<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Shynkarenko, V. I., Ilman, V. M.: Constructive-Synthesizing Structures and Their Gram-
matical Interpretations. Part I. Generalized Formal Constructive-Synthesizing Structure.
Springer (ed.), Cybernetics and Systems Analysis</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1060-0396</issn>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1145/3345317</article-id>
      <title-group>
        <article-title>Text Borrowings Detection System for Natural Language Structured Digital Documents</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Dnipro National University of Railway Transport named after Academician V. Lazaryan 2</institution>
          ,
          <addr-line>Lazaryan str., Dnipro</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <volume>7</volume>
      <issue>4</issue>
      <fpage>79</fpage>
      <lpage>82</lpage>
      <abstract>
        <p>Interpretation of results is an important stage in text borrowings detection systems. Necessary to take into consideration the tree structure of the document and the general content of structural elements (sections) is the reason for that. In article method comparison of structured document is developed. Formalization of comparison document process is based on constructivesynthesizing modeling. Document structure is processed using templates. They contain information about section and subsections titles and keywords sets. The base of natural language text comparison is text graph representation model. It represents a text as graphs set for improving borrowings retrieval in texts of database. On base of these models and method text borrowings detection system is developed for comparison digital structured natural language documents. The paper presents the features of the system and its advantages. System architecture is described and its time efficiency investigated.</p>
      </abstract>
      <kwd-group>
        <kwd>natural language text</kwd>
        <kwd>structured document</kwd>
        <kwd>text borrowings detection</kwd>
        <kwd>plagiarism</kwd>
        <kwd>constructive-synthesizing modeling</kwd>
        <kwd>constructor</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Borrowing detection in natural language texts is one of the tasks of NLP. Its relevance
is increasing with the development of information technology and the growth of
information in the public access.</p>
      <p>Text borrowing can be legitimate: properly designed quotes, a description of the
techniques and algorithms with specification the author and references, etc. Illegal
borrowings (plagiarism) are now widespread in many areas of society life, including
academic [1 – 4]. There are several ways to fight is. They are organizational and
administrative measures, technological and information-technical means [5, 6].
Information-technical means include anti-plagiarism programs that focus on textual
borrowing detection [7 – 10].</p>
      <p>The main stages the anti-plagiarism programs functioning are texts pre-processing,
comparison – borrowings detection, results interpretation.</p>
      <p>Pre-processing stage may include case-insensitive typing, deleting stop words,
deleting or ignoring punctuation marks, blank paragraphs, extra spaces, spell checking,
etc. [11].</p>
      <p>The usage of shingles [12, 13], multivariate graph approaches [14, 15, 16], n-grams
[9, 14, 17], TF-IDF based algorithms [17, 18], SCAM algorithms [19, 20] etc. are
widespread for comparison stage. These algorithms and approach solve only detection
task for entire text and do not for its parts. Their apply result is single mark for whole
text as a percentage of borrowing or uniqueness. Algorithms and approach can be
used for parts text, but need definition of text borrowing evaluation function and
method for text split.</p>
      <p>Interpreting the text borrowings detection results is particularly important. There
are a large number of technical tools (resources) for borrowings detection that provide
an ultimate text estimate as a percentage of borrowing or uniqueness. However, in the
course of the 25 resources analysis [22], authors don't found resources, which take
into account the structural features of the checked document. For example, some
sections describe known techniques completing the views, and then textual borrowings
are acceptable. However, existing tools do not take this into account when evaluating
the document.</p>
      <p>This paper is devoted to the development of a method of structured documents
comparison and its computer implementation using constructive-synthesizing
modeling [23, 24] and graph representation of text [25, 26]
2</p>
    </sec>
    <sec id="sec-2">
      <title>The Task of Text Borrowings Detection in Digital Structured</title>
    </sec>
    <sec id="sec-3">
      <title>Natural Language Documents</title>
      <p>Structured digital documents are documents represented by doc / docx files format
that have a logical structure in content and the appropriate formatting. Logical
structure determinates sections and subsections order.</p>
      <p>Such documents are e-books and synopses, reporting documentation for
educational (course, laboratory) and qualification papers (diploma thesis, PhD dissertations)
etc. Next, it will be about qualification works.</p>
      <p>Borrowings detection in structured documents is complex due to the following
factors:
─ the necessity to evaluate each section separately and the document as a whole;
─ formatting features. The use of different techniques to indicate the structural
elements of a document;
─ the necessity to select materials for comparison according to the content of the
structural section;
─ elements variety. The presence of text fragments in different languages, hyperlinks
and cross references, images, tables, formulas, other objects.</p>
      <p>Taking into account of the above, text borrowings detection in structured documents
further needs to be developed:
─ representation models and comparison methods for structured documents;
─ document pre-processing algorithms to reduce the amount of material to be
checked by omitting some items;
─ reading mechanisms for document files with text formatting.</p>
      <p>The goal of this research is modeling process of comparing structured digital
documents for construct comparison documents method. Main purpose of this method is
automated processing of structured digital documents for text borrowings detection.</p>
      <p>Research questions:
─ definition of the features and the basic stages of processing structured document in
borrowings detection tasks;
─ definition and formalized description of the algorithms processing structured
document by means of constructive-synthesizing modeling and development of
structured documents compression method ;
─ object-oriented modeling of structured documents and their processing;
─ creation relationship between object-oriented and constructive-synthesizing models
of processing structured document for development software based on them.
