Science.gov

Sample records for code plagiarism detection

  1. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    ERIC Educational Resources Information Center

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  2. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    ERIC Educational Resources Information Center

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  3. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    ERIC Educational Resources Information Center

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  4. Source Code Plagiarism--A Student Perspective

    ERIC Educational Resources Information Center

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  5. Plagiarism.

    PubMed

    Skandalakis, John E; Mirilas, Petros

    2004-09-01

    The theft of someone's words or thoughts--plagiarism--has long been a concern in medical literature. The phenomenon applies to unreferenced published or unpublished data that belong to someone else, including applications for grants and a publication submitted in a different language. Other acts of plagiarism are paraphrasing without crediting the source, using "blanket" references, "second-generation" references, and duplicate or repetitive publication of one's own previously published work. Does incorporating a peer reviewer's ideas constitute plagiarism? The requirement of many journals for a short list of references is problematic, as is confusion about what constitutes common knowledge. What criteria should be used for detecting plagiarism? To make an accusation of plagiarism is serious and perilous. Motivations for plagiarism are considered, and 2 striking historical examples of plagiarism are summarized. We believe that with insight into its causes and effects, plagiarism can be eliminated.

  6. Rapid assessment of assignments using plagiarism detection software.

    PubMed

    Bischoff, Whitney R; Abrego, Patricia C

    2011-01-01

    Faculty members most often use plagiarism detection software to detect portions of students' written work that have been copied and/or not attributed to their authors. The rise in plagiarism has led to a parallel rise in software products designed to detect plagiarism. Some of these products are configurable for rapid assessment and teaching, as well as for plagiarism detection.

  7. Automatic Student Plagiarism Detection: Future Perspectives

    ERIC Educational Resources Information Center

    Mozgovoy, Maxim; Kakkonen, Tuomo; Cosma, Georgina

    2010-01-01

    The availability and use of computers in teaching has seen an increase in the rate of plagiarism among students because of the wide availability of electronic texts online. While computer tools that have appeared in recent years are capable of detecting simple forms of plagiarism, such as copy-paste, a number of recent research studies devoted to…

  8. Does the Adoption of Plagiarism-Detection Software in Higher Education Reduce Plagiarism?

    ERIC Educational Resources Information Center

    Youmans, Robert J.

    2011-01-01

    In two studies, students at California State University, Northridge wrote papers that were checked for plagiarism using plagiarism-detection software. In the first study, half of the students in two classes were randomly selected and told by the professor that their term papers would be scanned for plagiarism using the software. Students in the…

  9. Guidelines on What Constitutes Plagiarism and Electronic Tools to Detect it.

    PubMed

    Luksanapruksa, Panya; Millhouse, Paul W

    2016-04-01

    Plagiarism is a serious ethical problem among scientific publications. There are various definitions of plagiarism, and the major categories include unintentional (unsuitable paraphrasing or improper citations) and intentional. Intentional plagiarism includes mosaic plagiarism, plagiarism of ideas, plagiarism of text, and self-plagiarism. There are many Web sites and software packages that claim to detect plagiarism effectively. A violation of plagiarism laws can lead to serious consequences including author banning, loss of professional reputation, termination of a position, and even legal action.

  10. The Cat-and-Mouse Game of Plagiarism Detection.

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2001-01-01

    Describes how colleges, frustrated by students who use the Internet to plagiarize, are going online to enable professors to fight back. Explains that plagiarism-detection software, available for several years, is increasing in use. (EV)

  11. The Toolbox for Local and Global Plagiarism Detection

    ERIC Educational Resources Information Center

    Butakov, Sergey; Scherbinin, Vladislav

    2009-01-01

    Digital plagiarism is a problem for educators all over the world. There are many software tools on the market for uncovering digital plagiarism. Most of them can work only with text submissions. In this paper, we present a new architecture for a plagiarism detection tool that can work with many different kinds of digital submissions, from plain or…

  12. Intelligent bar chart plagiarism detection in documents.

    PubMed

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Rehman, Amjad; Alkawaz, Mohammed Hazim; Saba, Tanzila; Al-Rodhaan, Mznah; Al-Dhelaan, Abdullah

    2014-01-01

    This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR). By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts.

  13. Intelligent Bar Chart Plagiarism Detection in Documents

    PubMed Central

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Alkawaz, Mohammed Hazim; Saba, Tanzila; Al-Rodhaan, Mznah; Al-Dhelaan, Abdullah

    2014-01-01

    This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR). By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts. PMID:25309952

  14. Guidelines on What Constitutes Plagiarism and Electronic Tools to Detect it.

    PubMed

    Luksanapruksa, Panya; Millhouse, Paul W

    2016-04-01

    Plagiarism is a serious ethical problem among scientific publications. There are various definitions of plagiarism, and the major categories include unintentional (unsuitable paraphrasing or improper citations) and intentional. Intentional plagiarism includes mosaic plagiarism, plagiarism of ideas, plagiarism of text, and self-plagiarism. There are many Web sites and software packages that claim to detect plagiarism effectively. A violation of plagiarism laws can lead to serious consequences including author banning, loss of professional reputation, termination of a position, and even legal action. PMID:26925859

  15. Online Plagiarism Detection Services--Saviour or Scourge?

    ERIC Educational Resources Information Center

    McKeever, Lucy

    2006-01-01

    Although the exponential growth of the Internet has made it easier than ever to carry out plagiarism, it has also made it much easier to detect. This paper gives an overview of the many different methods of detecting web-based plagiarism which are currently available, assessing practical matters such as cost, functionality and performance.…

  16. Grade Expectations: Mapping Stakeholder Views of Online Plagiarism Detection

    ERIC Educational Resources Information Center

    Ashe, Diana; Manning, Michelle

    2007-01-01

    Based upon a pilot study of the leading online plagiarism detection service, this article examines the views of faculty and students as the main stakeholders in the controversy over online plagiarism detection. Rather than give advice outside of a specific institutional context, this study offers an understanding of the reasoning that informs the…

  17. Education Improves Plagiarism Detection by Biology Undergraduates

    ERIC Educational Resources Information Center

    Holt, Emily A.

    2012-01-01

    Regrettably, the sciences are not untouched by the plagiarism affliction that threatens the integrity of budding professionals in classrooms around the world. My research, however, suggests that plagiarism training can improve students' recognition of plagiarism. I found that 148 undergraduate ecology students successfully identified plagiarized…

  18. Realigning the Focus of Plagiarism Detection Using "Plagiarismdetect.com"

    ERIC Educational Resources Information Center

    Sabapathy, Elangkeeran A/L; Rahim, Rozlan Abd; Jusoff, Kamaruzaman

    2009-01-01

    The purpose of this article is to examine the extent to which "plagiarismdetect.com," an internet help/tool to detect plagiarism helps academicians tackle the ever-growing problem of plagiarism. Concerned with term papers, essays and most of the time with full-blown research reports, a tool like "plagiarismdetect.com" may…

  19. Protecting Student Intellectual Property in Plagiarism Detection Process

    ERIC Educational Resources Information Center

    Butakov, Sergey; Barber, Craig

    2012-01-01

    The rapid development of the Internet along with increasing computer literacy has made it easy and tempting for digital natives to copy-paste someone's work. Plagiarism is now a burning issue in education, industry and even in the research community. In this study, the authors concentrate on plagiarism detection with particular focus on the…

  20. Plagiarism: Examination of Conceptual Issues and Evaluation of Research Findings on Using Detection Services

    ERIC Educational Resources Information Center

    Konstantinidis, Angelos; Theodosiadou, Dimitra; Pappos, Christos

    2013-01-01

    The purpose of this review is to analyze and evaluate the research findings on using Plagiarism Detection Services (PDS) in universities. In order to do that, conceptual issues about plagiarism are examined and the complex nature of plagiarism is discussed. Subsequently, the pragmatic forms of student plagiarism are listed and PDS strategies on…

  1. A Study of Electronic Detection and Pedagogical Approaches for Reducing Plagiarism

    ERIC Educational Resources Information Center

    Chao, Chia-An; Wilhelm, William J.; Neureuther, Brian D.

    2009-01-01

    Plagiarism is an increasing problem in high schools and universities. To address the issue of how to teach students not to plagiarize, this study examined several pedagogical approaches for reducing plagiarism and the use of Turnitin, an online plagiarism detection software. The study found a significant difference between the control group and…

  2. Combating unethical publications with plagiarism detection services

    PubMed Central

    Garner, H.R.

    2010-01-01

    About 3,000 new citations that are highly similar to citations in previously published manuscripts that appear each year in the biomedical literature (Medline) alone. This underscores the importance for the opportunity for editors and reviewers to have detection system to identify highly similar text in submitted manuscripts so that they can then review them for novelty. New software-based services, both commercial and free, provide this capability. The availability of such tools provides both a way to intercept suspect manuscripts and serve as a deterrent. Unfortunately, the capabilities of these services vary considerably, mainly as a consequence of the availability and completeness of the literature bases to which new queries are compared. Most of the commercial software has been designed for detection of plagiarism in high school and college papers, however, there is at least one fee-based service (CrossRef) and one free service (etblast.org) which are designed to target the needs of the biomedical publication industry. Information on these various services, examples of the type of operability and output, and things that need to be considered by publishers, editors and reviewers before selecting and using these services is provided. PMID:21194644

  3. Detecting Plagiarism in MS Access Assignments

    ERIC Educational Resources Information Center

    Singh, Anil

    2013-01-01

    Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…

  4. Sentence-Based Natural Language Plagiarism Detection

    ERIC Educational Resources Information Center

    White, Daniel R.; Joy, Mike S.

    2004-01-01

    With the increasing levels of access to higher education in the United Kingdom, larger class sizes make it unrealistic for tutors to be expected to identify instances of peer-to-peer plagiarism by eye and so automated solutions to the problem are required. This document details a novel algorithm for comparison of suspect documents at a sentence…

  5. An Empirical Research Study of the Efficacy of Two Plagiarism-Detection Applications

    ERIC Educational Resources Information Center

    Hill, Jacob D.; Page, Elaine Fetyko

    2009-01-01

    This article describes a study of the two most popular plagiarism-detection software platforms available on today's market--Turnitin (http://www.turnitin.com/static/index.html) and SafeAssign (http://www.safeassign.com/). After a brief discussion of plagiarism's relevance to librarians, the authors examine plagiarism-detection methodology and…

  6. Writer's Cloze Performance: Detecting Plagiarism at Four Grade Levels.

    ERIC Educational Resources Information Center

    Brubaugh, Steven J.; And Others

    1996-01-01

    Uses cloze techniques to examine the development of writers' memory for their own texts. Finds 70% accuracy on writer's cloze to be a consistent cutoff score for detection of plagiarism. Suggests that teachers should be aware that students remember their self-generated texts very well and that these standards can be used to detect and deter…

  7. Judge Rules Plagiarism-Detection Tool Falls under "Fair Use"

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2008-01-01

    Judge Claude M. Hilton, of the U.S. District Court in Alexandria, Virginia, in March found that scanning the student papers for the purpose of detecting plagiarism is a "highly transformative" use that falls under the fair-use provision of copyright law. He ruled that the company "makes no use of any work's particular expressive or creative…

  8. Protecting Students' Intellectual Property in the Web Plagiarism Detection Process

    ERIC Educational Resources Information Center

    Butakov, Sergey; Dyagilev, Vadim; Tskhay, Alexander

    2012-01-01

    Learning management systems (LMS) play a central role in communications in online and distance education. In the digital era, with all the information now accessible at students' fingertips, plagiarism detection services (PDS) have become a must-have part of LMS. Such integration provides a seamless experience for users, allowing PDS to check…

  9. Hermetic and Web Plagiarism Detection Systems for Student Essays--An Evaluation of the State-of-the-Art

    ERIC Educational Resources Information Center

    Kakkonen, Tuomo; Mozgovoy, Maxim

    2010-01-01

    Plagiarism has become a serious problem in education, and several plagiarism detection systems have been developed for dealing with this problem. This study provides an empirical evaluation of eight plagiarism detection systems for student essays. We present a categorical hierarchy of the most common types of plagiarism that are encountered in…

  10. Using the Google Search Engine to Detect Word-for-Word Plagiarism in Master's Theses: A Preliminary Study

    ERIC Educational Resources Information Center

    McCullough, Mark; Holmberg, Melissa

    2005-01-01

    The purpose of this research was to explore Google's potential for detecting occurrences of word-for-word (1) plagiarism in master's theses. The authors sought answers to these questions:1. Is Google an effective tool for detecting plagiarism in master's theses?2. Is Google an efficient tool for detecting plagiarism in master's theses?The first…

  11. An analysis of student privacy rights in the use of plagiarism detection systems.

    PubMed

    Brinkman, Bo

    2013-09-01

    Plagiarism detection services are a powerful tool to help encourage academic integrity. Adoption of these services has proven to be controversial due to ethical concerns about students' rights. Central to these concerns is the fact that most such systems make permanent archives of student work to be re-used in plagiarism detection. This computerization and automation of plagiarism detection is changing the relationships of trust and responsibility between students, educators, educational institutions, and private corporations. Educators must respect student privacy rights when implementing such systems. Student work is personal information, not the property of the educator or institution. The student has the right to be fully informed about how plagiarism detection works, and the fact that their work will be permanently archived as a result. Furthermore, plagiarism detection should not be used if the permanent archiving of a student's work may expose him or her to future harm.

  12. Plagiarism by Adult Learners Online: A Case Study in Detection and Remediation

    ERIC Educational Resources Information Center

    Jocoy, Christine; DiBiase, David

    2006-01-01

    Detecting and combating plagiarism from Web-based sources is a concern for administrators and instructors involved in online distance education. In this paper, we quantify copy-and-paste plagiarism among adult learners in an online geography course offered through Penn State's World Campus Geographic Information Systems (GIS) certificate program.…

  13. Using an Electronic Text-Matching Tool (Turnitin) to Detect Plagiarism in a New Zealand University

    ERIC Educational Resources Information Center

    Goddard, Robert; Rudzki, Romuald

    2005-01-01

    This paper is concerned with reporting the experience and findings of staff using a commercially-available text-matching tool (Turnitin) to detect plagiarism in a university setting in New Zealand. The use of actual instances of plagiarism revealed through Turnitin in a teaching department is a departure from the more usual self-reporting…

  14. Back Translation: An Emerging Sophisticated Cyber Strategy to Subvert Advances in "Digital Age" Plagiarism Detection and Prevention

    ERIC Educational Resources Information Center

    Jones, Michael; Sheridan, Lynnaire

    2015-01-01

    Advances have been made in detecting and deterring the student plagiarism that has accompanied the uptake and development of the internet. Many authors from the late 1990s onwards grappled with plagiarism in the digital age, presenting articles that were provoking and established the foundation for strategies to address cyber plagiarism, including…

  15. Student Plagiarism and the Use of a Plagiarism Detection Tool by Community College Faculty

    ERIC Educational Resources Information Center

    Thurmond, Bradley H.

    2010-01-01

    This study sought to better inform community college administrators and faculty regarding possible factors that contribute to higher levels of student plagiarism and to suggest appropriate preventative or responsive interventions. The specific purpose of the study was to investigate a set of faculty related factors that may be associated with…

  16. Plagiarism in computer science courses

    SciTech Connect

    Harris, J.K.

    1994-12-31

    Plagiarism of computer programs has long been a problem in higher education. Ease of electronic copying, vague understanding by students as to what constitutes plagiarism, increasing acceptance of plagiarism by students, lack of enforcement by instructors and school administrators, and a whole host of other factors contribute to plagiarism. The first step in curbing plagiarism is prevention, the second (and much less preferable) is detection. History files and software metrics can be used as a tool to aid in detecting possible plagiarism. This paper gives advice concerning how to deal with plagiarism and with using software monitors to detect plagiarism.

  17. Plagiarism in Academia

    ERIC Educational Resources Information Center

    Shahabuddin, Syed

    2009-01-01

    Plagiarism sometimes creates legal and ethical problems for students and faculty. It can have serious consequences. Fortunately, there are ways to stop plagiarism. There are many tools available to detect plagiarism, e.g. using software for detecting submitted articles. Also, there are many ways to punish a plagiarist, e.g. banning plagiarists…

  18. Student's Plagiarisms in Higher Learning Institutions in the Era of Improved Internet Access: Case Study of Developing Countries

    ERIC Educational Resources Information Center

    Anney, Vicent Naano; Mosha, Mary Atanas

    2015-01-01

    This study investigated students' plagiarism practices in Tanzania higher learning institutions by involving two universities-one public and one private university as a case study. The universities involved have honour code and policies for plagiarism detection however they do not employ software for checking students' plagiarism. The study…

  19. A Comprehensive Definition of Plagiarism.

    ERIC Educational Resources Information Center

    Liddell, Jean

    2003-01-01

    Explains how the internet has made it easy for students to plagiarize papers. Gives definitions for plagiarism. Explains reasons why students plagiarize including the following: they don't understand what it is, they think they won't get caught, etc. Describes ways to detect and prevent plagiarism. (ontains 58 references.)(MZ)

  20. Turnitoff: Identifying and Fixing a Hole in Current Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Heather, James

    2010-01-01

    In recent times, "plagiarism detection software" has become popular in universities and colleges, in an attempt to stem the tide of plagiarised student coursework. Such software attempts to detect any copied material and identify its source. The most popular such software is Turnitin, a commercial system used by thousands of institutions in more…

  1. Evaluating an Electronic Plagiarism Detection Service: The Importance of Trust and the Difficulty of Proving Students Don't Cheat

    ERIC Educational Resources Information Center

    Evans, Robert

    2006-01-01

    Plagiarism by students is seen as an increasing problem. The fear is that students will use the internet to obtain analysis, interpretation or even complete assignments and then submit these as their own work. Electronic plagiarism detection services may help to prevent such unfair practice but, in doing so, they create a new problem: certifying…

  2. To Cheat or Not to Cheat? A Trial of the JISC Plagiarism Detection Service with Biological Sciences Students

    ERIC Educational Resources Information Center

    Badge, Joanne L.; Cann, Alan J.; Scott, Jon

    2007-01-01

    In the UK, there is great concern about the perceived increase in plagiarized work being submitted by students in higher educations. Although there is much debate, the reasons for the perceived change are not completely clear. Here we present the results of a 2-year trial of the JISC Plagiarism Detection Service (PDS) involving hundreds of…

  3. The problem of plagiarism.

    PubMed

    Anderson, Melissa S; Steneck, Nicholas H

    2011-01-01

    Plagiarism is a form of research misconduct and a serious violation of the norms of science. It is the misrepresentation of another's ideas or words as one's own, without proper acknowledgement of the original source. Certain aspects of plagiarism make it less straightforward than this definition suggests. Over the past 30 years, the U.S. Federal Government has developed and refined its policies on misconduct, and Federal agencies, as well as research institutions, have established approaches to responding to allegations and instances of plagiarism. At present, efforts to avert plagiarism focus on plagiarism-detection software and instructional strategies.

  4. Student and Staff Perceptions of the Effectiveness of Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Atkinson, Doug; Yeoh, Sue

    2008-01-01

    The aim of this research was to determine student and staff perceptions of the effectiveness of plagiarism detection software. A mixed methods approach was undertaken, using a research model adapted from the literature. Eight hours of interviews were conducted with six students and six teaching staff from Curtin Business School at Curtin…

  5. Turnitin[R]: The Student Perspective on Using Plagiarism Detection Software

    ERIC Educational Resources Information Center

    Dahl, Stephan

    2007-01-01

    Recently there has been an increasing interest in plagiarism detection systems, such as the web-based Turnitin system. However, no study has so far tried to look at how students react towards those systems being used. This exploratory study examines the attitudes of students on a postgraduate module after using Turnitin as their standard way of…

  6. How to Act When Research Misconduct Is Not Detected by Software but Revealed by the Author of the Plagiarized Article.

    PubMed

    Baydik, Olga D; Gasparyan, Armen Yuri

    2016-10-01

    The detection of plagiarism in scholarly articles is a complex process. It requires not just quantitative analysis with the similarity recording by anti-plagiarism software but also assessment of the readers' opinion, pointing to the theft of ideas, methodologies, and graphics. In this article we describe a blatant case of plagiarism by Chinese authors, who copied a Russian article from a non-indexed and not widely visible Russian journal, and published their own report in English in an open-access journal indexed by Scopus and Web of Science and archived in PubMed Central. The details of copying in the translated English article were presented by the Russian author to the chief editor of the index journal, consultants from Scopus, anti-plagiarism experts, and the administrator of the Committee on Publication Ethics (COPE). The correspondents from Scopus and COPE pointed to the decisive role of the editors' of the English journal who may consider further actions if plagiarism is confirmed. After all, the chief editor of the English journal retracted the article on grounds of plagiarism and published a retraction note, although no details of the complexity of the case were reported. The case points to the need for combining anti-plagiarism efforts and actively seeking opinion of non-native English-speaking authors and readers who may spot intellectual theft which is not always detected by software. PMID:27550475

  7. How to Act When Research Misconduct Is Not Detected by Software but Revealed by the Author of the Plagiarized Article

    PubMed Central

    2016-01-01

    The detection of plagiarism in scholarly articles is a complex process. It requires not just quantitative analysis with the similarity recording by anti-plagiarism software but also assessment of the readers’ opinion, pointing to the theft of ideas, methodologies, and graphics. In this article we describe a blatant case of plagiarism by Chinese authors, who copied a Russian article from a non-indexed and not widely visible Russian journal, and published their own report in English in an open-access journal indexed by Scopus and Web of Science and archived in PubMed Central. The details of copying in the translated English article were presented by the Russian author to the chief editor of the index journal, consultants from Scopus, anti-plagiarism experts, and the administrator of the Committee on Publication Ethics (COPE). The correspondents from Scopus and COPE pointed to the decisive role of the editors’ of the English journal who may consider further actions if plagiarism is confirmed. After all, the chief editor of the English journal retracted the article on grounds of plagiarism and published a retraction note, although no details of the complexity of the case were reported. The case points to the need for combining anti-plagiarism efforts and actively seeking opinion of non-native English-speaking authors and readers who may spot intellectual theft which is not always detected by software. PMID:27550475

  8. How to Act When Research Misconduct Is Not Detected by Software but Revealed by the Author of the Plagiarized Article.

    PubMed

    Baydik, Olga D; Gasparyan, Armen Yuri

    2016-10-01

    The detection of plagiarism in scholarly articles is a complex process. It requires not just quantitative analysis with the similarity recording by anti-plagiarism software but also assessment of the readers' opinion, pointing to the theft of ideas, methodologies, and graphics. In this article we describe a blatant case of plagiarism by Chinese authors, who copied a Russian article from a non-indexed and not widely visible Russian journal, and published their own report in English in an open-access journal indexed by Scopus and Web of Science and archived in PubMed Central. The details of copying in the translated English article were presented by the Russian author to the chief editor of the index journal, consultants from Scopus, anti-plagiarism experts, and the administrator of the Committee on Publication Ethics (COPE). The correspondents from Scopus and COPE pointed to the decisive role of the editors' of the English journal who may consider further actions if plagiarism is confirmed. After all, the chief editor of the English journal retracted the article on grounds of plagiarism and published a retraction note, although no details of the complexity of the case were reported. The case points to the need for combining anti-plagiarism efforts and actively seeking opinion of non-native English-speaking authors and readers who may spot intellectual theft which is not always detected by software.

  9. Plagiarism: understanding and management.

    PubMed

    Wicker, Paul

    2007-08-01

    An epidemic of plagiarism is sweeping the world. A study carried out in the US suggested that 80% of college students admit to cheating at least once (Ashworth et al 1997). Alternative evidence from an American education and software company, Plagiarism.org, reported that 36% of undergraduates plagiarise written material and that 90% of students believe that cheaters are never caught or disciplined (Plagiarism.org 2005). Closer to home, research carried out in the UK by Clare (1996) suggested that 50% of students copy work and invent data. More recently the Plagiarism Advisory Service, based at Northumbria University, reported that 25% of students plagiarise, while lecturers only detect plagiarism 3% of the time (Plagiarism Advisory Service 2006).

  10. Plagiarism in Grant Proposals

    ERIC Educational Resources Information Center

    Markin, Karen M.

    2012-01-01

    It is not news that software exists to check undergraduate papers for plagiarism. What is less well known is that some federal grant agencies are using technology to detect plagiarism in grant proposals. That variety of research misconduct is a growing problem, according to federal experts. The National Science Foundation, in its most recent…

  11. Changing Attitudes in Learning and Assessment: Cast-Off "Plagiarism Detection" and Cast-On Self-Service Assessment for Learning

    ERIC Educational Resources Information Center

    Chew, Esyin; Ding, Seong Lin; Rowell, Gill

    2015-01-01

    Considering the change of attitudes of plagiarism detection to assessment for learning, it is necessary to explore the effect of the paradigm shift for Turnitin, from "plagiarism detection" to self-service learning aid. Two research questions are explored in the present study: (1) How Turnitin augments self-service skills of students and…

  12. A Model for Determining Student Plagiarism: Electronic Detection and Academic Judgement

    ERIC Educational Resources Information Center

    Bretag, Tracey; Mahmud, Saadia

    2009-01-01

    This paper provides insights based on the authors' own practice as university instructors, researchers and arbitrators of student plagiarism. Recognising the difficulty in defining plagiarism while still acknowledging the practical importance of doing so, the authors find the common element between the various types of plagiarism to be the lack of…

  13. EDITORIAL: On plagiarism

    NASA Astrophysics Data System (ADS)

    Harris, Simon; Webb, Steve; Hendee, William R.

    2008-03-01

    accused authors (all of them), the authors whose work may have been plagiarized, and the copyright holder of the original material. The correspondence will include the alleged plagiarizing language and a copy of the original and suspected work. If all parties agree that plagiarism (whether intentional or unintentional) has occurred, a written letter of apology should be sent promptly by the offending author(s) to the Editor/Publisher and to the authors and copyright holder whose work has been plagiarized. If the offending work has been published, a notice of plagiarism, citing both the plagiarized and the offending articles, will be published in the next available issue of PMB. The plagiarizing authors shall agree that all dissemination of the offending article shall be accompanied by the notice of plagiarism. In the most serious cases of plagiarism, a retraction (erratum) will be published (in accordance with the STM guidelines on 'Preservation of the objective record of science', retraction is favoured over removal in virtually all cases), and further sanctions applied. If the offending work hasn't yet been published (i.e. it is detected by the referees), sanctions will still be applied. If the accused authors deny that plagiarism has occurred, the Editor and Publisher must explore the accusation further. The investigation will also involve the Journals Director and the Chief Scientific Adviser of IOP Publishing (who publish PMB on behalf of IPEM) and also the General Secretary of IPEM. All parties to the allegation will be encouraged to submit corroborating evidence, and the accused authors granted an opportunity (at no expense to the journal) to testify in person to defend themselves against the allegation. The investigation should be concluded as quickly as possible (particularly if the article in question has already been published online or in print). If the investigation of the allegation of plagiarism concludes in support of the allegation, then the process for

  14. Local Plagiarisms

    ERIC Educational Resources Information Center

    Borg, Erik

    2009-01-01

    Plagiarism and collusion are significant issues for most lecturers whatever their discipline, and to universities and the higher education sector. Universities respond to these issues by developing institutional definitions of plagiarism, which are intended to apply to all instances of plagiarism and collusion. This article first suggests that…

  15. Plagiarism Detection: A Comparison of Teaching Assistants and a Software Tool in Identifying Cheating in a Psychology Course

    ERIC Educational Resources Information Center

    Seifried, Eva; Lenhard, Wolfgang; Spinath, Birgit

    2015-01-01

    Essays that are assigned as homework in large classes are prone to cheating via unauthorized collaboration. In this study, we compared the ability of a software tool based on Latent Semantic Analysis (LSA) and student teaching assistants to detect plagiarism in a large group of students. To do so, we took two approaches: the first approach was…

  16. Detecting and (not) dealing with plagiarism in an engineering paper: beyond CrossCheck-a case study.

    PubMed

    Zhang, Xin-xin; Huo, Zhao-lin; Zhang, Yue-hong

    2014-06-01

    In papers in areas such as engineering and the physical sciences, figures, tables and formulae are the basic elements to communicate the authors' core ideas, workings and results. As a computational text-matching tool, CrossCheck cannot work on these non-textual elements to detect plagiarism. Consequently, when comparing engineering or physical sciences papers, CrossCheck may return a low similarity index even when plagiarism has in fact taken place. A case of demonstrated plagiarism involving engineering papers with a low similarity index is discussed, and editor's experiences and suggestions are given on how to tackle this problem. The case shows a lack of understanding of plagiarism by some authors or editors, and illustrates the difficulty of getting some editors and publishers to take appropriate action. Consequently, authors, journal editors, and reviewers, as well as research institutions all are duty-bound not only to recognize the differences between ethical and unethical behavior in order to protect a healthy research environment, and also to maintain consistent ethical publishing standards.

  17. Electronic Plagiarism as a College Instructor's Nightmare--Prevention and Detection

    ERIC Educational Resources Information Center

    McLafferty, Charles L.; Foust, Karen M.

    2004-01-01

    Plagiarism, aided by the emergence of massive databases of information on the World Wide Web, has become commonplace on college campuses and in business schools. Because prevention is preferable to policing, in this article the authors (a) present methods for educators to define plagiarism and educate students in appropriate citation and…

  18. Avoid the Plague: Tips and Tricks for Preventing and Detecting Plagiarism

    ERIC Educational Resources Information Center

    Bolkan, J. V.

    2006-01-01

    Plagiarism is an ugly word. Copying someone else's work and attempting to claim credit for one's self is an act that involves a number of ethical failings--theft, laziness, coveting, and lying among others. Many educators blame the Internet for what they perceive as the rise of plagiarism. Although the Internet certainly enables more efficient…

  19. Beyond Plagiarism: Transgressive and Nontransgressive Intertextuality

    ERIC Educational Resources Information Center

    Chandrasoma, Ranamukalage; Thompson, Celia; Pennycook, Alastair

    2004-01-01

    The debate about what constitutes plagiarism and how it should be dealt with in the academy continues to gain momentum. The response from many higher education institutions is to channel ever-increasing amounts of resources into plagiarism detection technologies, rather than trying to ascertain why plagiarism might be occurring in the first place.…

  20. Plagiarism Software: No Magic Bullet!

    ERIC Educational Resources Information Center

    Warn, James

    2006-01-01

    The ready availability of Internet resources has made it easier than ever for students to plagiarize and many higher education institutions have resorted to checking essays with plagiarism detection software. Student behaviour is likely to change in response to this increased scrutiny but not necessarily in the desired direction. Internet…

  1. Avoiding plagiarism in academic writing.

    PubMed

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance.

  2. Plagiarism Prevention

    ERIC Educational Resources Information Center

    Probett, Christine

    2011-01-01

    Plagiarism does exist at universities today. In some cases, students are naive with respect to understanding what plagiarism is and how to avoid it. In other cases, students blatantly disregard and disrespect the written work of others, claiming it as their own. Regardless, educators must be vigilant in their efforts to discourage and prevent…

  3. Revisiting Information Technology tools serving authorship and editorship: a case-guided tutorial to statistical analysis and plagiarism detection

    PubMed Central

    Bamidis, P D; Lithari, C; Konstantinidis, S T

    2010-01-01

    With the number of scientific papers published in journals, conference proceedings, and international literature ever increasing, authors and reviewers are not only facilitated with an abundance of information, but unfortunately continuously confronted with risks associated with the erroneous copy of another's material. In parallel, Information Communication Technology (ICT) tools provide to researchers novel and continuously more effective ways to analyze and present their work. Software tools regarding statistical analysis offer scientists the chance to validate their work and enhance the quality of published papers. Moreover, from the reviewers and the editor's perspective, it is now possible to ensure the (text-content) originality of a scientific article with automated software tools for plagiarism detection. In this paper, we provide a step-bystep demonstration of two categories of tools, namely, statistical analysis and plagiarism detection. The aim is not to come up with a specific tool recommendation, but rather to provide useful guidelines on the proper use and efficiency of either category of tools. In the context of this special issue, this paper offers a useful tutorial to specific problems concerned with scientific writing and review discourse. A specific neuroscience experimental case example is utilized to illustrate the young researcher's statistical analysis burden, while a test scenario is purpose-built using open access journal articles to exemplify the use and comparative outputs of seven plagiarism detection software pieces. PMID:21487489

  4. [Plagiarism in medical schools, and its prevention].

    PubMed

    Annane, Djillali; Annane, Frédérique

    2012-09-01

    The plagiarism has become very common in universities and medical school. Undoubtedly, the easy access to a huge amount of electronic documents is one explanation for the increasing prevalence of plagiarism among students. While most of universities and medical school have clear statements and rules about plagiarism, available tools for the detection of plagiarism remain inefficient and dedicate training program for students and teachers too scarce. As lack of time is one reason for students to choose plagiarism, it should be one main target for educational programs.

  5. Plagiarism: An Egregious Form of Misconduct

    PubMed Central

    Juyal, Deepak; Thawani, Vijay; Thaledi, Shweta

    2015-01-01

    Background: Publishing research papers for academic fraternity has become important for career advancement and promotion. Number of publications in peer reviewed journals and subsequent citations are recognized as measures of scientific success. Non-publishing academicians and researchers are invisible to the scientific community. Discussion: With pressure to publish, misconduct has crept into scientific writing with the result that research misconduct, plagiarism, misappropriation of intellectual property, and substantial unattributed textual copying of another's publication have become common. The Office of Research Integrity, USA, defines research misconduct as “fabrication, falsification or plagiarism in proposing, performing or reviewing research, or in reporting research results.” Although plagiarism is difficult to define in few words, it can be viewed as the stealing of another person's ideas, methods, results, or words without giving proper attribution. The Office of Research Integrity defines plagiarism as being “theft or misappropriation of intellectual property and the substantial unattributed textual copying of another's work.” Plagiarism is one of the most vehemently derided breaches of research integrity as it undermines the original and honest contribution to an existing body of knowledge. Conclusion: Plagiarism has many forms viz. blatant plagiarism, technical plagiarism, patchwork plagiarism, and self-plagiarism. In any form, the plagiarism is a threat to the research integrity and is unacceptable. We do need to detect such acts and effectively prosecute the offenders. PMID:25789254

  6. Educational approaches for discouraging plagiarism.

    PubMed

    Fischer, Beth A; Zigmond, Michael J

    2011-01-01

    Suggested approaches to reduce the occurrence of plagiarism in academia, particularly among trainees. These include (1) educating individuals as to the definition of plagiarism and its consequences through written guidelines, active discussions, and practice in identifying proper and improper citation practices; (2) distributing checklists that break the writing task into more manageable steps, (3) requiring the submission of an outline and then a first draft prior to the deadline for a paper; (4) making assignments relevant to individual interests; and (5) providing trainees with access to software programs that detect plagiarism.

  7. University Student Online Plagiarism

    ERIC Educational Resources Information Center

    Wang, Yu-mei

    2008-01-01

    This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

  8. An Institutional Code of Ethics--A Response to Attitude of Israeli Teachers' Education College Students towards Academic Plagiarism

    ERIC Educational Resources Information Center

    Reingold,, Roni; Baratz, Lea

    2011-01-01

    Academic plagiarism becomes very easy due to new opportunities provided by the Internet era (Scrinber, 2003; Underwood & Sazabo, 2003; Ross, 2005). We believe that academic dishonesty is a major issue, because it strikes at the heart of the academic and social values: honesty, trust and integrity. When dealing with education students, the future…

  9. Source-Code Plagiarism in Universities: A Comparative Study of Student Perspectives in China and the UK

    ERIC Educational Resources Information Center

    Zhang, Dongyang; Joy, Mike; Cosma, Georgina; Boyatt, Russell; Sinclair, Jane; Yau, Jane

    2014-01-01

    There has been much research and discussion relating to variations in plagiaristic activity observed in students from different demographic backgrounds. Differences in behaviour have been noted in many studies, although the underlying reasons are still a matter of debate. Existing work focuses mainly on textual plagiarism, and most often derives…

  10. Rethinking Plagiarism

    ERIC Educational Resources Information Center

    Nealy, Chynette

    2011-01-01

    Plagiarism, presenting someone's words or other creative products as one's own, is a mandatory discussion and writing assignment in many undergraduate business communication courses. Class discussions about this topic tend to be lively, ranging from questions about simply omitting identified sources to different standards of ethical behaviors…

  11. "Turnitin Said It Wasn't Happy": Can the Regulatory Discourse of Plagiarism Detection Operate as a Change Artefact for Writing Development?

    ERIC Educational Resources Information Center

    Penketh, Claire; Beaumont, Chris

    2014-01-01

    This paper centres on the tensions between the introduction of plagiarism detection software (Turnitin) for student and tutor use at undergraduate level and the aim to promote a developmental approach to writing for assessment at a UK university. Aims to promote developmental models for writing often aim to counteract the effects of the structural…

  12. Turning to Turnitin to Fight Plagiarism among University Students

    ERIC Educational Resources Information Center

    Batane, Tshepo

    2010-01-01

    This paper reports on a pilot project of the Turnitin plagiarism detection software, which was implemented to determine the impact of the software on the level of plagiarism among University of Botswana (UB) students. Students' assignments were first submitted to the software without their knowledge so as to gauge their level of plagiarism. The…

  13. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    PubMed

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools.

  14. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    PubMed

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools. PMID:26462161

  15. Finding the True Incidence Rate of Plagiarism

    ERIC Educational Resources Information Center

    Price, Julie; Price, Robert

    2005-01-01

    This paper reports on research that explores the use of detection software in the fight against plagiarism. The aim of the research was to determine if the true incidence rate of plagiarism could be found for a cohort of Higher Education students. The paper outlines the problems and issues when attempting this. In addition, this report highlights…

  16. Plagiarism in research.

    PubMed

    Helgesson, Gert; Eriksson, Stefan

    2015-02-01

    Plagiarism is a major problem for research. There are, however, divergent views on how to define plagiarism and on what makes plagiarism reprehensible. In this paper we explicate the concept of "plagiarism" and discuss plagiarism normatively in relation to research. We suggest that plagiarism should be understood as "someone using someone else's intellectual product (such as texts, ideas, or results), thereby implying that it is their own" and argue that this is an adequate and fruitful definition. We discuss a number of circumstances that make plagiarism more or less grave and the plagiariser more or less blameworthy. As a result of our normative analysis, we suggest that what makes plagiarism reprehensible as such is that it distorts scientific credit. In addition, intentional plagiarism involves dishonesty. There are, furthermore, a number of potentially negative consequences of plagiarism.

  17. Biochemia Medica has started using the CrossCheck plagiarism detection software powered by iThenticate

    PubMed Central

    Šupak-Smolčić, Vesna; Šimundić, Ana-Maria

    2013-01-01

    In February 2013, Biochemia Medica has joined CrossRef, which enabled us to implement CrossCheck plagiarism detection service. Therefore, all manuscript submitted to Biochemia Medica are now first assigned to Research integrity editor (RIE), before sending the manuscript for peer-review. RIE submits the text to CrossCheck analysis and is responsible for reviewing the results of the text similarity analysis. Based on the CrossCheck analysis results, RIE subsequently provides a recommendation to the Editor-in-chief (EIC) on whether the manuscript should be forwarded to peer-review, corrected for suspected parts prior to peer-review or immediately rejected. Final decision on the manuscript is, however, with the EIC. We hope that our new policy and manuscript processing algorithm will help us to further increase the overall quality of our Journal. PMID:23894858

  18. Biochemia Medica has started using the CrossCheck plagiarism detection software powered by iThenticate.

    PubMed

    Supak-Smolcić, Vesna; Simundić, Ana-Maria

    2013-01-01

    In February 2013, Biodhemia Medica has joined CrossRef, which enabled us to implement CrossCheck plagiarism detection service. Therefore, all manuscript submitted to Biodchemia Medica are now first assigned to Research integrity editor (RIE), before sending the manuscript for peer-review. RIE submits the text to CrossCheck analysis and is responsible for reviewing the results of the text similarity analysis. Based on the CrossCheck analysis results, RIE subsequently provides a recommendation to the Editor-in-chief (EIC) on whether the manuscript should be forwarded to peer-review, corrected for suspected parts prior to peer-review or immediately rejected. Final decision on the manuscript is, however, with the EIC. We hope that our new policy and manuscript processing algorithm will help us to further increase the overall quality of our Journal.

  19. Patchwork plagiarism--a jigsaw of stolen puzzle pieces.

    PubMed

    Supak Smolcić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Plagiarism remains at the top in terms of interest to the scientific community. In its many vicious forms, patchwork plagiarism is characterized by numerous unresolved issues and often passes "below the radar" of editors and reviewers. The problem of detecting the complexity of misconduct has been partially resolved by plagiarism detection software. However, interpretation of relevant reports is not always obvious or easy. This article deals with plagiarism in general and patchwork plagiarism in particular, as well as related problems that editors must deal with to maintain the integrity of scientific journals.

  20. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  1. Knowing and Avoiding Plagiarism During Scientific Writing

    PubMed Central

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, SVVS; Nagasree, M

    2014-01-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing. PMID:25364588

  2. Knowing and avoiding plagiarism during scientific writing.

    PubMed

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, Svvs; Nagasree, M

    2014-09-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing.

  3. Plagiarism (Coming to Terms).

    ERIC Educational Resources Information Center

    Bowden, Darsie

    1996-01-01

    Explores the origins of the word "plagiarism" and concepts of authorship. Examines a number of current issues concerning plagiarism, for instance, how the term complicates teacher-student relationships and peer cooperation in writing. (TB)

  4. The plagiarism project.

    PubMed

    Glassman, Nancy R; Sorensen, Karen; Habousha, Racheline G; Minuti, Aurelia; Schwartz, Rachel

    2011-01-01

    Plagiarism has been a problem plaguing academia for centuries. The Internet has made it easier than ever to copy material from one electronic document and paste it into another. Many cases are unintentional, as writers are unaware of the rules regarding plagiarism. This paper provides an overview of plagiarism and describes a project in which librarians partnered with the assistant dean of a graduate science program to educate students about the perils of plagiarism and encourage ethical writing practices.

  5. Is It Cheating or Learning the Craft of Writing? Using Turnitin to Help Students Avoid Plagiarism

    ERIC Educational Resources Information Center

    Graham-Matheson, Lynne; Starr, Simon

    2013-01-01

    Plagiarism is a growing problem for universities, many of which are turning to software detection for help in detecting and dealing with it. This paper explores issues around plagiarism and reports on a study of the use of Turnitin in a new university. The purpose of the study was to inform the senior management team about the plagiarism policy…

  6. Pattern of Plagiarism in Novice Students' Generated Programs: An Experimental Approach

    ERIC Educational Resources Information Center

    Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad

    2011-01-01

    Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…

  7. EDITORIAL: On plagiarism

    NASA Astrophysics Data System (ADS)

    Harris, Simon; Webb, Steve; Hendee, William R.

