Information Services Committee (JISC)-funded questionnaire (n = 80) and focus group study investigated the views of lecturers, librarians and study advisors at a UK post-92 university,…

  17. Exploring University Students' Perceptions of Plagiarism: A Focus Group Study

    ERIC Educational Resources Information Center

    Gullifer, Judith; Tyson, Graham A.

    2010-01-01

    Plagiarism is perceived to be a growing problem and universities are being required to devote increasing time and resources to combating it. Theory and research in psychology show that a thorough understanding of an individual's view of an issue or problem is an essential requirement for successful change of that person's attitudes and behaviour.…

  18. Faculty Perceptions of Plagiarism at Queensborough Community College

    ERIC Educational Resources Information Center

    Marcus, Sara; Beck, Sheila

    2011-01-01

    The researchers surveyed English and Speech & Theater faculty members at Queensborough Community College on their perceptions of and attitudes toward plagiarism. The researchers used the Queensborough Community College Academic Integrity Policy as the basis for their analysis. Based on the responses received, it was determined that 50% of the…

  19. Cut and Paste 101: Plagiarism and the Net.

    ERIC Educational Resources Information Center

    Renard, Lisa

    2000-01-01

    There are three types of Internet cheaters: unintentional, sneaky, and lazy. Plagiarism is not new, but Internet cheat sites allowing users to cut and paste papers easily from untraceable sources are widespread. Teachers should be aware of cheat sites, demand rewrites, assign unique topics, and teach source documentation. (MLH)

  20. Strategies to Help Legal Studies Students Avoid Plagiarism

    ERIC Educational Resources Information Center

    Samuels, Linda B.; Bast, Carol M.

    2006-01-01

    Plagiarism is certainly not new to academics, but it may be on the rise with easy access to the vast quantities of information available on the Internet. Students researching on the Internet do not have to take handwritten or typewritten notes. They can simply print out or copy and save whatever they find. They are even spared the tedium of having…