3</p>
    </sec>
    <sec id="sec-4">
      <title>Modeling the Process of Comparing Structured Digital</title>
    </sec>
    <sec id="sec-5">
      <title>Documents</title>
      <p>The process of comparing structured documents is the orderly sequence of actions
performed on a document submitted for borrowings detect and the structured
documents base for comparison. The actions can be completed in the following stages:
1. forming a document tree - defining structural elements (sections, subsections) and
their hierarchy;
2. search in the documents database of structural elements for comparison;
3. pre-processing of the text of structural elements;
4. comparison of documents and obtaining an assessment of each structural element
and the document as a whole.</p>
      <p>To formalize this process, the means of constructive-synthesizing modeling [23] was
apply. Authors defined the constructor of the process and performed refinement
transformations: specialization, concretization, interpretation, and implementation.
3.1</p>
      <sec id="sec-5-1">
        <title>Specialization of the</title>
      </sec>
      <sec id="sec-5-2">
        <title>Comparison Process</title>
      </sec>
      <sec id="sec-5-3">
        <title>Constructor of the Structured</title>
      </sec>
      <sec id="sec-5-4">
        <title>Documents</title>
        <p>The specialization of the constructor [23] involves the determination of the semantic
component of the carrier:</p>
        <p>
          C  M , ,  s  CCP  MCP, CP, CP ,
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
where s  is operation of specialization, M CP is the heterogeneous replenishable
carrier, CP is the signature of operations and relation for construction, CP is the
information support that includes the ontology (the constructive basics are outlined in
[24]), the purpose, rules, constraints, initial conditions, and construction completion
conditions.
        </p>
        <p>Ontology of constructor C CP . Carrier is M CP  {T  N} . Terminals ( T ) include
finite set of algorithms for operations on the document, its attributes and text
{Di |YXi } , where Di is identifier of algorithm and X i ,Yi are sets of its definitions and
i
values. Non-terminals are auxiliary elements for identify abstract algorithms set.</p>
        <p>A document to which algorithms apply has many attributes-sections set
{sectionsiDOC}, which have the following attributes: title, level, text, and general
content.</p>
        <p>Algorithms for processing the document and its attributes:
D1 |sdeocctions for formation sections, sections is structural tree for document doc;
D |numbers</p>
        <p>2 section,template for definition the general content of the section (section)
according to a given structure template (template), numbers is the section numbers in the
template, countnumbers is number sections' quantity;
D |numbers</p>
        <p>3 section, num for comparison of the general contents of the section (section) with
the corresponding element of the structure of the template with the number num
(setting the pattern in manual mode);
D |s _ texts, db_ texts for selection s_texts from sections by structural tree of the
doc4 sections, db
ument (tree) for comparison with texts (db_texts) of data base documents db;
D |ul _ mark</p>
        <p>5 fragments, marks, doc_ size for calculation the percentage of borrowings (ul_mark) in
a document, where doc_size is size of the document, fragments, marks are the text
and the percentage of borrowings in the section, respectively.
─
─
─
─
─
─
─
─
Algorithms for the text processing:</p>
        <p>6 tteexxtt for text preprocessing, text is preprocessed text;
D |
D |graphs for construction the graphs set (graphs) for text;</p>
        <p>7 text
D | fragments, positions, marks for comparison of texts with a set of graphs, fragments,
8 text, graphs
positions are borrowed text fragments and their positions in the text, marks is
percentage mark of each fragment.</p>
        <p>The signature CР  , , ,{}, </p>
        <p>consists of operations sets and corresponding
relationships of the same name, where   {,:} are the operations of linking and
transforming carrier elements,   {,|,| |} are the operations of substitution and
inference,  is relationships and attribute operations, {} are the substitution
relations,   { i : si , gi } is the set of substitution rules, si is the sequence of
substitution relations, gi is the set of attribute operations. If attribute operations are not
performed, the substitution rule will look like this
si , , where  is empty symbol.</p>
        <p>The inference rules apply the relationship from  , and the corresponding operations
apply in the implementation of the constructor.</p>
        <p>Operation (Di , Dj ) is concatenation of algorithms, implies sequential execution
D j after Di .</p>
        <p>Operation : (b, A) is execution the algorithm A if the expression b is true
( b  true ).</p>
        <p>The purpose of the constructor is to form structured documents comparison
algorithms.</p>
        <p>Initial conditions for construct: inference begins with a non-terminal CР . There
are the structured document doc, doc _ sizedoc is the document text size, db is the
structured documents database, template that describes the possible sections in the
document; sections is the structural tree for document doc, each element of which
(section) has attributes of title (title) and text of the section / subsection (text).</p>
        <p>Termination condition of constructing: the form does not contain non-terminals.