    2008-03-01

    Plagiarism Plagiarism is, we are pleased to observe, not a common occurrence in Physics in Medicine & Biology (PMB); however, like those responsible for all scientific journals, we are concerned about plagiarism, and very keen to prevent it. The Publications Committee of the International Organization of Medical Physics (IOMP) has prepared a generic editorial on plagiarism. The editorial is reproduced here (with permission of the IOMP), with slight modifications to enhance its relevance to the audience of PMB, along with our procedures for dealing with any cases of plagiarism should they ever arise. Plagiarism (from the Latin 'plagiare', 'to kidnap') is defined as 'the appropriation or imitation of the language, ideas, and thoughts of another author, and representation of them as one's original work' (the Random House Dictionary of the English Language—unabridged). Plagiarism is a serious breach of research ethics that, if committed intentionally, is considered research misconduct. Plagiarism in its most serious form is the passing off of all, or large sections, of another author's published paper as one's original work. If, following appropriate confidential investigation (see below), such a plagiarism is established, this will result in heavy sanctions including retraction of the article, up to a 5 year publication ban from PMB, and informing of employers and/or professional bodies (even after one offence). This may result in loss of research funding, loss of professional stature, and even termination of employment of the plagiarizing author(s). Plagiarism undermines the authenticity of research manuscripts and the journals in which they are published, and compromises the integrity of the scientific process and the public regard for science. Plagiarism violates the literary rights of the individuals who are plagiarized, and the property rights of copyright holders. Violation of these rights may result in legal action against the individual(s) committing

  8. Decreasing Plagiarism: What Works and What Doesn't

    ERIC Educational Resources Information Center

    Houtman, Anne M.; Walker, Sean

    2010-01-01

    The authors tested the predictions of a game theory model of plagiarism, using a test population of student papers submitted to an online plagiarism detection program, over five semesters in a non-majors biology course with multiple sections and high enrollment. Consistent with the model, as the probability of detection and the penalty if caught…

  9. AuDeNTES: Automatic Detection of teNtative Plagiarism According to a rEference Solution

    ERIC Educational Resources Information Center

    Mariani, Leonardo; Micucci, Daniela

    2012-01-01

    In academic courses, students frequently take advantage of someone else's work to improve their own evaluations or grades. This unethical behavior seriously threatens the integrity of the academic system, and teachers invest substantial effort in preventing and recognizing plagiarism. When students take examinations requiring the production of…

  10. Stealing or Sharing? Cross-Cultural Issues of Plagiarism in an Open-Source Era

    ERIC Educational Resources Information Center

    Haitch, Russell

    2016-01-01

    More professors and institutions want to move from a detect-and-punish to an educate-and-prevent model for dealing with plagiarism. Understanding the causes of plagiarism, especially among international students, can aid in efforts to educate students and prevent plagiarism. Research points to a confluence of causal factors, such as time pressure,…

  11. Plagiarism, Cultural Diversity and Metaphor--Implications for Academic Staff Development

    ERIC Educational Resources Information Center

    Leask, Betty

    2006-01-01

    Plagiarism is a complex, culturally loaded concept which causes much anxiety for both academics and students. Exactly what constitutes plagiarism is dependent on a number of contextual factors. Despite the difficulties associated with defining and detecting plagiarism, it is said to be on the increase, and students from "other cultures" are…

  12. Antiplagiarism Software Takes on the Honor Code

    ERIC Educational Resources Information Center

    Wasley, Paula

    2008-01-01

    Among the 100-odd colleges with academic honor codes, plagiarism-detection services raise a knotty problem: Is software compatible with a system based on trust? The answer frequently devolves to the size and culture of the university. Colleges with traditional student-run honor codes tend to "forefront" trust, emphasizing it above all else. This…

  13. The Anatomy of a Plagiarism Initiative: One Library's Campus Collaboration

    ERIC Educational Resources Information Center

    Madray, Amrita

    2008-01-01

    Plagiarism in media and print continues to be a major issue for professors, librarians, and students. Through initiatives and outreach from the B. Davis Memorial Library at the C. W. Post Campus of Long Island University, plagiarism Web sites have been created and workshops and programs continually provided for faculty and students to detect,…

  14. Plagiarism--A Complex Issue Requiring a Holistic Institutional Approach

    ERIC Educational Resources Information Center

    MacDonald, Ranald; Carroll, Jude

    2006-01-01

    Recent years have seen a growing awareness of the incidence of plagiarism, though the response has largely been to focus on deterrence through detection and punishment. However, student plagiarism is a much more complex issue than suggested by a one-solution response and this paper argues for a more holistic institutional approach that recognises…

  15. A Strategy to Reduce Plagiarism in an Undergraduate Course

    ERIC Educational Resources Information Center

    Belter, Ronald W.; du Pre, Athena

    2009-01-01

    This study evaluated how effective an online academic integrity module was at reducing the occurrence of plagiarism in a written assignment for a university course. In a preintervention comparison group, plagiarism was detected in 25.8% of papers submitted, compared with only 6.5% in the group that completed the academic integrity module. The…

  16. Plagiarism and Cheating.

    ERIC Educational Resources Information Center

    Mawdsley, Ralph D.; Permuth, Steve

    Plagiarism and cheating can be defined as academic dishonesty and represent policy concerns among all levels of education. Such cases involve academic versus disciplinary decisions and the need to determine the student's understanding of the definition of plagiarism or cheating. This paper analyzes six legal issues raised in court cases and…

  17. Originality Detection Software in a Graduate Policy Course: A Mixed-Methods Evaluation of Plagiarism

    ERIC Educational Resources Information Center

    Dreuth Zeman, Laura; Steen, Julie A.; Metz Zeman, Natalie

    2011-01-01

    The authors used a mixed-methods approach to evaluate the use of Turnitin originality detection software in a graduate social work course. Qualitative analysis of student responses revealed positive and negative spent completing assignments, and the tone of the class. Quantitative analysis of students' originality scores indicated a short-term…

  18. How to Verify and Manage the Translational Plagiarism?

    PubMed Central

    Wiwanitkit, Viroj

    2016-01-01

    The use of Google translator as a tool for determining translational plagiarism is a big challenge. As noted, plagiarism of the original papers written in Macedonian and translated into other languages can be verified after computerised translation in other languages. Attempts to screen the translational plagiarism should be supported. The use of Google Translate tool might be helpful. Special focus should be on any non-English reference that might be the source of plagiarised material and non-English article that might translate from an original English article, which cannot be detected by simple plagiarism screening tool. It is a hard job for any journal to detect the complex translational plagiarism but the harder job might be how to effectively manage the case. PMID:27703588

  19. Prevalence of plagiarism in recent submissions to the Croatian Medical Journal.

    PubMed

    Baždarić, Ksenija; Bilić-Zulle, Lidija; Brumini, Gordana; Petrovečki, Mladen

    2012-06-01

    To assess the prevalence of plagiarism in manuscripts submitted for publication in the Croatian Medical Journal (CMJ). All manuscripts submitted in 2009-2010 were analyzed using plagiarism detection software: eTBLAST, CrossCheck, and WCopyfind. Plagiarism was suspected in manuscripts with more than 10% of the text derived from other sources. These manuscripts were checked against the Déjà vu database and manually verified by investigators. Of 754 submitted manuscripts, 105 (14%) were identified by the software as suspicious of plagiarism. Manual verification confirmed that 85 (11%) manuscripts were plagiarized: 63 (8%) were true plagiarism and 22 (3%) were self-plagiarism. Plagiarized manuscripts were mostly submitted from China (21%), Croatia (14%), and Turkey (19%). There was no significant difference in the text similarity rate between plagiarized and self-plagiarized manuscripts (25% [95% CI 22-27%] vs. 28% [95% CI 20-33%]; U = 645.50; P = 0.634). Differences in text similarity rate were found between various sections of self-plagiarized manuscripts (H = 12.65, P = 0.013). The plagiarism rate in the Materials and Methods (61% (95% CI 41-68%) was higher than in the Results (23% [95% CI 17-36%], U = 33.50; P = 0.009) or Discussion (25.5 [95% CI 15-35%]; U = 57.50; P < 0.001) sections. Three authors were identified in the Déjà vu database. Plagiarism detection software combined with manual verification may be used to detect plagiarized manuscripts and prevent their publication. The prevalence of plagiarized manuscripts submitted to the CMJ, a journal dedicated to promoting research integrity, was 11% in the 2-year period 2009-2010.

  20. Automated assistance for detecting malicious code

    SciTech Connect

    Crawford, R.; Kerchen, P.; Levitt, K.; Olsson, R.; Archer, M.; Casillas, M.

    1993-06-18

    This paper gives an update on the continuing work on the Malicious Code Testbed (MCT). The MCT is a semi-automated tool, operating in a simulated, cleanroom environment, that is capable of detecting many types of malicious code, such as viruses, Trojan horses, and time/logic bombs. The MCT allows security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict.

  1. There Was a Crooked Man(uscript): A Not-so-Serious Look at the Serious Subject of Plagiarism

    ERIC Educational Resources Information Center

    McGuire, Kevin T.

    2010-01-01

    The problem of plagiarism by political scientists has not received much attention. The incidence of plagiarism, however, may be greater than one would think. In this article, I offer a humorous look at what happened when a manuscript of mine was plagiarized. Based on my experience, I offer some suggestions on how scholars might detect and prevent…

  2. An Evaluation of the Effectiveness of Turnitin.Com as a Tool for Reducing Plagiarism in Graduate Student Term Papers

    ERIC Educational Resources Information Center

    Baker, Russell K.; Thornton, Barry; Adams, Michael

    2008-01-01

    Plagiarism is a continual problem in academia. Plagiarism-detection tools like Turnitin have been used for nearly ten years to help university faculty and administration combat this form of cheating (turnitin.com). This paper evaluates the difference in plagiarism levels in graduate-student term papers when students are not provided access to…

  3. Managing Plagiarism: A Preventative Approach

    ERIC Educational Resources Information Center

    Insley, Robert

    2011-01-01

    Plagiarism is a reality in most college classes where some students plagiarize unknowingly and others do so knowingly. This situation requires instructors to decide how to manage the situation. Some may take the easy way out by ignoring the problem, simply pretending that none of their students plagiarize. In contrast, other instructors embrace…

  4. A Question of Dialogues: Authorship, Authority, Plagiarism

    ERIC Educational Resources Information Center

    Thompson, Celia; Pennycook, Alastair

    2008-01-01

    In this article, the authors argue that while the term plagiarism has long been used as an unhelpful and moralistic catch-all to describe a range of textual "crimes." educators are moving into an era of both increased diversity of student populations and increased capacity to detect textual borrowings through new forms of software. To rely on the…

  5. Plagiarism: A silent epidemic in scientific writing - Reasons, recognition and remedies.

    PubMed

    Debnath, Jyotindu

    2016-04-01

    Plagiarism is one of the most serious forms of scientific misconduct prevalent today and is an important reason for significant proportion of rejection of manuscripts and retraction of published articles. It is time for the medical fraternity to unanimously adopt a 'zero tolerance' policy towards this menace. While responsibility for ensuring a plagiarism-free manuscript primarily lies with the authors, editors cannot absolve themselves of their accountability. The only way to write a plagiarism-free manuscript for an author is to write an article in his/her own words, literally and figuratively. This article discusses various types of plagiarism, reasons for increasingly reported instances of plagiarism, pros and cons of use of plagiarism detection tools for detecting plagiarism and role of authors and editors in preventing/avoiding plagiarism in a submitted manuscript. Regular usage of professional plagiarism detection tools for similarity checks with critical interpretation by the editorial team at the pre-review stage will certainly help in reducing the menace of plagiarism in submitted manuscripts.

  6. Plagiarism: A silent epidemic in scientific writing - Reasons, recognition and remedies.

    PubMed

    Debnath, Jyotindu

    2016-04-01

    Plagiarism is one of the most serious forms of scientific misconduct prevalent today and is an important reason for significant proportion of rejection of manuscripts and retraction of published articles. It is time for the medical fraternity to unanimously adopt a 'zero tolerance' policy towards this menace. While responsibility for ensuring a plagiarism-free manuscript primarily lies with the authors, editors cannot absolve themselves of their accountability. The only way to write a plagiarism-free manuscript for an author is to write an article in his/her own words, literally and figuratively. This article discusses various types of plagiarism, reasons for increasingly reported instances of plagiarism, pros and cons of use of plagiarism detection tools for detecting plagiarism and role of authors and editors in preventing/avoiding plagiarism in a submitted manuscript. Regular usage of professional plagiarism detection tools for similarity checks with critical interpretation by the editorial team at the pre-review stage will certainly help in reducing the menace of plagiarism in submitted manuscripts. PMID:27257327

  7. [Plagiarism in scientific publications].

    PubMed

    Reyes B, Humberto

    2009-01-01

    Similar to what occurs in literature, art and other human endeavours, every scientific report is based in previous work done by others. The new paper should add something original but a basic law of scientific honesty demands that any mention ideas, observations or thinking that has been previously proposed or published by others, should be acknowledged properly in the text and in the references. Plagiarism is identified when the authors of a scientific report use ideas or text that belong to others and present them as original, the previous source is concealed or it is referred to in a different context. The authors of a paper that contains plagiarism have the intention to mislead the readers, pretending to be the original authors of an idea that was expressed previously by others, or to be the owners of results shown by them. Plagiarism is a dishonest behaviour and, when discovered, may have dangerous consequences because the editors of the journal may publish a notice of retraction that will be inserted by Medline in both papers: the plagiarized and the plagiarizer, to be noticed by everyone who accesses to either of them in the Internet. PMID:19399315

  8. Surveillance in Programming Plagiarism beyond Techniques: An Incentive-Based Fishbone Model

    ERIC Educational Resources Information Center

    Wang, Yanqing; Chen, Min; Liang, Yaowen; Jiang, Yu

    2013-01-01

    Lots of researches have showed that plagiarism becomes a severe problem in higher education around the world, especially in programming learning for its essence. Therefore, an effective strategy for plagiarism surveillance in program learning is much essential. Some literature focus on code similarity algorithm and the related tools can help to…

  9. What is Plagiarism?

    NASA Astrophysics Data System (ADS)

    Vishniac, Ethan T.

    2012-01-01

    Manuscripts submitted to The Astrophysical Journal are required to contain "novel and significant" material and to be free of plagiarism. There is a surprising amount of confusion regarding the definition of plagiarism and what constitutes prior publication. I will discuss the definitions used by the ApJ and the procedures we follow to to support this rule. Individual members of the community frequently show a very different understanding of these standards and are surprised at the conflict. Time allowing, I will briefly discuss some of the other common ethical problems that arise during the preparation and publication of articles.

  10. Plagiarism and scientific writing: a personal commentary.

    PubMed

    Ponniah, Irulandy

    2012-11-01

    There have been a number of papers that have addressed the issue of plagiarism. Nevertheless, the charges of plagiarism usually merit little attention with experts, because it is still not clear what sort of copying actually constitutes plagiarism. Another problem that eludes consensus is whether plagiarism was committed with or without intention. This paper discusses certain issues relating to plagiarism and differentiates between intentional and unintentional forms of plagiarism.

  11. Teaching about Plagiarism in the Age of the Internet.

    ERIC Educational Resources Information Center

    Klausman, Jeffrey

    1999-01-01

    Considers how the Internet provides new opportunities for teaching about plagiarism and how to avoid it. Defines and gives examples of three different kinds of plagiarism: direct plagiarism, paraphrase plagiarism, and patchwork plagiarism. Discusses a way of teaching students about plagiarism. Concludes that plagiarism is usually unintentional.…

  12. Combating plagiarism: a shared responsibility.

    PubMed

    Rathod, Sujit D

    2010-01-01

    Scientific progress depends on the free dissemination of original thinking and research. With the evidence base formed by publication, investigators develop and implement additional studies, and policy makers propose new laws and regulations. The ramifications of this evidence can affect millions of lives and reallocate considerable resources for programmes or research. As such, it is incumbent on investigators to conduct rigorous research, which precludes engaging in scientific misconduct such as falsification, fabrication and plagiarism. This article addresses the causes and consequences of plagiarism and the processes by which plagiarism is discovered. It concludes by considering the responsibilities of members of the research community in preventing and addressing plagiarism.

  13. Flaw detection by spatially coded backscatter radiography.

    PubMed

    Thangavelu, Sivakumar; Hussein, Esam M A

    2007-02-01

    Backscatter imaging is useful for inspecting structures that are accessible only from one side. However, indications provided by scattered radiation are typically weak, convoluted and difficult to interpret. This paper explores the use of the coded aperture technique to detect flaws using gamma-ray backscatter imaging. The viability of this approach is demonstrated with indications obtained from Monte Carlo simulations of radiation scattering measurements. The results show that, with a 2 mm wide beam of 137Cs photons, flaws as small as 1.5 mm in width can be detected using this technique. Indications of changes in flaw size, location, multiplicity and density were also observable. In addition, it is possible to quantify, from the decoded indications, the flaw location and its size.

  14. Detection of small non-coding RNAs.

    PubMed

    Dalmay, Tamas

    2010-01-01

    Gene expression is regulated at several levels in plants, and one of the most recently discovered regulatory layers involve short RNAs. Short RNAs are produced through several pathways and target either mRNAs or genomic DNA. Different classes of short RNAs have slightly different sizes and detection of their accumulation is an important step in validating and studying non-coding short RNAs. Northern blotting is routinely used to detect short RNAs because it gives information about both the amount and size of the analysed short RNAs. Choice of the right RNA extraction protocol is crucial when short RNAs are being studied, because several routinely used commercial RNA extraction kits do not yield any short RNAs. This chapter describes optimised RNA extraction methods, which give good yields of short RNAs, and separation, transfer and hybridisation protocols to study the accumulation of short RNAs.

  15. PLAGIARISM IN SCIENTIFIC PUBLISHING

    PubMed Central

    Masic, Izet

    2012-01-01

    Scientific publishing is the ultimate product of scientist work. Number of publications and their quoting are measures of scientist success while unpublished researches are invisible to the scientific community, and as such nonexistent. Researchers in their work rely on their predecessors, while the extent of use of one scientist work, as a source for the work of other authors is the verification of its contributions to the growth of human knowledge. If the author has published an article in a scientific journal it cannot publish the article in any other journal h with a few minor adjustments or without quoting parts of the first article, which are used in another article. Copyright infringement occurs when the author of a new article with or without the mentioning the author used substantial portions of previously published articles, including tables and figures. Scientific institutions and universities should,in accordance with the principles of Good Scientific Practice (GSP) and Good Laboratory Practices (GLP) have a center for monitoring,security, promotion and development of quality research. Establish rules and compliance to rules of good scientific practice are the obligations of each research institutions,universities and every individual-researchers,regardless of which area of science is investigated. In this way, internal quality control ensures that a research institution such as a university, assume responsibility for creating an environment that promotes standards of excellence, intellectual honesty and legality. Although the truth should be the aim of scientific research, it is not guiding fact for all scientists. The best way to reach the truth in its study and to avoid the methodological and ethical mistakes is to consistently apply scientific methods and ethical standards in research. Although variously defined plagiarism is basically intended to deceive the reader’s own scientific contribution. There is no general regulation of control of

  16. Plagiarism in scientific publishing.

    PubMed

    Masic, Izet

    2012-12-01

    Scientific publishing is the ultimate product of scientist work. Number of publications and their quoting are measures of scientist success while unpublished researches are invisible to the scientific community, and as such nonexistent. Researchers in their work rely on their predecessors, while the extent of use of one scientist work, as a source for the work of other authors is the verification of its contributions to the growth of human knowledge. If the author has published an article in a scientific journal it cannot publish the article in any other journal h with a few minor adjustments or without quoting parts of the first article, which are used in another article. Copyright infringement occurs when the author of a new article with or without the mentioning the author used substantial portions of previously published articles, including tables and figures. Scientific institutions and universities should,in accordance with the principles of Good Scientific Practice (GSP) and Good Laboratory Practices (GLP) have a center for monitoring,security, promotion and development of quality research. Establish rules and compliance to rules of good scientific practice are the obligations of each research institutions,universities and every individual-researchers,regardless of which area of science is investigated. In this way, internal quality control ensures that a research institution such as a university, assume responsibility for creating an environment that promotes standards of excellence, intellectual honesty and legality. Although the truth should be the aim of scientific research, it is not guiding fact for all scientists. The best way to reach the truth in its study and to avoid the methodological and ethical mistakes is to consistently apply scientific methods and ethical standards in research. Although variously defined plagiarism is basically intended to deceive the reader's own scientific contribution. There is no general regulation of control of

  17. [High frequency of plagiarism in medical thesis from a Peruvian public university].

    PubMed

    Saldaña-Gastulo, J Jhan C; Quezada-Osoria, C Claudia; Peña-Oscuvilca, Américo; Mayta-Tristán, Percy

    2010-03-01

    An observational study was conducted to describe the presence of plagiarism in medical thesis in 2008 performed at a public university in Peru. Search for plagiarism in 33 thesis introductions using a Google search algorithm, characterizes of the study type and we search in electronic form if the thesis mentor have published articles in scientific journals. We found evidence of plagiarism in 27/33 introductions, 37.3% (171/479) of all the paragraphs analyzed had some degree of plagiarism, literal plagiarism was the most frequent (20/27) and journals were the most common sources of plagiarism (19/27). The characteristics of the studies were observational (32/33), cross-sectional (30/33), descriptive (25/33) and retrospective (19/33). None of the authors had published in a scientific journal, and only nine of his tutors of them had at least one publication. No association was found between the characteristics of the thesis and the presence of plagiarism. In conclusion, we found a high frequency of plagiarism in theses analyzed. Is responsibility of medical schools take the necessary actions to detect and avoid plagiarism among their students.

  18. Can Paraphrasing Practice Help Students Define Plagiarism?

    ERIC Educational Resources Information Center

    Barry, Elaine S.

    2006-01-01

    Plagiarism is the new dirty word on campus, and college instructors are increasingly interested in teaching students how to prevent committing plagiarism. In this study, college students wrote definitions of plagiarism before and after 6 weeks of practice paraphrasing and citing original sources. Students' definitions of plagiarism were evaluated…

  19. The Scarlet "P": Plagiarism, Panopticism, and the Rhetoric of Academic Integrity

    ERIC Educational Resources Information Center

    Zwagerman, Sean

    2008-01-01

    This article is a rhetorical analysis of the anxious and outraged discourse employed in response to the "rising tide" of cheating and plagiarism. This discourse invites actions that are antithetical to the goals of education and the roles of educators, as exemplified by the proliferation of plagiarism-detection technologies. (Contains 15 notes.)

  20. The Illusory Dichotomy of Plagiarism

    ERIC Educational Resources Information Center

    Stuhmcke, Anita; Booth, Tracey; Wangmann, Jane

    2016-01-01

    Plagiarism has been characterised as a "major problem" for universities. While tensions between students and universities are inevitable, the problem with the existing system of plagiarism management and prevention is that it operates to problematise the relationship between the university and the student, rather than address the core…

  1. Exploring Student Self-Plagiarism

    ERIC Educational Resources Information Center

    Halupa, Colleen M.

    2014-01-01

    Student self-plagiarism is a confusing issue for both faculty and students alike. This problem is compounded because both groups perceive the concept very differently. Recent literature regarding these perceptions is reviewed and some brief preliminary results of an exploratory multi-university study of student perceptions of self-plagiarism are…

  2. Cheaters: A Case Study of Plagiarism in Composition Classrooms

    ERIC Educational Resources Information Center

    Yadgir, Sheri A.

    2013-01-01

    This study sought to find a better understanding of plagiarism in the university writing classroom; specifically, institutional and departmental honor codes and policies were looked at--as was the tendency of individual instructors to follow those policies versus creating their own. The narrow purpose of the study was to investigate plagiarism…

  3. Plagiarism in graduate medical education.

    PubMed

    Cole, Ariel Forrester

    2007-06-01

    The act of overt plagiarism by graduates of accredited residency programs represents a failure in personal integrity. It also indicates a lack of professionalism, one of the six Accreditation Council for Graduate Medical Education (ACGME) competencies for graduate medical education. A recent experience at one geriatric fellowship indicates that the problem of plagiarism may be more prevalent than previously recognized. A situation was discovered at the geriatric medicine fellowship at Florida Hospital Family Medicine Residency Program in Orlando, Fla, in which three of the personal statements included in a total of 26 applications to the fellowship in the past 2 years contained portions plagiarized from a single Web site. The aim in documenting this plagiarism is to raise awareness among medical educators about the availability of online sources of content and ease of electronic plagiarism. Some students and residents may not recognize copying other resources verbatim as plagiarism. Residency programs should evaluate their own need for education about plagiarism and include this in the training of the competency of professionalism.

  4. Plagiarism: It Can Happen to You!

    ERIC Educational Resources Information Center

    Peterson, Paul

    1984-01-01

    Suggests that preventative measures, such as proper instruction in basic journalism classes, are not always enough to prevent plagiarism. Urges publications that have discovered they have printed a plagiarized piece to admit their error frankly to their readers. (MM)

  5. Rethinking Plagiarism in the Digital Age

    ERIC Educational Resources Information Center

    Evering, Lea Calvert; Moorman, Gary

    2012-01-01

    Plagiarism is a complex issue in need of reexamination. A common misconception is there is consensus on what constitute plagiarism, and general agreement that engaging in plagiarism and other forms of academic dishonesty is a major breech of ethics. There seems to be little concern for differentiating degrees of seriousness; the intentional…

  6. Students' Perceptions of Plagiarism

    ERIC Educational Resources Information Center

    Fish, Reva; Hura, Gerri

    2013-01-01

    While plagiarism by college students is a serious problem that must be addressed, students generally overestimate the frequency of plagiarism at their schools and blame students they do not know for the majority of incidents. This study looked at students' estimations of the frequency of plagiarism at a large urban college and explored how…

  7. Policy, Preparation, and Prevention: Proactive Minimization of Student Plagiarism

    ERIC Educational Resources Information Center

    Devlin, Marcia

    2006-01-01

    Countless cases of plagiarism are detected across the Australian higher education sector each year. Generally speaking, policy and other responses to the issue focus on punitive, rather than on educative, measures. Recently, a subtle shift is discernable. As well as ensuring appropriate consequences for plagiarists, several universities are…

  8. The Ethics and Politics of Policing Plagiarism: A Qualitative Study of Faculty Views on Student Plagiarism and Turnitin®

    ERIC Educational Resources Information Center

    Bruton, Samuel; Childers, Dan

    2016-01-01

    Recently, the usage of plagiarism detection software such as Turnitin® has increased dramatically among university instructors. At the same time, academic criticism of this software's employment has also increased. We interviewed 23 faculty members from various departments at a medium-sized, public university in the southeastern US to determine…

  9. Plagiarism in law and medicine: challenges for scholarship, academia, publishers and regulators.

    PubMed

    Freckelton, Ian

    2010-05-01

    The phenomenon of plagiarism has evolved as a major problem in many fields with the increasing accessibility of material on the internet. It poses dilemmas for those involved in secondary and tertiary education, as well as for book publishers and those who edit journals. This editorial reviews important recent decisions in the United Kingdom, Canada and Australia by courts and regulatory bodies in respect of doctors and lawyers who have engaged in plagiarism in various ways both while undergraduates and in the course of their professional careers. It reflects on the phenomenon of plagiarism, the challenges involved in its detection and the steps that can be taken to reduce its incidence.

  10. Coded excitation plane wave imaging for shear wave motion detection.

    PubMed

    Song, Pengfei; Urban, Matthew W; Manduca, Armando; Greenleaf, James F; Chen, Shigao

    2015-07-01

    Plane wave imaging has greatly advanced the field of shear wave elastography thanks to its ultrafast imaging frame rate and the large field-of-view (FOV). However, plane wave imaging also has decreased penetration due to lack of transmit focusing, which makes it challenging to use plane waves for shear wave detection in deep tissues and in obese patients. This study investigated the feasibility of implementing coded excitation in plane wave imaging for shear wave detection, with the hypothesis that coded ultrasound signals can provide superior detection penetration and shear wave SNR compared with conventional ultrasound signals. Both phase encoding (Barker code) and frequency encoding (chirp code) methods were studied. A first phantom experiment showed an approximate penetration gain of 2 to 4 cm for the coded pulses. Two subsequent phantom studies showed that all coded pulses outperformed the conventional short imaging pulse by providing superior sensitivity to small motion and robustness to weak ultrasound signals. Finally, an in vivo liver case study on an obese subject (body mass index = 40) demonstrated the feasibility of using the proposed method for in vivo applications, and showed that all coded pulses could provide higher SNR shear wave signals than the conventional short pulse. These findings indicate that by using coded excitation shear wave detection, one can benefit from the ultrafast imaging frame rate and large FOV provided by plane wave imaging while preserving good penetration and shear wave signal quality, which is essential for obtaining robust shear elasticity measurements of tissue.

  11. Authors, editors, and the signs, symptoms and causes of plagiarism

    PubMed Central

    Shashok, Karen

    2011-01-01

    Plagiarism and inadequate citing appear to have reached epidemic proportions in research publication. This article discusses how plagiarism is defined and suggests some possible causes for the increase in the plagiarism disease. Most editors do not have much tolerance for text re-use with inadequate citation regardless of reasons why words are copied from other sources without correct attribution. However, there is now some awareness that re-use of words in research articles to improve the writing or “the English” (which has become a common practice) should be distinguished from intentional deceit for the purpose of stealing other authors’ ideas (which appears to remain a very rare practice). Although it has become almost as easy for editors to detect duplicate text as it is for authors to re-use text from other sources, editors often fail to consider the reasons why researchers resort to this strategy, and tend to consider any text duplication as a symptom of serious misconduct. As a result, some authors may be stigmatized unfairly by being labeled as plagiarists. The article concludes with practical advice for researchers on how to improve their writing and citing skills and thus avoid accusations of plagiarism. PMID:21957412

  12. Authors, editors, and the signs, symptoms and causes of plagiarism.

    PubMed

    Shashok, Karen

    2011-07-01

    Plagiarism and inadequate citing appear to have reached epidemic proportions in research publication. This article discusses how plagiarism is defined and suggests some possible causes for the increase in the plagiarism disease. Most editors do not have much tolerance for text re-use with inadequate citation regardless of reasons why words are copied from other sources without correct attribution. However, there is now some awareness that re-use of words in research articles to improve the writing or "the English" (which has become a common practice) should be distinguished from intentional deceit for the purpose of stealing other authors' ideas (which appears to remain a very rare practice). Although it has become almost as easy for editors to detect duplicate text as it is for authors to re-use text from other sources, editors often fail to consider the reasons why researchers resort to this strategy, and tend to consider any text duplication as a symptom of serious misconduct. As a result, some authors may be stigmatized unfairly by being labeled as plagiarists. The article concludes with practical advice for researchers on how to improve their writing and citing skills and thus avoid accusations of plagiarism. PMID:21957412

  13. Pluralizing Plagiarism: Identities, Contexts, Pedagogies

    ERIC Educational Resources Information Center

    Howard, Rebecca Moore; Robillard, Amy

    2008-01-01

    Recent cases have demonstrated that plagiarism is a hot-button issue. It is also pervasive, occurring in universities, four-year colleges, community colleges, secondary schools, graduate programs, international classrooms, multicultural classrooms, writing centers, writing-across-the-curriculum programs, scholarly publications and the popular…

  14. Plagiarism: What's the Big Deal?

    ERIC Educational Resources Information Center

    Hansen, Brittney; Stith, Danica; Tesdell, Lee S.

    2011-01-01

    In academic culture, plagiarism is considered to be a form of cheating and therefore unethical. Understandably, instructors try to eliminate this kind of unethical behavior from their courses. But what if they designed their assignments and exams in such a way that students would find no reason to cheat? The authors think that it is possible, at…

  15. Plagiarism: Can It Be Stopped?

    ERIC Educational Resources Information Center

    Christensen, G. Jay

    2011-01-01

    Plagiarism can be controlled, not stopped. The more appropriate question to ask is: What can be done to encourage students to "cheat" correctly by doing the assignment the way it was intended? Cheating by college students continues to reach epidemic proportions on selected campuses, as witnessed by the recent episode at Central Florida University,…

  16. CrossCheck plagiarism screening : Experience of the Journal of Epidemiology

    NASA Astrophysics Data System (ADS)

    Hashimoto, Katsumi

    Due to technological advances in the past two decades, researchers now have unprecedented access to a tremendous amount of useful information. However, because of the extreme pressure to publish, this abundance of information can sometimes tempt researchers to commit scientific misconduct. A serious form of such misconduct is plagiarism. Editors are always concerned about the possibility of publishing plagiarized manuscripts. The plagiarism detection tool CrossCheck allows editors to scan and analyze manuscripts effectively. The Journal of Epidemiology took part in a trial of CrossCheck, and this article discusses the concerns journal editors might have regarding the use of CrossCheck and its analysis. In addition, potential problems identified by CrossCheck, including self-plagiarism, are introduced.

  17. Penguins and Plagiarism: Stemming the Tide of Plagiarism in Elementary School

    ERIC Educational Resources Information Center

    Mitchell, Sara

    2007-01-01

    Plagiarism is on the rise on high school and college campuses. There are many reasons why students tend to plagiarize. One of these is that many students are interested in the shortest possible route through a course. Some students also fear that their writing ability is inadequate. If student plagiarism and lack of academic integrity are…

  18. The detection and extraction of interleaved code segments

    NASA Technical Reports Server (NTRS)

    Rugaber, Spencer; Stirewalt, Kurt; Wills, Linda M.

    1995-01-01

    This project is concerned with a specific difficulty that arises when trying to understand and modify computer programs. In particular, it is concerned with the phenomenon of 'interleaving' in which one section of a program accomplishes several purposes, and disentangling the code responsible for each purposes is difficult. Unraveling interleaved code involves discovering the purpose of each strand of computation, as well as understanding why the programmer decided to interleave the strands. Increased understanding improve the productivity and quality of software maintenance, enhancement, and documentation activities. It is the goal of the project to characterize the phenomenon of interleaving as a prerequisite for building tools to detect and extract interleaved code fragments.

  19. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person,Suzette; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (1) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows that SPA can detect porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points.

  20. Measuring students' perceptions of plagiarism: modification and Rasch validation of a plagiarism attitude scale.

    PubMed

    Howard, Steven J; Ehrich, John F; Walton, Russell

    2014-01-01

    Plagiarism is a significant area of concern in higher education, given university students' high self-reported rates of plagiarism. However, research remains inconsistent in prevalence estimates and suggested precursors of plagiarism. This may be a function of the unclear psychometric properties of the measurement tools adopted. To investigate this, we modified an existing plagiarism scale (to broaden its scope), established its psychometric properties using traditional (EFA, Cronbach's alpha) and modern (Rasch analysis) survey evaluation approaches, and examined results of well-functioning items. Results indicated that traditional and modern psychometric approaches differed in their recommendations. Further, responses indicated that although most respondents acknowledged the seriousness of plagiarism, these attitudes were neither unanimous nor consistent across the range of issues assessed. This study thus provides rigorous psychometric testing of a plagiarism attitude scale and baseline data from which to begin a discussion of contextual, personal, and external factors that influence students' plagiarism attitudes.

  1. [Is there protection against copying? Thoughts about plagiarism].

    PubMed

    Schubert, András; Glänzel, Wolfgang

    2015-12-13

    There are at least two reasons why more and more cases of suspected plagiarism are perceived in the scientific literature. On one hand, the ever increasing pressure for publication makes it easier for authors, reviewers and editors to infringe or overlook this serious ethical misdemeanor; on the other hand, with the development of text analysis software, detecting text similarities has become a simple task. The judgement of actual cases, however, requires well-grounded professional knowledge and prudent human decisions.

  2. [Is there protection against copying? Thoughts about plagiarism].

    PubMed

    Schubert, András; Glänzel, Wolfgang

    2015-12-13

    There are at least two reasons why more and more cases of suspected plagiarism are perceived in the scientific literature. On one hand, the ever increasing pressure for publication makes it easier for authors, reviewers and editors to infringe or overlook this serious ethical misdemeanor; on the other hand, with the development of text analysis software, detecting text similarities has become a simple task. The judgement of actual cases, however, requires well-grounded professional knowledge and prudent human decisions. PMID:26639647

  3. Plagiarism: Presenting Someone Else's Creation as One's Own.

    ERIC Educational Resources Information Center

    Hiestand, Mike

    1994-01-01

    Explains that "plagiarism" does not have a commonly agreed-upon definition. Claims that plagiarism is not a legal term. Describes plagiarism as a term for an academic crime, for which each institution has its own definition. Notes that copyright law (a crime with a specific legal definition) is a cousin of plagiarism. (PA)

  4. Online Plagiarism Training Falls Short in Biology Classrooms

    ERIC Educational Resources Information Center

    Holt, Emily A.; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework…

  5. Judging Plagiarism: A Problem of Morality and Convention

    ERIC Educational Resources Information Center

    East, Julianne

    2010-01-01

    This paper considers the problem of plagiarism as an issue of morality. Outrage about student plagiarism in universities positions it as dishonesty and a transgression of standards. Despite this, there has been little work analysing the implications of positioning plagiarism as a moral matter in the making of judgments about plagiarism and…

  6. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  7. Plagiarism in High School: A Survey.

    ERIC Educational Resources Information Center

    Dant, Doris R.

    1986-01-01

    Summarizes results of a survey of 309 students concerning their plagiarism while in high school. Reports data about how many teachers recommended copying, how many required crediting sources, whether students understood about plagiarism, and the relationship between understanding and copying. Recommends action based on survey results. (EL)

  8. Plagiarism in Second-Language Writing

    ERIC Educational Resources Information Center

    Pecorari, Diane; Petric, Bojana

    2014-01-01

    Plagiarism is a broad and multidisciplinary field of study, and within second-language (L2) writing, research on the topic goes back to the mid-1980s. In this review article we first discuss the received view of plagiarism as a transgressive act and alternative understandings which have been presented in the L1 and L2 writing literature. We then…

  9. Chinese University EFL Teachers' Perceptions of Plagiarism

    ERIC Educational Resources Information Center

    Lei, Jun; Hu, Guangwei

    2015-01-01

    Although Chinese university students' perceptions of plagiarism have been extensively investigated, those of their teachers have been surprisingly under-researched. This study sought to address this gap by investigating 112 Chinese university English teachers' knowledge of and attitudes towards plagiarism. While 57 participating teachers had…

  10. Decreasing Plagiarism Using Critical Thinking Skills.

    ERIC Educational Resources Information Center

    Hall, Ann W.

    A practicum project emphasizing critical thinking skills was undertaken in an eighth grade history class to make students aware of the nature and seriousness of plagiarism. The 10-week unit was preceded by a reading comprehension test and an essay assignment on a major Civil War battle. Plagiarized portions of the essays were highlighted and the…

  11. Plagiarisms, Authorships, and the Academic Death Penalty.

    ERIC Educational Resources Information Center

    Howard, Rebecca Moore

    1995-01-01

    Suggests a plagiarism policy that would respect present concerns and discipline but would allow for an enlarged range of definitions of and motivations for plagiarism. Brings to bear contemporary theoretical approaches that take issue with authoring as an autonomous, individual, original act. (TB)

  12. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person, Suzette J.; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (I) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows thai SPA can dell-oct porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points

  13. The challenges for scientists in avoiding plagiarism.

    PubMed

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required.

  14. Performance of coded coherent FSK lightwave system with noncoherent detection

    NASA Astrophysics Data System (ADS)

    Neely, Thomas E.

    1993-03-01

    The original coherent lightwave systems were expected to offer significant performance gains relative to standard direct detection systems. This expectation has not been realized due to the effects of laser phase noise. The laser phase noise process results in the integration of a random variable that transitions over the integration period from a Gaussian distribution to a uniform distribution. The use of convolutional coding effectively replaces a single bit time, with its mostly noncoherently integrating latter portion, by several more coherently integrating bits. This primary bit-time effect comes in addition to the normal coding effect of efficiently trading bandwidth for error performance. The improvement in performance brought about from coding may enable coherent systems to live up to previous expectations. The contributions of this thesis include the visualization of the phase noise process, the efficient computation of the laser phase noise power factor probability density function, and the computation of performance curves for uncoded and coded systems. Additional sections on coherent lightwave systems and coding provide tutorial information. A potential military application is discussed, along with practical implementation issues.

  15. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-04-01

    From the Board of Editors: on Plagiarism

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission: Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism

  16. Social influences on unconscious plagiarism and anti-plagiarism.

    PubMed

    Hollins, Timothy J; Lange, Nicholas; Dennis, Ian; Longmore, Christopher A

    2016-08-01

    People are more likely to unconsciously plagiarise ideas from a same-sex partner than a different-sex partner, and more likely to unconsciously plagiarise if recalling alone rather than in the presence of their partner [Macrae, C. N., Bodenhausen, G. V., & Calvini, G. (1999). Contexts of cryptomnesia: May the source be with you. Social Cognition, 17, 273-297. doi: 10.1521/soco.1999.17.3.273 ]. Two sets of experiments explore these phenomena, using extensions of the standard unconscious plagiarism paradigm. In Experiment 1A participants worked together in same- or different-sex dyads before trying to recall their own ideas or their partner's ideas. More source errors were evident for same-sex dyads (Experiment 1A), but this effect was absent when participants recalled from both sources simultaneously (Experiment 1B). In Experiment 2A, participants recalled ideas from a single source either alone or in the presence of the partner, using an extended-recall task. Partner presence did not affect the availability of ideas, but did reduce the propensity to report them as task compliant, relative to a partner-present condition. Simultaneous recall from both sources removed this social effect (Experiment 2B). Thus social influences on unconscious plagiarism are apparent, but are influenced by the salience of the alternate source at retrieval.

  17. Social influences on unconscious plagiarism and anti-plagiarism.

    PubMed

    Hollins, Timothy J; Lange, Nicholas; Dennis, Ian; Longmore, Christopher A

    2016-08-01

    People are more likely to unconsciously plagiarise ideas from a same-sex partner than a different-sex partner, and more likely to unconsciously plagiarise if recalling alone rather than in the presence of their partner [Macrae, C. N., Bodenhausen, G. V., & Calvini, G. (1999). Contexts of cryptomnesia: May the source be with you. Social Cognition, 17, 273-297. doi: 10.1521/soco.1999.17.3.273 ]. Two sets of experiments explore these phenomena, using extensions of the standard unconscious plagiarism paradigm. In Experiment 1A participants worked together in same- or different-sex dyads before trying to recall their own ideas or their partner's ideas. More source errors were evident for same-sex dyads (Experiment 1A), but this effect was absent when participants recalled from both sources simultaneously (Experiment 1B). In Experiment 2A, participants recalled ideas from a single source either alone or in the presence of the partner, using an extended-recall task. Partner presence did not affect the availability of ideas, but did reduce the propensity to report them as task compliant, relative to a partner-present condition. Simultaneous recall from both sources removed this social effect (Experiment 2B). Thus social influences on unconscious plagiarism are apparent, but are influenced by the salience of the alternate source at retrieval. PMID:26293909

  18. Roles for Coincidence Detection in Coding Amplitude-Modulated Sounds

    PubMed Central

    Ashida, Go; Kretzberg, Jutta; Tollin, Daniel J.

    2016-01-01

    Many sensory neurons encode temporal information by detecting coincident arrivals of synaptic inputs. In the mammalian auditory brainstem, binaural neurons of the medial superior olive (MSO) are known to act as coincidence detectors, whereas in the lateral superior olive (LSO) roles of coincidence detection have remained unclear. LSO neurons receive excitatory and inhibitory inputs driven by ipsilateral and contralateral acoustic stimuli, respectively, and vary their output spike rates according to interaural level differences. In addition, LSO neurons are also sensitive to binaural phase differences of low-frequency tones and envelopes of amplitude-modulated (AM) sounds. Previous physiological recordings in vivo found considerable variations in monaural AM-tuning across neurons. To investigate the underlying mechanisms of the observed temporal tuning properties of LSO and their sources of variability, we used a simple coincidence counting model and examined how specific parameters of coincidence detection affect monaural and binaural AM coding. Spike rates and phase-locking of evoked excitatory and spontaneous inhibitory inputs had only minor effects on LSO output to monaural AM inputs. In contrast, the coincidence threshold of the model neuron affected both the overall spike rates and the half-peak positions of the AM-tuning curve, whereas the width of the coincidence window merely influenced the output spike rates. The duration of the refractory period affected only the low-frequency portion of the monaural AM-tuning curve. Unlike monaural AM coding, temporal factors, such as the coincidence window and the effective duration of inhibition, played a major role in determining the trough positions of simulated binaural phase-response curves. In addition, empirically-observed level-dependence of binaural phase-coding was reproduced in the framework of our minimalistic coincidence counting model. These modeling results suggest that coincidence detection of excitatory

  19. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-05-01

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission: Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism and plagiarism from others' works. Self-plagiarism is the publication of substantially

  20. Resolving an Incident of Academic Dishonesty: Plagiarism.

    ERIC Educational Resources Information Center

    Carmack, Betty J.

    1983-01-01

    Describes the emotions encountered in confronting nursing students involved in plagiarism and presents the experience as a process involving denial, anger, and resolution. Evaluates and recommends that nurse educators be prepared to deal with academic dishonesty. (JOW)

  1. Methods for Helping Students Avoid Plagiarism.

    ERIC Educational Resources Information Center

    Landau, Joshua D.; Druen, Perri B.; Arcuri, Jennifer A.

    2002-01-01

    Describes an experiment used with undergraduate students to educate students about plagiarism and paraphrasing techniques. Discusses the procedure used for the experiment as well as results from the experiment and a postexperiement questionnaire. (CMK)

  2. Local graph regularized coding for salient object detection

    NASA Astrophysics Data System (ADS)

    Huo, Lina; Yang, Shuyuan; Jiao, Licheng; Wang, Shuang; Shi, Jiao

    2016-07-01

    Subspace segmentation based salient object detection has received increasing interests in recent years. To preserve the locality and similarity of regions, a grouping effect of representation is introduced to segment the salient object and background in subspace. Then a new saliency map is calculated by incorporating this local graph regularizer into coding, which explicitly explores the data self-representation model and thus locate more accurate salient regions. Moreover, a heuristic object-based dictionary from background superpixels is obtained in border set removing the image regions within the potential object regions. Experimental results on four large benchmark databases demonstrate that the proposed method performs favorably against eight recent state-of-the-art methods in terms of three evaluation criterions, with a reduction of MAE by 19.8% than GR and 29.3% than CB in the two SED datasets, respectively. Meanwhile, our method also runs faster than the comparative detection approaches.

  3. Text-based plagiarism in scientific publishing: issues, developments and education.

    PubMed

    Li, Yongyan

    2013-09-01

    Text-based plagiarism, or copying language from sources, has recently become an issue of growing concern in scientific publishing. Use of CrossCheck (a computational text-matching tool) by journals has sometimes exposed an unexpected amount of textual similarity between submissions and databases of scholarly literature. In this paper I provide an overview of the relevant literature, to examine how journal gatekeepers perceive textual appropriation, and how automated plagiarism-screening tools have been developed to detect text matching, with the technique now available for self-check of manuscripts before submission; I also discuss issues around English as an additional language (EAL) authors and in particular EAL novices being the typical offenders of textual borrowing. The final section of the paper proposes a few educational directions to take in tackling text-based plagiarism, highlighting the roles of the publishing industry, senior authors and English for academic purposes professionals.

  4. The Crime of Plagiarism: A Critique of Literary Property Law.

    ERIC Educational Resources Information Center

    Hatch, Gary Layne

    Understanding the history of plagiarism may put scholars in a position to define plagiarism more precisely and to decide plagiarism disputes involving students and scholars more fairly. The origins of literary property are found in ritual and religious drama. In classical Greece and Rome, literary property began to hold some value for the author.…

  5. The Issue of (Software) Plagiarism: A Student View

    ERIC Educational Resources Information Center

    Chuda, D.; Navrat, P.; Kovacova, B.; Humay, P.

    2012-01-01

    The issue of plagiarism is discussed in the context of university education in disciplines related to computing. The focus is therefore mainly on software plagiarism. First, however, a case is made for the claim that the most important reason that plagiarism cannot be tolerated lies in the essence of the concept of a university as it is rooted in…

  6. Rational Ignorance in Education: A Field Experiment in Student Plagiarism

    ERIC Educational Resources Information Center

    Dee, Thomas S.; Jacob, Brian A.

    2012-01-01

    Plagiarism appears to be a common problem among college students, yet there is little evidence on the effectiveness of interventions designed to minimize plagiarism. This study presents the results of a field experiment that evaluated the effects of a web-based educational tutorial in reducing plagiarism. We found that assignment to the treatment…

  7. Technology Enhanced Learning and Plagiarism in Entrepreneurship Education

    ERIC Educational Resources Information Center

    Risquez, Angelica; O'Dwyer, Michele; Ledwith, Ann

    2011-01-01

    Purpose: This paper seeks to explore the relationship between entrepreneurship students' ethical views on plagiarism, their self reported engagement in plagiarism and their participation in an online plagiarism prevention tutorial. Design/methodology/approach: The study is based on a questionnaire administered to 434 undergraduate university…

  8. Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing

    ERIC Educational Resources Information Center

    Bakhtiyari, Kaveh; Salehi, Hadi; Embi, Mohamed Amin; Shakiba, Masoud; Zavvari, Azam; Shahbazi-Moghadam, Masoomeh; Ebrahim, Nader Ale; Mohammadjafari, Marjan

    2014-01-01

    This paper discusses plagiarism origins, and the ethical solutions to prevent it. It also reviews some unethical approaches, which may be used to decrease the plagiarism rate in academic writings. We propose eight ethical techniques to avoid unconscious and accidental plagiarism in manuscripts without using online systems such as Turnitin and/or…

  9. Inoculating against Pro-Plagiarism Justifications: Rational and Affective Strategies

    ERIC Educational Resources Information Center

    Compton, Josh; Pfau, Michael

    2008-01-01

    Student plagiarism continues to threaten academic integrity. This investigation assessed whether an inoculation message strategy could combat university plagiarism by protecting student attitudes against pro-plagiarism justification arguments. Additionally, we sought theoretical confirmation of previous findings on involvement and accessibility in…

  10. Perceptions about Plagiarism between Faculty and Undergraduate Students

    ERIC Educational Resources Information Center

    Pritchett, Serene

    2010-01-01

    The problem. Through observation and the review of literature, students often receive inconsistent and vague messages about plagiarism from faculty. Marcoux (2002) and Roig (2001) found a lack of consensus between faculty concerning definitions and forms of plagiarism. Although some students develop skills in order to avoid plagiarism, almost half…

  11. "You Fail": Plagiarism, the Ownership of Writing, and Transnational Conflicts

    ERIC Educational Resources Information Center

    Lyon, Arabella

    2009-01-01

    Responding to cultural concerns about the ownership of writing and the nature of plagiarism, this article examines discourses about plagiarism by ESL students and argues for a plurality of approaches to understanding the ownership of language and textual appropriation. First, it uses speech act theory to explain the dynamics of plagiarism; second,…

  12. Integrated photonic decoder with complementary code processing and balanced detection for two-dimensional optical code division multiple access.

    PubMed

    Takiguchi, K; Okuno, M; Takahashi, H; Moriwaki, O

    2007-04-01

    We propose a novel integrated photonic decoder for two-dimensional (time spreading, wavelength hopping) optical code division multiple access. The decoder is composed of multiplexers-demultiplexers, variable delay lines, and a coupler, which processes complementary codes and utilizes balanced detection to reduce unwanted cross-correlation interference. We successfully carried out a 10 Gbit/s transmission that demonstrated its effectiveness.

  13. Dual enzyme electrochemical coding for detecting DNA hybridization.

    PubMed

    Wang, Joseph; Kawde, Abdel-Nasser; Musameh, Mustafa; Rivas, Gustavo

    2002-10-01

    Enzyme-based hybridization assays for the simultaneous electrochemical measurements of two DNA targets are described. Two encoding enzymes, alkaline phosphatase and beta-galactosidase, are used to differentiate the signals of two DNA targets in connection to chronopotentiometric measurements of their electroactive phenol and alpha-naphthol products. These products yield well-defined and resolved peaks at +0.31 V (alpha-naphthol) and +0.63 V (phenol) at the graphite working electrode (vs. Ag/AgCl reference). The position and size of these peaks reflect the identity and level of the corresponding target. The dual target detection capability is coupled to the amplification feature of enzyme tags (to yield fmol detection limits) and with an efficient magnetic removal of non-hybridized nucleic acids. Proper attention is given to the choice of the substrates (for attaining well resolved peaks), to the activity of the enzymes (for obtaining similar sensitivities), and to the selection of the enzymes (for minimizing cross interferences). The new bioassay is illustrated for the simultaneous detection of two DNA sequences related to the BCRA1 breast-cancer gene in a single sample in connection to magnetic beads bearing the corresponding oligonucleotide probes. Prospects for electrochemical coding of multiple DNA targets are discussed.

  14. Using Anti-Plagiarism Software to Promote Academic Honesty in the Context of Peer Reviewed Assignments

    ERIC Educational Resources Information Center

    Ledwith, Ann; Risquez, Angelica

    2008-01-01

    A variety of free and commercial software applications designed to detect plagiarism from Internet sources has appeared in recent years. However, their effectiveness and impact on student behaviour has been assumed rather than confirmed. The study presented here explores the responses and perceptions of a group of first year students at an Irish…

  15. Methodology for fast detection of false sharing in threaded scientific codes

    SciTech Connect

    Chung, I-Hsin; Cong, Guojing; Murata, Hiroki; Negishi, Yasushi; Wen, Hui-Fang

    2014-11-25

    A profiling tool identifies a code region with a false sharing potential. A static analysis tool classifies variables and arrays in the identified code region. A mapping detection library correlates memory access instructions in the identified code region with variables and arrays in the identified code region while a processor is running the identified code region. The mapping detection library identifies one or more instructions at risk, in the identified code region, which are subject to an analysis by a false sharing detection library. A false sharing detection library performs a run-time analysis of the one or more instructions at risk while the processor is re-running the identified code region. The false sharing detection library determines, based on the performed run-time analysis, whether two different portions of the cache memory line are accessed by the generated binary code.

  16. International Perspectives on Plagiarism and Considerations for Teaching International Trainees

    PubMed Central

    Heitman, Elizabeth; Litewka, Sergio

    2010-01-01

    In the increasingly global community of biomedical science and graduate science education, many US academic researchers work with international trainees whose views on scientific writing and plagiarism can be strikingly different from US norms. Although a growing number of countries and international professional organizations identify plagiarism as research misconduct, many international trainees come from research environments where plagiarism is ill-defined and even commonly practiced. Two research-ethics educators consider current perspectives on plagiarism around the world and contend that US research-training programs should focus on trainees’ scientific writing skills and acculturation, not simply on preventing plagiarism. PMID:21194646

  17. International perspectives on plagiarism and considerations for teaching international trainees.

    PubMed

    Heitman, Elizabeth; Litewka, Sergio

    2011-01-01

    In the increasingly global community of biomedical science and graduate science education, many US academic researchers work with international trainees whose views on scientific writing and plagiarism can be strikingly different from US norms. Although a growing number of countries and international professional organizations identify plagiarism as research misconduct, many international trainees come from research environments where plagiarism is ill-defined and even commonly practiced. Two research-ethics educators consider current perspectives on plagiarism around the world and contend that US research-training programs should focus on trainees' scientific writing skills and acculturation, not simply on preventing plagiarism.

  18. Avoiding plagiarism: guidance for nursing students.

    PubMed

    Price, Bob

    The pressures of study, diversity of source materials, past assumptions relating to good writing practice, ambiguous writing guidance on best practice and students' insecurity about their reasoning ability, can lead to plagiarism. With the use of source checking software, there is an increased chance that plagiarised work will be identified and investigated, and penalties given. In extreme cases, plagiarised work may be reported to the Nursing and Midwifery Council and professional as well as academic penalties may apply. This article provides information on how students can avoid plagiarism when preparing their coursework for submission.

  19. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-04-01

    From the Board of Editors: on Plagiarism

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission: Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism

  20. Plagiarism: A Shared Responsibility of All, Current Situation, and Future Actions in Yemen.

    PubMed

    Muthanna, Abdulghani

    2016-01-01

    As combating plagiarism is a shared responsibility of all, this article focuses on presenting the current situation of higher education in Yemen. The critical review of four implementable policy documents and interviews revealed the absence of research ethics code, research misconduct policy, and institutional policies in the country. This led to the presence of several acts of research dishonesty. The article concludes with an initiative for necessary future actions in the nation. PMID:26890365

  1. Evaluation and Testing of the ADVANTG Code on SNM Detection

    SciTech Connect

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; Hayes, John W.

    2013-09-24

    Pacific Northwest National Laboratory (PNNL) has been tasked with evaluating the effectiveness of ORNL’s new hybrid transport code, ADVANTG, on scenarios of interest to our NA-22 sponsor, specifically of detection of diversion of special nuclear material (SNM). PNNL staff have determined that acquisition and installation of ADVANTG was relatively straightforward for a code in its phase of development, but probably not yet sufficient for mass distribution to the general user. PNNL staff also determined that with little effort, ADVANTG generated weight windows that typically worked for the problems and generated results consistent with MCNP. With slightly greater effort of choosing a finer mesh around detectors or sample reaction tally regions, the figure of merit (FOM) could be further improved in most cases. This does take some limited knowledge of deterministic transport methods. The FOM could also be increased by limiting the energy range for a tally to the energy region of greatest interest. It was then found that an MCNP run with the full energy range for the tally showed improved statistics in the region used for the ADVANTG run. The specific case of interest chosen by the sponsor is the CIPN project from Las Alamos National Laboratory (LANL), which is an active interrogation, non-destructive assay (NDA) technique to quantify the fissile content in a spent fuel assembly and is also sensitive to cases of material diversion. Unfortunately, weight windows for the CIPN problem cannot currently be properly generated with ADVANTG due to inadequate accommodations for source definition. ADVANTG requires that a fixed neutron source be defined within the problem and cannot account for neutron multiplication. As such, it is rendered useless in active interrogation scenarios. It is also interesting to note that this is a difficult problem to solve and that the automated weight windows generator in MCNP actually slowed down the problem. Therefore, PNNL had determined

  2. A dual-sided coded-aperture radiation detection system

    NASA Astrophysics Data System (ADS)

    Penny, R. D.; Hood, W. E.; Polichar, R. M.; Cardone, F. H.; Chavez, L. G.; Grubbs, S. G.; Huntley, B. P.; Kuharski, R. A.; Shyffer, R. T.; Fabris, L.; Ziock, K. P.; Labov, S. E.; Nelson, K.

    2011-10-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5×5×50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  3. Codon Distribution in Error-Detecting Circular Codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-03-15

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick's hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C³ and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C(3) codes to maximal self-complementary circular codes.

  4. Codon Distribution in Error-Detecting Circular Codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-01

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick's hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C³ and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C(3) codes to maximal self-complementary circular codes. PMID:26999215

  5. Codon Distribution in Error-Detecting Circular Codes

    PubMed Central

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-01

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick’s hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C3 and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C3 codes to maximal self-complementary circular codes. PMID:26999215

  6. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-05-01

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission: Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism and plagiarism from others' works. Self-plagiarism is the publication of substantially

  7. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-04-01

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission: Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism and plagiarism from others' works. Self-plagiarism is the publication of substantially

  8. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-03-01

    Dear Colleagues: There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA's published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. Duplicate submission is the most common ethics violation encountered. Duplicate submission is the submission of substantially similar papers to more than one journal. There is a misperception in a small fraction of the scientific community that duplicate submission is acceptable because it sometimes takes a long time to get a paper reviewed and because one of the papers can be withdrawn at any time. This is a clear violation of professional ethics and of the copyright agreement that is signed on submission. Duplicate submission harms the whole community because editors and reviewers waste their time and in the process compound the time it takes to get a paper reviewed for all authors. In cases of duplicate submission, the Editor of the affected OSA journal will consult with the Editor of the other journal involved to determine the proper course of action. Often that action will be the rejection of both papers. Plagiarism: Plagiarism is a serious breach of ethics and is defined as the substantial replication, without attribution, of significant elements of another document already published by the same or other authors. Two types of plagiarism can occur-self-plagiarism and plagiarism from others' works. Self-plagiarism is the publication of substantially similar scientific content

  9. Attitude toward plagiarism among Iranian medical faculty members.

    PubMed

    Ghajarzadeh, Mahsa; Norouzi-Javidan, Abbas; Hassanpour, Kiana; Aramesh, Kiarash; Emami-Razavi, Seyed Hassan

    2012-01-01

    The goal of this study was to assess attitude towards plagiarism in faculty members of Medical School at Tehran University of Medical Sciences. One hundred and twenty medical faculty members of Tehran University of Medical Sciences were enrolled in this cross-sectional study. They were asked to answer to valid and reliable Persian version of attitude towards plagiarism questionnaire. Attitude toward plagiarism, positive attitude toward self-plagiarism and plagiarism acceptance were assessed. Eighty seven filled-up questionnaires were collected. Mean total number of correct answers was 11.6±3.1. Mean number of correct answers to questions evaluating self-plagiarism was 1.7±0.4 and mean number of correct answers to questions evaluating plagiarism acceptance was 1.4±0.2. There was no significant correlation between plagiarism acceptance and self-plagiarism (r=0.17, P=0.1). It is essential to provide materials (such as workshops, leaflets and mandatory courses) to make Iranian medical faculty members familiar with medical research ethics issues such as plagiarism.

  10. Plagiarism and the Internet: Turning the Tables.

    ERIC Educational Resources Information Center

    Atkins, Thomas; Nelson, Gene

    2001-01-01

    Notes the problem of Net-based plagiarism in student papers. Describes a solution that turns the tables by using the Internet: TurnItIn.com, an Internet scanner that annotates/marks unattributed material in student papers and compiles a report for the teacher overnight. (SR)

  11. Plagiarism: What Don't They Know?

    ERIC Educational Resources Information Center

    Voelker, Troy A.; Love, Leonard G.; Pentina, Iryna

    2012-01-01

    The present economic environment is beneficial for universities and schools of business that are experiencing significant enrollment increases. But just as the U.S. economy is suffering from an economic recession, universities increasingly suffer from an integrity recession. Student academic misconduct, particularly plagiarism, is at an all-time…

  12. Methods for Identifying Versioned and Plagiarized Documents.

    ERIC Educational Resources Information Center

    Hoad, Timothy C.; Zobel, Justin

    2003-01-01

    Describes research that was conducted to develop and evaluate techniques for identifying plagiarism, revisions, and different versions of online documents. Highlights include ranking; parsing; similarity measures; identity measures; fingerprinting documents; measuring effectiveness via recall and precision; and experiments on two document…

  13. Plagiarism and Academic Writing of NNS Learners.

    ERIC Educational Resources Information Center

    LoCastro, Virginia; Masuko, Mayumi

    A study investigated attitudes toward and practices of plagiarism of Japanese college students writing in English. Data were drawn from two senior theses written in English and two in Japanese, 30 other student academic papers, interviews with students, and a questionnaire administered to 46 undergraduate and graduate students. In both…

  14. An Investigation of Plagiarism in Developmental Literacy

    ERIC Educational Resources Information Center

    Hammer, Emily Grace Ehrlich; Agnello, Mary Frances; Kiser, Michelle; Osaghae, Osariemen

    2012-01-01

    The purpose of higher education is to prepare students for the workforce. In order to prepare students for the workforce, many life lessons must be learned specifically respect for others' work. One of the invaluable lessons that a student can learn regarding respect for others' work is to appreciate originality and avoid of plagiarism. To be…

  15. Unintended Lessons: Plagiarism and the University

    ERIC Educational Resources Information Center

    Thompson, Carol C.

    2006-01-01

    Plagiarism, like other ethical problems, flourishes in atmospheres with few consequences. The finding by one survey that only 27% of college students thought cutting and pasting someone else's work was "serious cheating" is troubling evidence of student inclination to cut corners ethically. Papers are easily copied from the Internet, and adult…

  16. Classrooms that Discourage Plagiarism and Welcome Technology

    ERIC Educational Resources Information Center

    Pearson, Nancy Guillot

    2011-01-01

    The key to establishing a defense against plagiarism is understanding the reasons that students engage in the process in the first place. Many students enter new grade levels academically unprepared for new challenges. When students encounter gaps between knowledge and the expectations of the classroom, some engage in unethical practices to propel…

  17. Reflections on the Cultural Climate of Plagiarism

    ERIC Educational Resources Information Center

    Willen, Matthew S.

    2004-01-01

    If frequiency of e-mail distribution is any indication, college professors and administrators indeed took notice of last fall's article in the New York Times, "A Campus Fad That's Being Copied: Internet Plagiarism" (Rimer 2003), on Rutgers Professor Donald L. McCabe's recent study of cheating in college and universities. Four copies of the…

  18. Academic Integrity and Plagiarism: Australasian Perspectives

    ERIC Educational Resources Information Center

    Joyce, Donald

    2007-01-01

    This paper reviews nearly 80 published items concerned with promoting academic integrity and reducing plagiarism. Nearly all of them were published in the last seven years and have authors based in Australasia. Most of them have authors from computing departments and many were published in computing journals or presented at computing conferences.…

  19. Plagiarism within Extension: Origin and Current Effects

    ERIC Educational Resources Information Center

    Rollins, Dora

    2011-01-01

    Extension publication editors from around the United States are finding cases of plagiarism within manuscripts that Extension educators submit as new public education materials. When editors confront such educators with the problem, some don't understand it as such, rationalizing that reproducing published information for a new purpose qualifies…

  20. Plagiarism: Do Students Know What It Is?

    ERIC Educational Resources Information Center

    Dawson, Maureen M.; Overfield, Joyce A.

    2006-01-01

    The ability of students to plagiarise coursework assessments has been a topic of much debate in recent years. The consequences of plagiarism for students may be devastating, since their failure to learn and use appropriate study skills will affect both their university experience and their subsequent career. This project set out to investigate…

  1. Comparison of the pseudorandom noise code and pulsed direct-detection lidars for atmospheric probing.

    PubMed

    Machol, J L

    1997-08-20

    The advantages and limitations of using the pseudorandom-noise (PN)-code technique in comparison with pulsed direct detection are discussed. Because the signal-to-noise ratio (SNR) of the PN codes is dependent on the average atmospheric return, strong returns from short ranges and clouds determine the SNR for all ranges. The SNR of a profile obtained by pulsed direct detection exceeds that of the PN-code technique for laser beams with the same average power.

  2. How do we handle self-plagiarism in submitted manuscripts?

    PubMed

    Supak-Smocić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms of self-plagiarism in scientific writing and then present good editorial policy toward questionable material. The importance of dealing with self-plagiarism is emphasized by the recently published proposal of Text Recycling Guidelines by the Committee on Publication Ethics (COPE).

  3. How do we handle self-plagiarism in submitted manuscripts?

    PubMed

    Supak-Smocić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms of self-plagiarism in scientific writing and then present good editorial policy toward questionable material. The importance of dealing with self-plagiarism is emphasized by the recently published proposal of Text Recycling Guidelines by the Committee on Publication Ethics (COPE). PMID:23894861

  4. Bar Coding Platforms for Nucleic Acid and Protein Detection

    NASA Astrophysics Data System (ADS)

    Müller, Uwe R.

    A variety of novel bar coding systems has been developed as multiplex testing platforms for applications in biological, chemical, and biomedical diagnostics. Instead of identifying a target through capture at a specific locus on an array, target analytes are captured by a bar coded tag, which then uniquely identifies the target, akin to putting a UPC bar code on a product. This requires an appropriate surface functionalization to ensure that the correct target is captured with high efficiency. Moreover the tag, or bar code, has to be readable with minimal error and at high speed, typically by flow analysis. For quantitative assays the target may be labeled separately, or the tag may also serve as the label. A great variety of materials and physicochemical principles has been exploited to generate this plethora of novel bar coding platforms. Their advantages compared to microarray-based assay platforms include in-solution binding kinetics, flexibility in assay design, compatibility with microplate-based assay automation, high sample throughput, and with some assay formats, increased sensitivity.

  5. From the Board of Editors: on Plagiarism

    NASA Astrophysics Data System (ADS)

    2005-03-01

    There has been a significant increase in the number of duplicate submissions and plagiarism cases reported in all major journals, including the journals of the Optical Society of America. Duplicate submissions and plagiarism can take many forms, and all of them are violations of professional ethics, the copyright agreement that an author signs along with the submission of a paper, and OSA’s published Author Guidelines. There must be a significant component of new science for a paper to be publishable. The copying of large segments of text from previously published or in-press papers with only minor cosmetic changes is not acceptable and can lead to the rejection of papers. [Please click on the link below to view the full-text.

  6. Addressing Plagiarism in Online Programmes at a Health Sciences University: A Case Study

    ERIC Educational Resources Information Center

    Ewing, Helen; Anast, Ade; Roehling, Tamara

    2016-01-01

    Plagiarism continues to be a concern for all educational institutions. To build a solid foundation for high academic standards and best practices at a graduate university, aspects of plagiarism were reviewed to develop better management processes for reducing plagiarism. Specifically, the prevalence of plagiarism and software programmes for…

  7. Legality, Quality Assurance and Learning: Competing Discourses of Plagiarism Management in Higher Education

    ERIC Educational Resources Information Center

    Sutherland-Smith, Wendy

    2014-01-01

    In universities around the world, plagiarism management is an ongoing issue of quality assurance and risk management. Plagiarism management discourses are often framed by legal concepts of authorial rights, and plagiarism policies outline penalties for infringement. Learning and teaching discourses argue that plagiarism management is, and should…

  8. An Approach for Detecting Inconsistencies between Behavioral Models of the Software Architecture and the Code

    SciTech Connect

    Ciraci, Selim; Sozer, Hasan; Tekinerdogan, Bedir

    2012-07-16

    In practice, inconsistencies between architectural documentation and the code might arise due to improper implementation of the architecture or the separate, uncontrolled evolution of the code. Several approaches have been proposed to detect the inconsistencies between the architecture and the code but these tend to be limited for capturing inconsistencies that might occur at runtime. We present a runtime verification approach for detecting inconsistencies between the dynamic behavior of the architecture and the actual code. The approach is supported by a set of tools that implement the architecture and the code patterns in Prolog, and support the automatic generation of runtime monitors for detecting inconsistencies. We illustrate the approach and the toolset for a Crisis Management System case study.

  9. Preventing Unintentional Plagiarism: A Method for Strengthening Paraphrasing Skills

    ERIC Educational Resources Information Center

    Walker, Angela L.

    2008-01-01

    Plagiarism may result from faulty cognitive processing and thereby be unintentional (Marsh, Landau, & Hicks, 1997). The current study tested the effectiveness of paraphrasing training designed to prevent unintentional plagiarism. Thirty-six students enrolled in research methods participated, one group received paraphrasing training; a control…

  10. Plagiarism Litigation Trends in the USA and Australia

    ERIC Educational Resources Information Center

    Mawdsley, Ralph D.; Cumming, J. Joy

    2008-01-01

    In this article we explore the increasing complexity of plagiarism litigation in the USA and Australia. Plagiarism has always been a serious academic issue and academic staff and students have wrestled with its definition and appropriate penalties for some time. However, the advent of the Internet and more freely accessible information resources,…

  11. Cyber-Plagiarism: Technological and Cultural Background and Suggested Responses.

    ERIC Educational Resources Information Center

    Gresham, John

    2002-01-01

    Discusses concerns over the increase in computer-aided plagiarism among secondary and higher education students. Considers technological factors; cultural reasons and background, including time constraints; possible responses and deterrents, including clear policies regarding plagiarism and designing assignments that are more creative; and the…

  12. More Heat than Light: Plagiarism in Its Appearing

    ERIC Educational Resources Information Center

    Clegg, Sue; Flint, Abbi

    2006-01-01

    This paper argues that the recent debate about plagiarism has taken on aspects of a moral panic, which reflects underlying anxieties about the state of higher education in the United Kingdom. In contrast to the moral absolutism of some commentators, we argue for the significance of posing the phenomenological question of "what is plagiarism in its…

  13. Peers and Plagiarism: The Role of Student Judicial Boards

    ERIC Educational Resources Information Center

    Whitaker, Elaine

    2007-01-01

    After reading Kathryn Valentine's article that talked about her interaction with a Chinese student accused of plagiarism, the author was reminded of the effectiveness of student judicial boards. In this article, the author describes the benefits of having a student judicial board in fighting off plagiarism among students. She relates that although…

  14. Application of Plagiarism Screening Software in the Chemical Engineering Curriculum

    ERIC Educational Resources Information Center

    Cooper, Matthew E.; Bullard, Lisa G.

    2014-01-01

    Plagiarism is an area of increasing concern for written ChE assignments, such as laboratory and design reports, due to ease of access to text and other materials via the internet. This study examines the application of plagiarism screening software to four courses in a university chemical engineering curriculum. The effectiveness of plagiarism…

  15. Good intentions: providing students with skills to avoid accidental plagiarism.

    PubMed

    Zafron, Michelle L

    2012-01-01

    This article explores one librarian's experience with creating and implementing a plagiarism seminar as part of the library liaison program to the School of Public Health and Health Professions at the University at Buffalo. The changes and evolution of the seminar over several iterations are described. This article also examines student perceptions, misperceptions, and reactions to the plagiarism workshop.

  16. Reducing Plagiarism by Using Online Software: An Experimental Study

    ERIC Educational Resources Information Center

    Kose, Ozgur; Arikan, Arda

    2011-01-01

    This action research attempts to explore the perceptions of Turkish university students on plagiarism while evaluating the effectiveness of an online application used to deter plagiarism. The participants were 40 first year university students studying in two different sections of an academic writing class. The findings show that the participants…

  17. Turnitin Systems: A Deterrent to Plagiarism in College Classrooms

    ERIC Educational Resources Information Center

    Heckler, Nina C.; Rice, Margaret; Bryan, C. Hobson

    2013-01-01

    Computer technology and the Internet now make plagiarism an easier enterprise. As a result, faculty must be more diligent in their efforts to mitigate the practice of academic integrity, and institutions of higher education must provide the leadership and support to ensure the context for it. This study explored the use of a plagiarism detection…

  18. Combating plagiarism: the role of the health librarian.

    PubMed

    Spring, Hannah; Adams, Rachel

    2013-12-01

    This feature looks at the issue of plagiarism in health care students and the role of the health librarian in combating the problem. In particular, consideration is given to how plagiarism can occur and provides some examples from two UK universities of approaches health librarians can take in supporting students to avoid these common pitfalls.

  19. Online plagiarism training falls short in biology classrooms.

    PubMed

    Holt, Emily A; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework assignment) and their impacts on students' ability to accurately discriminate plagiarism from text that is properly quoted, paraphrased, and attributed. Using pre- and postsurveys of 173 undergraduate students in three general ecology courses, we found that students given the homework assignment had far greater success in identifying plagiarism or the lack thereof compared with students given no training. In general, students trained with the homework assignment more successfully identified plagiarism than did students trained with the online tutorial. We also found that the summative assessment associated with the plagiarism-avoidance training formats (i.e., homework grade and online tutorial assessment score) did not correlate with student improvement on surveys through time.

  20. Instructor Perceptions of Plagiarism: Are We Finding Common Ground?

    ERIC Educational Resources Information Center

    Bennett, Kymberley K.; Behrendt, Linda S.; Boothby, Jennifer L.

    2011-01-01

    This study examined instructor views of what constitutes plagiarism. The authors collected questionnaire data from 158 participants recruited through three teaching-related electronic listservs. Results showed that most participants agreed that behaviors that claim credit for someone else's work constituted plagiarism. Instructors differed in…

  1. Using Computer Simulations and Games to Prevent Student Plagiarism

    ERIC Educational Resources Information Center

    Bradley, Elizabeth G.

    2015-01-01

    In this increasingly digital age, student plagiarism is rampant. Roughly half of college students admit to plagiarizing using content found online, directly copying and pasting the work of others. Digital technology and social media have greatly changed the landscape of how knowledge is acquired and disseminated; thus, students must be explicitly…

  2. Fighting Plagiarism: Taking the Work out of Homework

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    This article discusses the rise of cut-and-paste plagiarism in schools. Students are constantly searching for essays online, however, they did not know that their teachers are using the same technology to catch them cheating. Plagiarism is happening on campuses nationwide. Yet, with veritable libraries at their fingertips, students see nothing…

  3. Teaching Students about Plagiarism Using a Web-Based Module

    ERIC Educational Resources Information Center

    Stetter, Maria Earman

    2013-01-01

    The following research delivered a web-based module about plagiarism and paraphrasing to avoid plagiarism in both a blended method, with live instruction paired with web presentation for 105 students, and a separate web-only method for 22 other students. Participants were graduates and undergraduates preparing to become teachers, the majority of…

  4. Plagiarism Avoidance: An Empirical Study Examining Teaching Strategies

    ERIC Educational Resources Information Center

    Soto, Julio G.; Anand, Sulekha; McGee, Elizabeth

    2004-01-01

    College students often struggle to understand complex technical language inherent in scientific communication. In some cases, this struggle leads to plagiarism. We performed a statistical analysis to find which teaching strategies are best suited to significantly reducing plagiarism in science courses. (Contains 1 table and 7 figures.)

  5. Plagiarism in the Japanese Universities: Truly a Cultural Matter?

    ERIC Educational Resources Information Center

    Wheeler, Greg

    2009-01-01

    Although plagiarism is considered among western academic circles as one of the worst "crimes" a student can commit, many scholars suggest that these attitudes do not apply to students from areas outside this sphere. They believe that in many countries, plagiarism is considered culturally acceptable. As such, ESL or EFL instructors in charge of…

  6. Plagiarism as Literacy Practice: Recognizing and Rethinking Ethical Binaries

    ERIC Educational Resources Information Center

    Valentine, Kathryn

    2006-01-01

    In this article, I assert that plagiarism is a literacy practice that involves social relationships, attitudes, and values as much as it involves rules of citation and students' texts. In addition, I show how plagiarism is complicated by a discourse about academic dishonesty, and I consider the implications that recognizing such complexity has for…

  7. Students' Perceptions of Cheating and Plagiarism in Higher Institutions

    ERIC Educational Resources Information Center

    Owunwanne, Daniel; Rustagi, Narendra; Dada, Remi

    2010-01-01

    There is a growing body of evidence that cheating and plagiarism are prominent problems in many universities. In informal conversations, it seems that different students perceive plagiarism differently. In this paper, we conducted a survey at Howard University to examine or to follow up with this growing trend. Specifically, team leaders in school…

  8. Plagiarism, Enclosure, and the Commons of the Mind.

    ERIC Educational Resources Information Center

    Scurrah, William L.

    When discussing plagiarism and cheating these days, college faculty seem to find themselves using the rhetoric of crime and punishment ("It's easier to steal from the Internet") on their students rather than a rhetoric more attuned to their actual mission. A short overview in this paper of the history of plagiarism and the development of the…

  9. Arresting Student Plagiarism: Are We Investigators or Educators?

    ERIC Educational Resources Information Center

    Davis, Lajuan

    2011-01-01

    Managing student plagiarism can cause instructors to feel as if they are serving educational institutions in the role of investigator rather than educator. Since many educators continue to struggle with the issue of student plagiarism, the author interviewed some of her colleagues. In this article, she shares her and her colleagues' antiplagiarism…

  10. Applying an Employee-Motivation Model to Prevent Student Plagiarism.

    ERIC Educational Resources Information Center

    Malouff, John M.; Sims, Randi L.

    1996-01-01

    A model based on Vroom's expectancy theory of employee motivation posits that instructors can prevent plagiarism by ensuring that students understand the rules of ethical writing, expect assignments to be manageable and have personal benefits, and expect plagiarism to be difficult and have important personal costs. (SK)

  11. Pharmacy Students’ Ability to Identify Plagiarism After an Educational Intervention

    PubMed Central

    Harris, Kira; Kehr, Heather; Ford, Carolyn; Lane, Daniel C.; Nuzum, Donald S.; Compton, Cynthia; Gibson, Whitney

    2014-01-01

    Objective. To determine if an educational intervention in a doctor of pharmacy (PharmD) degree program increases pharmacy students’ ability to identify plagiarism. Methods. First-year (P1), second-year (P2), and third-year (P3) pharmacy students attended an education session during which types of plagiarism and methods for avoiding plagiarism were reviewed. Students completed a preintervention assessment immediately prior to the session and a postintervention assessment the following semester to measure their ability. Results. Two hundred fifty-two students completed both preintervention and postintervention assessments. There was a 4% increase from preintervention to postintervention in assessment scores for the overall student sample (p<0.05). The mean change was greatest for P1 and P2 students (5% and 4.8%, respectively). Conclusion. An educational intervention about plagiarism can significantly improve students’ ability to identify plagiarism. PMID:24672066

  12. Pharmacy students' ability to identify plagiarism after an educational intervention.

    PubMed

    Degeeter, Michelle; Harris, Kira; Kehr, Heather; Ford, Carolyn; Lane, Daniel C; Nuzum, Donald S; Compton, Cynthia; Gibson, Whitney

    2014-03-12

    Objective. To determine if an educational intervention in a doctor of pharmacy (PharmD) degree program increases pharmacy students' ability to identify plagiarism. Methods. First-year (P1), second-year (P2), and third-year (P3) pharmacy students attended an education session during which types of plagiarism and methods for avoiding plagiarism were reviewed. Students completed a preintervention assessment immediately prior to the session and a postintervention assessment the following semester to measure their ability. Results. Two hundred fifty-two students completed both preintervention and postintervention assessments. There was a 4% increase from preintervention to postintervention in assessment scores for the overall student sample (p<0.05). The mean change was greatest for P1 and P2 students (5% and 4.8%, respectively). Conclusion. An educational intervention about plagiarism can significantly improve students' ability to identify plagiarism.

  13. Who Has Read the Policy on Plagiarism? Unpacking Students' Understanding of Plagiarism

    ERIC Educational Resources Information Center

    Gullifer, J. M.; Tyson, G. A.

    2014-01-01

    Research has established that the term "plagiarism" is open to different interpretations, resulting in confusion among students and staff alike. University policy on academic integrity/misconduct defines the behaviours that all stakeholders must abide by, and the parameters for reporting, investigating and penalising infringements. These…

  14. Multi-frequency phase-coded microwave signal generation based on polarization modulation and balanced detection.

    PubMed

    Zhu, Dan; Xu, Weiyuan; Wei, Zhengwu; Pan, Shilong

    2016-01-01

    Photonic multi-frequency phase-coded microwave signal generation is proposed and demonstrated based on polarization modulation and balanced detection. Consisting of only a polarization modulator (PolM) driven by an electrical coding data, a polarization beam splitter (PBS) and a balanced photodetector (BPD), the proposed microwave phase coder has no requirement on the wavelength, intensity modulation format, or modulation index of the input optical microwave signal, and allows phase coding of arbitrary-format RF signals, which enables multi-frequency phase coding with compact structure, simple operation, and high flexibility. A proof-of-concept experiment is performed, achieving simultaneous phase coding of 15 and 30 GHz, or 10 and 20 GHz RF signals with a coding rate of 5  Gb/s.

  15. Neural coding and perceptual detection in the primate somatosensory thalamus.

    PubMed

    Vázquez, Yuriria; Zainos, Antonio; Alvarez, Manuel; Salinas, Emilio; Romo, Ranulfo

    2012-09-11

    The contribution of the sensory thalamus to perception and decision making is not well understood. We addressed this problem by recording single neurons in the ventral posterior lateral (VPL) nucleus of the somatosensory thalamus while trained monkeys judged the presence or absence of a vibrotactile stimulus of variable amplitude applied to the skin of a fingertip. We found that neurons in the VPL nucleus modulated their firing rate as a function of stimulus amplitude, and that such modulations accounted for the monkeys' overall psychophysical performance. These neural responses did not predict the animals' decision reports in individual trials, however. Moreover, the sensitivity to changes in stimulus amplitude was similar when the monkeys' performed the detection task and when they were not required to report stimulus detection. These results suggest that the primate somatosensory thalamus likely provides a reliable neural representation of the sensory input to the cerebral cortex, where sensory information is transformed and combined with other cognitive components associated with behavioral performance.

  16. Do medical students require education on issues related to plagiarism?

    PubMed

    Varghese, Joe; Jacob, Molly

    2015-01-01

    In the course of our professional experience, we have seen that many medical students plagiarise. We hypothesised that they do so out of ignorance and that they require formal education on the subject. With this objective in mind, we conducted a teaching session on issues related to plagiarism. As a part of this, we administered a quiz to assess their baseline knowledge on plagiarism and a questionnaire to determine their attitudes towards it. We followed this up with an interactive teaching session, in which we discussed various aspects of plagiarism. We subjected the data obtained from the quiz and questionnaire to bivariate and multivariate analysis. A total of 423 medical students participated in the study. Their average score for the quiz was 4.96±1.67 (out of 10). Age, gender and years in medical school were not significantly associated with knowledge regarding plagiarism. The knowledge scores were negatively correlated with permissive attitudes towards plagiarism and positively correlated with attitudes critical of the practice. Men had significantly higher scores on permissive attitudes compared to women . In conclusion, we found that the medical students' knowledge regarding plagiarism was limited. Those with low knowledge scores tended to have permissive attitudes towards plagiarism and were less critical of the practice. We recommend the inclusion of formal instruction on this subject in the medical curriculum, so that this form of academic misconduct can be tackled.

  17. Accuracy comparison among different machine learning techniques for detecting malicious codes

    NASA Astrophysics Data System (ADS)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  18. Demonstration of a quantum error detection code using a square lattice of four superconducting qubits

    PubMed Central

    Córcoles, A.D.; Magesan, Easwar; Srinivasan, Srikanth J.; Cross, Andrew W.; Steffen, M.; Gambetta, Jay M.; Chow, Jerry M.

    2015-01-01

    The ability to detect and deal with errors when manipulating quantum systems is a fundamental requirement for fault-tolerant quantum computing. Unlike classical bits that are subject to only digital bit-flip errors, quantum bits are susceptible to a much larger spectrum of errors, for which any complete quantum error-correcting code must account. Whilst classical bit-flip detection can be realized via a linear array of qubits, a general fault-tolerant quantum error-correcting code requires extending into a higher-dimensional lattice. Here we present a quantum error detection protocol on a two-by-two planar lattice of superconducting qubits. The protocol detects an arbitrary quantum error on an encoded two-qubit entangled state via quantum non-demolition parity measurements on another pair of error syndrome qubits. This result represents a building block towards larger lattices amenable to fault-tolerant quantum error correction architectures such as the surface code. PMID:25923200

  19. Multiplexed Detection of Cytokines Based on Dual Bar-Code Strategy and Single-Molecule Counting.

    PubMed

    Li, Wei; Jiang, Wei; Dai, Shuang; Wang, Lei

    2016-02-01

    Cytokines play important roles in the immune system and have been regarded as biomarkers. While single cytokine is not specific and accurate enough to meet the strict diagnosis in practice, in this work, we constructed a multiplexed detection method for cytokines based on dual bar-code strategy and single-molecule counting. Taking interferon-γ (IFN-γ) and tumor necrosis factor-α (TNF-α) as model analytes, first, the magnetic nanobead was functionalized with the second antibody and primary bar-code strands, forming a magnetic nanoprobe. Then, through the specific reaction of the second antibody and the antigen that fixed by the primary antibody, sandwich-type immunocomplex was formed on the substrate. Next, the primary bar-code strands as amplification units triggered multibranched hybridization chain reaction (mHCR), producing nicked double-stranded polymers with multiple branched arms, which were served as secondary bar-code strands. Finally, the secondary bar-code strands hybridized with the multimolecule labeled fluorescence probes, generating enhanced fluorescence signals. The numbers of fluorescence dots were counted one by one for quantification with epi-fluorescence microscope. By integrating the primary and secondary bar-code-based amplification strategy and the multimolecule labeled fluorescence probes, this method displayed an excellent sensitivity with the detection limits were both 5 fM. Unlike the typical bar-code assay that the bar-code strands should be released and identified on a microarray, this method is more direct. Moreover, because of the selective immune reaction and the dual bar-code mechanism, the resulting method could detect the two targets simultaneously. Multiple analysis in human serum was also performed, suggesting that our strategy was reliable and had a great potential application in early clinical diagnosis. PMID:26721199

  20. Detection and Location of Gamma-Ray Sources with a Modulating Coded Mask

    SciTech Connect

    Anderson, Dale N.; Stromswold, David C.; Wunschel, Sharon C.; Peurrung, Anthony J.; Hansen, Randy R.

    2006-01-31

    This paper presents methods of detecting and locating a concelaed nuclear gamma-ray source with a coded aperture mask. Energetic gamma rays readily penetrate moderate amounts of shielding material and can be detected at distances of many meters. The detection of high energy gamma-ray sources is vitally important to national security for several reasons, including nuclear materials smuggling interdiction, monitoring weapon components under treaties, and locating nuclear weapons and materials in the possession terrorist organizations.

  1. Code System to Detect Recurring Loss of Special Nuclear Materials.

    2001-08-23

    Version 00 NRCPAGE is used in safeguards applications to detect a recurring loss of special nuclear material by frequent evaluation (sequential analysis) of accountability data. Standard sequential testing procedures are traditionally based on sequences of independent and normally distributed measurements. This same approach can be applied to materials balance (MB) data. Here, the term materials balance has a meaning similar to inventory difference and represents a materials loss indicator localized in time and space. However,more » distinct Mbs cannot be reasonably treated as statistically independent and may not always be reasonably treated as normally distributed. Furthermore, the covariance structure associated with a given MB sequence is not known and must be estimated. Nonindependence is treated by converting the MB sequence to the innovation sequence, sometimes called the ITMUF sequence or the sequence of MUF residuals, which are statistically independent and amenable to sequential test procedures. A one-sided page's test, effective for a wide range of recurring loss scenarios, is applied to the standardized innovation sequence. The program can be easily modified to suit particular needs; the models for the assumption of multivariate normality for MBs when computing the innovation sequence or the test procedure can be changed as can the input/output format, dimensioning, local error checking, and simulation work. Input files can be sequentially constructed using local text editors to update existing files. Output files can be read by graphics, report writer, or other stand-alone utility routines.« less

  2. Limiter-discriminator detection performance of Manchester and NRZ coded FSK

    NASA Technical Reports Server (NTRS)

    Cartier, D. E.

    1977-01-01

    The theory of limiter-discriminator detection of a frequency shift keyed (FSK) carrier is reviewed and this theory is used to predict the bit error probability performance of Manchester coded and nonreturn-to-zero (NRZ) coded data. A major result of the study is that the predetection time bandwidth product BT and the deviation ratio h needed to give optimum performance for Manchester coding are seen to be larger than optimum NRZ FSK. Specifically, BT of about 2 and h of about 1 will result in Manchester performance about 2 dB worse than optimum NRZ.

  3. Developing a coding scheme for detecting usability and fun problems in computer games for young children.

    PubMed

    Barendregt, W; Bekker, M M

    2006-08-01

    This article describes the development and assessment of a coding scheme for finding both usability and fun problems through observations of young children playing computer games during user tests. The proposed coding scheme is based on an existing list of breakdown indication types of the detailed video analysis method (DEVAN). This method was developed to detect usability problems in task-based products for adults. However, the new coding scheme for children's computer games takes into account that in games, fun, in addition to usability, is an important factor and that children behave differently from adults. Therefore, the proposed coding scheme uses 8 of the 14 original breakdown indications and has 7 new indications. The article first discusses the development of the new coding scheme. Subsequently, the article describes the reliability assessment of the coding scheme. The any-two agreement measure of 38.5% shows that thresholds for when certain user behavior is worth coding will be different for different evaluators. However, the any-two agreement of .92 for a fixed list of observation points shows that the distinction between the available codes is clear to most evaluators. Finally, a pilot study shows that training can increase any-two agreement considerably by decreasing the number of unique observations, in comparison with the number of agreed upon observations.

  4. Low-Complexity Saliency Detection Algorithm for Fast Perceptual Video Coding

    PubMed Central

    Liu, Pengyu; Jia, Kebin

    2013-01-01

    A low-complexity saliency detection algorithm for perceptual video coding is proposed; low-level encoding information is adopted as the characteristics of visual perception analysis. Firstly, this algorithm employs motion vector (MV) to extract temporal saliency region through fast MV noise filtering and translational MV checking procedure. Secondly, spatial saliency region is detected based on optimal prediction mode distributions in I-frame and P-frame. Then, it combines the spatiotemporal saliency detection results to define the video region of interest (VROI). The simulation results validate that the proposed algorithm can avoid a large amount of computation work in the visual perception characteristics analysis processing compared with other existing algorithms; it also has better performance in saliency detection for videos and can realize fast saliency detection. It can be used as a part of the video standard codec at medium-to-low bit-rates or combined with other algorithms in fast video coding. PMID:24489495

  5. But I Changed Three Words! Plagiarism in the ESL Classroom.

    ERIC Educational Resources Information Center

    Thompson, Lenora C.; Williams, Portia G.

    1995-01-01

    Describes teaching plagiarism to students of English as a Second Language by treating it as a technical, ethical, and cultural issue, and by giving students ample, semester-long opportunity to practice their newfound skills. (SR)

  6. Teaching Paraphrase, Summary, and Plagiarism: An Integrated Approach.

    ERIC Educational Resources Information Center

    Lasarenko, Jane

    1996-01-01

    Offers an exercise to help students understand the difference between summarizing and paraphrasing and how both practices can result in plagiarism if the original source is not cited. Explains how the exercise uses Lincoln's "Gettysburg Address." (TB)

  7. Iranian academia: evolution after revolution and plagiarism as a disorder.

    PubMed

    Ghazinoory, Sepehr; Ghazinoori, Soroush; Azadegan-Mehr, Mandana

    2011-06-01

    Recently, a few of scientific journals raise serious questions about scientific ethics and moral judgment of some of the Iranian government's senior executives in their papers. Plagiarism, under any circumstances is not justified, and we do not intend to justify it in this note. However, we find it useful in understanding why otherwise respected, responsible individuals may engage in plagiarism by terse review of the history Iranian academia.

  8. Microfluidic CODES: a scalable multiplexed electronic sensor for orthogonal detection of particles in microfluidic channels.

    PubMed

    Liu, Ruxiu; Wang, Ningquan; Kamili, Farhan; Sarioglu, A Fatih

    2016-04-21

    Numerous biophysical and biochemical assays rely on spatial manipulation of particles/cells as they are processed on lab-on-a-chip devices. Analysis of spatially distributed particles on these devices typically requires microscopy negating the cost and size advantages of microfluidic assays. In this paper, we introduce a scalable electronic sensor technology, called microfluidic CODES, that utilizes resistive pulse sensing to orthogonally detect particles in multiple microfluidic channels from a single electrical output. Combining the techniques from telecommunications and microfluidics, we route three coplanar electrodes on a glass substrate to create multiple Coulter counters producing distinct orthogonal digital codes when they detect particles. We specifically design a digital code set using the mathematical principles of Code Division Multiple Access (CDMA) telecommunication networks and can decode signals from different microfluidic channels with >90% accuracy through computation even if these signals overlap. As a proof of principle, we use this technology to detect human ovarian cancer cells in four different microfluidic channels fabricated using soft lithography. Microfluidic CODES offers a simple, all-electronic interface that is well suited to create integrated, low-cost lab-on-a-chip devices for cell- or particle-based assays in resource-limited settings.

  9. Construction and Validation of Attitudes Toward Plagiarism Questionnaire

    PubMed Central

    Mavrinac, Martina; Brumini, Gordana; Bilić-Zulle, Lidija; Petrovečki, Mladen

    2010-01-01

    Aim To develop and test the psychometric characteristics of a questionnaire measuring attitudes toward plagiarism. Methods Participants were 227 undergraduates and graduate students from three Croatian universities, with a median age of 21 years (range 18 to 48). Research was conducted from March to June 2009. For the purpose of construction of the first version of the questionnaire, 67 statements (items) were developed. The statements were based on the relevant literature and were developed following rules and recommendations for questionnaire writing, and 36 items were chosen for final validation. Factor analysis was used to find out the factor structure of the questionnaire and to measure construct validity. Results The final version of the questionnaire consisted of 29 items divided into a three-factor structure: factor I – positive attitude toward plagiarism (12 items); factor II – negative attitude toward plagiarism (7 items); and factor III – subjective norms toward plagiarism (10 items). Cronbach α was calculated to confirm the reliability of the scale: factor I – α = 0.83; factor II – α = 0.79; and factor III – α = 0.85. Correlations between factors were: -0.37 between I and II, -0.41 between I and III, and +0.31 between II and III. Conclusion Attitudes Toward Plagiarism questionnaire was developed, with good psychometric characteristics. It will be used in future research as a standardized tool for measuring attitudes toward plagiarism. PMID:20564761

  10. Quantum-capacity-approaching codes for the detected-jump channel

    SciTech Connect

    Grassl, Markus; Wei Zhaohui; Ji Zhengfeng; Zeng Bei

    2010-12-15

    The quantum-channel capacity gives the ultimate limit for the rate at which quantum data can be reliably transmitted through a noisy quantum channel. Degradable quantum channels are among the few channels whose quantum capacities are known. Given the quantum capacity of a degradable channel, it remains challenging to find a practical coding scheme which approaches capacity. Here we discuss code designs for the detected-jump channel, a degradable channel with practical relevance describing the physics of spontaneous decay of atoms with detected photon emission. We show that this channel can be used to simulate a binary classical channel with both erasures and bit flips. The capacity of the simulated classical channel gives a lower bound on the quantum capacity of the detected-jump channel. When the jump probability is small, it almost equals the quantum capacity. Hence using a classical capacity-approaching code for the simulated classical channel yields a quantum code which approaches the quantum capacity of the detected-jump channel.

  11. Optimal Multicarrier Phase-Coded Waveform Design for Detection of Extended Targets

    SciTech Connect

    Sen, Satyabrata; Glover, Charles Wayne

    2013-01-01

    We design a parametric multicarrier phase-coded (MCPC) waveform that achieves the optimal performance in detecting an extended target in the presence of signal-dependent interference. Traditional waveform design techniques provide only the optimal energy spectral density of the transmit waveform and suffer a performance loss in the synthesis process of the time-domain signal. Therefore, we opt for directly designing an MCPC waveform in terms of its time-frequency codes to obtain the optimal detection performance. First, we describe the modeling assumptions considering an extended target buried within the signal-dependent clutter with known power spectral density, and deduce the performance characteristics of the optimal detector. Then, considering an MCPC signal transmission, we express the detection characteristics in terms of the phase-codes of the MCPC waveform and propose to optimally design the MCPC signal by maximizing the detection probability. Our numerical results demonstrate that the designed MCPC signal attains the optimal detection performance and requires a lesser computational time than the other parametric waveform design approach.

  12. A general-purpose contact detection algorithm for nonlinear structural analysis codes

    SciTech Connect

    Heinstein, M.W.; Attaway, S.W.; Swegle, J.W.; Mello, F.J.

    1993-05-01

    A new contact detection algorithm has been developed to address difficulties associated with the numerical simulation of contact in nonlinear finite element structural analysis codes. Problems including accurate and efficient detection of contact for self-contacting surfaces, tearing and eroding surfaces, and multi-body impact are addressed. The proposed algorithm is portable between dynamic and quasi-static codes and can efficiently model contact between a variety of finite element types including shells, bricks, beams and particles. The algorithm is composed of (1) a location strategy that uses a global search to decide which slave nodes are in proximity to a master surface and (2) an accurate detailed contact check that uses the projected motions of both master surface and slave node. In this report, currently used contact detection algorithms and their associated difficulties are discussed. Then the proposed algorithm and how it addresses these problems is described. Finally, the capability of the new algorithm is illustrated with several example problems.

  13. Multi-hop optical label switching with coherent detected spectral amplitude code labels

    NASA Astrophysics Data System (ADS)

    Cao, Yongsheng

    Based on label stacking principles and coherent detection, we present a two-hop, coherent detected spectral amplitude code (SAC) labeled system to accomplish ultrafast packet forwarding for packet-switched metropolitan area networks. An optical switching network with two forwarding nodes, two 156 Mb/s SAC labels, and 40 Gb/s differential quadrature phase shift keying (DQPSK) payloads is demonstrated by computer simulation. The bit error rate (BER) performances of coherent detected SAC labels and high speed payload over 160 km fiber after two hops transmission are accessed, respectively.

  14. A Safe Place: The Role of Librarians and Writing Centers in Addressing Citation Practices and Plagiarism

    ERIC Educational Resources Information Center

    Buranen, Lise

    2009-01-01

    In American colleges and universities, plagiarism is a hot topic: teachers wail and moan about the rise in student plagiarism (though often without evidence to demonstrate this supposed rise); they complain that the Web has "caused" plagiarism; and at the same time, many believe that technology is the key to "solving" the problem of student…

  15. Is It Happening? How to Avoid the Deleterious Effects of Plagiarism and Cheating in Your Courses

    ERIC Educational Resources Information Center

    Hall, Susan E.

    2011-01-01

    Plagiarism can be "plaguing" if it is not discussed, understood, and enforced by the professor right at the beginning of the course and throughout the semester. Students usually don't "have" to cheat or plagiarize; they do so mainly because "they can." Professors who turn a deaf ear or a blind eye to students who plagiarize create deleterious…

  16. The Use of Technology to Combat Plagiarism in Business Communication Classes

    ERIC Educational Resources Information Center

    Stowers, Robert H.; Hummel, Julie Y.

    2011-01-01

    Some have called plagiarism literary theft. Plagiarizing is akin to stealing the intellect of another person. At times, plagiarism occurs because of ignorance, sloppy authorship, or lack of knowledge about proper sourcing. Sometimes, it is done purposefully. Experts have suggested that the concept of intellectual ownership is limited to Western…

  17. Placing the Library at the Heart of Plagiarism Prevention: The University of Bradford Experience

    ERIC Educational Resources Information Center

    George, Sarah; Costigan, Anne; O'hara, Maria

    2013-01-01

    Plagiarism is a vexing issue for Higher Education, affecting student transition, retention, and attainment. This article reports on two initiatives from the University of Bradford library aimed at reducing student plagiarism. The first initiative is an intensive course for students who have contravened plagiarism regulations. The second course…

  18. Is Cheating Always Intentional? The Perception of College Students toward the Issues of Plagiarism

    ERIC Educational Resources Information Center

    Tabor, Erin L.

    2013-01-01

    The definition of plagiarism that is used in university handbooks is a simple one, and policies along with tiers of disciplinary strategies are used by faculty members in higher education to deter students from committing a plagiarism infraction based on this simple definition. However, plagiarism still occurs on college campuses, and this may be…

  19. An Integrated Academic Literacy Approach to Improving Students' Understanding of Plagiarism in an Accounting Course

    ERIC Educational Resources Information Center

    Powell, Lisa; Singh, Nishani

    2016-01-01

    Plagiarism in higher education is a widespread and complex issue. Students' understanding of plagiarism differs as a result of combining their prior learning about referencing with their current experience of institutional policies and generic resources. Plagiarism was identified as a major learning issue in a core second-year undergraduate…

  20. Measuring Plagiarism: Researching What Students Do, Not What They Say They Do

    ERIC Educational Resources Information Center

    Walker, John

    2010-01-01

    Student plagiarism in colleges and universities has become a controversial issue in recent years. A key problem has been the lack of reliable empirical data on the frequency, nature and extent of plagiarism in student assignments. The aim of the study described here was to provide this data. Patterns of plagiarism were tracked in two university…

  1. Literacy & Identity: Trust, Betrayal, and Authorship: Plagiarism and How We Perceive Students

    ERIC Educational Resources Information Center

    Williams, Bronwyn T.

    2007-01-01

    Emotional responses to plagiarism are rarely addressed in professional literature that focuses on ethics and good teaching practices. Yet, the emotions that are unleashed by cases of plagiarism, or suspicions of plagiarism, influence how we perceive our students and how we approach teaching them. Such responses have been complicated by online…

  2. Another Look at Plagiarism in the Digital Age: Is It Time to Turn in My Badge?

    ERIC Educational Resources Information Center

    Colvin, Benie B.

    2007-01-01

    In this article, the author talks about plagiarism in the digital age and how plagiarism challenges teachers in their relationship with students. With a growing body of digital commentary and the looming dominance of electronic writing, current professional consensus in the plagiarism dilemma appears dubious and the slope gets more slippery every…

  3. Policing--Or, at Least, Policying--Plagiarism at One Australian University

    ERIC Educational Resources Information Center

    O'Regan, Kerry

    2006-01-01

    How universities and university people deal with plagiarism is articulated in universities' plagiarism policies. Universities, policies and people are all located in a bigger context, one which is being increasingly shaped by global issues. Some global issues of particular relevance to plagiarism are associated with the Internet and its attendant…

  4. Plagiarism Awareness among Students: Assessing Integration of Ethics Theory into Library Instruction

    ERIC Educational Resources Information Center

    Strittmatter, Connie; Bratton, Virginia K.

    2014-01-01

    The library literature on plagiarism instruction focuses on students' understanding of what plagiarism is and is not. This study evaluates the effect of library instruction from a broader perspective by examining the pre- and posttest (instruction) levels of students' perceptions toward plagiarism ethics. Eighty-six students completed a pre- and…

  5. When Emotion Stands to Reason: A Phenomenological Study of Composition Instructors' Emotional Responses to Plagiarism

    ERIC Educational Resources Information Center

    Biswas, Ann E.

    2015-01-01

    Plagiarism has been the focus of considerable scholarly research in recent decades, much of which has examined the number of students who are plagiarizing, why they plagiarize, and what instructors can do to teach students to effectively and ethically integrate their own words and ideas with those of their sources. Overlooked in this scholarship…

  6. Scientists Admitting to Plagiarism: A Meta-analysis of Surveys.

    PubMed

    Pupovac, Vanja; Fanelli, Daniele

    2015-10-01

    We conducted a systematic review and meta-analysis of anonymous surveys asking scientists whether they ever committed various forms of plagiarism. From May to December 2011 we searched 35 bibliographic databases, five grey literature databases and hand searched nine journals for potentially relevant studies. We included surveys that asked scientists if, in a given recall period, they had committed or knew of a colleague who committed plagiarism, and from each survey extracted the proportion of those who reported at least one case. Studies that focused on academic (i.e. student) plagiarism were excluded. Literature searches returned 12,460 titles from which 17 relevant survey studies were identified. Meta-analysis of studies reporting committed (N = 7) and witnessed (N = 11) plagiarism yielded a pooled estimate of, respectively, 1.7% (95% CI 1.2-2.4) and 30% (95% CI 17-46). Basic methodological factors, including sample size, year of survey, delivery method and whether survey questions were explicit rather than indirect made a significant difference on survey results. Even after controlling for these methodological factors, between-study differences in admission rates were significantly above those expected by sampling error alone and remained largely unexplained. Despite several limitations of the data and of this meta-analysis, we draw three robust conclusions: (1) The rate at which scientists report knowing a colleague who committed plagiarism is higher than for data fabrication and falsification; (2) The rate at which scientists report knowing a colleague who committed plagiarism is correlated to that of fabrication and falsification; (3) The rate at which scientists admit having committed either form of misconduct (i.e. fabrication, falsification and plagiarism) in surveys has declined over time. PMID:25352123

  7. Scientists Admitting to Plagiarism: A Meta-analysis of Surveys.

    PubMed

    Pupovac, Vanja; Fanelli, Daniele

    2015-10-01

    We conducted a systematic review and meta-analysis of anonymous surveys asking scientists whether they ever committed various forms of plagiarism. From May to December 2011 we searched 35 bibliographic databases, five grey literature databases and hand searched nine journals for potentially relevant studies. We included surveys that asked scientists if, in a given recall period, they had committed or knew of a colleague who committed plagiarism, and from each survey extracted the proportion of those who reported at least one case. Studies that focused on academic (i.e. student) plagiarism were excluded. Literature searches returned 12,460 titles from which 17 relevant survey studies were identified. Meta-analysis of studies reporting committed (N = 7) and witnessed (N = 11) plagiarism yielded a pooled estimate of, respectively, 1.7% (95% CI 1.2-2.4) and 30% (95% CI 17-46). Basic methodological factors, including sample size, year of survey, delivery method and whether survey questions were explicit rather than indirect made a significant difference on survey results. Even after controlling for these methodological factors, between-study differences in admission rates were significantly above those expected by sampling error alone and remained largely unexplained. Despite several limitations of the data and of this meta-analysis, we draw three robust conclusions: (1) The rate at which scientists report knowing a colleague who committed plagiarism is higher than for data fabrication and falsification; (2) The rate at which scientists report knowing a colleague who committed plagiarism is correlated to that of fabrication and falsification; (3) The rate at which scientists admit having committed either form of misconduct (i.e. fabrication, falsification and plagiarism) in surveys has declined over time.

  8. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  9. The Limits of Coding with Joint Constraints on Detected and Undetected Error Rates

    NASA Technical Reports Server (NTRS)

    Dolinar, Sam; Andrews, Kenneth; Pollara, Fabrizio; Divsalar, Dariush

    2008-01-01

    We develop a remarkably tight upper bound on the performance of a parameterized family of bounded angle maximum-likelihood (BA-ML) incomplete decoders. The new bound for this class of incomplete decoders is calculated from the code's weight enumerator, and is an extension of Poltyrev-type bounds developed for complete ML decoders. This bound can also be applied to bound the average performance of random code ensembles in terms of an ensemble average weight enumerator. We also formulate conditions defining a parameterized family of optimal incomplete decoders, defined to minimize both the total codeword error probability and the undetected error probability for any fixed capability of the decoder to detect errors. We illustrate the gap between optimal and BA-ML incomplete decoding via simulation of a small code.

  10. Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching.

    PubMed

    Jenadeleh, Mohsen; Ebrahimi Moghaddam, Mohsen

    2016-05-01

    Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy-move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy-move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy-move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method.

  11. Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching.

    PubMed

    Jenadeleh, Mohsen; Ebrahimi Moghaddam, Mohsen

    2016-05-01

    Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy-move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy-move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy-move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method. PMID:27122398

  12. Arbitrary error detection in a planar lattice of the surface code

    NASA Astrophysics Data System (ADS)

    Corcoles, Antonio; Magesan, Easwar; Srinivasan, Srikanth; Bronn, Nicholas; Hertzberg, Jared; Cross, Andrew; Steffen, Matthias; Gambetta, Jay; Chow, Jerry

    2015-03-01

    We detect arbitrary single-qubit errors on a system of four superconducting qubits arranged in a planar lattice, amenable to the surface code. The error detection protocol is based on the stabilizer formalism and protects a codeword encoded on an entangled two-qubit state by quantum non-demolition parity measurements, ZZ and XX. These parity measurements are performed using the other two qubits acting as syndromes. We introduce a bit- or phase-flip single-qubit error applied to the codeword and show that this error can be revealed uniquely in the syndromes. The -non-trivial- geometric arrangement of the qubits is essential to the surface code algorithm and is therefore extendable throughout the two-dimensional plane, encoding progressively larger logical Hilbert spaces towards a fully scaled fault-tolerant quantum computer. We acknowledge support from IARPA under contract W911NF-10-1-0324

  13. Using locality-constrained linear coding in automatic target detection of HRS images

    NASA Astrophysics Data System (ADS)

    Rezaee, M.; Mirikharaji, Z.; Zhang, Y.

    2016-04-01

    Automatic target detection with complicated shapes in high spatial resolution images is an ongoing challenge in remote sensing image processing. This is because most methods use spectral or texture information, which are not sufficient for detecting complex shapes. In this paper, a new detection framework, based on Spatial Pyramid Matching (SPM) and Locality- constraint Linear Coding (LLC), is proposed to solve this problem, and exemplified using airplane shapes. The process starts with partitioning the image into sub-regions and generating a unique histogram for local features of each sub-region. Then, linear Support Vector Machines (SVMs) are used to detect objects based on a pyramid-matching kernel, which analyses the descriptors inside patches in different resolution. In order to generate the histogram, first a point feature detector (e.g. SIFT) is applied on the patches, and then a quantization process is used to select local features. In this step, the k-mean method is used in conjunction with the locality-constrained linear coding method. The LLC forces the coefficient matrix in the quantization process to be local and sparse as well. As a result, the speed of the method improves around 24 times in comparison to using sparse coding for quantization. Quantitative analysis also shows improvement in comparison to just using k-mean, but the accuracy in comparison to using sparse coding is similar. Rotation and shift of the desired object has no effect on the obtained results. The speed and accuracy of this algorithm for high spatial resolution images make it capable for use in real-world applications.

  14. Automatic Detection of Frontal Face Midline by Chain-coded Merlin-Farber Hough Trasform

    NASA Astrophysics Data System (ADS)

    Okamoto, Daichi; Ohyama, Wataru; Wakabayashi, Tetsushi; Kimura, Fumitaka

    We propose a novel approach for detection of the facial midline (facial symmetry axis) from a frontal face image. The facial midline has several applications, for instance reducing computational cost required for facial feature extraction (FFE) and postoperative assessment for cosmetic or dental surgery. The proposed method detects the facial midline of a frontal face from an edge image as the symmetry axis using the Merlin-Faber Hough transformation. And a new performance improvement scheme for midline detection by MFHT is present. The main concept of the proposed scheme is suppression of redundant vote on the Hough parameter space by introducing chain code representation for the binary edge image. Experimental results on the image dataset containing 2409 images from FERET database indicate that the proposed algorithm can improve the accuracy of midline detection from 89.9% to 95.1 % for face images with different scales and rotation.

  15. An intervention aimed at reducing plagiarism in undergraduate nursing students.

    PubMed

    Smedley, Alison; Crawford, Tonia; Cloete, Linda

    2015-05-01

    Plagiarism is a current and developing problem in the tertiary education sector where students access information and reproduce it as their own. It is identified as occurring in many tertiary level degrees including nursing and allied health profession degrees. Nursing specifically, is a profession where standards and ethics are required and honesty is paramount. The aim of this study was to evaluate the change in nursing student's knowledge and understanding of plagiarism before and after an educational intervention in their first semester of the Bachelor of nursing degree at a private college of higher education in Sydney, Australia. This study concluded that an educational intervention can increase knowledge and awareness of plagiarism among nursing students.

  16. The eureka error: inadvertent plagiarism by misattributions of effort.

    PubMed

    Preston, Jesse; Wegner, Daniel M

    2007-04-01

    The authors found that the feeling of authorship for mental actions such as solving problems is enhanced by effort cues experienced during mental activity; misattribution of effort cues resulted in inadvertent plagiarism. Pairs of participants took turns solving anagrams as they exerted effort on an unrelated task. People inadvertently plagiarized their partners' answers more often when they experienced high incidental effort while working on the problem and reduced effort as the solution appeared. This result was found for efforts produced when participants squeezed a handgrip during the task (Experiment 1) or when the anagram was displayed in a font that was difficult to read (Experiments 2, 3a, and 3b). Plagiarism declined, however, when participants attended to the source of the effort cues (Experiments 3a and 3b). These results suggest that effort misattribution can influence authorship processing for mental activities. PMID:17469945

  17. Coded aperture coherent scatter imaging for breast cancer detection: a Monte Carlo evaluation

    NASA Astrophysics Data System (ADS)

    Lakshmanan, Manu N.; Morris, Robert E.; Greenberg, Joel A.; Samei, Ehsan; Kapadia, Anuj J.

    2016-03-01

    It is known that conventional x-ray imaging provides a maximum contrast between cancerous and healthy fibroglandular breast tissues of 3% based on their linear x-ray attenuation coefficients at 17.5 keV, whereas coherent scatter signal provides a maximum contrast of 19% based on their differential coherent scatter cross sections. Therefore in order to exploit this potential contrast, we seek to evaluate the performance of a coded- aperture coherent scatter imaging system for breast cancer detection and investigate its accuracy using Monte Carlo simulations. In the simulations we modeled our experimental system, which consists of a raster-scanned pencil beam of x-rays, a bismuth-tin coded aperture mask comprised of a repeating slit pattern with 2-mm periodicity, and a linear-array of 128 detector pixels with 6.5-keV energy resolution. The breast tissue that was scanned comprised a 3-cm sample taken from a patient-based XCAT breast phantom containing a tomosynthesis- based realistic simulated lesion. The differential coherent scatter cross section was reconstructed at each pixel in the image using an iterative reconstruction algorithm. Each pixel in the reconstructed image was then classified as being either air or the type of breast tissue with which its normalized reconstructed differential coherent scatter cross section had the highest correlation coefficient. Comparison of the final tissue classification results with the ground truth image showed that the coded aperture imaging technique has a cancerous pixel detection sensitivity (correct identification of cancerous pixels), specificity (correctly ruling out healthy pixels as not being cancer) and accuracy of 92.4%, 91.9% and 92.0%, respectively. Our Monte Carlo evaluation of our experimental coded aperture coherent scatter imaging system shows that it is able to exploit the greater contrast available from coherently scattered x-rays to increase the accuracy of detecting cancerous regions within the breast.

  18. Analysis of a Coded, M-ary Orthogonal Input Optical Channel with Random-gain Photomultiplier Detection

    NASA Technical Reports Server (NTRS)

    Lee, P. J.

    1984-01-01

    Performance of two coding systems is analyzed for a noisy optical channel with M(=2(L)-ary orthogonal signaling and random gain photomultiplier detection. The considered coding systems are the Reed Solomon (RS) coding with error only correction decoding and the interleaved binary convolutional system with soft decision Viterbi decoding. The required average number of received signal photons per information bit, N sub b, for a desired bit error of 0.000001 is found for a set of commonly used parameters and with a high background noise level. We find that the interleaved binary convolutional coding system is preferable to the RS coding system in performance complexity tradeoffs.

  19. Detecting and Comparing Non-Coding RNAs in the High-Throughput Era

    PubMed Central

    Bussotti, Giovanni; Notredame, Cedric; Enright, Anton J.

    2013-01-01

    In recent years there has been a growing interest in the field of non-coding RNA. This surge is a direct consequence of the discovery of a huge number of new non-coding genes and of the finding that many of these transcripts are involved in key cellular functions. In this context, accurately detecting and comparing RNA sequences has become important. Aligning nucleotide sequences is a key requisite when searching for homologous genes. Accurate alignments reveal evolutionary relationships, conserved regions and more generally any biologically relevant pattern. Comparing RNA molecules is, however, a challenging task. The nucleotide alphabet is simpler and therefore less informative than that of amino-acids. Moreover for many non-coding RNAs, evolution is likely to be mostly constrained at the structural level and not at the sequence level. This results in very poor sequence conservation impeding comparison of these molecules. These difficulties define a context where new methods are urgently needed in order to exploit experimental results to their full potential. This review focuses on the comparative genomics of non-coding RNAs in the context of new sequencing technologies and especially dealing with two extremely important and timely research aspects: the development of new methods to align RNAs and the analysis of high-throughput data. PMID:23887659

  20. Detection of code spread OFDM based on 0-1 integer quadratic programming

    NASA Astrophysics Data System (ADS)

    Elghariani, Ali; Zoltowski, Michael D.

    2012-05-01

    In this paper we introduce Integer Quadratic Programming (MIQP) approach to optimally detect QPSK Code Spread OFDM (CS-OFDM) by formulating the problem as a combinatorial optimization problem. The Branch and Bound (BB) algorithm is utilized to solve this integer quadratic programming problem. Furthermore, we propose combined preprocessing steps that can be applied prior to BB so that the computational complexity of the optimum receiver is reduced. The first step in this combination is to detect as much as possible symbols using procedures presented in [9], which is basically based on the gradient of quadratic function. The second step detects the undetected symbols from the first step using MMSE estimator. The result of the latter step will be used to predict the initial upper bound of the BB algorithm. Simulation results show that the proposed preprocessing combination when applied prior to BB provides optimal performance with a significantly reduced computational complexity.

  1. Detection of almond allergen coding sequences in processed foods by real time PCR.

    PubMed

    Prieto, Nuria; Iniesto, Elisa; Burbano, Carmen; Cabanillas, Beatriz; Pedrosa, Mercedes M; Rovira, Mercè; Rodríguez, Julia; Muzquiz, Mercedes; Crespo, Jesus F; Cuadrado, Carmen; Linacero, Rosario

    2014-06-18

    The aim of this work was to develop and analytically validate a quantitative RT-PCR method, using novel primer sets designed on Pru du 1, Pru du 3, Pru du 4, and Pru du 6 allergen-coding sequences, and contrast the sensitivity and specificity of these probes. The temperature and/or pressure processing influence on the ability to detect these almond allergen targets was also analyzed. All primers allowed a specific and accurate amplification of these sequences. The specificity was assessed by amplifying DNA from almond, different Prunus species and other common plant food ingredients. The detection limit was 1 ppm in unprocessed almond kernels. The method's robustness and sensitivity were confirmed using spiked samples. Thermal treatment under pressure (autoclave) reduced yield and amplificability of almond DNA; however, high-hydrostatic pressure treatments did not produced such effects. Compared with ELISA assay outcomes, this RT-PCR showed higher sensitivity to detect almond traces in commercial foodstuffs. PMID:24857239

  2. Supersensitive detection and discrimination of enantiomers by dorsal olfactory receptors: evidence for hierarchical odour coding.

    PubMed

    Sato, Takaaki; Kobayakawa, Reiko; Kobayakawa, Ko; Emura, Makoto; Itohara, Shigeyoshi; Kizumi, Miwako; Hamana, Hiroshi; Tsuboi, Akio; Hirono, Junzo

    2015-09-11

    Enantiomeric pairs of mirror-image molecular structures are difficult to resolve by instrumental analyses. The human olfactory system, however, discriminates (-)-wine lactone from its (+)-form rapidly within seconds. To gain insight into receptor coding of enantiomers, we compared behavioural detection and discrimination thresholds of wild-type mice with those of ΔD mice in which all dorsal olfactory receptors are genetically ablated. Surprisingly, wild-type mice displayed an exquisite "supersensitivity" to enantiomeric pairs of wine lactones and carvones. They were capable of supersensitive discrimination of enantiomers, consistent with their high detection sensitivity. In contrast, ΔD mice showed selective major loss of sensitivity to the (+)-enantiomers. The resulting 10(8)-fold differential sensitivity of ΔD mice to (-)- vs. (+)-wine lactone matched that observed in humans. This suggests that humans lack highly sensitive orthologous dorsal receptors for the (+)-enantiomer, similarly to ΔD mice. Moreover, ΔD mice showed >10(10)-fold reductions in enantiomer discrimination sensitivity compared to wild-type mice. ΔD mice detected one or both of the (-)- and (+)-enantiomers over a wide concentration range, but were unable to discriminate them. This "enantiomer odour discrimination paradox" indicates that the most sensitive dorsal receptors play a critical role in hierarchical odour coding for enantiomer identification.

  3. Detection optimization using linear systems analysis of a coded aperture laser sensor system

    SciTech Connect

    Gentry, S.M.

    1994-09-01

    Minimum detectable irradiance levels for a diffraction grating based laser sensor were calculated to be governed by clutter noise resulting from reflected earth albedo. Features on the earth surface caused pseudo-imaging effects on the sensor`s detector arras that resulted in the limiting noise in the detection domain. It was theorized that a custom aperture transmission function existed that would optimize the detection of laser sources against this clutter background. Amplitude and phase aperture functions were investigated. Compared to the diffraction grating technique, a classical Young`s double-slit aperture technique was investigated as a possible optimized solution but was not shown to produce a system that had better clutter-noise limited minimum detectable irradiance. Even though the double-slit concept was not found to have a detection advantage over the slit-grating concept, one interesting concept grew out of the double-slit design that deserved mention in this report, namely the Barker-coded double-slit. This diffractive aperture design possessed properties that significantly improved the wavelength accuracy of the double-slit design. While a concept was not found to beat the slit-grating concept, the methodology used for the analysis and optimization is an example of the application of optoelectronic system-level linear analysis. The techniques outlined here can be used as a template for analysis of a wide range of optoelectronic systems where the entire system, both optical and electronic, contribute to the detection of complex spatial and temporal signals.

  4. Ultrasonic Array for Obstacle Detection Based on CDMA with Kasami Codes

    PubMed Central

    Diego, Cristina; Hernández, Álvaro; Jiménez, Ana; Álvarez, Fernando J.; Sanz, Rebeca; Aparicio, Joaquín

    2011-01-01

    This paper raises the design of an ultrasonic array for obstacle detection based on Phased Array (PA) techniques, which steers the acoustic beam through the environment by electronics rather than mechanical means. The transmission of every element in the array has been encoded, according to Code Division for Multiple Access (CDMA), which allows multiple beams to be transmitted simultaneously. All these features together enable a parallel scanning system which does not only improve the image rate but also achieves longer inspection distances in comparison with conventional PA techniques. PMID:22247675

  5. Staff and Student Perceptions of Plagiarism and Cheating

    ERIC Educational Resources Information Center

    Wilkinson, Jenny

    2009-01-01

    Cheating, plagiarism, and other forms of academic misconduct are a significant issue in higher education. In this study, the attitudes of academic staff and students in a 3 year undergraduate nursing program to various forms of academic misconduct were assessed and compared. Forty-nine percent of staff and 39% of students thought that cheating on…

  6. Cut and Paste 101: Plagiarism and the Net.

    ERIC Educational Resources Information Center

    Renard, Lisa

    2000-01-01

    There are three types of Internet cheaters: unintentional, sneaky, and lazy. Plagiarism is not new, but Internet cheat sites allowing users to cut and paste papers easily from untraceable sources are widespread. Teachers should be aware of cheat sites, demand rewrites, assign unique topics, and teach source documentation. (MLH)

  7. Internet Plagiarism: An Agenda for Staff Inservice and Student Awareness.

    ERIC Educational Resources Information Center

    Lincoln, Margaret

    2002-01-01

    Discusses Internet plagiarism and includes an outline for a presentation that library media specialists can use with teachers. Highlights include an overview of the problem; helping teachers recognize the signs; pinpointing the source, including the use of search engines and Web sites; and prevention, including more control over the research…

  8. Student Plagiarism and Faculty Responsibility in Undergraduate Engineering Labs

    ERIC Educational Resources Information Center

    Parameswaran, Ashvin; Devi, Poornima

    2006-01-01

    In undergraduate engineering labs, lab reports are routinely copied. By ignoring this form of plagiarism, teaching assistants and lab technicians neglect their role responsibility. By designing courses that facilitate it, however inadvertently, professors neglect their causal responsibility. Using the case of one university, we show via interviews…

  9. Online Anti-Plagiarism Service Sets off Court Fight

    ERIC Educational Resources Information Center

    Robelen, Erik W.

    2007-01-01

    As educators grapple with how best to combat plagiarism in the Internet age, several high school students are suing a company that many districts and schools have hired to help them reduce such cheating. The lawsuit alleges that the company is violating the high school students' rights under U.S. copyright law. The lawsuit was filed by four…

  10. Ensuring Effective Student Support in Higher Education Alleged Plagiarism Cases

    ERIC Educational Resources Information Center

    Baird, Craig; Dooey, Patricia

    2014-01-01

    Plagiarism and other forms of academic misconduct are matters of great concern at all levels of study worldwide. This is especially so for students in higher education institutions, where higher degrees and publications are key focus activities. Ready access to internet based resources assist academic writing practices. However, the unintentional,…

  11. Loss, Responsibility, Blame? Staff Discourses of Student Plagiarism

    ERIC Educational Resources Information Center

    Gourlay, Lesley; Deane, Janis

    2012-01-01

    Student plagiarism and difficulties with writing have been widely investigated in the literature, but there has been less research on staff perspectives. A Joint Information Services Committee (JISC)-funded questionnaire (n = 80) and focus group study investigated the views of lecturers, librarians and study advisors at a UK post-92 university,…

  12. Awareness about Plagiarism amongst University Students in Pakistan

    ERIC Educational Resources Information Center

    Ramzan, Muhammad; Munir, Muhammad Asif; Siddique, Nadeem; Asif, Muhammad

    2012-01-01

    Research is an original and systematic investigation undertaken to discover new facts and information about a phenomenon. However a variety of empirical and ethical issues are on the rise in academia, especially plagiarism is quickly becoming part of global educational and research culture. More and more students and researchers are turning to the…

  13. Plagiarism: Academic Dishonesty or "Blind Spot" of Multicultural Education?

    ERIC Educational Resources Information Center

    Song-Turner, Helen

    2008-01-01

    One of the issues facing universities operating in a range of market situations and contexts is that of plagiarism. Different universities have taken different approaches in dealing with this issue. In an Australian university context, this issue is of particular concern, given the large numbers of overseas students studying in Australia, and…

  14. Confronting Plagiarism: How Conventional Teaching Invites Cyber-Cheating

    ERIC Educational Resources Information Center

    Sterngold, Arthur

    2004-01-01

    The digital revolution makes it easy for students to plagiarize. Using Internet search engines, DVD-based reference works, online journals, Web-based news sources, article databases, and other electronic sources, students can find information about nearly any topic and paste the data directly into their papers. Or students can take credit for…

  15. Using Bloom's Taxonomy to Teach Students about Plagiarism

    ERIC Educational Resources Information Center

    Vosen, Melissa A.

    2008-01-01

    Melissa A. Vosen outlines a unit she has designed to help students comprehend the often unclear boundaries and issues surrounding plagiarism. Using Bloom's taxonomy of the cognitive domain, students complete increasingly complex tasks, learning to construct a works cited page and assess scholarly opinions. They also research the consequences of…

  16. A Reflection on Plagiarism, Patchwriting, and the Engineering Master's Thesis

    ERIC Educational Resources Information Center

    Eckel, Edward J.

    2010-01-01

    Early in his career as an engineering librarian, the author saw plagiarism in completely black and white terms. However, digging into the scholarly literature, he finds ample evidence that there are other factors at work in student writing besides a lack of ethics or the intent to cheat. In this article, he briefly highlights some of these…

  17. Strategies to Help Legal Studies Students Avoid Plagiarism

    ERIC Educational Resources Information Center

    Samuels, Linda B.; Bast, Carol M.

    2006-01-01

    Plagiarism is certainly not new to academics, but it may be on the rise with easy access to the vast quantities of information available on the Internet. Students researching on the Internet do not have to take handwritten or typewritten notes. They can simply print out or copy and save whatever they find. They are even spared the tedium of having…

  18. Assessing Domestic vs. International Student Perceptions and Attitudes of Plagiarism

    ERIC Educational Resources Information Center

    Doss, Daniel Adrian; Henley, Russ; Gokaraju, Balakrishna; McElreath, David; Lackey, Hilliard; Hong, Qiuqi; Miller, Lauren

    2016-01-01

    The authors examined students' perceptions of plagiarism from a higher education teaching institution within the U.S. southeast. This study employed a five-point Likert-scale to examine differences of perceptions between domestic versus international students. Statistically significant outcomes were observed regarding the notions that plagiarism…

  19. Faculty Perceptions of Plagiarism at Queensborough Community College

    ERIC Educational Resources Information Center

    Marcus, Sara; Beck, Sheila

    2011-01-01

    The researchers surveyed English and Speech & Theater faculty members at Queensborough Community College on their perceptions of and attitudes toward plagiarism. The researchers used the Queensborough Community College Academic Integrity Policy as the basis for their analysis. Based on the responses received, it was determined that 50% of the…

  20. Plagiarism Isn't Just an Issue for Students

    ERIC Educational Resources Information Center

    Reed, Deborah K.

    2011-01-01

    Everyone is appalled at reports of rampant cheating among high school and college students, primarily by cutting and pasting from the Internet without providing citations. There are situations in real life where an individual suffered serious consequences for plagiarizing work. Many schools incorporate such scenarios in character education…

  1. Exploring University Students' Perceptions of Plagiarism: A Focus Group Study

    ERIC Educational Resources Information Center

    Gullifer, Judith; Tyson, Graham A.

    2010-01-01

    Plagiarism is perceived to be a growing problem and universities are being required to devote increasing time and resources to combating it. Theory and research in psychology show that a thorough understanding of an individual's view of an issue or problem is an essential requirement for successful change of that person's attitudes and behaviour.…

  2. A Model for Exploring Student Understandings of Plagiarism

    ERIC Educational Resources Information Center

    Sutton, Anna; Taylor, David; Johnston, Carol

    2014-01-01

    A clear understanding of how students view plagiarism is needed if the extensive efforts devoted to helping them engage in high-quality scholarship are to be worthwhile. There are a variety of views on this topic, but theoretical models to integrate the literature, take account of international differences and guide practitioners are limited.…

  3. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  4. Auditory detection of ultrasonic coded transmitters by seals and sea lions.

    PubMed

    Cunningham, Kane A; Hayes, Sean A; Michelle Wargo Rub, A; Reichmuth, Colleen

    2014-04-01

    Ultrasonic coded transmitters (UCTs) are high-frequency acoustic tags that are often used to conduct survivorship studies of vulnerable fish species. Recent observations of differential mortality in tag control studies suggest that fish instrumented with UCTs may be selectively targeted by marine mammal predators, thereby skewing valuable survivorship data. In order to better understand the ability of pinnipeds to detect UCT outputs, behavioral high-frequency hearing thresholds were obtained from a trained harbor seal (Phoca vitulina) and a trained California sea lion (Zalophus californianus). Thresholds were measured for extended (500 ms) and brief (10 ms) 69 kHz narrowband stimuli, as well as for a stimulus recorded directly from a Vemco V16-3H UCT, which consisted of eight 10 ms, 69 kHz pure-tone pulses. Detection thresholds for the harbor seal were as expected based on existing audiometric data for this species, while the California sea lion was much more sensitive than predicted. Given measured detection thresholds of 113 dB re 1 μPa and 124 dB re 1 μPa, respectively, both species are likely able to detect acoustic outputs of the Vemco V16-3H under water from distances exceeding 200 m in typical natural conditions, suggesting that these species are capable of using UCTs to detect free-ranging fish. PMID:25234996

  5. Auditory detection of ultrasonic coded transmitters by seals and sea lions.

    PubMed

    Cunningham, Kane A; Hayes, Sean A; Michelle Wargo Rub, A; Reichmuth, Colleen

    2014-04-01

    Ultrasonic coded transmitters (UCTs) are high-frequency acoustic tags that are often used to conduct survivorship studies of vulnerable fish species. Recent observations of differential mortality in tag control studies suggest that fish instrumented with UCTs may be selectively targeted by marine mammal predators, thereby skewing valuable survivorship data. In order to better understand the ability of pinnipeds to detect UCT outputs, behavioral high-frequency hearing thresholds were obtained from a trained harbor seal (Phoca vitulina) and a trained California sea lion (Zalophus californianus). Thresholds were measured for extended (500 ms) and brief (10 ms) 69 kHz narrowband stimuli, as well as for a stimulus recorded directly from a Vemco V16-3H UCT, which consisted of eight 10 ms, 69 kHz pure-tone pulses. Detection thresholds for the harbor seal were as expected based on existing audiometric data for this species, while the California sea lion was much more sensitive than predicted. Given measured detection thresholds of 113 dB re 1 μPa and 124 dB re 1 μPa, respectively, both species are likely able to detect acoustic outputs of the Vemco V16-3H under water from distances exceeding 200 m in typical natural conditions, suggesting that these species are capable of using UCTs to detect free-ranging fish.

  6. Coded moderator approach for fast neutron source detection and localization at standoff

    NASA Astrophysics Data System (ADS)

    Littell, Jennifer; Lukosi, Eric; Hayward, Jason; Milburn, Robert; Rowan, Allen

    2015-06-01

    Considering the need for directional sensing at standoff for some security applications and scenarios where a neutron source may be shielded by high Z material that nearly eliminates the source gamma flux, this work focuses on investigating the feasibility of using thermal neutron sensitive boron straw detectors for fast neutron source detection and localization. We utilized MCNPX simulations to demonstrate that, through surrounding the boron straw detectors by a HDPE coded moderator, a source-detector orientation-specific response enables potential 1D source localization in a high neutron detection efficiency design. An initial test algorithm has been developed in order to confirm the viability of this detector system's localization capabilities which resulted in identification of a 1 MeV neutron source with a strength equivalent to 8 kg WGPu at 50 m standoff within ±11°.

  7. Accumulating pyramid spatial-spectral collaborative coding divergence for hyperspectral anomaly detection

    NASA Astrophysics Data System (ADS)

    Sun, Hao; Zou, Huanxin; Zhou, Shilin

    2016-03-01

    Detection of anomalous targets of various sizes in hyperspectral data has received a lot of attention in reconnaissance and surveillance applications. Many anomaly detectors have been proposed in literature. However, current methods are susceptible to anomalies in the processing window range and often make critical assumptions about the distribution of the background data. Motivated by the fact that anomaly pixels are often distinctive from their local background, in this letter, we proposed a novel hyperspectral anomaly detection framework for real-time remote sensing applications. The proposed framework consists of four major components, sparse feature learning, pyramid grid window selection, joint spatial-spectral collaborative coding and multi-level divergence fusion. It exploits the collaborative representation difference in the feature space to locate potential anomalies and is totally unsupervised without any prior assumptions. Experimental results on airborne recorded hyperspectral data demonstrate that the proposed methods adaptive to anomalies in a large range of sizes and is well suited for parallel processing.

  8. Detection and reconstruction of error control codes for engineered and biological regulatory systems.

    SciTech Connect

    May, Elebeoba Eni; Rintoul, Mark Daniel; Johnston, Anna Marie; Pryor, Richard J.; Hart, William Eugene; Watson, Jean-Paul

    2003-10-01

    A fundamental challenge for all communication systems, engineered or living, is the problem of achieving efficient, secure, and error-free communication over noisy channels. Information theoretic principals have been used to develop effective coding theory algorithms to successfully transmit information in engineering systems. Living systems also successfully transmit biological information through genetic processes such as replication, transcription, and translation, where the genome of an organism is the contents of the transmission. Decoding of received bit streams is fairly straightforward when the channel encoding algorithms are efficient and known. If the encoding scheme is unknown or part of the data is missing or intercepted, how would one design a viable decoder for the received transmission? For such systems blind reconstruction of the encoding/decoding system would be a vital step in recovering the original message. Communication engineers may not frequently encounter this situation, but for computational biologists and biotechnologist this is an immediate challenge. The goal of this work is to develop methods for detecting and reconstructing the encoder/decoder system for engineered and biological data. Building on Sandia's strengths in discrete mathematics, algorithms, and communication theory, we use linear programming and will use evolutionary computing techniques to construct efficient algorithms for modeling the coding system for minimally errored engineered data stream and genomic regulatory DNA and RNA sequences. The objective for the initial phase of this project is to construct solid parallels between biological literature and fundamental elements of communication theory. In this light, the milestones for FY2003 were focused on defining genetic channel characteristics and providing an initial approximation for key parameters, including coding rate, memory length, and minimum distance values. A secondary objective addressed the question of

  9. The ethics of scholarly publishing: exploring differences in plagiarism and duplicate publication across nations.

    PubMed

    Amos, Kathleen A

    2014-04-01

    This study explored national differences in plagiarism and duplicate publication in retracted biomedical literature. The national affiliations of authors and reasons for retraction of papers accessible through PubMed that were published from 2008 to 2012 and subsequently retracted were determined in order to identify countries with the largest numbers and highest rates of retraction due to plagiarism and duplicate publication. Authors from more than fifty countries retracted papers. While the United States retracted the most papers, China retracted the most papers for plagiarism and duplicate publication. Rates of plagiarism and duplicate publication were highest in Italy and Finland, respectively. Unethical publishing practices cut across nations.

  10. Self-plagiarism in academic publishing: the anatomy of a misnomer.

    PubMed

    Andreescu, Liviu

    2013-09-01

    The paper discusses self-plagiarism and associated practices in scholarly publishing. It approaches at some length the conceptual issues raised by the notion of self-plagiarism. It distinguishes among and then examines the main families of arguments against self-plagiarism, as well as the question of possibly legitimate reasons to engage in this practice. It concludes that some of the animus frequently reserved for self-plagiarism may be the result of, among others, poor choice of a label, unwarranted generalizations as to its ill effects based on the specific experience (and goals) of particular disciplines, and widespread but not necessarily beneficial publishing practices.

  11. Self-plagiarism in academic publishing: the anatomy of a misnomer.

    PubMed

    Andreescu, Liviu

    2013-09-01

    The paper discusses self-plagiarism and associated practices in scholarly publishing. It approaches at some length the conceptual issues raised by the notion of self-plagiarism. It distinguishes among and then examines the main families of arguments against self-plagiarism, as well as the question of possibly legitimate reasons to engage in this practice. It concludes that some of the animus frequently reserved for self-plagiarism may be the result of, among others, poor choice of a label, unwarranted generalizations as to its ill effects based on the specific experience (and goals) of particular disciplines, and widespread but not necessarily beneficial publishing practices. PMID:23179068

  12. Detection by real time PCR of walnut allergen coding sequences in processed foods.

    PubMed

    Linacero, Rosario; Ballesteros, Isabel; Sanchiz, Africa; Prieto, Nuria; Iniesto, Elisa; Martinez, Yolanda; Pedrosa, Mercedes M; Muzquiz, Mercedes; Cabanillas, Beatriz; Rovira, Mercè; Burbano, Carmen; Cuadrado, Carmen

    2016-07-01

    A quantitative real-time PCR (RT-PCR) method, employing novel primer sets designed on Jug r 1, Jug r 3, and Jug r 4 allergen-coding sequences, was set up and validated. Its specificity, sensitivity, and applicability were evaluated. The DNA extraction method based on CTAB-phenol-chloroform was best for walnut. RT-PCR allowed a specific and accurate amplification of allergen sequence, and the limit of detection was 2.5pg of walnut DNA. The method sensitivity and robustness were confirmed with spiked samples, and Jug r 3 primers detected up to 100mg/kg of raw walnut (LOD 0.01%, LOQ 0.05%). Thermal treatment combined with pressure (autoclaving) reduced yield and amplification (integrity and quality) of walnut DNA. High hydrostatic pressure (HHP) did not produce any effect on the walnut DNA amplification. This RT-PCR method showed greater sensitivity and reliability in the detection of walnut traces in commercial foodstuffs compared with ELISA assays.

  13. Detection by real time PCR of walnut allergen coding sequences in processed foods.

    PubMed

    Linacero, Rosario; Ballesteros, Isabel; Sanchiz, Africa; Prieto, Nuria; Iniesto, Elisa; Martinez, Yolanda; Pedrosa, Mercedes M; Muzquiz, Mercedes; Cabanillas, Beatriz; Rovira, Mercè; Burbano, Carmen; Cuadrado, Carmen

    2016-07-01

    A quantitative real-time PCR (RT-PCR) method, employing novel primer sets designed on Jug r 1, Jug r 3, and Jug r 4 allergen-coding sequences, was set up and validated. Its specificity, sensitivity, and applicability were evaluated. The DNA extraction method based on CTAB-phenol-chloroform was best for walnut. RT-PCR allowed a specific and accurate amplification of allergen sequence, and the limit of detection was 2.5pg of walnut DNA. The method sensitivity and robustness were confirmed with spiked samples, and Jug r 3 primers detected up to 100mg/kg of raw walnut (LOD 0.01%, LOQ 0.05%). Thermal treatment combined with pressure (autoclaving) reduced yield and amplification (integrity and quality) of walnut DNA. High hydrostatic pressure (HHP) did not produce any effect on the walnut DNA amplification. This RT-PCR method showed greater sensitivity and reliability in the detection of walnut traces in commercial foodstuffs compared with ELISA assays. PMID:26920302

  14. Coded excitation speeds up the detection of the fundamental flexural guided wave in coated tubes

    NASA Astrophysics Data System (ADS)

    Song, Xiaojun; Moilanen, Petro; Zhao, Zuomin; Ta, Dean; Pirhonen, Jalmari; Salmi, Ari; Hæeggström, Edward; Myllylä, Risto; Timonen, Jussi; Wang, Weiqi

    2016-09-01

    The fundamental flexural guided wave (FFGW) permits ultrasonic assessment of the wall thickness of solid waveguides, such as tubes or, e.g., long cortical bones. Recently, an optical non-contact method was proposed for ultrasound excitation and detection with the aim of facilitating the FFGW reception by suppressing the interfering modes from the soft coating. This technique suffers from low SNR and requires iterative physical scanning across the source-receiver distance for 2D-FFT analysis. This means that SNR improvement achieved by temporal averaging becomes time-consuming (several minutes) which reduces the applicability of the technique, especially in time-critical applications such as clinical quantitative ultrasound. To achieve sufficient SNR faster, an ultrasonic excitation by a base-sequence-modulated Golay code (BSGC, 64-bit code pair) on coated tube samples (1-5 mm wall thickness and 5 mm soft coating layer) was used. This approach improved SNR by 21 dB and speeded up the measurement by a factor of 100 compared to using a classical pulse excitation with temporal averaging. The measurement now took seconds instead of minutes, while the ability to determine the wall thickness of the phantoms was maintained. The technique thus allows rapid noncontacting assessment of the wall thickness in coated solid tubes, such as the human bone.

  15. Assessment of absolute added correlative coding in optical intensity modulation and direct detection channels

    NASA Astrophysics Data System (ADS)

    Dong-Nhat, Nguyen; Elsherif, Mohamed A.; Malekmohammadi, Amin

    2016-06-01

    The performance of absolute added correlative coding (AACC) modulation format with direct detection has been numerically and analytically reported, targeting metro data center interconnects. Hereby, the focus lies on the performance of the bit error rate, noise contributions, spectral efficiency, and chromatic dispersion tolerance. The signal space model of AACC, where the average electrical and optical power expressions are derived for the first time, is also delineated. The proposed modulation format was also compared to other well-known signaling, such as on-off-keying (OOK) and four-level pulse-amplitude modulation, at the same bit rate in a directly modulated vertical-cavity surface-emitting laser-based transmission system. The comparison results show a clear advantage of AACC in achieving longer fiber delivery distance due to the higher dispersion tolerance.

  16. Cooperative multi-user detection and ranging based on pseudo-random codes

    NASA Astrophysics Data System (ADS)

    Morhart, C.; Biebl, E. M.

    2009-05-01

    We present an improved approach for a Round Trip Time of Flight distance measurement system. The system is intended for the usage in a cooperative localisation system for automotive applications. Therefore, it is designed to address a large number of communication partners per measurement cycle. By using coded signals in a time divison multiple access order, we can detect a large number of pedestrian sensors with just one car sensor. We achieve this by using very short transmit bursts in combination with a real time correlation algorithm. Futhermore, the correlation approach offers real time data, concerning the time of arrival, that can serve as a trigger impulse for other comunication systems. The distance accuracy of the correlation result was further increased by adding a fourier interpolation filter. The system performance was checked with a prototype at 2.4 GHz. We reached a distance measurement accuracy of 12 cm at a range up to 450 m.

  17. PCR-free quantitative detection of genetically modified organism from raw materials. An electrochemiluminescence-based bio bar code method.

    PubMed

    Zhu, Debin; Tang, Yabing; Xing, Da; Chen, Wei R

    2008-05-15

    A bio bar code assay based on oligonucleotide-modified gold nanoparticles (Au-NPs) provides a PCR-free method for quantitative detection of nucleic acid targets. However, the current bio bar code assay requires lengthy experimental procedures including the preparation and release of bar code DNA probes from the target-nanoparticle complex and immobilization and hybridization of the probes for quantification. Herein, we report a novel PCR-free electrochemiluminescence (ECL)-based bio bar code assay for the quantitative detection of genetically modified organism (GMO) from raw materials. It consists of tris-(2,2'-bipyridyl) ruthenium (TBR)-labeled bar code DNA, nucleic acid hybridization using Au-NPs and biotin-labeled probes, and selective capture of the hybridization complex by streptavidin-coated paramagnetic beads. The detection of target DNA is realized by direct measurement of ECL emission of TBR. It can quantitatively detect target nucleic acids with high speed and sensitivity. This method can be used to quantitatively detect GMO fragments from real GMO products.

  18. Metrics-based assessments of research: incentives for 'institutional plagiarism'?

    PubMed

    Berry, Colin

    2013-06-01

    The issue of plagiarism--claiming credit for work that is not one's own, rightly, continues to cause concern in the academic community. An analysis is presented that shows the effects that may arise from metrics-based assessments of research, when credit for an author's outputs (chiefly publications) is given to an institution that did not support the research but which subsequently employs the author. The incentives for what is termed here "institutional plagiarism" are demonstrated with reference to the UK Research Assessment Exercise in which submitting units of assessment are shown in some instances to derive around twice the credit for papers produced elsewhere by new recruits, compared to papers produced 'in-house'.

  19. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    ERIC Educational Resources Information Center

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  20. Ultrasensitive aptamer-based bio bar code immunomagnetic separation and electrochemiluminescence method for the detection of protein.

    PubMed

    Zhu, Debin; Zhou, Xiaoming; Xing, Da

    2012-05-01

    An ultrasensitive aptamer-based bio bar code immunomagnetic separation and electrochemiluminescence (IM-ECL) method for the detection of protein is developed. The target protein is captured by biotin-labeled aptamer (biotin probe) and [Ru(bpy)(3)](2+) (TBR)-Au bio bar code-labeled aptamer (ECL nanoprobe), to form a double aptamer-protein sandwich complex. The complex is then immobilized on the streptavidin microbeads through biotin-streptavidin linkage and detected by ECL assay. The ECL signal of the target protein is amplified by the TBR-bio bar code DNAs. As an example, platelet-derived growth factor B-chain homodimer (PDGF-BB) was detected by the method. Experimental results show that the detection limit of the assay is 1 pM of PDGF-BB. A calibration curve with a linearity range from 1 pM to 10 nM is established, thus, make quantitative analysis possible. The method has been used to detect PDGF-BB in fetal calf serum with minimum background interference. Due to the wide availability of aptamer for numerous proteins, this aptamer-based bio bar code IM-ECL method holds great promise in protein detection.

  1. Information Use and Secondary School Students: A Model for Understanding Plagiarism

    ERIC Educational Resources Information Center

    Williamson, Kirsty; McGregor, Joy

    2006-01-01

    Introduction: The paper describes an interim model for understanding the influences on information use in relation to plagiarism, with a focus on secondary school students. Available literature mostly focuses on the tertiary level and on quantifying the extent of plagiarism, with limited availability of theory or empirical research focussing on…

  2. "Not Necessarily a Bad Thing ...": A Study of Online Plagiarism amongst Undergraduate Students

    ERIC Educational Resources Information Center

    Selwyn, Neil

    2008-01-01

    Whilst the copying, falsification and plagiarism of essays and assignments has long been a prevalent form of academic misconduct amongst undergraduate students, the increasing use of the internet in higher education has raised concern over enhanced levels of online plagiarism and new types of "cyber-cheating". Based on a self-report study of 1222…

  3. Journals May Soon Use Anti-Plagiarism Software on Their Authors

    ERIC Educational Resources Information Center

    Rampell, Catherine

    2008-01-01

    This spring, academic journals may turn the anti-plagiarism software that professors have been using against their students on the professors themselves. CrossRef, a publishing industry association, and the software company iParadigms announced a deal last week to create CrossCheck, an anti-plagiarism program for academic journals. The software…

  4. Plagiarism: using a collaborative approach in an online allied health professions course.

    PubMed

    Pence, Patricia L

    2012-01-01

    The purpose of the study was to evaluate the effectiveness of interventions to increase the awareness and understanding of plagiarism among undergraduate students enrolled in an online allied health professions course in a community college in the Midwestern United States. The results suggested that the interventions were effective in educating students about how to avoid plagiarism.

  5. Chinese International Students' and Faculty Members' Views of Plagiarism in Higher Education

    ERIC Educational Resources Information Center

    Grigg, Alan

    2016-01-01

    As the enrollment of Chinese international students (CIS) increased at a private institution in the Midwest, so did suspected cases of plagiarism. This study addressed the problem of how faculty members grappled with CIS' interpretation and application of Western-based views of plagiarism. The purpose of the study was to identify similarities and…

  6. Deconstructing Attitudes towards Plagiarism of Japanese Undergraduates in EFL Academic Writing Classes

    ERIC Educational Resources Information Center

    Teeter, Jennifer

    2015-01-01

    In this study, a qualitative analysis of 276 first-year Japanese university science major responses to plagiarism to deconstruct prevailing generalizations regarding the incidence of plagiarism by Japanese university students. These students were enrolled in a compulsory yearlong English academic writing course. While utilizing a contextualized…

  7. Retribution, Deterrence and Reform: The Dilemmas of Plagiarism Management in Universities

    ERIC Educational Resources Information Center

    Sutherland-Smith, Wendy

    2010-01-01

    Universities face constant scrutiny about their plagiarism management strategies, policies and procedures. A resounding theme, usually media inspired, is that plagiarism is rife, unstoppable and university processes are ineffectual in its wake. This has been referred to as a "moral panic" approach (Carroll & Sutherland-Smith, forthcoming; Clegg,…

  8. Skills Training to Avoid Inadvertent Plagiarism: Results from a Randomised Control Study

    ERIC Educational Resources Information Center

    Newton, Fiona J.; Wright, Jill D.; Newton, Joshua D.

    2014-01-01

    Plagiarism continues to be a concern within academic institutions. The current study utilised a randomised control trial of 137 new entry tertiary students to assess the efficacy of a scalable short training session on paraphrasing, patch writing and plagiarism. The results indicate that the training significantly enhanced students' overall…

  9. Helping International Students Succeed Academically through Research Process and Plagiarism Workshops

    ERIC Educational Resources Information Center

    Chen, Yu-Hui; Van Ullen, Mary K.

    2011-01-01

    Workshops on the research process and plagiarism were designed to meet the needs of international students at the University at Albany. The research process workshop covered formulating research questions, as well as locating and evaluating sources. The plagiarism workshop focused on acknowledging sources, quoting, paraphrasing, and summarizing…

  10. Substantive Editing as a Form of Plagiarism among Postgraduate Students in Australia

    ERIC Educational Resources Information Center

    Lines, Lisa

    2016-01-01

    In university plagiarism policies, and in the research into plagiarism, one form of collusion remains virtually unacknowledged: substantive editing performed by editors. While almost all Australian universities allow postgraduate students to have their thesis professionally edited, "substantive" editing is prohibited. This article…

  11. A Comparison of Chinese and Australian University Students' Attitudes towards Plagiarism

    ERIC Educational Resources Information Center

    Ehrich, John; Howard, Steven J.; Mu, Congjun; Bokosmaty, Sahar

    2016-01-01

    Student plagiarism is a growing problem within Australian universities and abroad. Potentially exacerbating this situation, research indicates that students' attitudes toward plagiarism are typically more permissive and lenient than the policies of their tertiary institutions. There has been suggestion that this is especially so in Asian countries…

  12. Teaching Students about Plagiarism: What It Looks Like and How It Is Measured

    ERIC Educational Resources Information Center

    Stout, Diana

    2013-01-01

    This case study examines how full-time faculty, adjunct instructors, and graduate teaching assistants teach students how to avoid plagiarism. Additionally, this case study includes a cross-section of teachers who encounter plagiarism in writing assignments across the curriculum. While many studies in the past have focused on students, this study…

  13. Practice Makes Perfect: Improving Students' Skills in Understanding and Avoiding Plagiarism with a Themed Methods Course

    ERIC Educational Resources Information Center

    Estow, Sarah; Lawrence, Eva K.; Adams, Kathrynn A.

    2011-01-01

    To address the issue of plagiarism, students in two undergraduate Research Methods and Analysis courses conducted, analyzed, and wrote up original research on the topic of plagiarism. Students in an otherwise identical course completed the same assignments but examined a different research topic. At the start and end of the semester, all students…

  14. Academic Staff's Perspectives upon Student Plagiarism: A Case Study at a University in Hong Kong

    ERIC Educational Resources Information Center

    Li, Yongyan

    2015-01-01

    Much of the previous research concerning student plagiarism has been conducted in Anglo-American settings. The present paper reports a case study of academic staff's perspectives upon student plagiarism at a university in Hong Kong. Based on interviews with 16 instructors, the study focused on the teachers' views and pedagogical practices,…

  15. Online Academic-Integrity Mastery Training May Improve Students' Awareness of, and Attitudes toward, Plagiarism

    ERIC Educational Resources Information Center

    Curtis, Guy J.; Gouldthorp, Bethanie; Thomas, Emma F.; O'Brien, Geraldine M.; Correia, Helen M.

    2013-01-01

    Some evidence has emerged in recent years that plagiarism can be reduced through the use of online mastery tests that are designed to train introductory psychology students in awareness of academic integrity and referencing conventions. Although these studies demonstrated a reduction in incidents of plagiarism they did not directly examine whether…

  16. Rebels without a Clause: Towards an Institutional Framework for Dealing with Plagiarism by Students

    ERIC Educational Resources Information Center

    Park, Chris

    2004-01-01

    This paper explores why an institutional framework for dealing with plagiarism by students is necessary and it outlines the main ingredients of such a framework that has been developed at Lancaster University. It defines plagiarism as a form of academic malpractice and frames it as a breach of academic integrity. The framework places a strong…

  17. The Ethics of Plagiarism: How Genre Affects Writers' Use of Source Materials.

    ERIC Educational Resources Information Center

    Jameson, Daphne A.

    1993-01-01

    Explores the definition of plagiarism in terms of genre. Recommends ways that business communication faculty can provide their students with an understanding of the problem and its solution. Suggests that business communication needs a broader view of what constitutes plagiarism, how documentation expectations are developed, and why the ethical…

  18. Of Flattery and Thievery: Reconsidering Plagiarism in a Time of Virtual Information

    ERIC Educational Resources Information Center

    Thomas, P. L.

    2007-01-01

    P. L. Thomas provides a framework for discussing plagiarism and calls on us to avoid overly simplified policies. After considering various perspectives on intent and the purposes of documentation, Thomas advocates developing standard definitions and guidelines for plagiarism in the department or the classroom. We should also offer professional…

  19. An Investigation into Electronic-Source Plagiarism in a First-Year Essay Assignment

    ERIC Educational Resources Information Center

    Ellery, Karen

    2008-01-01

    Since the emergence of the electronic era, plagiarism has become an increasingly prevalent problem at tertiary institutions. This study investigated the role electronic sources of information played in influencing plagiarism in an essay assignment in a first-year geography module at the University of KwaZulu-Natal in South Africa. Despite explicit…

  20. Students Turned Off by Turnitin? Perception of Plagiarism and Collusion by Undergraduate Bioscience Students

    ERIC Educational Resources Information Center

    Thompsett, Andrew; Ahluwalia, Jatinder

    2010-01-01

    Research on undergraduate bioscience students and the incidence of plagiarism is still in its infancy and a key problem arises in gauging the perception of undergraduate students on plagiarism and collusion in biosciences subjects because of the lack of empirical data. The aim of this study was to provide qualitative data on the perceptions of…

  1. "Thou Shalt Not Plagiarise": From Self-Reported Views to Recognition and Avoidance of Plagiarism

    ERIC Educational Resources Information Center

    Risquez, Angelica; O'Dwyer, Michele; Ledwith, Ann

    2013-01-01

    Throughout much of the literature on plagiarism in higher education, there is an implicit assumption that students who understand plagiarism, who have high ethical views and declare not to engage in plagiaristic behaviour are able to recognise it and avoid it in practice. Challenging this supposition, this paper contrasts students' self-reported…

  2. Stabilizing distinguishable qubits against spontaneous decay by detected-jump correcting quantum codes.

    PubMed

    Alber, G; Beth, T; Charnes, C; Delgado, A; Grassl, M; Mussinger, M

    2001-05-01

    A new class of error-correcting quantum codes is introduced capable of stabilizing qubits against spontaneous decay arising from couplings to statistically independent reservoirs. These quantum codes are based on the idea of using an embedded quantum code and exploiting the classical information available about which qubit has been affected by the environment. They are immediately relevant for quantum computation and information processing using arrays of trapped ions or nuclear spins. Interesting relations between these quantum codes and basic notions of design theory are established. PMID:11328185

  3. Automatic Plagiarism Detection with PAIRwise 2.0

    ERIC Educational Resources Information Center

    Knight, Allan; Almeroth, Kevin

    2011-01-01

    As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…

  4. Detection of coding microsatellite frameshift mutations in DNA mismatch repair-deficient mouse intestinal tumors.

    PubMed

    Woerner, Stefan M; Tosti, Elena; Yuan, Yan P; Kloor, Matthias; Bork, Peer; Edelmann, Winfried; Gebert, Johannes

    2015-11-01

    Different DNA mismatch repair (MMR)-deficient mouse strains have been developed as models for the inherited cancer predisposing Lynch syndrome. It is completely unresolved, whether coding mononucleotide repeat (cMNR) gene mutations in these mice can contribute to intestinal tumorigenesis and whether MMR-deficient mice are a suitable molecular model of human microsatellite instability (MSI)-associated intestinal tumorigenesis. A proof-of-principle study was performed to identify mouse cMNR-harboring genes affected by insertion/deletion mutations in MSI murine intestinal tumors. Bioinformatic algorithms were developed to establish a database of mouse cMNR-harboring genes. A panel of five mouse noncoding mononucleotide markers was used for MSI classification of intestinal matched normal/tumor tissues from MMR-deficient (Mlh1(-/-) , Msh2(-/-) , Msh2(LoxP/LoxP) ) mice. cMNR frameshift mutations of candidate genes were determined by DNA fragment analysis. Murine MSI intestinal tumors but not normal tissues from MMR-deficient mice showed cMNR frameshift mutations in six candidate genes (Elavl3, Tmem107, Glis2, Sdccag1, Senp6, Rfc3). cMNRs of mouse Rfc3 and Elavl3 are conserved in type and length in their human orthologs that are known to be mutated in human MSI colorectal, endometrial and gastric cancer. We provide evidence for the utility of a mononucleotide marker panel for detection of MSI in murine tumors, the existence of cMNR instability in MSI murine tumors, the utility of mouse subspecies DNA for identification of polymorphic repeats, and repeat conservation among some orthologous human/mouse genes, two of them showing instability in human and mouse MSI intestinal tumors. MMR-deficient mice hence are a useful molecular model system for analyzing MSI intestinal carcinogenesis.

  5. Why do I always have the best ideas? The role of idea quality in unconscious plagiarism.

    PubMed

    Perfect, Timothy J; Stark, Louisa-Jayne

    2008-05-01

    Groups of individuals often work together to generate solutions to a problem. Subsequently, one member of the group can plagiarise another either by recalling that person's idea as their own (recall-own plagiarism), or by generating a novel solution that duplicates a previous idea (generate-new plagiarism). The current study examines the extent to which these forms of plagiarism are influenced by the quality of the ideas. Groups of participants initially generated ideas, prior to an elaboration phase in which idea quality was manipulated in two ways: participants received feedback on the quality of the ideas as rated by independent judges, and they generated improvements to a subset of the ideas. Unconscious plagiarism was measured in recall-own and generate-new tasks. For recall, idea improvement led to increased plagiarism, while for the generate-new task, the independent ratings influenced plagiarism. These data indicate that different source-judgement processes underlie the two forms of plagiarism, neither of which can be reduced simply to memory strength.

  6. Profits and plagiarism: the case of medical ghostwriting.

    PubMed

    Anekwe, Tobenna D

    2010-07-01

    This paper focuses on medical ghostwriting in the United States. I argue that medical ghostwriting often involves plagiarism and, in those cases, can be treated as an act of research misconduct by both the federal government and research institutions. I also propose several anti-ghostwriting measures, including: 1) journals should implement guarantor policies so that researchers may be better held accountable for their work; 2) research institutions and the federal government should explicitly prohibit medical ghostwriting and outline appropriate penalties; and 3) a publicly available database should be created to record researchers' ethics violations.

  7. Strategies for Using Plagiarism Software in the Screening of Incoming Journal Manuscripts: Recommendations Based on a Recent Literature Survey.

    PubMed

    Lykkesfeldt, Jens

    2016-08-01

    In recent years, several online tools have appeared capable of identifying potential plagiarism in science. While such tools may help to maintain or even increase the originality and ethical quality of the scientific literature, no apparent consensus exists among editors on the degree of plagiarism or self-plagiarism necessary to reject or retract manuscripts. In this study, two entire volumes of published original papers and reviews from Basic & Clinical Pharmacology & Toxicology were retrospectively scanned for similarity in anonymized form using iThenticate software to explore measures to predictively identify true plagiarism and self-plagiarism and to potentially provide guidelines for future screening of incoming manuscripts. Several filters were applied, all of which appeared to lower the noise from irrelevant hits. The main conclusions were that plagiarism software offers a unique opportunity to screen for plagiarism easily but also that it has to be employed with caution as automated or uncritical use is far too unreliable to allow a fair basis for judging the degree of plagiarism in a manuscript. This remains the job of senior editors. Whereas a few cases of self-plagiarism that would not likely have been accepted with today's guidelines were indeed identified, no cases of fraud or serious plagiarism were found. Potential guidelines are discussed.

  8. Strategies for Using Plagiarism Software in the Screening of Incoming Journal Manuscripts: Recommendations Based on a Recent Literature Survey.

    PubMed

    Lykkesfeldt, Jens

    2016-08-01

    In recent years, several online tools have appeared capable of identifying potential plagiarism in science. While such tools may help to maintain or even increase the originality and ethical quality of the scientific literature, no apparent consensus exists among editors on the degree of plagiarism or self-plagiarism necessary to reject or retract manuscripts. In this study, two entire volumes of published original papers and reviews from Basic & Clinical Pharmacology & Toxicology were retrospectively scanned for similarity in anonymized form using iThenticate software to explore measures to predictively identify true plagiarism and self-plagiarism and to potentially provide guidelines for future screening of incoming manuscripts. Several filters were applied, all of which appeared to lower the noise from irrelevant hits. The main conclusions were that plagiarism software offers a unique opportunity to screen for plagiarism easily but also that it has to be employed with caution as automated or uncritical use is far too unreliable to allow a fair basis for judging the degree of plagiarism in a manuscript. This remains the job of senior editors. Whereas a few cases of self-plagiarism that would not likely have been accepted with today's guidelines were indeed identified, no cases of fraud or serious plagiarism were found. Potential guidelines are discussed. PMID:26876730

  9. Asynchronous detection of optical code division multiple access signals using a bandwidth-efficient and wavelength-aware receiver.

    PubMed

    Fok, Mable P; Deng, Yanhua; Prucnal, Paul R

    2010-04-01

    We experimentally demonstrate what we believe to be a novel detection scheme for interfacing asynchronous optical code division multiple access (CDMA) signals with an electronic clock and data recovery system that operates only at the baseband bandwidth. This allows using a large optical bandwidth expansion factor in which the optical chip rate is much larger than the bandwidth of the optoelectronic receiver. The received optical CDMA signal is launched into a four-wave-mixing-based wavelength-aware all-optical front end that rejects multiaccess interference, followed by an amplitude-noise suppression stage comprised of a semiconductor optical amplifier. The clean signal is then converted into a non-return-to-zero-like signal by a baseband receiver. Using the proposed detection scheme, asynchronous transmission and detection of optical CDMA signals is implemented. With the novel detection scheme, the classic CDMA near-far problem is mitigated, and error-free detection is easily obtained.

  10. Partial correlation properties of pseudonoise /PN/ codes in noncoherent synchronization/detection schemes

    NASA Technical Reports Server (NTRS)

    Cartier, D. E.

    1976-01-01

    This concise paper considers the effect on the autocorrelation function of a pseudonoise (PN) code when the acquisition scheme only integrates coherently over part of the code and then noncoherently combines these results. The peak-to-null ratio of the effective PN autocorrelation function is shown to degrade to the square root of n, where n is the number of PN symbols over which coherent integration takes place.

  11. The impact of mismatch on the performance of coded narrow-band FM with limiter/discriminator detection

    NASA Technical Reports Server (NTRS)

    Simon, M. K.

    1983-01-01

    An examination of the impact of mismatch on the performance of convolutionally encoded/Viterbi decoded narrow-band FM with limiter/discriminator detection is presented. Attention was given to the potential gain available by the combination of this type of system in terms of hard and soft decision decoding. Soft decision decoding was demonstrated to offer only approximately 0.3 dB better performance than hard decision coding. It was also shown, through a technique involving the number of clicks occurring in each detection interval, that both soft and hard decision decoding bit error probability performance could be improved. It is concluded that the mismatch between the coding channel and the decoding metric of the Viterbi algorithm is responsible for reducing the difference between hard and soft decoding metrics.

  12. Long range detection of line-array multi-pulsed coding lidar by combining the Accumulation coherence and Subpixel-energy detection method.

    PubMed

    Su, Jinshan; Wang, Yuanqing; Liang, Dongdong

    2015-06-15

    This paper presents a multi-pulsed line-array push broom lidar, the pixel array scale reaches Geiger mode detectors in time-of-flight (TOF) depth imaging: by using time and space correlation between array elements of array avalanche photo detector (APD), light coding technology and a diode pumped solid-state laser with 10kHz repetition rate and 5µJ per pulses. Two signal enhancement methods, accumulation-coherence and high accuracy energy detection were combined improves the decode effect and realizes further long detection range. Experimental results and theory analysis indicating that the retrieval and denoising results of both simulated and real signals demonstrate that our method is practical and effective; what's more, the increasing scale of array sensor and the code bits can further improve system performance. PMID:26193500

  13. Detection of STRs from body fluid collected on IsoCode paper-based devices.

    PubMed

    Barbaro, A; Cormaci, P; Barbaro, A

    2004-12-01

    Isocode card and IsoCode ID Sample Registration Matrix (Schleicher and Schuell BioScience Inc.) are different paper devices chemically treated that keep sample DNA safe from degradation, allowing for the indefinite storage of DNA at ambient temperatures. In this study, blood was collected on Isocode card while saliva, sperm were collected on IsoCode ID. We also tried to verify the effect of collecting urine on Isocode ID. All samples (belonging to the same male donor) were analyzed after 1 day, 1-5 months since their application on the paper.

  14. Detection of the heat-stable toxin coding gene (ST-gene) in enterotoxigenic Escherichia coli: development of a colour amplified PCR detection system.

    PubMed

    Fanning, S; O'Mullane, J; O'Meara, D; Ward, A; Joyce, C; Delaney, M; Cryan, B

    1995-12-01

    Screening biological samples using the polymerase chain reaction (PCR) has obvious advantages compared with current molecular analytical methods based on gel electrophoresis and/or hybridisation, both of which are expensive and time-consuming, therefore the development of a PCR assay format that is applicable to large sample numbers and that can readily use equipment commonly found in diagnostic laboratories would be advantageous. This report describes the development of a colour amplified PCR detection system which is simple in design and could be universally applied to the detection of any DNA template. As an example, the system has been applied in the detection of the heat-stable toxin coding gene (ST-gene) from enterotoxigenic Escherichia coli (ETEC). The assay is sensitive, detecting 10 fg of a purified DNA template and 270 cfu of an ST-gene-positive ETEC strain. PMID:8555786

  15. Using Code-Recode to Detect Critical Thinking Aspects of Asynchronous Small Group CMC Collaborative Learning

    ERIC Educational Resources Information Center

    Oriogun, Peter K.; Cave, Diana

    2008-01-01

    This article empirically validates an existing content analysis scheme and addresses a main concern of researchers about text-based, online transcripts in the form of code-recoding by mapping our scheme to the practical inquiry, cognitive presence model's five phases directly to realise higher-order thinking or critical thinking aspects for our…

  16. Knowledge of medical students of Tehran University of Medical Sciences regarding plagiarism.

    PubMed

    Gharedaghi, Mohammad Hadi; Nourijelyani, Keramat; Salehi Sadaghiani, Mohammad; Yousefzadeh-Fard, Yashar; Gharedaghi, Azadeh; Javadian, Pouya; Morteza, Afsaneh; Andrabi, Yasir; Nedjat, Saharnaz

    2013-07-13

    The core concept of plagiarism is defined as the use of other people's ideas or words without proper acknowledgement. Herein, we used a questionnaire to assess the knowledge of students of Tehran University of Medical Sciences (TUMS) regarding plagiarism and copyright infringement. The questionnaire comprised 8 questions. The first six questions of the questionnaire were translations of exercises of a book about academic writing and were concerning plagiarism in preparing articles. Questions number 7 and 8 (which were concerning plagiarism in preparing Microsoft PowerPoint slideshows and copyright infringement, respectively) were developed by the authors of the present study. The validity of the questionnaire was approved by five experts in the field of epidemiology and biostatistics. A pilot study consisting of a test and retest was carried to assess the reliability of the questionnaire. The sampling method was stratified random sampling, and the questionnaire was handed out to 74 interns of TUMS during July and August 2011. 14.9% of the students correctly answered the first six questions. 44.6% of the students were adequately familiar with proper referencing in Microsoft PowerPoint slideshows. 16.2% of the students understood what constitutes copyright infringement. The number of correctly answered questions by the students was directly proportionate to the number of their published articles. Knowledge of students of TUMS regarding plagiarism and copyright infringement is quite poor. Courses with specific focus on plagiarism and copyright infringement might help in this regard.

  17. Proteomic Detection of Non-Annotated Protein-Coding Genes in Pseudomonas fluorescens Pf0-1

    SciTech Connect

    Kim, Wook; Silby, Mark W.; Purvine, Samuel O.; Nicoll, Julie S.; Hixson, Kim K.; Monroe, Matthew E.; Nicora, Carrie D.; Lipton, Mary S.; Levy, Stuart B.

    2009-12-24

    Genome sequences are annotated by computational prediction of coding sequences, followed by similarity searches such as BLAST, which provide a layer of (possible) functional information. While the existence of processes such as alternative splicing complicates matters for eukaryote genomes, the view of bacterial genomes as a linear series of closely spaced genes leads to the assumption that computational annotations which predict such arrangements completely describe the coding capacity of bacterial genomes. We undertook a proteomic study to identify proteins expressed by Pseudomonas fluorescens Pf0-1 from genes which were not predicted during the genome annotation. Mapping peptides to the Pf0-1 genome sequence identified sixteen non-annotated protein-coding regions, of which nine were antisense to predicted genes, six were intergenic, and one read in the same direction as an annotated gene but in a different frame. The expression of all but one of the newly discovered genes was verified by RT-PCR. Few clues as to the function of the new genes were gleaned from informatic analyses, but potential orthologues in other Pseudomonas genomes were identified for eight of the new genes. The 16 newly identified genes improve the quality of the Pf0-1 genome annotation, and the detection of antisense protein-coding genes indicates the under-appreciated complexity of bacterial genome organization.

  18. Intensity modulation and direct detection Alamouti polarization-time coding for optical fiber transmission systems with polarization mode dispersion

    NASA Astrophysics Data System (ADS)

    Reza, Ahmed Galib; Rhee, June-Koo Kevin

    2016-07-01

    Alamouti space-time coding is modified in the form of polarization-time coding to combat against polarization mode dispersion (PMD) impairments in exploiting a polarization diversity multiplex (PDM) gain with simple intensity modulation and direct detection (IM/DD) in optical transmission systems. A theoretical model for the proposed IM/DD Alamouti polarization-time coding (APTC-IM/DD) using nonreturn-to-zero on-off keying signal can surprisingly eliminate the requirement of channel estimation for decoding in the low PMD regime, when a two-transmitter and two-receiver channel is adopted. Even in the high PMD regime, the proposed APTC-IM/DD still reveals coding gain demonstrating the robustness of APTC-IM/DD. In addition, this scheme can eliminate the requirements for a polarization state controller, a coherent receiver, and a high-speed analog-to-digital converter at a receiver. Simulation results reveal that the proposed APTC scheme is able to reduce the optical signal-to-noise ratio requirement by ˜3 dB and significantly enhance the PMD tolerance of a PDM-based IM/DD system.

  19. Proteomic Detection of Non-Annotated Protein-Coding Genes in Pseudomonas fluorescens Pf0-1

    PubMed Central

    Kim, Wook; Silby, Mark W.; Purvine, Sam O.; Nicoll, Julie S.; Hixson, Kim K.; Monroe, Matt; Nicora, Carrie D.; Lipton, Mary S.; Levy, Stuart B.

    2009-01-01

    Genome sequences are annotated by computational prediction of coding sequences, followed by similarity searches such as BLAST, which provide a layer of possible functional information. While the existence of processes such as alternative splicing complicates matters for eukaryote genomes, the view of bacterial genomes as a linear series of closely spaced genes leads to the assumption that computational annotations that predict such arrangements completely describe the coding capacity of bacterial genomes. We undertook a proteomic study to identify proteins expressed by Pseudomonas fluorescens Pf0-1 from genes that were not predicted during the genome annotation. Mapping peptides to the Pf0-1 genome sequence identified sixteen non-annotated protein-coding regions, of which nine were antisense to predicted genes, six were intergenic, and one read in the same direction as an annotated gene but in a different frame. The expression of all but one of the newly discovered genes was verified by RT-PCR. Few clues as to the function of the new genes were gleaned from informatic analyses, but potential orthologs in other Pseudomonas genomes were identified for eight of the new genes. The 16 newly identified genes improve the quality of the Pf0-1 genome annotation, and the detection of antisense protein-coding genes indicates the under-appreciated complexity of bacterial genome organization. PMID:20041161

  20. Proteomic detection of non-annotated protein-coding genes in Pseudomonas fluorescens Pf0-1.

    PubMed

    Kim, Wook; Silby, Mark W; Purvine, Sam O; Nicoll, Julie S; Hixson, Kim K; Monroe, Matt; Nicora, Carrie D; Lipton, Mary S; Levy, Stuart B

    2009-12-24

    Genome sequences are annotated by computational prediction of coding sequences, followed by similarity searches such as BLAST, which provide a layer of possible functional information. While the existence of processes such as alternative splicing complicates matters for eukaryote genomes, the view of bacterial genomes as a linear series of closely spaced genes leads to the assumption that computational annotations that predict such arrangements completely describe the coding capacity of bacterial genomes. We undertook a proteomic study to identify proteins expressed by Pseudomonas fluorescens Pf0-1 from genes that were not predicted during the genome annotation. Mapping peptides to the Pf0-1 genome sequence identified sixteen non-annotated protein-coding regions, of which nine were antisense to predicted genes, six were intergenic, and one read in the same direction as an annotated gene but in a different frame. The expression of all but one of the newly discovered genes was verified by RT-PCR. Few clues as to the function of the new genes were gleaned from informatic analyses, but potential orthologs in other Pseudomonas genomes were identified for eight of the new genes. The 16 newly identified genes improve the quality of the Pf0-1 genome annotation, and the detection of antisense protein-coding genes indicates the under-appreciated complexity of bacterial genome organization.

  1. Color bar coding the BRCA1 gene on combed DNA: a useful strategy for detecting large gene rearrangements.

    PubMed

    Gad, S; Aurias, A; Puget, N; Mairal, A; Schurra, C; Montagna, M; Pages, S; Caux, V; Mazoyer, S; Bensimon, A; Stoppa-Lyonnet, D

    2001-05-01

    Genetic linkage data have shown that alterations of the BRCA1 gene are responsible for the majority of hereditary breast and ovarian cancers. BRCA1 germline mutations, however, are found less frequently than expected. Mutation detection strategies, which are generally based on the polymerase chain reaction, therefore focus on point and small gene alterations. These approaches do not allow for the detection of large gene rearrangements, which also can be involved in BRCA1 alterations. Indeed, a few of them, spread over the entire BRCA1 gene, have been detected recently by Southern blotting or transcript analysis. We have developed an alternative strategy allowing a panoramic view of the BRCA1 gene, based on dynamic molecular combing and the design of a full four-color bar code of the BRCA1 region. The strategy was tested with the study of four large BRCA1 rearrangements previously reported. In addition, when screening a series of 10 breast and ovarian cancer families negatively tested for point mutation in BRCA1/2, we found an unreported 17-kb BRCA1 duplication encompassing exons 3 to 8. The detection of rearrangements as small as 2 to 6 kb with respect to the normal size of the studied fragment is achieved when the BRCA1 region is divided into 10 fragments. In addition, as the BRCA1 bar code is a morphologic approach, the direct observation of complex and likely underreported rearrangements, such as inversions and insertions, becomes possible. PMID:11284038

  2. Pathway detection from protein interaction networks and gene expression data using color-coding methods and A∗ search algorithms.

    PubMed

    Yeh, Cheng-Yu; Yeh, Hsiang-Yuan; Arias, Carlos Roberto; Soo, Von-Wun

    2012-01-01

    With the large availability of protein interaction networks and microarray data supported, to identify the linear paths that have biological significance in search of a potential pathway is a challenge issue. We proposed a color-coding method based on the characteristics of biological network topology and applied heuristic search to speed up color-coding method. In the experiments, we tested our methods by applying to two datasets: yeast and human prostate cancer networks and gene expression data set. The comparisons of our method with other existing methods on known yeast MAPK pathways in terms of precision and recall show that we can find maximum number of the proteins and perform comparably well. On the other hand, our method is more efficient than previous ones and detects the paths of length 10 within 40 seconds using CPU Intel 1.73 GHz and 1 GB main memory running under windows operating system. PMID:22577352

  3. Blind and semi-blind ML detection for space-time block-coded OFDM wireless systems

    NASA Astrophysics Data System (ADS)

    Zaib, Alam; Al-Naffouri, Tareq Y.

    2014-12-01

    This paper investigates the joint maximum likelihood (ML) data detection and channel estimation problem for Alamouti space-time block-coded (STBC) orthogonal frequency-division multiplexing (OFDM) wireless systems. The joint ML estimation and data detection is generally considered a hard combinatorial optimization problem. We propose an efficient low-complexity algorithm based on branch-estimate-bound strategy that renders exact joint ML solution. However, the computational complexity of blind algorithm becomes critical at low signal-to-noise ratio (SNR) as the number of OFDM carriers and constellation size are increased especially in multiple-antenna systems. To overcome this problem, a semi-blind algorithm based on a new framework for reducing the complexity is proposed by relying on subcarrier reordering and decoding the carriers with different levels of confidence using a suitable reliability criterion. In addition, it is shown that by utilizing the inherent structure of Alamouti coding, the estimation performance improvement or the complexity reduction can be achieved. The proposed algorithms can reliably track the wireless Rayleigh fading channel without requiring any channel statistics. Simulation results presented against the perfect coherent detection demonstrate the effectiveness of blind and semi-blind algorithms over frequency-selective channels with different fading characteristics.

  4. Non-protein coding RNA-based genosensor with quantum dots as electrochemical labels for attomolar detection of multiple pathogens.

    PubMed

    Vijian, Dinesh; Chinni, Suresh V; Yin, Lee Su; Lertanantawong, Benchaporn; Surareungchai, Werasak

    2016-03-15

    The ability of a diagnostic test to detect multiple pathogens simultaneously is useful to obtain meaningful information for clinical treatment and preventive measures. We report a highly sensitive and specific electrochemical biosensor assay for simultaneous detection of three gene targets using quantum dots (QDs). The targets are novel non-protein coding RNA (npcRNA) sequences of Vibrio cholerae, Salmonella sp. and Shigella sp., which cause diarrheal diseases. QDs (PbS, CdS, ZnS) were synthesized and functionalized with DNA probes that were specific to each pathogen. Electrochemical detection of QDs was performed using square wave anodic stripping voltammetry (SWASV). The QDs gave distinct peaks at 0.5 V (PbS), 0.75 V (CdS) and 1.1 V (ZnS). There was no interference in signal response when all three QDs were mixed and detected simultaneously. The detection limits of single and multiplex assays with linear targets and PCR products were in the attomolar ranges. The high assay sensitivity, in combination with specific npcRNA sequences as novel diagnostic targets, makes it a viable tool for detecting pathogens from food, environment and clinical samples. PMID:26513287

  5. Molecular Detection of Methicillin-Resistant Staphylococcus aureus by Non-Protein Coding RNA-Mediated Monoplex Polymerase Chain Reaction

    PubMed Central

    Soo Yean, Cheryl Yeap; Selva Raju, Kishanraj; Xavier, Rathinam; Subramaniam, Sreeramanan; Gopinath, Subash C. B.; Chinni, Suresh V.

    2016-01-01

    Non-protein coding RNA (npcRNA) is a functional RNA molecule that is not translated into a protein. Bacterial npcRNAs are structurally diversified molecules, typically 50–200 nucleotides in length. They play a crucial physiological role in cellular networking, including stress responses, replication and bacterial virulence. In this study, by using an identified npcRNA gene (Sau-02) in Methicillin-resistant Staphylococcus aureus (MRSA), we identified the Gram-positive bacteria S. aureus. A Sau-02-mediated monoplex Polymerase Chain Reaction (PCR) assay was designed that displayed high sensitivity and specificity. Fourteen different bacteria and 18 S. aureus strains were tested, and the results showed that the Sau-02 gene is specific to S. aureus. The detection limit was tested against genomic DNA from MRSA and was found to be ~10 genome copies. Further, the detection was extended to whole-cell MRSA detection, and we reached the detection limit with two bacteria. The monoplex PCR assay demonstrated in this study is a novel detection method that can replicate other npcRNA-mediated detection assays. PMID:27367909

  6. Code of ethics for dental researchers.

    PubMed

    2014-01-01

    The International Association for Dental Research, in 2009, adopted a code of ethics. The code applies to members of the association and is enforceable by sanction, with the stated requirement that members are expected to inform the association in cases where they believe misconduct has occurred. The IADR code goes beyond the Belmont and Helsinki statements by virtue of covering animal research. It also addresses issues of sponsorship of research and conflicts of interest, international collaborative research, duty of researchers to be informed about applicable norms, standards of publication (including plagiarism), and the obligation of "whistleblowing" for the sake of maintaining the integrity of the dental research enterprise as a whole. The code is organized, like the ADA code, into two sections. The IADR principles are stated, but not defined, and number 12, instead of the ADA's five. The second section consists of "best practices," which are specific statements of expected or interdicted activities. The short list of definitions is useful. PMID:25951679

  7. Heterodyne detection using spectral line pairing for spectral phase encoding optical code division multiple access and dynamic dispersion compensation.

    PubMed

    Yang, Yi; Foster, Mark; Khurgin, Jacob B; Cooper, A Brinton

    2012-07-30

    A novel coherent optical code-division multiple access (OCDMA) scheme is proposed that uses spectral line pairing to generate signals suitable for heterodyne decoding. Both signal and local reference are transmitted via a single optical fiber and a simple balanced receiver performs sourceless heterodyne detection, canceling speckle noise and multiple-access interference (MAI). To validate the idea, a 16 user fully loaded phase encoded system is simulated. Effects of fiber dispersion on system performance are studied as well. Both second and third order dispersion management is achieved by using a spectral phase encoder to adjust phase shifts of spectral components at the optical network unit (ONU).

  8. Short non-coding RNAs as bacteria species identifiers detected by surface plasmon resonance enhanced common path interferometry

    NASA Astrophysics Data System (ADS)

    Greef, Charles; Petropavlovskikh, Viatcheslav; Nilsen, Oyvind; Khattatov, Boris; Plam, Mikhail; Gardner, Patrick; Hall, John

    2008-04-01

    Small non-coding RNA sequences have recently been discovered as unique identifiers of certain bacterial species, raising the possibility that they can be used as highly specific Biowarfare Agent detection markers in automated field deployable integrated detection systems. Because they are present in high abundance they could allow genomic based bacterial species identification without the need for pre-assay amplification. Further, a direct detection method would obviate the need for chemical labeling, enabling a rapid, efficient, high sensitivity mechanism for bacterial detection. Surface Plasmon Resonance enhanced Common Path Interferometry (SPR-CPI) is a potentially market disruptive, high sensitivity dual technology that allows real-time direct multiplex measurement of biomolecule interactions, including small molecules, nucleic acids, proteins, and microbes. SPR-CPI measures differences in phase shift of reflected S and P polarized light under Total Internal Reflection (TIR) conditions at a surface, caused by changes in refractive index induced by biomolecular interactions within the evanescent field at the TIR interface. The measurement is performed on a microarray of discrete 2-dimensional areas functionalized with biomolecule capture reagents, allowing simultaneous measurement of up to 100 separate analytes. The optical beam encompasses the entire microarray, allowing a solid state detector system with no scanning requirement. Output consists of simultaneous voltage measurements proportional to the phase differences resulting from the refractive index changes from each microarray feature, and is automatically processed and displayed graphically or delivered to a decision making algorithm, enabling a fully automatic detection system capable of rapid detection and quantification of small nucleic acids at extremely sensitive levels. Proof-of-concept experiments on model systems and cell culture samples have demonstrated utility of the system, and efforts are in

  9. What Prevents ESL/FL Writers from Avoiding Plagiarism? Analyses of 10 North-American College Websites.

    ERIC Educational Resources Information Center

    Yamada, Kyoko

    2003-01-01

    Discusses how inexperienced English-as-a-Second/Foreign-Language (ESL/EFL) writers can be helped to avoid plagiarism. Analyzes 10 North American Web sites on plagiarism, which provide a window to understanding how this issue has been problemitized and explained in Anglophone academic contexts. Concludes ESL/EFL may need to emphasize the role of…

  10. Using Online Resources to Improve Writing Skills and Attitudes about Writing and Plagiarism of Criminal Justice Students

    ERIC Educational Resources Information Center

    Grohe, B.; Schroeder, J.; Davis, S. R. B.

    2013-01-01

    Cheating and plagiarism are significant problems in higher education because they occur often and interfere with learning. Plagiarism creates shortcuts that bypass the time and effort required to develop the writing and analytical skills necessary to produce evidence of progress in mastering course content. The purpose of a two-semester writing…

  11. Developing Students' Referencing Skills: A Matter of Plagiarism, Punishment and Morality or of Learning to Write Critically?

    ERIC Educational Resources Information Center

    Vardi, Iris

    2012-01-01

    Just as plagiarism is viewed poorly in the academic community, so is plagiarism viewed poorly in student writing, with a range of sanctions and penalties applying for not displaying academic integrity. Yet learning to cite effectively to progress one's argument, position or understandings is a skill that takes time to develop and hone. This paper…

  12. Police, Design, Plan and Manage: Developing a Framework for Integrating Staff Roles and Institutional Policies into a Plagiarism Prevention Strategy

    ERIC Educational Resources Information Center

    Walker, Christopher; White, Melanie

    2014-01-01

    When student plagiarism occurs, academic interest and institutional policy generally assume the fault rests with the student. This paper questions this assumption. We claim that plagiarism is a shared responsibility and a complex phenomenon that requires an ongoing calibration of the relative skills and experiences of students and staff in…

  13. Anti-Cheating Crusader Vexes Some Professors: Software Kingpin Says Using his Product Would Cure Plagiarism Blight

    ERIC Educational Resources Information Center

    Read, Brock

    2008-01-01

    A parallel between plagiarism and corporate crime raises eyebrows--and ire-- on campuses, but for John Barrie, the comparison is a perfectly natural one. In the 10 years since he founded iParadigms, which sells the antiplagiarism software Turnitin, he has argued--forcefully, and at times combatively--that academic plagiarism is growing, and that…

  14. Making a Difference: Library and Teaching Faculty Working Together to Develop Strategies in Dealing with Student Plagiarism

    ERIC Educational Resources Information Center

    Sciammarella, Susan

    2009-01-01

    Student plagiarism is a problem affecting all colleges. Various strategies have been developed to deal with this situation. But, the collaborative efforts of subject faculty and librarians in creating a team approach towards plagiarism can produce positive results. Research shows that these relationships can provide structure to assignments…

  15. Generic detection of poleroviruses using an RT-PCR assay targeting the RdRp coding sequence.

    PubMed

    Lotos, Leonidas; Efthimiou, Konstantinos; Maliogka, Varvara I; Katis, Nikolaos I

    2014-03-01

    In this study a two-step RT-PCR assay was developed for the generic detection of poleroviruses. The RdRp coding region was selected as the primers' target, since it differs significantly from that of other members in the family Luteoviridae and its sequence can be more informative than other regions in the viral genome. Species specific RT-PCR assays targeting the same region were also developed for the detection of the six most widespread poleroviral species (Beet mild yellowing virus, Beet western yellows virus, Cucurbit aphid-borne virus, Carrot red leaf virus, Potato leafroll virus and Turnip yellows virus) in Greece and the collection of isolates. These isolates along with other characterized ones were used for the evaluation of the generic PCR's detection range. The developed assay efficiently amplified a 593bp RdRp fragment from 46 isolates of 10 different Polerovirus species. Phylogenetic analysis using the generic PCR's amplicon sequence showed that although it cannot accurately infer evolutionary relationships within the genus it can differentiate poleroviruses at the species level. Overall, the described generic assay could be applied for the reliable detection of Polerovirus infections and, in combination with the specific PCRs, for the identification of new and uncharacterized species in the genus. PMID:24374125

  16. Selective error detection for error-resilient wavelet-based image coding.

    PubMed

    Karam, Lina J; Lam, Tuyet-Trang

    2007-12-01

    This paper introduces the concept of a similarity check function for error-resilient multimedia data transmission. The proposed similarity check function provides information about the effects of corrupted data on the quality of the reconstructed image. The degree of data corruption is measured by the similarity check function at the receiver, without explicit knowledge of the original source data. The design of a perceptual similarity check function is presented for wavelet-based coders such as the JPEG2000 standard, and used with a proposed "progressive similarity-based ARQ" (ProS-ARQ) scheme to significantly decrease the retransmission rate of corrupted data while maintaining very good visual quality of images transmitted over noisy channels. Simulation results with JPEG2000-coded images transmitted over the Binary Symmetric Channel, show that the proposed ProS-ARQ scheme significantly reduces the number of retransmissions as compared to conventional ARQ-based schemes. The presented results also show that, for the same number of retransmitted data packets, the proposed ProS-ARQ scheme can achieve significantly higher PSNR and better visual quality as compared to the selective-repeat ARQ scheme.

  17. A study of redundancy management strategy for tetrad strap-down inertial systems. [error detection codes

    NASA Technical Reports Server (NTRS)

    Hruby, R. J.; Bjorkman, W. S.; Schmidt, S. F.; Carestia, R. A.

    1979-01-01

    Algorithms were developed that attempt to identify which sensor in a tetrad configuration has experienced a step failure. An algorithm is also described that provides a measure of the confidence with which the correct identification was made. Experimental results are presented from real-time tests conducted on a three-axis motion facility utilizing an ortho-skew tetrad strapdown inertial sensor package. The effects of prediction errors and of quantization on correct failure identification are discussed as well as an algorithm for detecting second failures through prediction.

  18. Non-coding RNAs in hepatitis C-induced hepatocellular carcinoma: dysregulation and implications for early detection, diagnosis and therapy.

    PubMed

    Hou, Weihong; Bonkovsky, Herbert L

    2013-11-28

    Hepatitis C virus (HCV) infection is one of main causes of hepatocellular carcinoma (HCC) and the prevalence of HCV-associated HCC is on the rise worldwide. It is particularly important and helpful to identify potential markers for screening and early diagnosis of HCC among high-risk individuals with chronic hepatitis C, and to identify target molecules for the prevention and treatment of HCV-associated-HCC. Small non-coding RNAs, mainly microRNAs (miRNAs), and long non-coding RNAs (lncRNAs) with size greater than 200 nucleotides, are likely to play important roles in a variety of biological processes, including development and progression of HCC. For the most part their underlying mechanisms of action remain largely unknown. In recent years, with the advance of high-resolution of microarray and application of next generation sequencing techniques, a significant number of non-coding RNAs (ncRNAs) associated with HCC, particularly caused by HCV infection, have been found to be differentially expressed and to be involved in pathogenesis of HCV-associated HCC. In this review, we focus on recent studies of ncRNAs, especially miRNAs and lncRNAs related to HCV-induced HCC. We summarize those ncRNAs aberrantly expressed in HCV-associated HCC and highlight the potential uses of ncRNAs in early detection, diagnosis and therapy of HCV-associated HCC. We also discuss the limitations of recent studies, and suggest future directions for research in the field. miRNAs, lncRNAs and their target genes may represent new candidate molecules for the prevention, diagnosis and treatment of HCC in patients with HCV infection. Studies of the potential uses of miRNAs and lncRNAs as diagnostic tools or therapies are still in their infancy.

  19. Replica Analysis of Multiuser Detection for Code Division Multiple Access with M-Ary Phase-Shift Keying

    NASA Astrophysics Data System (ADS)

    Kato, Hiroyuki; Okada, Masato; Miyoshi, Seiji

    2013-07-01

    We analyze the performance of the maximizer of the posterior marginals (MPM) detector for code division multiple access (CDMA) multiuser detection with M-ary phase shift keying (M-ary PSK) in the large system limit by the replica method. The obtained theory agrees with computer simulation reasonably well. We also derive the theory in the case of the large M limit and discuss the dependence of the properties of M-ary PSK CDMA communication on M. We show that the waterfall phenomenon occurs for both the finite and infinite values of M. We also show that a value of M for which the decoded phase information on the original user symbol becomes minimum exists. Furthermore, we discuss the relationship between the theory based on the replica method and that based on self-consistent signal-to-noise analysis (SCSNA).

  20. Plagiarism and registered health professionals: navigating the borderlands between scholarly and professional misconduct.

    PubMed

    Wardle, Jon

    2013-12-01

    As access to published materials becomes more readily available, the ability to plagiarise material, deliberately or unwittingly has become easier than ever. This article explores important recent decisions in Australia and the United Kingdom regarding registered health practitioners who have engaged in plagiarism, both related and unrelated to their clinical practice, and explores the ways in which regulatory authorities in these countries have viewed scholarly misconduct committed by registered health professionals. This article also examines the implications of plagiarism for the registered health professions, and makes suggestions for strategies to reduce its influence and incidence in modern clinical practice.

  1. Self-plagiarism and textual recycling: legitimate forms of research misconduct.

    PubMed

    Bruton, Samuel V

    2014-01-01

    The concept of self-plagiarism frequently elicits skepticism and generates confusion in the research ethics literature, and the ethical status of what is often called "textual recycling" is particularly controversial. I argue that, in general, self-plagiarism is unethical because it is deceptive and dishonest. I then distinguish several forms of it and argue against various common rationalizations for textual recycling. I conclude with a discussion of two instances of textual recycling, distinguishing them in terms of their ethical seriousness but concluding that both are ethically problematic.

  2. No evidence of age-related increases in unconscious plagiarism during free recall.

    PubMed

    Perfect, Timothy John; Defeldre, Anne-Catherine; Elliman, Rachel; Dehon, Hedwige

    2011-07-01

    In three experiments younger and older participants took part in a group generation task prior to a delayed recall task. In each, participants were required to recall the items that they had generated, avoiding plagiarism errors. All studies showed the same pattern: older adults did not plagiarise their partners any more than younger adults did. However, older adults were more likely than younger adults to intrude with entirely novel items not previously generated by anyone. These findings stand in opposition to the single previous demonstration of age-related increases in plagiarism during recall.

  3. Task-Specific Codes for Face Recognition: How they Shape the Neural Representation of Features for Detection and Individuation

    PubMed Central

    2008-01-01

    Background The variety of ways in which faces are categorized makes face recognition challenging for both synthetic and biological vision systems. Here we focus on two face processing tasks, detection and individuation, and explore whether differences in task demands lead to differences both in the features most effective for automatic recognition and in the featural codes recruited by neural processing. Methodology/Principal Findings Our study appeals to a computational framework characterizing the features representing object categories as sets of overlapping image fragments. Within this framework, we assess the extent to which task-relevant information differs across image fragments. Based on objective differences we find among task-specific representations, we test the sensitivity of the human visual system to these different face descriptions independently of one another. Both behavior and functional magnetic resonance imaging reveal effects elicited by objective task-specific levels of information. Behaviorally, recognition performance with image fragments improves with increasing task-specific information carried by different face fragments. Neurally, this sensitivity to the two tasks manifests as differential localization of neural responses across the ventral visual pathway. Fragments diagnostic for detection evoke larger neural responses than non-diagnostic ones in the right posterior fusiform gyrus and bilaterally in the inferior occipital gyrus. In contrast, fragments diagnostic for individuation evoke larger responses than non-diagnostic ones in the anterior inferior temporal gyrus. Finally, for individuation only, pattern analysis reveals sensitivity to task-specific information within the right “fusiform face area”. Conclusions/Significance Our results demonstrate: 1) information diagnostic for face detection and individuation is roughly separable; 2) the human visual system is independently sensitive to both types of information; 3) neural

  4. Examining Differences among Online Faculty Reporting Student Plagiarism Using the Theory of Planned Behavior

    ERIC Educational Resources Information Center

    Moeder Stowe, Susan A.

    2013-01-01

    Among higher education faculty, having to address academic misconduct and plagiarism is often viewed as a negative aspect of teaching resulting in inconsistent reporting by faculty. Some faculty members take no action in response. Differences exist in attitudes between traditional regular full-time and part-time adjunct faculty members in terms of…

  5. Academic Integrity and Student Plagiarism: Guided Instructional Strategies for Business Communication Assignments

    ERIC Educational Resources Information Center

    Okoro, Ephraim A.

    2011-01-01

    Maintaining academic integrity is critical to the sustainability of a civil society and to the democratic process. Educators across the disciplines are growing increasingly disturbed by the level of plagiarism on university campuses. The author contends that developing supportive ways of empowering students to become more independent writers in…

  6. Self-Plagiarism and Unfortunate Publication: An Essay on Academic Values

    ERIC Educational Resources Information Center

    Robinson, Susan R.

    2014-01-01

    Recent years have seen a steady stream of journal editorials condemning self-plagiarism and other questionable publishing practices. Whilst in the biomedical sciences, redundant publication is condemned for its potential to exaggerate the efficacy of clinical trials, the potential negative consequences of textual recycling are less obvious in the…

  7. Evaluation of an Intervention to Help Students Avoid Unintentional Plagiarism by Improving Their Authorial Identity

    ERIC Educational Resources Information Center

    Elander, James; Pittam, Gail; Lusher, Joanne; Fox, Pauline; Payne, Nicola

    2010-01-01

    Students with poorly developed authorial identity may be at risk of unintentional plagiarism. An instructional intervention designed specifically to improve authorial identity was delivered to 364 psychology students at three post-1992 universities in London, UK, and evaluated with before-and-after measures of beliefs and attitudes about academic…

  8. Two First-Year Students' Strategies for Writing from Sources: Patchwriting or Plagiarism?

    ERIC Educational Resources Information Center

    Li, Yongyan; Casanave, Christine Pearson

    2012-01-01

    In this paper we report a case study of two first-year students at a university in Hong Kong doing the same writing assignment that required the use of sources. We explore the students' understanding of plagiarism, their strategies for composing, the similarity between their texts and source texts, and the lecturer's assessment of their work. The…

  9. An Online Tutorial vs. Pre-Recorded Lecture for Reducing Incidents of Plagiarism

    ERIC Educational Resources Information Center

    Henslee, Amber M.; Goldsmith, Jacob; Stone, Nancy J.; Krueger, Merilee

    2015-01-01

    The current study compared an online academic integrity tutorial modified from Belter & du Pre (2009) to a pre-recorded online academic integrity lecture in reducing incidents of plagiarism among undergraduate students at a science and technology university. Participants were randomized to complete either the tutorial or the pre-recorded…

  10. Academic Integrity, Remix Culture, Globalization: A Canadian Case Study of Student and Faculty Perceptions of Plagiarism

    ERIC Educational Resources Information Center

    Evans-Tokaryk, Tyler

    2014-01-01

    This article presents the results of a case study at a Canadian university that used a combination of surveys and focus groups to explore faculty members' and students' perceptions of plagiarism. The research suggests that the globalization of education and remix culture have contributed to competing and contradictory understandings of plagiarism…

  11. Reducing the Prevalence of Plagiarism: A Model for Staff, Students and Universities

    ERIC Educational Resources Information Center

    Choo, Teh Eng (Elaine); Paull, Megan

    2013-01-01

    The incidence of plagiarism, according to the literature, is increasing. But why do students plagiarise and why the increase? Is it due to laziness, opportunity, ignorance, fear or ambivalence? Or do they know that there is little chance of any significant penalty? The literature suggests that all of these apply. Given this, are universities and,…

  12. Reducing Unintentional Plagiarism amongst International Students in the Biological Sciences: An Embedded Academic Writing Development Programme

    ERIC Educational Resources Information Center

    Divan, Aysha; Bowman, Marion; Seabourne, Anna

    2015-01-01

    There is general agreement in the literature that international students are more likely to plagiarise compared to their native speaker peers and, in many instances, plagiarism is unintentional. In this article we describe the effectiveness of an academic writing development programme embedded into a Biological Sciences Taught Masters course…

  13. Teaching Note--Evaluation of an Avoiding Plagiarism Workshop for Social Work Students

    ERIC Educational Resources Information Center

    Fenster, Judy

    2016-01-01

    A 1-hour workshop on how to avoid plagiarizing when writing academic papers was developed and delivered at an orientation session for BSW and MSW students at a university in the northeast United States. Six social work instructors led the workshops at the university's main campus and two extension centers. Before and after the workshop, students…

  14. Investigating Chinese University Students' Knowledge of and Attitudes toward Plagiarism from an Integrated Perspective

    ERIC Educational Resources Information Center

    Hu, Guangwei; Lei, Jun

    2012-01-01

    This article reports on a mixed-methods study of Chinese university students' knowledge of and attitudes toward plagiarism in English academic writing. A sample of 270 undergraduates from two Chinese universities rated three short English passages under different conditions, provided open-ended responses to justify their ratings, and completed a…

  15. MOOCs for Research: The Case of the Indiana University Plagiarism Tutorials and Tests

    ERIC Educational Resources Information Center

    Frick, Theodore; Dagli, Cesur

    2016-01-01

    We illustrate a very recent research study that demonstrates the value of Massive Open Online Courses (MOOCs) as vehicles for research. We describe the development of the Indiana University Plagiarism Tutorials and Tests (IPTAT). Our new design has been guided by "First Principles of Instruction": authentic problems, activation,…

  16. The Library Media Specialist, "Information Power", and Social Responsibility: Part 1 (Plagiarism).

    ERIC Educational Resources Information Center

    Barron, Daniel D.

    2002-01-01

    Discussion of ethical and social responsibility issues that are raised in "Information Power II: Partnerships for Learning" (ALA, 1998) focuses on plagiarism, especially from the Internet. Presents ideas helpful to library media specialists and teachers, including suggestions for prevention when assigning research papers; and includes pertinent…

  17. Distance Education and Plagiarism Prevention at the University of South Carolina Upstate

    ERIC Educational Resources Information Center

    Kirsch, Breanne A.; Bradley, Lola

    2012-01-01

    At the University of South Carolina Upstate, two librarians created a series of workshops to proactively prevent plagiarism. To reach distance education students, online workshops were developed in Blackboard including basic and advanced workshops for lower and upper-level courses. The workshops are intended to introduce students to the concepts…

  18. Discourses of Plagiarism: Moralist, Proceduralist, Developmental and Inter-Textual Approaches

    ERIC Educational Resources Information Center

    Kaposi, David; Dell, Pippa

    2012-01-01

    This paper reconstructs prevalent academic discourses of student plagiarism: moralism, proceduralism, development, and writing/inter-textuality. It approaches the discourses from three aspects: intention, interpretation and the nature of the academic community. It argues that the assumptions of the moralistic approach regarding suspect intention,…

  19. An Empirical Investigation of Digital Cheating and Plagiarism among Middle School Students

    ERIC Educational Resources Information Center

    Ma, Hongyan; Lu, Eric Yong; Turner, Sandra; Wan, Guofang

    2007-01-01

    What are middle school students' attitudes toward digital cheating and plagiarism? To answer the question, an empirical study was conducted in three middle schools using multiple focus groups and interviews. Students participated in the focus groups, and teachers, and parents participated in interviews. The study found that peer culture…

  20. In Their Own Words: A Qualitative Study of the Reasons Australian University Students Plagiarize

    ERIC Educational Resources Information Center

    Devlin, Marcia; Gray, Kathleen

    2007-01-01

    The ways in which universities and individual academics attempt to deter and respond to student plagiarism may be based on untested assumptions about particular or primary reasons for this behaviour. Using a series of group interviews, this qualitative study gathered the views of 56 Australian university students on the possible reasons for…

  1. Internet Plagiarism in Higher Education: Tendencies, Triggering Factors and Reasons among Teacher Candidates

    ERIC Educational Resources Information Center

    Eret, Esra; Ok, Ahmet

    2014-01-01

    While plagiarism has been a growing problem in higher education for a long time, the use of the Internet has made this increasing problem more unmanageable. In many countries, this problem has become a matter of discussion, and higher education institutions feel obliged to review their policies on academic dishonesty. As part of these efforts, the…

  2. The i-Map: A Process-Centered Response to Plagiarism

    ERIC Educational Resources Information Center

    Walden, Kim; Peacock, Alan

    2006-01-01

    In recent years there has been a marked change in our cultural relationship with information which has implications for our teaching and learning practices. Current concerns about the identification of, and responses to, plagiarism are grounded in that process of change. In this paper we take the position that it is better to address and respond…

  3. Rational Ignorance in Education: A Field Experiment in Student Plagiarism. NBER Working Paper No. 15672

    ERIC Educational Resources Information Center

    Dee, Thomas S.; Jacob, Brian A.

    2010-01-01

    Despite the concern that student plagiarism has become increasingly common, there is relatively little objective data on the prevalence or determinants of this illicit behavior. This study presents the results of a natural field experiment designed to address these questions. Over 1,200 papers were collected from the students in undergraduate…

  4. Generating Knowledge and Avoiding Plagiarism: Smart Information Use by High School Students

    ERIC Educational Resources Information Center

    Williamson, Kirsty; McGregor, Joy

    2011-01-01

    The article reports phase 2 of a two-year study, dubbed the Smart Information Use project, the focus of which was appropriate seeking and use of information by students at various stages of their high school education, along with the avoidance of plagiarism. In four Australian high schools, teacher librarians and classroom teachers developed and…

  5. Academic Literacy and Plagiarism: Conversations with International Graduate Students and Disciplinary Professors

    ERIC Educational Resources Information Center

    Abasi, Ali R.; Graves, Barbara

    2008-01-01

    In this study we examine how university plagiarism policies interact with international graduate students' academic writing in English as they develop identities as authors and students. The study is informed by the sociocultural theoretical perspective [Vygotsky, L. (1978). "Mind in society: The development of higher mental processes." Cambridge,…

  6. Teaching Students about Plagiarism: An Internet Solution to an Internet Problem

    ERIC Educational Resources Information Center

    Snow, Eleanour

    2006-01-01

    The Internet has changed the ways that students think, learn, and write. Students have large amounts of information, largely anonymous and without clear copyright information, literally at their fingertips. Without sufficient guidance, the inappropriate use of this information seems inevitable. Plagiarism among college students is rising, due to…

  7. Problems of Policing Plagiarism and Cheating in University Institutions Due to Incomplete or Inconsistent Definitions

    ERIC Educational Resources Information Center

    Soiferman, L. Karen

    2016-01-01

    The purpose of this article was to gain an understanding of the definitions of plagiarism, and cheating that are used in the literature, in institutions, and by students. The information was gathered from a literature review, from university and college websites, and from an informal sampling of students from five different first-year classes. The…

  8. Plagiarism in Speeches by College Presidents Called "Capital Offense" and "Ultimate Sin."

    ERIC Educational Resources Information Center

    Blum, Debra E.

    1988-01-01

    The issue of giving proper attribution in speeches--a problem that cost Joseph Biden his presidential candidacy--flared up in academe this year. Richard J. Sauer withdrew his candidacy for the presidency of North Dakota State University amid allegations that he plagiarized part of a speech he had delivered. (MLW)

  9. Gauging the Effectiveness of Anti-Plagiarism Software: An Empirical Study of Second Language Graduate Writers

    ERIC Educational Resources Information Center

    Stapleton, Paul

    2012-01-01

    The use of anti-plagiarism services has grown very quickly in recent years to the point where over half of American universities now have a license. The most popular of these services, Turnitin, claims that it is licensed in 126 countries and available in 10 languages suggesting that the service is becoming widely used around the world. In order…

  10. The Tangled Web: Investigating Academics' Views of Plagiarism at the University of Cape Town

    ERIC Educational Resources Information Center

    de Jager, Karin; Brown, Cheryl

    2010-01-01

    This article considers the problematic question of student plagiarism, its causes and manifestations, and how it is addressed in academic environments. A literature survey was conducted to establish how higher education institutions approach these issues, and a twofold investigation was conducted at the University of Cape Town. Data was gathered…

  11. Plagiarism and Other Sins Seem Rife in Science Journals, a Digital Sleuth Finds

    ERIC Educational Resources Information Center

    Guterman, Lila

    2008-01-01

    Faculty members gnash their teeth and wring their hands when students plagiarize. They cry for offenders to be punished. But now an online text-search program directed at their own work suggests that professors in biomedicine may be just as guilty of paper-writing sins. More than 70,000 article abstracts appeared disturbingly similar to other…

  12. Coding Gene Single Nucleotide Polymorphism Mapping and Quantitative Trait Loci Detection for Physiological Reproductive Traits in Brook Charr, Salvelinus fontinalis

    PubMed Central

    Sauvage, Christopher; Vagner, Marie; Derôme, Nicolas; Audet, Céline; Bernatchez, Louis

    2012-01-01

    A linkage map of 40 linkage groups (LGs) was developed for brook charr, Salvelinus fontinalis, using an F2 interstrain hybrid progeny (n = 171) and 256 coding gene SNP developed specifically for brook charr and validated from a large (>1000) subset of putative SNP, as well as 81 microsatellite markers. To identify quantitative trait loci (QTL) related to reproduction functions, these fish were also phenotyped at six physiological traits, including spermatozoid head diameter, sperm concentration, plasma testosterone, plasma 11-keto-testosterone, egg diameter, and plasma 17β-estradiol. Five significant QTL were detected over four LGs for egg diameter and plasma 17β-estradiol concentration in females, and sperm concentration as well as spermatozoid head diameter in males. In females, two different QTLs located on LG 11 and LG 34 were associated with the egg number, whereas one QTL was associated with plasma 17β-estradiol concentration (LG 8). Their total percent variance explained (PVE) was 26.7% and 27.6%, respectively. In males, two QTL were also detected for the sperm concentration, and their PVE were estimated at 18.58% and 14.95%, respectively. The low QTL number, associated with the high PVE, suggests that the variance in these reproductive physiological traits was either under the control of one major gene or a small number of genes. The QTL associated with sperm concentration, plasma 17β-estradiol, and egg diameter appeared to be under a dominance effect, whereas the two others were under a negative additive effect. These results show that genes underlying the phenotypic variance of these traits are under different modes of action (additive vs. dominance) and may be used to predict an increase or a decrease in their phenotypic values in subsequent generations of selective breeding. Moreover, this newly developed panel of mapped SNP located in coding gene regions will be useful for screening wild populations, especially in the context of investigating the

  13. The Conservation and Application of Three Hypothetical Protein Coding Gene for Direct Detection of Mycobacterium tuberculosis in Sputum Specimens

    PubMed Central

    Qin, Lianhua; Gao, Shihui; Wang, Jie; Zheng, Ruijuan; Lu, Junmei; Hu, Zhongyi

    2013-01-01

    Background Accurate and early diagnosis of tuberculosis (TB) is of major importance in the control of TB. One of the most important technical advances in diagnosis of tuberculosis is the development of nucleic acid amplification (NAA) tests. However, the choice of the target sequence remains controversial in NAA tests. Recently, interesting alternatives have been found in hypothetical protein coding sequences from mycobacterial genome. Methodology/Principal Findings To obtain rational biomarker for TB diagnosis, the conservation of three hypothetical genes was firstly evaluated in 714 mycobacterial strains. The results showed that SCAR1 (Sequenced Characterized Amplified Region) based on Rv0264c coding gene showed the highest conservation (99.8%) and SCAR2 based on Rv1508c gene showed the secondary high conservation (99.7%) in M. tuberculosis (MTB) strains. SCAR3 based on Rv2135c gene (3.2%) and IS6110 (8%) showed relatively high deletion rate in MTB strains. Secondly, three SCAR markers were evaluated in 307 clinical sputum from patients in whom TB was suspected or patients with diseases other than TB. The amplification of IS6110 and 16SrRNA sequences together with both clinical and bacteriological identification was as a protocol to evaluate the efficacy of SCAR markers. The sensitivities and specificities, positive predictive value (PPV) and negative predictive value (NPV) of all NAA tests were higher than those of bacteriological detection. In four NAA tests, IS6110 and SCAR3 showed the highest PPV (100%) and low NPV (70% and 68.8%, respectively), and SCAR1 and SCAR2 showed the relatively high PPV and NPV (97% and 82.6%, 95.6% and 88.8%, respectively). Conclusions/Significance Our result indicated that SCAR1 and SCAR2 with a high degree of sequence conservation represent efficient and promising alternatives as NAA test targets in identification of MTB. Moreover, the targets developed from this study may provide more alternative targets for the development of a

  14. Detecting pop-out targets in contexts of varying homogeneity: investigating homogeneity coding with event-related brain potentials (ERPs).

    PubMed

    Schubö, Anna; Wykowska, Agnieszka; Müller, Hermann J

    2007-03-23

    Searching for a target among many distracting context elements might be an easy or a demanding task. Duncan and Humphreys (Duncan, J., Humphreys, G.W., 1989. Visual search and stimulus similarity. Psychol. Rev. 96, 433-458) showed that not only the target itself plays a role in the difficulty of target detection. Similarity among context elements and dissimilarity of target and context are two main factors also affecting search efficiency. Moreover, many studies have shown that search becomes particularly efficient with large set sizes and perfectly homogeneous context elements, presumably due to grouping processes involved in target-context segmentation. Especially N2p amplitude has been found to be modulated by the number of context elements and their homogeneity. The aim of the present study was to investigate the influence of context elements of different heterogeneities on search performance using event-related brain potentials (ERPs). Results showed that contexts with perfectly homogeneous elements were indeed special: they were most efficient in visual search and elicited a large N2p differential amplitude effect. Increasing context heterogeneity led to a decrease in search performance and a reduction in N2p differential amplitude. Reducing the number of context elements led to a marked performance decrease for random heterogeneous contexts but not for grouped heterogeneous contexts. Behavioral and N2p results delivered evidence (a) in favor of specific processing modes operating on different spatial scales (b) for the existence of homogeneity coding postulated by Duncan and Humphreys.

  15. Source credibility and idea improvement have independent effects on unconscious plagiarism errors in recall and generate-new tasks.

    PubMed

    Perfect, Timothy J; Field, Ian; Jones, Robert

    2009-01-01

    Unconscious plagiarism occurs when people try to generate new ideas or when they try to recall their own ideas from among a set generated by a group. In this study, the factors that independently influence these two forms of plagiarism error were examined. Participants initially generated solutions to real-world problems in 2 domains of knowledge in collaboration with a confederate presented as an expert in 1 domain. Subsequently, the participant generated improvements to half of the ideas from each person. Participants returned 1 day later to recall either their own ideas or their partner's ideas and to complete a generate-new task. A double dissociation was observed. Generate-new plagiarism was driven by partner expertise but not by idea improvement, whereas recall plagiarism was driven by improvement but not expertise. This improvement effect on recall plagiarism was seen for the recall-own but not the recall-partner task, suggesting that the increase in recall-own plagiarism is due to mistaken idea ownership, not source confusion.

  16. The Nuremberg Code-A critique.

    PubMed

    Ghooi, Ravindra B

    2011-04-01

    The Nuremberg Code drafted at the end of the Doctor's trial in Nuremberg 1947 has been hailed as a landmark document in medical and research ethics. Close examination of this code reveals that it was based on the Guidelines for Human Experimentation of 1931. The resemblance between these documents is uncanny. It is unfortunate that the authors of the Nuremberg Code passed it off as their original work. There is evidence that the defendants at the trial did request that their actions be judged on the basis of the 1931 Guidelines, in force in Germany. The prosecutors, however, ignored the request and tried the defendants for crimes against humanity, and the judges included the Nuremberg Code as a part of the judgment. Six of ten principles in Nuremberg Code are derived from the 1931 Guidelines, and two of four newly inserted principles are open to misinterpretation. There is little doubt that the Code was prepared after studying the Guidelines, but no reference was made to the Guidelines, for reasons that are not known. Using the Guidelines as a base document without giving due credit is plagiarism; as per our understanding of ethics today, this would be considered unethical. The Nuremberg Code has fallen by the wayside; since unlike the Declaration of Helsinki, it is not regularly reviewed and updated. The regular updating of some ethics codes is evidence of the evolving nature of human ethics. PMID:21731859

  17. Detecting selection in the blue crab, Callinectes sapidus, using DNA sequence data from multiple nuclear protein-coding genes.

    PubMed

    Yednock, Bree K; Neigel, Joseph E

    2014-01-01

    The identification of genes involved in the adaptive evolution of non-model organisms with uncharacterized genomes constitutes a major challenge. This study employed a rigorous and targeted candidate gene approach to test for positive selection on protein-coding genes of the blue crab, Callinectes sapidus. Four genes with putative roles in physiological adaptation to environmental stress were chosen as candidates. A fifth gene not expected to play a role in environmental adaptation was used as a control. Large samples (n>800) of DNA sequences from C. sapidus were used in tests of selective neutrality based on sequence polymorphisms. In combination with these, sequences from the congener C. similis were used in neutrality tests based on interspecific divergence. In multiple tests, significant departures from neutral expectations and indicative of positive selection were found for the candidate gene trehalose 6-phosphate synthase (tps). These departures could not be explained by any of the historical population expansion or bottleneck scenarios that were evaluated in coalescent simulations. Evidence was also found for balancing selection at ATP-synthase subunit 9 (atps) using a maximum likelihood version of the Hudson, Kreitmen, and Aguadé test, and positive selection favoring amino acid replacements within ATP/ADP translocase (ant) was detected using the McDonald-Kreitman test. In contrast, test statistics for the control gene, ribosomal protein L12 (rpl), which presumably has experienced the same demographic effects as the candidate loci, were not significantly different from neutral expectations and could readily be explained by demographic effects. Together, these findings demonstrate the utility of the candidate gene approach for investigating adaptation at the molecular level in a marine invertebrate for which extensive genomic resources are not available.

  18. No one likes a copycat: a cross-cultural investigation of children's response to plagiarism.

    PubMed

    Yang, F; Shaw, A; Garduno, E; Olson, K R

    2014-05-01

    Copying other people's ideas is evaluated negatively by American children and adults. The current study investigated the influence of culture on children's evaluations of plagiarism by comparing children from three countries--the United States, Mexico, and China--that differ in terms of their emphasis on the protection of intellectual property and ideas. Children (3- to 6-year-olds) were presented with videos involving two characters drawing pictures and were asked to evaluate the character who drew unique work or the character who copied someone else's drawing. The study showed that 5- and 6-year-olds from all three cultures evaluated copiers negatively compared with unique drawers. These results suggest that children from cultures that place different values on the protection of ideas nevertheless develop similar concerns with plagiarism by 5-year-olds.

  19. Perspective: publication ethics and the emerging scientific workforce: understanding "plagiarism" in a global context.

    PubMed

    Cameron, Carrie; Zhao, Hui; McHugh, Michelle K

    2012-01-01

    English has long been the dominant language of scientific publication, and it is rapidly approaching near-complete hegemony. The majority of the scientists publishing in English-language journals are not native English speakers, however. This imbalance has important implications for training concerning ethics and enforcement of publication standards, particularly with respect to plagiarism. The authors suggest that lack of understanding of what constitutes plagiarism and the use of a linguistic support strategy known as "patchwriting" can lead to inadvertent misuse of source material by nonnative speakers writing in English as well as to unfounded accusations of intentional scientific misconduct on the part of these authors. They propose that a rational and well-informed dialogue about this issue is needed among editors, educators, administrators, and both native-English-speaking and nonnative-English-speaking writers. They offer recommendations for creating environments in which such dialogue and training can occur.

  20. No one likes a copycat: a cross-cultural investigation of children's response to plagiarism.

    PubMed

    Yang, F; Shaw, A; Garduno, E; Olson, K R

    2014-05-01

    Copying other people's ideas is evaluated negatively by American children and adults. The current study investigated the influence of culture on children's evaluations of plagiarism by comparing children from three countries--the United States, Mexico, and China--that differ in terms of their emphasis on the protection of intellectual property and ideas. Children (3- to 6-year-olds) were presented with videos involving two characters drawing pictures and were asked to evaluate the character who drew unique work or the character who copied someone else's drawing. The study showed that 5- and 6-year-olds from all three cultures evaluated copiers negatively compared with unique drawers. These results suggest that children from cultures that place different values on the protection of ideas nevertheless develop similar concerns with plagiarism by 5-year-olds. PMID:24473471

  1. A novel error detection due to joint CRC aided denoise-and-forward network coding for two-way relay channels.

    PubMed

    Cheng, Yulun; Yang, Longxiang

    2014-01-01

    In wireless two-way (TW) relay channels, denoise-and-forward (DNF) network coding (NC) is a promising technique to achieve spectral efficiency. However, unsuccessful detection at relay severely deteriorates the diversity gain, as well as end-to-end pairwise error probability (PEP). To handle this issue, a novel joint cyclic redundancy code (CRC) check method (JCRC) is proposed in this paper by exploiting the property of two NC combined CRC codewords. Firstly, the detection probability bounds of the proposed method are derived to prove its efficiency in evaluating the reliability of NC signals. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Numerical results reveal that JCRC aided TW DNF NC has similar PEP comparing with the separate CRC one, while the complexity is reduced to half. Besides, it demonstrates that the proposed schemes outperform the conventional one with log-likelihood ratio threshold.

  2. Biases in detection of apparent “weekend effect” on outcome with administrative coding data: population based study of stroke

    PubMed Central

    Li, Linxin

    2016-01-01

    Objectives To determine the accuracy of coding of admissions for stroke on weekdays versus weekends and any impact on apparent outcome. Design Prospective population based stroke incidence study and a scoping review of previous studies of weekend effects in stroke. Setting Primary and secondary care of all individuals registered with nine general practices in Oxfordshire, United Kingdom (OXVASC, the Oxford Vascular Study). Participants All patients with clinically confirmed acute stroke in OXVASC identified with multiple overlapping methods of ascertainment in 2002-14 versus all acute stroke admissions identified by hospital diagnostic and mortality coding alone during the same period. Main outcomes measures Accuracy of administrative coding data for all patients with confirmed stroke admitted to hospital in OXVASC. Difference between rates of “false positive” or “false negative” coding for weekday and weekend admissions. Impact of inaccurate coding on apparent case fatality at 30 days in weekday versus weekend admissions. Weekend effects on outcomes in patients with confirmed stroke admitted to hospital in OXVASC and impacts of other potential biases compared with those in the scoping review. Results Among 92 728 study population, 2373 episodes of acute stroke were ascertained in OXVASC, of which 826 (34.8%) mainly minor events were managed without hospital admission, 60 (2.5%) occurred out of the area or abroad, and 195 (8.2%) occurred in hospital during an admission for a different reason. Of 1292 local hospital admissions for acute stroke, 973 (75.3%) were correctly identified by administrative coding. There was no bias in distribution of weekend versus weekday admission of the 319 strokes missed by coding. Of 1693 admissions for stroke identified by coding, 1055 (62.3%) were confirmed to be acute strokes after case adjudication. Among the 638 false positive coded cases, patients were more likely to be admitted on weekdays than at weekends (536

  3. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    NASA Astrophysics Data System (ADS)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  4. Do Cheaters Never Prosper? The Impact of Examples, Expertise, and Cognitive Load on Cryptomnesia and Inadvertent Self-Plagiarism of Creative Tasks

    ERIC Educational Resources Information Center

    Dow, Gayle T.

    2015-01-01

    Previous work has shown that the presence of examples may lead to cryptomnesia, or inadvertent plagiarism, on creative tasks. Various experiential and environmental attributes may magnify this finding. For instance, novices, with limited knowledge, may be more prone to inadvertently plagiarize examples, and increases in cognitive load may result…

  5. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system.

    PubMed

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  6. Plagiarism in scientific research and publications and how to prevent it.

    PubMed

    Masic, Izet

    2014-04-01

    can re-publish the article already published. In that case, that is not plagiarism, because the journal states that the article was re-published with the permission of the journal in which the article is primarily released. The original can be only one, and the copy is a copy, and plagiarism is stolen copy. The aim of combating plagiarism is to improve the quality, to achieve satisfactory results and to compare the results of their own research, rather than copying the data from the results of other people's research. Copy leads to incorrect results. Nowadays the problem of plagiarism has become huge, or widespread and present in almost all spheres of human activity, particularly in science. Scientific institutions and universities should have a center for surveillance, security, promotion and development of quality research. Establishment of rules and respect the rules of good practice are the obligations of each research institutions, universities and every individual researchers, regardless of which area of science is being investigated. There are misunderstandings and doubts about the criteria and standards for when and how to declare someone a plagiarist. European and World Association of Science Editors (EASE and WAME), and COPE - Committee on Publishing Ethics working on the precise definition of that institution or that the scientific committee may sanction when someone is proven plagiarism and familiarize the authors with the types of sanctions. The practice is to inform the editors about discovered plagiarism and articles are withdrawn from the database, while the authors are put on the so-called black list. So far this is the only way of preventing plagiarism, because there are no other sanctions.

  7. Plagiarism in Scientific Research and Publications and How to Prevent It

    PubMed Central

    Masic, Izet

    2014-01-01

    can re-publish the article already published. In that case, that is not plagiarism, because the journal states that the article was re-published with the permission of the journal in which the article is primarily released. The original can be only one, and the copy is a copy, and plagiarism is stolen copy. The aim of combating plagiarism is to improve the quality, to achieve satisfactory results and to compare the results of their own research, rather than copying the data from the results of other people's research. Copy leads to incorrect results. Nowadays the problem of plagiarism has become huge, or widespread and present in almost all spheres of human activity, particularly in science. Scientific institutions and universities should have a center for surveillance, security, promotion and development of quality research. Establishment of rules and respect the rules of good practice are the obligations of each research institutions, universities and every individual researchers, regardless of which area of science is being investigated. There are misunderstandings and doubts about the criteria and standards for when and how to declare someone a plagiarist. European and World Association of Science Editors (EASE and WAME), and COPE - Committee on Publishing Ethics working on the precise definition of that institution or that the scientific committee may sanction when someone is proven plagiarism and familiarize the authors with the types of sanctions. The practice is to inform the editors about discovered plagiarism and articles are withdrawn from the database, while the authors are put on the so-called black list. So far this is the only way of preventing plagiarism, because there are no other sanctions. PMID:24944543

  8. Plagiarism in scientific research and publications and how to prevent it.

    PubMed

    Masic, Izet

    2014-04-01

    can re-publish the article already published. In that case, that is not plagiarism, because the journal states that the article was re-published with the permission of the journal in which the article is primarily released. The original can be only one, and the copy is a copy, and plagiarism is stolen copy. The aim of combating plagiarism is to improve the quality, to achieve satisfactory results and to compare the results of their own research, rather than copying the data from the results of other people's research. Copy leads to incorrect results. Nowadays the problem of plagiarism has become huge, or widespread and present in almost all spheres of human activity, particularly in science. Scientific institutions and universities should have a center for surveillance, security, promotion and development of quality research. Establishment of rules and respect the rules of good practice are the obligations of each research institutions, universities and every individual researchers, regardless of which area of science is being investigated. There are misunderstandings and doubts about the criteria and standards for when and how to declare someone a plagiarist. European and World Association of Science Editors (EASE and WAME), and COPE - Committee on Publishing Ethics working on the precise definition of that institution or that the scientific committee may sanction when someone is proven plagiarism and familiarize the authors with the types of sanctions. The practice is to inform the editors about discovered plagiarism and articles are withdrawn from the database, while the authors are put on the so-called black list. So far this is the only way of preventing plagiarism, because there are no other sanctions. PMID:24944543

  9. Ultrasensitive strategy based on PtPd nanodendrite/nano-flower-like@GO signal amplification for the detection of long non-coding RNA.

    PubMed

    Liu, Fei; Xiang, Guiming; Jiang, Dongneng; Zhang, Liqun; Chen, Xuemei; Liu, Linlin; Luo, Fukang; Li, Yi; Liu, Chang; Pu, Xiaoyun

    2015-12-15

    Highly up-regulated in liver cancer (HULC) is a novel promising noninvasive biomarker for hepatocellular carcinoma (HCC), which is a kind of long non-coding RNAs (lncRNAs). But traditional methods limited HULC clinical detection for ownself drawbacks. Development a new HULC detection approach is urgent and necessary. Electrochemical nucleic acid sensor based on different signal amplification strategies with high sensitivity, fast, simple, and convenient, may solve this problem. Herein, we propose a novel strategy based on Pt-Pd bimetallic nanodendrites/nanoflower-like clusters on graphene oxide/Au/horseradish peroxidase (PtPd BND/BNF@GO/Au/HRP) to enhance the catalytic efficiency and sensitivity. And Au particles were simultaneously and separately capped with thionine or detection probe, which increase the binding amount of detection probe and decrease the electronic background. The results indicated that the catalytic effect was noticeably elevated and that the biosensor provides ultrasensitive detection for the lncRNA HULC. The linear calibration of the biosensor ranged from 1.00×10(-3) to 1.00×10(3) pM/mL, and the limit of detection was 0.247 fM/mL. The lncRNA biosensor based on the PtPd BND/BNF@GO/Au/HRP/Au/thionine exhibited acceptable reproducibility and clear selectivity. This strategy may provide a new alternative for clinical HCC diagnosis through the detection of HULC.

  10. A new RNA-seq method to detect the transcription and non-coding RNA in prostate cancer.

    PubMed

    Zhang, Xiao-Ming; Ma, Zhong-Wei; Wang, Qiang; Wang, Jian-Ning; Yang, Ji-Wei; Li, Xian-Duo; Li, Hao; Men, Tong-Yi

    2014-01-01

    Prostate cancer is a big killer in many regions especially American men, and this year, the diagnosed rate rises rapidly. We aimed to find the biomarker or any changing in prostate cancer patients. With the development of next generation sequencing, much genomic alteration has been found. Here, basing on the RNA-seq result of human prostate cancer tissue, we tried to find the transcription or non-coding RNA expressed differentially between normal tissue and prostate cancer tissue. 10 T sample data is the RNA-seq data for prostate cancer tissue in this study, we found the differential gene is TFF3-Trefoil factor 3, which was more than seven fold change from prostate cancer tissue to normal tissue, and the most outstanding transcript is C15orf21. Additionally, 9 lncRNAs were found according our method. Finally, we found the many important non-coding RNA related to prostate cancer, some of them were long non-coding RNA (lncRNA).

  11. [Research code at the Academic Medical Center in Amsterdam: useful].

    PubMed

    Vermeulen, M

    2002-08-31

    At the Academic Medical Centre (AMC) of the University of Amsterdam, the Netherlands, it was decided to set up a research code committee. The first thing that was done was to define what were considered the most relevant types of scientific misconduct: falsification, plagiarism and invasion of privacy. The committee decided that prevention is better than cure and therefore developed a guideline for desirable behaviour, i.e. how to act scientifically with care and integrity, instead of a guideline on what not to do. The committee also proposed an ombudsman whose services are available to all participants in research in the AMC, and to whom misconduct can be reported. The research code is a loose-leaf system, since new issues will come to the fore and included issues will need to be changed. This committee has created a code that provides a firm basis for scientific integrity within the AMC.

  12. Utility of rapid database searching for quality assurance: 'detective work' in uncovering radiology coding and billing errors

    NASA Astrophysics Data System (ADS)

    Horii, Steven C.; Kim, Woojin; Boonn, William; Iyoob, Christopher; Maston, Keith; Coleman, Beverly G.

    2011-03-01

    When the first quarter of 2010 Department of Radiology statistics were provided to the Section Chiefs, the authors (SH, BC) were alarmed to discover that Ultrasound showed a decrease of 2.5 percent in billed examinations. This seemed to be in direct contradistinction to the experience of the ultrasound faculty members and sonographers. Their experience was that they were far busier than during the same quarter of 2009. The one exception that all acknowledged was the month of February, 2010 when several major winter storms resulted in a much decreased Hospital admission and Emergency Department visit rate. Since these statistics in part help establish priorities for capital budget items, professional and technical staffing levels, and levels of incentive salary, they are taken very seriously. The availability of a desktop, Web-based RIS database search tool developed by two of the authors (WK, WB) and built-in database functions of the ultrasound miniPACS, made it possible for us very rapidly to develop and test hypotheses for why the number of billable examinations was declining in the face of what experience told the authors was an increasing number of examinations being performed. Within a short time, we identified the major cause as errors on the part of the company retained to verify billable Current Procedural Terminology (CPT) codes against ultrasound reports. This information is being used going forward to recover unbilled examinations and take measures to reduce or eliminate the types of coding errors that resulted in the problem.

  13. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines.

    PubMed

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-08-27

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization.

  14. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines

    PubMed Central

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-01-01

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization. PMID:26343660

  15. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines.

    PubMed

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-01-01

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization. PMID:26343660

  16. Aptamer-conjugated bio-bar-code Au-Fe3O4 nanoparticles as amplification station for electrochemiluminescence detection of tumor cells.

    PubMed

    Chen, Min; Bi, Sai; Jia, Xiaoqiang; He, Peng

    2014-07-21

    An electrochemiluminescence (ECL) assay has been developed for highly sensitive and selective detection of tumor cells based on cell-SELEX aptamer-target cell interactions through a cascaded amplification process by using bio-bar-code Au-Fe3O4 as amplification station. Firstly, bio-bar-code toehold-aptamer/DNA primer/Au-Fe3O4 (TA/DP/Au-Fe3O4) nanoconjugates are fabricated with a ratio of 1:10 to efficiently avoid cross-linking reaction and recognize target cells, which are immobilized on the substrate by hybridizing aptamer to capture probe with 18-mer. Through strand displacement reaction (SDR), the TA/DP/Au-Fe3O4 composites further act as the amplification station to initiate rolling circle amplification (RCA). As a result, on the surface of TA/DP/Au-Fe3O4, a large number of Ru(bpy)2(dcbpy)NHS-labeled probes hybridize to RCA products, which are easily trapped by magnetic electrode to perform the magnetic particle-based ECL platform. Under isothermal conditions, this powerful amplification strategy permits detection of Ramos cells as low as 16 cells with an excellent selectivity. Moreover, analysis of Ramos cells in complex samples and whole blood samples further show the great potential of this ultrasensitive approach in clinical application involving cancer cells-related biological processes.

  17. We Won't Get Fooled Again: On the Absence of Angry Responses to Plagiarism in Composition Studies

    ERIC Educational Resources Information Center

    Robillard, Amy E.

    2007-01-01

    This is an article about the complex relationship between anger and plagiarism in composition studies. Here, the author brings into dialogue two strands of inquiry that have shaped recent disciplinary conversations in composition studies but that have yet to publicly influence each other. Because emotions and authorship have both been perceived…

  18. A Comparison of the Act and Frequency of Plagiarism between Technical and Non-Technical Programme Undergraduates

    ERIC Educational Resources Information Center

    BavaHarji, Madhubala; Chetty, Thiba Naraina; Ismail, Zalina Bt; Letchumanan, Krishnaveni

    2016-01-01

    Concerned with intellectual theft, we decided to examine intellectual theft among undergraduates at a private higher education institution. The aim of this study was to compare the act and frequency of plagiarism, particularly between programmes, gender, year of study and academic performance. This study adopted the quantitative approach, using a…

  19. PCR assay based on DNA coding for 16S rRNA for detection and identification of mycobacteria in clinical samples.

    PubMed Central

    Kox, L F; van Leeuwen, J; Knijper, S; Jansen, H M; Kolk, A H

    1995-01-01

    A PCR and a reverse cross blot hybridization assay were developed for the detection and identification of mycobacteria in clinical samples. The PCR amplifies a part of the DNA coding for 16S rRNA with a set of primers that is specific for the genus Mycobacterium and that flanks species-specific sequences within the genes coding for 16S rRNA. The PCR product is analyzed in a reverse cross blot hybridization assay with probes specific for M. tuberculosis complex (pTub1), M. avium (pAvi3), M. intracellulare (pInt5 and pInt7), M. kansasii complex-M. scrofulaceum complex (pKan1), M. xenopi (pXen1), M. fortuitum (pFor1), M. smegmatis (pSme1), and Mycobacterium spp. (pMyc5a). The PCR assay can detect 10 fg of DNA, the equivalent of two mycobacteria. The specificities of the probes were tested with 108 mycobacterial strains (33 species) and 31 nonmycobacterial strains (of 17 genera). The probes pAvi3, pInt5, pInt7, pKan1, pXen1, and pMyc5a were specific. With probes pTub1, pFor1, and pSme1, slight cross hybridization occurred. However, the mycobacterial strains from which the cross-hybridizing PCR products were derived belonged to nonpathogenic or nonopportunistic species which do not occur in clinical samples. The test was used on 31 different clinical specimens obtained from patients suspected of having mycobacterial disease, including a patient with a double mycobacterial infection. The samples included sputum, bronchoalveolar lavage, tissue biopsy samples, cerebrospinal fluid, pus, peritoneal fluid, pleural fluid, and blood. The results of the PCR assay agreed with those of conventional identification methods or with clinical data, showing that the test can be used for the direct and rapid detection and identification of mycobacteria in clinical samples. PMID:8586707

  20. [The detection of occurrence rate of genes coding capability to form pili binding in auto-strains of Escherichia coli].

    PubMed

    Ivanova, E I; Popkova, S M; Dzhioev, Iu P; Rakova, E B; Dolgikh, V V; Savel'kaeva, M V; Nemchenko, U M; Bukharova, E V; Serdiuk, L V

    2015-01-01

    E. coli is a commensal of intestine of the vertebrata. The exchange of genetic material of different types of bacteria between themselves and with other representatives of family of Enterobacteriaceae in intestinal ecosystem results in development of types of normal colibacillus with genetic characteristics of pathogenicity that can serve as a theoretical substantiation to attribute such strains to pathobionts. The entero-pathogenic colibacillus continues be an important cause of diarrhea in children in developing countries. The gene responsible for formation of pili binding is a necessary condition for virulence of entero-pathogenic colibacillus. The polymerase chain reaction was applied to examine 316 strains of different types of E. coli (normal, with weak enzyme activity and hemolytic activity) isolated from healthy children and children with functional disorders of gastro-intestinal tract for presence of genes coding capability to form pill binding. The presence of this gene in different biochemical types of E. coli permits to establish the fact of formation of reservoir of pathogenicity in indigent microbiota of intestinal biocenosis. PMID:25874306

  1. [The detection of occurrence rate of genes coding capability to form pili binding in auto-strains of Escherichia coli].

    PubMed

    Ivanova, E I; Popkova, S M; Dzhioev, Iu P; Rakova, E B; Dolgikh, V V; Savel'kaeva, M V; Nemchenko, U M; Bukharova, E V; Serdiuk, L V

    2015-01-01

    E. coli is a commensal of intestine of the vertebrata. The exchange of genetic material of different types of bacteria between themselves and with other representatives of family of Enterobacteriaceae in intestinal ecosystem results in development of types of normal colibacillus with genetic characteristics of pathogenicity that can serve as a theoretical substantiation to attribute such strains to pathobionts. The entero-pathogenic colibacillus continues be an important cause of diarrhea in children in developing countries. The gene responsible for formation of pili binding is a necessary condition for virulence of entero-pathogenic colibacillus. The polymerase chain reaction was applied to examine 316 strains of different types of E. coli (normal, with weak enzyme activity and hemolytic activity) isolated from healthy children and children with functional disorders of gastro-intestinal tract for presence of genes coding capability to form pill binding. The presence of this gene in different biochemical types of E. coli permits to establish the fact of formation of reservoir of pathogenicity in indigent microbiota of intestinal biocenosis.

  2. High Hydrogen Concentrations Detected In The Underground Vaults For RH-TRU Waste At INEEL Compared With Calculated Values Using The INEEL-Developed Computer Code

    SciTech Connect

    Rajiv Bhatt; Soli Khericha

    2005-02-01

    About 700 remote-handled transuranic (RH-TRU) waste drums are stored in about 144 underground vaults at the Intermediate-Level Transuranic Storage Facility at the Idaho National Environmental and Engineering Laboratory’s (INEEL’s) Radioactive Waste Management Complex (RWMC). These drums were shipped to the INEEL from 1976 through 1996. During recent monitoring, concentrations of hydrogen were found to be in excess of lower explosive limits. The hydrogen concentration in one vault was detected to be as high as 18% (by volume). This condition required evaluation of the safety basis for the facility. The INEEL has developed a computer program to estimate the hydrogen gas generation as a function of time and diffusion through a series of layers (volumes), with a maximum five layers plus a sink/environment. The program solves the first-order diffusion equations as a function of time. The current version of the code is more flexible in terms of user input. The program allows the user to estimate hydrogen concentrations in the different layers of a configuration and then change the configuration after a given time; e.g.; installation of a filter on an unvented drum or placed in a vault or in a shipping cask. The code has been used to predict vault concentrations and to identify potential problems during retrieval and aboveground storage. The code has generally predicted higher hydrogen concentrations than the measured values, particularly for the drums older than 20 year, which could be due to uncertainty and conservative assumptions in drum age, heat generation rate, hydrogen generation rate, Geff, and diffusion rates through the layers.

  3. Highly sensitive and selective microRNA detection based on DNA-bio-bar-code and enzyme-assisted strand cycle exponential signal amplification.

    PubMed

    Dong, Haifeng; Meng, Xiangdan; Dai, Wenhao; Cao, Yu; Lu, Huiting; Zhou, Shufeng; Zhang, Xueji

    2015-04-21

    Herein, a highly sensitive and selective microRNA (miRNA) detection strategy using DNA-bio-bar-code amplification (BCA) and Nb·BbvCI nicking enzyme-assisted strand cycle for exponential signal amplification was designed. The DNA-BCA system contains a locked nucleic acid (LNA) modified DNA probe for improving hybridization efficiency, while a signal reported molecular beacon (MB) with an endonuclease recognition site was designed for strand cycle amplification. In the presence of target miRNA, the oligonucleotides functionalized magnetic nanoprobe (MNP-DNA) and gold nanoprobe (AuNP-DNA) with numerous reported probes (RP) can hybridize with target miRNA, respectively, to form a sandwich structure. After sandwich structures were separated from the solution by the magnetic field, the RP were released under high temperature to recognize the MB and cleaved the hairpin DNA to induce the dissociation of RP. The dissociated RP then triggered the next strand cycle to produce exponential fluorescent signal amplification for miRNA detection. Under optimized conditions, the exponential signal amplification system shows a good linear range of 6 orders of magnitude (from 0.3 pM to 3 aM) with limit of detection (LOD) down to 52.5 zM, while the sandwich structure renders the system with high selectivity. Meanwhile, the feasibility of the proposed strategy for cell miRNA detection was confirmed by analyzing miRNA-21 in HeLa lysates. Given the high-performance for miRNA analysis, the strategy has a promising application in biological detection and in clinical diagnosis.

  4. An optimum PN code search technique for a given apriori signal location density. [PseudoNoise in radar detection

    NASA Technical Reports Server (NTRS)

    Holmes, J. K.; Woo, K. T.

    1978-01-01

    A method is presented for optimizing (minimizing) the acquisition time for a PN-type spread spectrum system when the a priori probability density function is not uniform. For an assumed a priori Gaussian density function, calculations show that the acquisition time, when the 0.5 probability acquisition time is used as a measure of acquisition time, is reduced by 40% for a cell detection probability of 0.25 and when three sweeps are used. For the same parameters and with four sweeps the acquisition time is reduced by 41%. When the acquisition time probability is set to 0.9 instead of 0.5, the reduction is 25% of the uniform sweep time.

  5. Rapid, high-throughput detection of rifampin resistance and heteroresistance in Mycobacterium tuberculosis by use of sloppy molecular beacon melting temperature coding.

    PubMed

    Chakravorty, Soumitesh; Kothari, Harsheel; Aladegbami, Bola; Cho, Eun Jin; Lee, Jong Seok; Roh, Sandy S; Kim, Hyunchul; Kwak, Hyungkyung; Lee, Eun Gae; Hwang, Soo Hee; Banada, Padmapriya P; Safi, Hassan; Via, Laura E; Cho, Sang-Nae; Barry, Clifton E; Alland, David

    2012-07-01

    Rifampin resistance in Mycobacterium tuberculosis is largely determined by mutations in an 80-bp rifampin resistance determining region (RRDR) of the rpoB gene. We developed a rapid single-well PCR assay to identify RRDR mutations. The assay uses sloppy molecular beacons to probe an asymmetric PCR of the M. tuberculosis RRDR by melting temperature (T(m)) analysis. A three-point T(m) code is generated which distinguishes wild-type from mutant RRDR DNA sequences in approximately 2 h. The assay was validated on synthetic oligonucleotide targets containing the 44 most common RRDR mutations. It was then tested on a panel of DNA extracted from 589 geographically diverse clinical M. tuberculosis cultures, including isolates with wild-type RRDR sequences and 25 different RRDR mutations. The assay detected 236/236 RRDR mutant sequences as mutant (sensitivity, 100%; 95% confidence interval [CI], 98 to 100%) and 353/353 RRDR wild-type sequences as wild type (specificity, 100%; 95% CI, 98.7 to 100%). The assay identified 222/225 rifampin-resistant isolates as rifampin resistant (sensitivity, 98.7%; 95% CI, 95.8 to 99.6%) and 335/336 rifampin-susceptible isolates as rifampin susceptible (specificity, 99.7%; 95% CI, 95.8 to 99.6%). All mutations were either individually identified or clustered into small mutation groups using the triple T(m) code. The assay accurately identified mixed (heteroresistant) samples and was shown analytically to detect RRDR mutations when present in at least 40% of the total M. tuberculosis DNA. This was at least as accurate as Sanger DNA sequencing. The assay was easy to use and well suited for high-throughput applications. This new sloppy molecular beacon assay should greatly simplify rifampin resistance testing in clinical laboratories.

  6. Adding blood to agitated saline significantly improves detection of right-to-left shunt by contrast-transcranial color-coded duplex sonography.

    PubMed

    Gentile, Mauro; De Vito, Alessandro; Azzini, Cristiano; Tamborino, Carmine; Casetta, Ilaria

    2014-11-01

    Contrast-transcranial Doppler and contrast-transcranial color-coded duplex sonography (c-TCCD) have been reported to have high sensitivity in detecting patent foramen ovale as compared with transesophageal echocardiography. An international consensus meeting (Jauss and Zanette 2000) recommended that the contrast agent for right-to left-shunt (RLS) detection using contrast-transcranial Doppler be prepared by mixing 9 mL of isotonic saline solution and 1 mL of air. The aim of our study was to determine whether adding blood to the contrast agent results in improved detection of RLS. We enrolled all consecutive patients admitted to our neurosonology laboratory for RLS diagnosis. For each patient, we performed c-TCCD both at rest and during the Valsalva maneuver using two different contrast agents: ANSs (1 mL of air mixed with 9 mL of normal saline) and ANSHBs (1 mL of air mixed with 8 mL of normal saline and 1 mL of the patient's blood). To classify RLS, we used a four-level visual categorization: (i) no occurrence of micro-embolic signals; (ii) grade I, 1-10 signals; (iii) grade II, >10 signals but no curtain; grade III, curtain pattern. We included 80 patients, 33 men and 47 women. RLS was detected in 18.8% at rest and in 35% during the Valsalva maneuver using ANSs, and in 31.3% and in 46.3% using ANSHBs, respectively (p < 0.0001). There was a statistically significant increase in the number of micro-embolic signals with the use of ANSHBs. The use of blood mixed with saline solution and air as a c-TCCD contrast agent produced an increase in positive tests and a higher grade of RLS compared with normal saline and air alone, either with or without the Valsalva maneuver.

  7. Uplink Coding

    NASA Technical Reports Server (NTRS)

    Pollara, Fabrizio; Hamkins, Jon; Dolinar, Sam; Andrews, Ken; Divsalar, Dariush

    2006-01-01

    This viewgraph presentation reviews uplink coding. The purpose and goals of the briefing are (1) Show a plan for using uplink coding and describe benefits (2) Define possible solutions and their applicability to different types of uplink, including emergency uplink (3) Concur with our conclusions so we can embark on a plan to use proposed uplink system (4) Identify the need for the development of appropriate technology and infusion in the DSN (5) Gain advocacy to implement uplink coding in flight projects Action Item EMB04-1-14 -- Show a plan for using uplink coding, including showing where it is useful or not (include discussion of emergency uplink coding).

  8. Sharing code.

    PubMed

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  9. Detection of a long non-coding RNA (CCAT1) in living cells and human adenocarcinoma of colon tissues using FIT-PNA molecular beacons.

    PubMed

    Kam, Yossi; Rubinstein, Abraham; Naik, Shankar; Djavsarov, Irena; Halle, David; Ariel, Ilana; Gure, Ali O; Stojadinovic, Alexander; Pan, HongGuang; Tsivin, Victoria; Nissan, Aviram; Yavin, Eylon

    2014-09-28

    Although the function and mechanism of action of long non-coding RNAs (lncRNA) is still not completely known, studies have shown their potential role in the control of gene expression and regulation, in cellular proliferation and invasiveness at the transcriptional level via multiple mechanisms. Recently, colon cancer associated transcript 1 (CCAT1) lncRNA was found to be expressed in colorectal cancer (CRC) tumors but not in normal tissue. This study aimed to study the ability of a CCAT1-specific peptide nucleic acid (PNA) based molecular beacons (TO-PNA-MB) to serve as a diagnostic probe for in vitro, ex vivo, and in situ (human colon biopsies) detection of CRC. The data showed enhanced fluorescence upon in vitro hybridization to RNA extracted from CCAT1 expressing cells (HT-29, SW-480) compared to control cells (SK-Mel-2). Uptake of TO-PNA-MBs into cells was achieved by covalently attaching cell penetrating peptides (CPPs) to the TO-PNA-MB probes. In situ hybridization of selected TO-PNA-MB in human CRC specimens was shown to detect CCAT1 expression in all (4/4) subjects with pre-cancerous adenomas, and in all (8/8) patients with invasive adenocarcinoma (penetrating the bowel wall) tumors. The results showed that CCAT1 TO-PNA-MB is a powerful diagnostic tool for the specific identification of CRC, suggesting that with the aid of an appropriate pharmaceutical vehicle, real time in vivo imaging is feasible. TO-PNA-MB may enable identifying occult metastatic disease during surgery, or differentiating in real time in vivo imaging, between benign and malignant lesions. PMID:23416875

  10. A Dual-Sided Coded-Aperture Radiation Detection System , Nuclear Instruments & Methods in Physics Research Section A-Accelerators Spectrometers Detectors and Associated Equipment

    SciTech Connect

    Ziock, Klaus-Peter; Fabris, Lorenzo

    2010-01-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5 x 5 x 50 cm{sup 3} cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  11. Detection of a long non-coding RNA (CCAT1) in living cells and human adenocarcinoma of colon tissues using FIT-PNA molecular beacons.

    PubMed

    Kam, Yossi; Rubinstein, Abraham; Naik, Shankar; Djavsarov, Irena; Halle, David; Ariel, Ilana; Gure, Ali O; Stojadinovic, Alexander; Pan, HongGuang; Tsivin, Victoria; Nissan, Aviram; Yavin, Eylon

    2014-09-28

    Although the function and mechanism of action of long non-coding RNAs (lncRNA) is still not completely known, studies have shown their potential role in the control of gene expression and regulation, in cellular proliferation and invasiveness at the transcriptional level via multiple mechanisms. Recently, colon cancer associated transcript 1 (CCAT1) lncRNA was found to be expressed in colorectal cancer (CRC) tumors but not in normal tissue. This study aimed to study the ability of a CCAT1-specific peptide nucleic acid (PNA) based molecular beacons (TO-PNA-MB) to serve as a diagnostic probe for in vitro, ex vivo, and in situ (human colon biopsies) detection of CRC. The data showed enhanced fluorescence upon in vitro hybridization to RNA extracted from CCAT1 expressing cells (HT-29, SW-480) compared to control cells (SK-Mel-2). Uptake of TO-PNA-MBs into cells was achieved by covalently attaching cell penetrating peptides (CPPs) to the TO-PNA-MB probes. In situ hybridization of selected TO-PNA-MB in human CRC specimens was shown to detect CCAT1 expression in all (4/4) subjects with pre-cancerous adenomas, and in all (8/8) patients with invasive adenocarcinoma (penetrating the bowel wall) tumors. The results showed that CCAT1 TO-PNA-MB is a powerful diagnostic tool for the specific identification of CRC, suggesting that with the aid of an appropriate pharmaceutical vehicle, real time in vivo imaging is feasible. TO-PNA-MB may enable identifying occult metastatic disease during surgery, or differentiating in real time in vivo imaging, between benign and malignant lesions.

  12. Genome-Wide Detection of Predicted Non-coding RNAs Related to the Adhesion Process in Vibrio alginolyticus Using High-Throughput Sequencing

    PubMed Central

    Huang, Lixing; Hu, Jiao; Su, Yongquan; Qin, Yingxue; Kong, Wendi; Zhao, Lingmin; Ma, Ying; Xu, Xiaojin; Lin, Mao; Zheng, Jiang; Yan, Qingpi

    2016-01-01

    The ability of bacteria to adhere to fish mucus can be affected by environmental conditions and is considered to be a key virulence factor of Vibrio alginolyticus. However, the molecular mechanism underlying this ability remains unclear. Our previous study showed that stress conditions such as exposure to Cu, Pb, Hg, and low pH are capable of reducing the adhesion ability of V. alginolyticus. Non-coding RNAs (ncRNAs) play a crucial role in the intricate regulation of bacterial gene expression, thereby affecting bacterial pathogenicity. Thus, we hypothesized that ncRNAs play a key role in the V. alginolyticus adhesion process. To validate this, we combined high-throughput sequencing with computational techniques to detect ncRNA dynamics in samples after stress treatments. The expression of randomly selected novel ncRNAs was confirmed by QPCR. Among the significantly altered ncRNAs, 30 were up-regulated and 2 down-regulated by all stress treatments. The QPCR results reinforced the reliability of the sequencing data. Target prediction and KEGG pathway analysis indicated that these ncRNAs are closely related to pathways associated with in vitro adhesion, and our results indicated that chemical stress-induced reductions in the adhesion ability of V. alginolyticus might be due to the perturbation of ncRNA expression. Our findings provide important information for further functional characterization of ncRNAs during the adhesion process of V. alginolyticus. PMID:27199948

  13. Detection of genetic diversity and selection at the coding region of the melanocortin receptor 1 (MC1R) gene in Tibetan pigs and Landrace pigs.

    PubMed

    Liu, Rui; Jin, Long; Long, Keren; Chai, Jie; Ma, Jideng; Tang, Qianzi; Tian, Shilin; Hu, Yaodong; Lin, Ling; Wang, Xun; Jiang, Anan; Li, Xuewei; Li, Mingzhou

    2016-01-10

    Domestication and subsequent selective pressures have produced a large variety of pig coat colors in different regions and breeds. The melanocortin 1 receptor (MC1R) gene plays a crucial role in determining coat color of mammals. Here, we investigated genetic diversity and selection at the coding region of the porcine melanocortin receptor 1 (MC1R) in Tibetan pigs and Landrace pigs. By contrast, genetic variability was much lower in Landrace pigs than in Tibetan pigs. Meanwhile, haplotype analysis showed that Tibetan pigs possessed shared haplotypes, suggesting a possibility of recent introgression event by way of crossbreeding with neighboring domestic pigs or shared ancestral polymorphism. Additionally, we detected positive selection at the MC1R in both Tibetan pigs and Landrace pigs through the dN/dS analysis. These findings suggested that novel phenotypic change (dark coat color) caused by novel mutations may help Tibetan pigs against intensive solar ultraviolet (UV) radiation and camouflage in wild environment, whereas white coat color in Landrace were intentionally selected by human after domestication. Furthermore, both the phylogenetic analysis and the network analysis provided clues that MC1R in Asian and European wild boars may have initially experienced different selective pressures, and MC1R alleles diversified in modern domesticated pigs. PMID:26431999

  14. Fine-Mapping the HOXB Region Detects Common Variants Tagging a Rare Coding Allele: Evidence for Synthetic Association in Prostate Cancer

    PubMed Central

    Saunders, Edward J.; Dadaev, Tokhir; Leongamornlert, Daniel A.; Jugurnauth-Little, Sarah; Tymrakiewicz, Malgorzata; Wiklund, Fredrik; Al Olama, Ali Amin; Benlloch, Sara; Xu, Jianfeng; Mikropoulos, Christos; Goh, Chee; Govindasami, Koveela; Guy, Michelle; Wilkinson, Rosemary A.; Sawyer, Emma J.; Morgan, Angela; Easton, Douglas F.; Muir, Ken; Eeles, Rosalind A.; Kote-Jarai, Zsofia

    2014-01-01

    The HOXB13 gene has been implicated in prostate cancer (PrCa) susceptibility. We performed a high resolution fine-mapping analysis to comprehensively evaluate the association between common genetic variation across the HOXB genetic locus at 17q21 and PrCa risk. This involved genotyping 700 SNPs using a custom Illumina iSelect array (iCOGS) followed by imputation of 3195 SNPs in 20,440 PrCa cases and 21,469 controls in The PRACTICAL consortium. We identified a cluster of highly correlated common variants situated within or closely upstream of HOXB13 that were significantly associated with PrCa risk, described by rs117576373 (OR 1.30, P = 2.62×10−14). Additional genotyping, conditional regression and haplotype analyses indicated that the newly identified common variants tag a rare, partially correlated coding variant in the HOXB13 gene (G84E, rs138213197), which has been identified recently as a moderate penetrance PrCa susceptibility allele. The potential for GWAS associations detected through common SNPs to be driven by rare causal variants with higher relative risks has long been proposed; however, to our knowledge this is the first experimental evidence for this phenomenon of synthetic association contributing to cancer susceptibility. PMID:24550738

  15. Fine-mapping the HOXB region detects common variants tagging a rare coding allele: evidence for synthetic association in prostate cancer.

    PubMed

    Saunders, Edward J; Dadaev, Tokhir; Leongamornlert, Daniel A; Jugurnauth-Little, Sarah; Tymrakiewicz, Malgorzata; Wiklund, Fredrik; Al Olama, Ali Amin; Benlloch, Sara; Neal, David E; Hamdy, Freddie C; Donovan, Jenny L; Giles, Graham G; Severi, Gianluca; Gronberg, Henrik; Aly, Markus; Haiman, Christopher A; Schumacher, Fredrick; Henderson, Brian E; Lindstrom, Sara; Kraft, Peter; Hunter, David J; Gapstur, Susan; Chanock, Stephen; Berndt, Sonja I; Albanes, Demetrius; Andriole, Gerald; Schleutker, Johanna; Weischer, Maren; Nordestgaard, Børge G; Canzian, Federico; Campa, Daniele; Riboli, Elio; Key, Tim J; Travis, Ruth C; Ingles, Sue A; John, Esther M; Hayes, Richard B; Pharoah, Paul; Khaw, Kay-Tee; Stanford, Janet L; Ostrander, Elaine A; Signorello, Lisa B; Thibodeau, Stephen N; Schaid, Daniel; Maier, Christiane; Kibel, Adam S; Cybulski, Cezary; Cannon-Albright, Lisa; Brenner, Hermann; Park, Jong Y; Kaneva, Radka; Batra, Jyotsna; Clements, Judith A; Teixeira, Manuel R; Xu, Jianfeng; Mikropoulos, Christos; Goh, Chee; Govindasami, Koveela; Guy, Michelle; Wilkinson, Rosemary A; Sawyer, Emma J; Morgan, Angela; Easton, Douglas F; Muir, Ken; Eeles, Rosalind A; Kote-Jarai, Zsofia

    2014-02-01

    The HOXB13 gene has been implicated in prostate cancer (PrCa) susceptibility. We performed a high resolution fine-mapping analysis to comprehensively evaluate the association between common genetic variation across the HOXB genetic locus at 17q21 and PrCa risk. This involved genotyping 700 SNPs using a custom Illumina iSelect array (iCOGS) followed by imputation of 3195 SNPs in 20,440 PrCa cases and 21,469 controls in The PRACTICAL consortium. We identified a cluster of highly correlated common variants situated within or closely upstream of HOXB13 that were significantly associated with PrCa risk, described by rs117576373 (OR 1.30, P = 2.62×10(-14)). Additional genotyping, conditional regression and haplotype analyses indicated that the newly identified common variants tag a rare, partially correlated coding variant in the HOXB13 gene (G84E, rs138213197), which has been identified recently as a moderate penetrance PrCa susceptibility allele. The potential for GWAS associations detected through common SNPs to be driven by rare causal variants with higher relative risks has long been proposed; however, to our knowledge this is the first experimental evidence for this phenomenon of synthetic association contributing to cancer susceptibility. PMID:24550738

  16. Learning Vector Quantization Neural Networks Improve Accuracy of Transcranial Color-coded Duplex Sonography in Detection of Middle Cerebral Artery Spasm—Preliminary Report

    PubMed Central

    Swiercz, Miroslaw; Kochanowicz, Jan; Weigele, John; Hurst, Robert; Liebeskind, David S.; Mariak, Zenon; Melhem, Elias R.

    2009-01-01

    To determine the performance of an artificial neural network in transcranial color-coded duplex sonography (TCCS) diagnosis of middle cerebral artery (MCA) spasm. TCCS was prospectively acquired within 2 h prior to routine cerebral angiography in 100 consecutive patients (54M:46F, median age 50 years). Angiographic MCA vasospasm was classified as mild (<25% of vessel caliber reduction), moderate (25–50%), or severe (>50%). A Learning Vector Quantization neural network classified MCA spasm based on TCCS peak-systolic, mean, and end-diastolic velocity data. During a four-class discrimination task, accurate classification by the network ranged from 64.9% to 72.3%, depending on the number of neurons in the Kohonen layer. Accurate classification of vasospasm ranged from 79.6% to 87.6%, with an accuracy of 84.7% to 92.1% for the detection of moderate-to-severe vasospasm. An artificial neural network may increase the accuracy of TCCS in diagnosis of MCA spasm. PMID:18704768

  17. Text-based plagiarism in scientific writing: what Chinese supervisors think about copying and how to reduce it in students' writing.

    PubMed

    Li, Yongyan

    2013-06-01

    Text-based plagiarism, or textual copying, typically in the form of replicating or patchwriting sentences in a row from sources, seems to be an issue of growing concern among scientific journal editors. Editors have emphasized that senior authors (typically supervisors of science students) should take the responsibility for educating novices against text-based plagiarism. To address a research gap in the literature as to how scientist supervisors perceive the issue of textual copying and what they do in educating their students, this paper reports an interview study with 14 supervisors at a research-oriented Chinese university. The study throws light on the potentiality of senior authors mentoring novices in English as an Additional Language (EAL) contexts and has implications for the efforts that can be made in the wider scientific community to support scientists in writing against text-based plagiarism.

  18. Speech coding

    SciTech Connect

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  19. Selective encryption for H.264/AVC video coding

    NASA Astrophysics Data System (ADS)

    Shi, Tuo; King, Brian; Salama, Paul

    2006-02-01

    Due to the ease with which digital data can be manipulated and due to the ongoing advancements that have brought us closer to pervasive computing, the secure delivery of video and images has become a challenging problem. Despite the advantages and opportunities that digital video provide, illegal copying and distribution as well as plagiarism of digital audio, images, and video is still ongoing. In this paper we describe two techniques for securing H.264 coded video streams. The first technique, SEH264Algorithm1, groups the data into the following blocks of data: (1) a block that contains the sequence parameter set and the picture parameter set, (2) a block containing a compressed intra coded frame, (3) a block containing the slice header of a P slice, all the headers of the macroblock within the same P slice, and all the luma and chroma DC coefficients belonging to the all the macroblocks within the same slice, (4) a block containing all the ac coefficients, and (5) a block containing all the motion vectors. The first three are encrypted whereas the last two are not. The second method, SEH264Algorithm2, relies on the use of multiple slices per coded frame. The algorithm searches the compressed video sequence for start codes (0x000001) and then encrypts the next N bits of data.

  20. MCNP code

    SciTech Connect

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids.

  1. QR Codes

    ERIC Educational Resources Information Center

    Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

    2013-01-01

    This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

  2. Circular codes, symmetries and transformations.

    PubMed

    Fimmel, Elena; Giannerini, Simone; Gonzalez, Diego Luis; Strüngmann, Lutz

    2015-06-01

    Circular codes, putative remnants of primeval comma-free codes, have gained considerable attention in the last years. In fact they represent a second kind of genetic code potentially involved in detecting and maintaining the normal reading frame in protein coding sequences. The discovering of an universal code across species suggested many theoretical and experimental questions. However, there is a key aspect that relates circular codes to symmetries and transformations that remains to a large extent unexplored. In this article we aim at addressing the issue by studying the symmetries and transformations that connect different circular codes. The main result is that the class of 216 C3 maximal self-complementary codes can be partitioned into 27 equivalence classes defined by a particular set of transformations. We show that such transformations can be put in a group theoretic framework with an intuitive geometric interpretation. More general mathematical results about symmetry transformations which are valid for any kind of circular codes are also presented. Our results pave the way to the study of the biological consequences of the mathematical structure behind circular codes and contribute to shed light on the evolutionary steps that led to the observed symmetries of present codes. PMID:25008961

  3. Code query by example

    NASA Astrophysics Data System (ADS)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  4. Keeping It Real. Technology Has Blurred the Distinction between Plagiarism and Research, but Some Teachers Are Determinded to Redraw the Line

    ERIC Educational Resources Information Center

    Waldsmith, Lynn

    2005-01-01

    In this article, the author reports how teachers at Phoenix's Mountain Pointe High School have developed an anti-plagiarism initiative for their English students. The teachers realized that they need to teach their students right from electronic wrong after two of their honor students were caught using a Web site containing answers to an English…

  5. Transversal Clifford gates on folded surface codes

    NASA Astrophysics Data System (ADS)

    Moussa, Jonathan E.

    2016-10-01

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. The specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  6. A dip-stick type biosensor using bioluminescent bacteria encapsulated in color-coded alginate microbeads for detection of water toxicity.

    PubMed

    Jung, Insup; Seo, Ho Bin; Lee, Ji-eun; Kim, Byoung Chan; Gu, Man Bock

    2014-09-21

    The use of genetically engineered bioluminescent bacteria, in which bioluminescence is induced by different modes of toxic action, represents an alternative to acute toxicity tests using living aquatic organisms (plants, vertebrates, or invertebrates) in an aqueous environment. A number of these bacterial strains have been developed, but there have been no attempts to develop a hand-held type of biosensor for monitoring or identification of toxicity. We report a facile dip-stick type biosensor using genetically engineered bioluminescent bacteria as a new platform for classification and identification of toxicity in water environments. This dip-stick type biosensor is composed of eight different optically color-coded functional alginate beads that each encapsulates a different bioluminescent bacterial strain and its corresponding fluorescent microbead. These color-coded microbeads exhibit easy identification of encapsulated microbeads, since each microbead has a different color code depending on the bioluminescent bacterial strain contained and improved cell-stability compared to liquid culture. This dip-stick type biosensor can discriminate different modes of toxic actions (i.e. DNA damage, oxidative damage, cell-membrane damage, or protein damage) of sample water tested by simply dipping the stick into the water samples. It was found that each color-coded microbead emitted distinct bioluminescence, and each dip-stick type biosensor showed different bioluminescence patterns within 2 hours, depending on the toxic chemicals contained in LB medium, tap water, or river water samples. This dip-stick type biosensor can, therefore, be widely and practically used in checking toxicity of water in the environment primarily in situ, possibly indicating the status of biodiversity. PMID:25057512

  7. A dip-stick type biosensor using bioluminescent bacteria encapsulated in color-coded alginate microbeads for detection of water toxicity.

    PubMed

    Jung, Insup; Seo, Ho Bin; Lee, Ji-eun; Kim, Byoung Chan; Gu, Man Bock

    2014-09-21

    The use of genetically engineered bioluminescent bacteria, in which bioluminescence is induced by different modes of toxic action, represents an alternative to acute toxicity tests using living aquatic organisms (plants, vertebrates, or invertebrates) in an aqueous environment. A number of these bacterial strains have been developed, but there have been no attempts to develop a hand-held type of biosensor for monitoring or identification of toxicity. We report a facile dip-stick type biosensor using genetically engineered bioluminescent bacteria as a new platform for classification and identification of toxicity in water environments. This dip-stick type biosensor is composed of eight different optically color-coded functional alginate beads that each encapsulates a different bioluminescent bacterial strain and its corresponding fluorescent microbead. These color-coded microbeads exhibit easy identification of encapsulated microbeads, since each microbead has a different color code depending on the bioluminescent bacterial strain contained and improved cell-stability compared to liquid culture. This dip-stick type biosensor can discriminate different modes of toxic actions (i.e. DNA damage, oxidative damage, cell-membrane damage, or protein damage) of sample water tested by simply dipping the stick into the water samples. It was found that each color-coded microbead emitted distinct bioluminescence, and each dip-stick type biosensor showed different bioluminescence patterns within 2 hours, depending on the toxic chemicals contained in LB medium, tap water, or river water samples. This dip-stick type biosensor can, therefore, be widely and practically used in checking toxicity of water in the environment primarily in situ, possibly indicating the status of biodiversity.

  8. Code Optimization Techniques

    SciTech Connect

    MAGEE,GLEN I.

    2000-08-03

    Computers transfer data in a number of different ways. Whether through a serial port, a parallel port, over a modem, over an ethernet cable, or internally from a hard disk to memory, some data will be lost. To compensate for that loss, numerous error detection and correction algorithms have been developed. One of the most common error correction codes is the Reed-Solomon code, which is a special subset of BCH (Bose-Chaudhuri-Hocquenghem) linear cyclic block codes. In the AURA project, an unmanned aircraft sends the data it collects back to earth so it can be analyzed during flight and possible flight modifications made. To counter possible data corruption during transmission, the data is encoded using a multi-block Reed-Solomon implementation with a possibly shortened final block. In order to maximize the amount of data transmitted, it was necessary to reduce the computation time of a Reed-Solomon encoding to three percent of the processor's time. To achieve such a reduction, many code optimization techniques were employed. This paper outlines the steps taken to reduce the processing time of a Reed-Solomon encoding and the insight into modern optimization techniques gained from the experience.

  9. Generalized optical code construction for enhanced and Modified Double Weight like codes without mapping for SAC-OCDMA systems

    NASA Astrophysics Data System (ADS)

    Kumawat, Soma; Ravi Kumar, M.

    2016-07-01

    Double Weight (DW) code family is one of the coding schemes proposed for Spectral Amplitude Coding-Optical Code Division Multiple Access (SAC-OCDMA) systems. Modified Double Weight (MDW) code for even weights and Enhanced Double Weight (EDW) code for odd weights are two algorithms extending the use of DW code for SAC-OCDMA systems. The above mentioned codes use mapping technique to provide codes for higher number of users. A new generalized algorithm to construct EDW and MDW like codes without mapping for any weight greater than 2 is proposed. A single code construction algorithm gives same length increment, Bit Error Rate (BER) calculation and other properties for all weights greater than 2. Algorithm first constructs a generalized basic matrix which is repeated in a different way to produce the codes for all users (different from mapping). The generalized code is analysed for BER using balanced detection and direct detection techniques.

  10. Comparative genomics approach to detecting split-coding regions in a low-coverage genome: lessons from the chimaera Callorhinchus milii (Holocephali, Chondrichthyes).

    PubMed

    Dessimoz, Christophe; Zoller, Stefan; Manousaki, Tereza; Qiu, Huan; Meyer, Axel; Kuraku, Shigehiro

    2011-09-01

    Recent development of deep sequencing technologies has facilitated de novo genome sequencing projects, now conducted even by individual laboratories. However, this will yield more and more genome sequences that are not well assembled, and will hinder thorough annotation when no closely related reference genome is available. One of the challenging issues is the identification of protein-coding sequences split into multiple unassembled genomic segments, which can confound orthology assignment and various laboratory experiments requiring the identification of individual genes. In this study, using the genome of a cartilaginous fish, Callorhinchus milii, as test case, we performed gene prediction using a model specifically trained for this genome. We implemented an algorithm, designated ESPRIT, to identify possible linkages between multiple protein-coding portions derived from a single genomic locus split into multiple unassembled genomic segments. We developed a validation framework based on an artificially fragmented human genome, improvements between early and recent mouse genome assemblies, comparison with experimentally validated sequences from GenBank, and phylogenetic analyses. Our strategy provided insights into practical solutions for efficient annotation of only partially sequenced (low-coverage) genomes. To our knowledge, our study is the first formulation of a method to link unassembled genomic segments based on proteomes of relatively distantly related species as references.

  11. Error coding simulations in C

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1994-01-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  12. Error coding simulations in C

    NASA Astrophysics Data System (ADS)

    Noble, Viveca K.

    1994-10-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  13. Video coding with dynamic background

    NASA Astrophysics Data System (ADS)

    Paul, Manoranjan; Lin, Weisi; Lau, Chiew Tong; Lee, Bu-Sung

    2013-12-01

    Motion estimation (ME) and motion compensation (MC) using variable block size, sub-pixel search, and multiple reference frames (MRFs) are the major reasons for improved coding performance of the H.264 video coding standard over other contemporary coding standards. The concept of MRFs is suitable for repetitive motion, uncovered background, non-integer pixel displacement, lighting change, etc. The requirement of index codes of the reference frames, computational time in ME & MC, and memory buffer for coded frames limits the number of reference frames used in practical applications. In typical video sequences, the previous frame is used as a reference frame with 68-92% of cases. In this article, we propose a new video coding method using a reference frame [i.e., the most common frame in scene (McFIS)] generated by dynamic background modeling. McFIS is more effective in terms of rate-distortion and computational time performance compared to the MRFs techniques. It has also inherent capability of scene change detection (SCD) for adaptive group of picture (GOP) size determination. As a result, we integrate SCD (for GOP determination) with reference frame generation. The experimental results show that the proposed coding scheme outperforms the H.264 video coding with five reference frames and the two relevant state-of-the-art algorithms by 0.5-2.0 dB with less computational time.

  14. Detection of long non-coding RNA in archival tissue: correlation with polycomb protein expression in primary and metastatic breast carcinoma.

    PubMed

    Chisholm, Karen M; Wan, Yue; Li, Rui; Montgomery, Kelli D; Chang, Howard Y; West, Robert B

    2012-01-01

    A major function of long non-coding RNAs (lncRNAs) is regulating gene expression through changes in chromatin state. Experimental evidence suggests that in cancer, they can influence Polycomb Repressive Complexes (PRC) to retarget to an occupancy pattern resembling that of the embryonic state. We have previously demonstrated that the expression level of lncRNA in the HOX locus, including HOTAIR, is a predictor of breast cancer metastasis. In this current project, RNA in situ hybridization of probes to three different lncRNAs (HOTAIR, ncHoxA1, and ncHoxD4), as well a immunohistochemical staining of EZH2, is undertaken in formalin-fixed paraffin-embedded breast cancer tissues in a high throughput tissue microarray format to correlate expression with clinicopathologic features. Though overall EZH2 and HOTAIR expression levels were highly correlated, the subset of cases with strong HOTAIR expression correlated with ER and PR positivity, while the subset of cases with strong EZH2 expression correlated with an increased proliferation rate, ER and PR negativity, HER2 underexpression, and triple negativity. Co-expression of HOTAIR and EZH2 trended with a worse outcome. In matched primary and metastatic cancers, both HOTAIR and EZH2 had increased expression in the metastatic carcinomas. This is the first study to show that RNA in situ hybridization of formalin fixed paraffin-embedded clinical material can be used to measure levels of long non-coding RNAs. This approach offers a method to make observations on lncRNAs that may influence the cancer epigenome in a tissue-based technique.

  15. Box codes of lengths 48 and 72

    NASA Technical Reports Server (NTRS)

    Solomon, G.; Jin, Y.

    1993-01-01

    A self-dual code length 48, dimension 24, with Hamming distance essentially equal to 12 is constructed here. There are only six code words of weight eight. All the other code words have weights that are multiples of four and have a minimum weight equal to 12. This code may be encoded systematically and arises from a strict binary representation of the (8,4;5) Reed-Solomon (RS) code over GF (64). The code may be considered as six interrelated (8,7;2) codes. The Mattson-Solomon representation of the cyclic decomposition of these codes and their parity sums are used to detect an odd number of errors in any of the six codes. These may then be used in a correction algorithm for hard or soft decision decoding. A (72,36;15) box code was constructed from a (63,35;8) cyclic code. The theoretical justification is presented herein. A second (72,36;15) code is constructed from an inner (63,27;16) Bose Chaudhuri Hocquenghem (BCH) code and expanded to length 72 using box code algorithms for extension. This code was simulated and verified to have a minimum distance of 15 with even weight words congruent to zero modulo four. The decoding for hard and soft decision is still more complex than the first code constructed above. Finally, an (8,4;5) RS code over GF (512) in the binary representation of the (72,36;15) box code gives rise to a (72,36;16*) code with nine words of weight eight, and all the rest have weights greater than or equal to 16.

  16. Box codes of lengths 48 and 72

    NASA Astrophysics Data System (ADS)

    Solomon, G.; Jin, Y.

    1993-11-01

    A self-dual code length 48, dimension 24, with Hamming distance essentially equal to 12 is constructed here. There are only six code words of weight eight. All the other code words have weights that are multiples of four and have a minimum weight equal to 12. This code may be encoded systematically and arises from a strict binary representation of the (8,4;5) Reed-Solomon (RS) code over GF (64). The code may be considered as six interrelated (8,7;2) codes. The Mattson-Solomon representation of the cyclic decomposition of these codes and their parity sums are used to detect an odd number of errors in any of the six codes. These may then be used in a correction algorithm for hard or soft decision decoding. A (72,36;15) box code was constructed from a (63,35;8) cyclic code. The theoretical justification is presented herein. A second (72,36;15) code is constructed from an inner (63,27;16) Bose Chaudhuri Hocquenghem (BCH) code and expanded to length 72 using box code algorithms for extension. This code was simulated and verified to have a minimum distance of 15 with even weight words congruent to zero modulo four. The decoding for hard and soft decision is still more complex than the first code constructed above. Finally, an (8,4;5) RS code over GF (512) in the binary representation of the (72,36;15) box code gives rise to a (72,36;16*) code with nine words of weight eight, and all the rest have weights greater than or equal to 16.

  17. NRC Job Code V6060: Extended in-situ and real time monitoring. Task 4: Detection and monitoring of leaks at nuclear power plants external to structures

    SciTech Connect

    Sheen, S. H.

    2012-08-01

    In support of Task 4 of the NRC study on compliance with 10 CFR part 20.1406, minimization of contamination, Argonne National Laboratory (ANL) conducted a one-year scoping study, in concert with a parallel study performed by NRC/NRR staff, on monitoring for leaks at nuclear power plants (NPPs) external to structures. The objective of this task-4 study is to identify and assess those sensors and monitoring techniques for early detection of abnormal radioactive releases from the engineered facility structures, systems and components (SSCs) to the surrounding underground environment in existing NPPs and planned new reactors. As such, methods of interest include: (1) detection of anomalous water content of soils surrounding SSCs, (2) radionuclides contained in the leaking water, and (3) secondary signals such as temperature. ANL work scope includes mainly to (1) identify, in concert with the nuclear industry, the sensors and techniques that have most promise to detect radionuclides and/or associated chemical releases from SSCs of existing NPPs and (2) review and provide comments on the results of the NRC/NRR staff scoping study to identify candidate technologies. This report constitutes the ANL deliverable of the task-4 study. It covers a survey of sensor technologies and leak detection methods currently applied to leak monitoring at NPPs. The survey also provides a technology evaluation that identifies their strength and deficiency based on their detection speed, sensitivity, range and reliability. Emerging advanced technologies that are potentially capable of locating releases, identifying the radionuclides, and estimating their concentrations and distributions are also included in the report along with suggestions of required further research and development.

  18. Bar coded retroreflective target

    SciTech Connect

    Vann, C.S.

    2000-01-25

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  19. Bar coded retroreflective target

    DOEpatents

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  20. Authentication codes that permit arbitration

    SciTech Connect

    Simmons, G.J.

    1987-01-01

    Objective of authentication is to detect attempted deceptions in a communications channel. Traditionally this has been restricted to providing the authorized receiver with a capability of detecting unauthentic messages. The known codes have all left open the possibility for either the transmitter to disavow a message that he actually sent to the receiver, i.e., an authentic message, or else for the receiver to falsely attribute a message of his own devising to the transmitter. Of course the party being deceived would know that he was the victim of a deception by the other, but would be unable to ''prove'' this to a third party. Ideally, authentication should provide a means to detect attempted deceptions by insiders (the transmitter or receiver) as well as outsiders (the opponent). It has been an open question of whether it was possible to devise authentication codes that would permit a third party, an arbiter, to decide (in probability) whether the transmitter or the receiver was cheating in the event of a dispute. We answer this question in that both permits the receiver to detect outsider deceptions, as well affirmative by first constructing an example of an authentication code as permitting a designated arbiter to detect insider deceptions and then by generalizing this construction to an infinite class of such codes.

  1. Homological stabilizer codes

    SciTech Connect

    Anderson, Jonas T.

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  2. Detection of the oomycete Pythium insidiosum by real-time PCR targeting the gene coding for exo-1,3-β-glucanase.

    PubMed

    Keeratijarut, Angsana; Lohnoo, Tassanee; Yingyong, Wanta; Rujirawat, Thidarat; Srichunrusami, Chutatip; Onpeaw, Pornpit; Chongtrakool, Piriyaporn; Brandhorst, T Tristan; Krajaejun, Theerapong

    2015-09-01

    Pythiosis is a life-threatening infectious disease caused by Pythium insidiosum. Early and accurate diagnosis is the key to prompt treatment and an improved prognosis for patients with pythiosis. An alternative to microbiological and immunological approaches for facilitating diagnosis of pythiosis is the PCR-based assay. Until recently, the ribosomal DNA (rDNA) region was the only target available for PCR-based detection of P. insidiosum. Failure to detect P. insidiosum by PCR amplification using the rDNA-specific primers has been reported. PinsEXO1, encoding an exo-1,3-β-glucanase, is an alternative, novel and efficient target for identification of P. insidiosum by conventional PCR. In this study, we aimed to develop a real-time (RT)-PCR approach targeting PinsEXO1 and compare its performance with conventional PCR for the detection of P. insidiosum. Both conventional and RT-PCR assays were positive for all 35 P. insidiosum strains tested, whilst all 58 control fungi were negative. The turnaround time for conventional PCR was 10 h, whilst that for RT-PCR was 7.5 h. The lowest amounts of genomic DNA template required for successful amplification by conventional and RT-PCR were 1 and 1 × 10(-4) ng, respectively. In conclusion, the RT-PCR assay retained 100% sensitivity and 100% specificity for detection of P. insidiosum. It showed a substantially improved analytical sensitivity and turnaround time that could improve diagnosis of pythiosis. The assay could also facilitate quantitative DNA analysis and epidemiological studies of P. insidiosum. PMID:26296566

  3. Complementary code and digital filtering for detection of weak VHF radar signals from the mesoscale. [SOUSY-VHF radar, Harz Mountains, Germany

    NASA Technical Reports Server (NTRS)

    Schmidt, G.; Ruster, R.; Czechowsky, P.

    1983-01-01

    The SOUSY-VHF-Radar operates at a frequency of 53.5 MHz in a valley in the Harz mountains, Germany, 90 km from Hanover. The radar controller, which is programmed by a 16-bit computer holds 1024 program steps in core and controls, via 8 channels, the whole radar system: in particular the master oscillator, the transmitter, the transmit-receive-switch, the receiver, the analog to digital converter, and the hardware adder. The high-sensitivity receiver has a dynamic range of 70 dB and a video bandwidth of 1 MHz. Phase coding schemes are applied, in particular for investigations at mesospheric heights, in order to carry out measurements with the maximum duty cycle and the maximum height resolution. The computer takes the data from the adder to store it in magnetic tape or disc. The radar controller is programmed by the computer using simple FORTRAN IV statements. After the program has been loaded and the computer has started the radar controller, it runs automatically, stopping at the program end. In case of errors or failures occurring during the radar operation, the radar controller is shut off caused either by a safety circuit or by a power failure circuit or by a parity check system.

  4. Transionospheric Propagation Code (TIPC)

    SciTech Connect

    Roussel-Dupre, R.; Kelley, T.A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

  5. Coding of Neuroinfectious Diseases.

    PubMed

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue. PMID:26633789

  6. Model Children's Code.

    ERIC Educational Resources Information Center

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  7. To Code or Not To Code?

    ERIC Educational Resources Information Center

    Parkinson, Brian; Sandhu, Parveen; Lacorte, Manel; Gourlay, Lesley

    1998-01-01

    This article considers arguments for and against the use of coding systems in classroom-based language research and touches on some relevant considerations from ethnographic and conversational analysis approaches. The four authors each explain and elaborate on their practical decision to code or not to code events or utterances at a specific point…

  8. An Assessment of the Detection of Highly Enriched Uranium and its Use in an Improvised Nuclear Device using the Monte Carlo Computer Code MCNP-5

    NASA Astrophysics Data System (ADS)

    Cochran, Thomas

    2007-04-01

    In 2002 and again in 2003, an investigative journalist unit at ABC News transported a 6.8 kilogram metallic slug of depleted uranium (DU) via shipping container from Istanbul, Turkey to Brooklyn, NY and from Jakarta, Indonesia to Long Beach, CA. Targeted inspection of these shipping containers by Department of Homeland Security (DHS) personnel, included the use of gamma-ray imaging, portal monitors and hand-held radiation detectors, did not uncover the hidden DU. Monte Carlo analysis of the gamma-ray intensity and spectrum of a DU slug and one consisting of highly-enriched uranium (HEU) showed that DU was a proper surrogate for testing the ability of DHS to detect the illicit transport of HEU. Our analysis using MCNP-5 illustrated the ease of fully shielding an HEU sample to avoid detection. The assembly of an Improvised Nuclear Device (IND) -- a crude atomic bomb -- from sub-critical pieces of HEU metal was then examined via Monte Carlo criticality calculations. Nuclear explosive yields of such an IND as a function of the speed of assembly of the sub-critical HEU components were derived. A comparison was made between the more rapid assembly of sub-critical pieces of HEU in the ``Little Boy'' (Hiroshima) weapon's gun barrel and gravity assembly (i.e., dropping one sub-critical piece of HEU on another from a specified height). Based on the difficulty of detection of HEU and the straightforward construction of an IND utilizing HEU, current U.S. government policy must be modified to more urgently prioritize elimination of and securing the global inventories of HEU.

  9. Bare Code Reader

    NASA Astrophysics Data System (ADS)

    Clair, Jean J.

    1980-05-01

    The Bare code system will be used, in every market and supermarket. The code, which is normalised in US and Europe (code EAN) gives informations on price, storage, nature and allows in real time the gestion of theshop.

  10. Fluorescent taggants with temporally coded signatures.

    PubMed

    Wang, Siyang; Vyas, Raul; Dwyer, Chris

    2016-07-11

    In this paper, resonance energy transfer (RET) networks between chromophores are used to implement fluorescent taggants with temporally coded signatures. Because the temporal signature of such a fluorescent taggant is a phase-type distribution defined by the geometry of its RET network, the taggant design is not constrained by resolvable dyes and has a significantly larger coding capacity than spectrally or lifetime coded fluorescent taggants. Meanwhile, the detection process becomes highly efficient when the signatures are coded in the time domain. The taggant identification method is based on the multinomial distribution of detected photons and Maximum Likelihood Estimation, which guarantees high accuracy even with only a few hundred photons and also applies to a mixture of taggants in multiplex detection. Therefore, these temporally coded fluorescent taggants have great potential for both in situ and Lidar applications. PMID:27410827

  11. Accumulate repeat accumulate codes

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.

  12. Discussion on LDPC Codes and Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  13. Manually operated coded switch

    DOEpatents

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  14. Parafermion stabilizer codes

    NASA Astrophysics Data System (ADS)

    Güngördü, Utkan; Nepal, Rabindra; Kovalev, Alexey A.

    2014-10-01

    We define and study parafermion stabilizer codes, which can be viewed as generalizations of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions. Parafermion stabilizer codes can protect against low-weight errors acting on a small subset of parafermion modes in analogy to qudit stabilizer codes. Examples of several smallest parafermion stabilizer codes are given. A locality-preserving embedding of qudit operators into parafermion operators is established that allows one to map known qudit stabilizer codes to parafermion codes. We also present a local 2D parafermion construction that combines topological protection of Kitaev's toric code with additional protection relying on parity conservation.

  15. Rapid detection of HCV genotyping 1a, 1b, 2a, 3a, 3b and 6a in a single reaction using two-melting temperature codes by a real-time PCR-based assay.

    PubMed

    Athar, Muhammad Ammar; Xu, Ye; Xie, Xiaoting; Xu, Zhenxing; Ahmad, Vakil; Hayder, Zulfiqar; Hussain, Syed Sajid; Liao, Yiqun; Li, Qingge

    2015-09-15

    The genotype of the hepatitis C virus (HCV) is an important indicator for antiviral therapeutic response. We hereby described development of a rapid HCV genotyping approach that enabled the identification of the six most common HCV subtypes of Asia, i.e., 1a, 1b, 2a, 3a, 3b, and 6a, in a single reaction. Using two dual-labeled, self-quenched probes that target the core region of the HCV genome, the exact subtype could be accurately identified by two-melting temperature codes determined from the two respective probes in a real-time PCR assay. Analytical sensitivity studies using armored RNA samples representing each of the six HCV subtypes showed that 5 copies/reaction of HCV RNA could be detected. The assay was evaluated using 244 HCV-positive serum samples and the results were compared with sequencing analysis. Of the 224 samples, subtype 3a (127, 52.3%) was the dominant, followed by 1b (51, 20.9%), 3b (47, 19.3%), 2a (8, 3.3%), 6a (4, 1.6%) and the least was subtype 1a (1, 0.4%). Moreover, 6 (2.5%) mixed infection samples were also detected. These results were fully concordant with sequencing analysis. We concluded that this real-time PCR-based assay could provide a rapid and reliable tool for routine HCV genotyping in most Asian countries.

  16. Peripheral coding of taste

    PubMed Central

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  17. ARA type protograph codes

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2008-01-01

    An apparatus and method for encoding low-density parity check codes. Together with a repeater, an interleaver and an accumulator, the apparatus comprises a precoder, thus forming accumulate-repeat-accumulate (ARA codes). Protographs representing various types of ARA codes, including AR3A, AR4A and ARJA codes, are described. High performance is obtained when compared to the performance of current repeat-accumulate (RA) or irregular-repeat-accumulate (IRA) codes.

  18. QR Codes 101

    ERIC Educational Resources Information Center

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  19. Multiplexed coding in the human basal ganglia

    NASA Astrophysics Data System (ADS)

    Andres, D. S.; Cerquetti, D.; Merello, M.

    2016-04-01

    A classic controversy in neuroscience is whether information carried by spike trains is encoded by a time averaged measure (e.g. a rate code), or by complex time patterns (i.e. a time code). Here we apply a tool to quantitatively analyze the neural code. We make use of an algorithm based on the calculation of the temporal structure function, which permits to distinguish what scales of a signal are dominated by a complex temporal organization or a randomly generated process. In terms of the neural code, this kind of analysis makes it possible to detect temporal scales at which a time patterns coding scheme or alternatively a rate code are present. Additionally, finding the temporal scale at which the correlation between interspike intervals fades, the length of the basic information unit of the code can be established, and hence the word length of the code can be found. We apply this algorithm to neuronal recordings obtained from the Globus Pallidus pars interna from a human patient with Parkinson’s disease, and show that a time pattern coding and a rate coding scheme co-exist at different temporal scales, offering a new example of multiplexed neuronal coding.

  20. Nonbinary Quantum Convolutional Codes Derived from Negacyclic Codes

    NASA Astrophysics Data System (ADS)

    Chen, Jianzhang; Li, Jianping; Yang, Fan; Huang, Yuanyuan

    2015-01-01

    In this paper, some families of nonbinary quantum convolutional codes are constructed by using negacyclic codes. These nonbinary quantum convolutional codes are different from quantum convolutional codes in the literature. Moreover, we construct a family of optimal quantum convolutional codes.