3.2</p>
      </sec>
      <sec id="sec-5-5">
        <title>Document Comparison Constructor Interpretation</title>
        <p>Let's interpret the constructor by the algorithmic structure C A</p>
        <p>CCP , CA,CP  M A,CP,VA,CP,  A,CP,  A,CP I 
I </p>
        <p>ACCP, ACCP  M1, 1, 1
where 1  CP , VA,CP  {Ai0 |YXi i } is the basic algorithms set [23], Xi ,Yi are the sets
of
definitions
and
values
of
an</p>
        <p>
          algorithm
( X ( Ai0 ) Y ( Ai0 ))  (CCP)} is the heterogeneous carrier,
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
Ai0 |YXi .
        </p>
        <p>i
 A,CP  {M A,CP </p>
        <p></p>
        <p>AioVA,SP
1  {(A10 |AAii ,AAjj "");</p>
        <p>( A20 |bAi ":");
( A5 |, "| |"); 1  CP .
(CCP) is the set of algorithms implemented by the constructor
CSC ;
( A3 |lfhi,lq , fi "");
( A4 | ffij, "|");</p>
        <p>Constructor ACCP includes performing operations algorithms:
─ A10 | AAii , AAjj for algorithms composition, Ai  Aj is sequential execution of the
algorithm Aj after algorithm Ai ;</p>
        <p>0 A
─ A | i</p>
        <p>2 b, Ai for conditional execution: algorithm Ai executes if the expression b is
true;
─ A3 |lfhi,lq , fi for substitution, lh ,lq , fi are forms;
─</p>
        <p>A | f j </p>
        <p>4 fi ,  , A5 | ,  for partial and complete inference, where fi , f j are forms,  is
axiom,  is the set of constructed structures.</p>
        <p>
          Let's execute concretization of the constructor (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ):
        </p>
        <p>I ,CA CСР  M СР , СР , СР , Z</p>
        <p>K  K,I ,CA Ch </p>
        <p>M СР , СР , 2 , Z ,
where 2  1  3 , 3  {MСР  T  N , T  {{Di0},{D1j}}} is the terminals set,
N  {CP, , , } is the non-terminals set, CP is the initial non-terminal.</p>
      </sec>
      <sec id="sec-5-6">
        <title>Information support: substitution rules. Consider the inference rules that allow</title>
        <p>us to formalize the process of comparing structured documents according to the
previously defined stages.</p>
        <p>
          Definition of structural elements (sections, subdivisions) of the document:
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
s2   |numbers
section,template D |numbers
2 section, template  |numbers
section, template ,
s3   |numbers 0 D
section, template A2 |co3untnumbers0: D |numbers
3 section, num
 |numbers
section, template ,
s4   |numbers
section, template D |numbers
2 section, template  |numbers
section, template ,
s5   |numbers 0 D
section, template A2 |co3untnumbers0: D |number section, template ,
        </p>
        <p>3 section, num  |numbers
s8   |
ul _ mark
text,db_ texts
 D |graphs </p>
        <p>7 db_ textsi
 D | fragments, positions,marks D |ul _ mark</p>
        <p>8 text, graphs 5 fragments,marks,doc_ size .
where countnumbers  0 is an indication that the section did not match the
template.</p>
        <p>Retrieval for documents of structural elements that can be compared and
preprocessed for structural elements
s6   |text,db_ texts
sections,template</p>
        <p> D4 |sse_ctteioxtnss,,ddbb_texts D6 |tse_xttextsi  |tuelx_tm,dabr_ktexts .</p>
        <p>Comparison documents and getting marks for each structural element and document
as a whole
s7   |
ul _ mark
text,db_ texts
 D |graphs
7 db_ textsi</p>
        <p>D8 |tferxatg, mgreanpts,hpsositions,marks  |tuelx_tm,dabr_ktexts ,</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Method of Structured Documents Comparison</title>
      <p>
        The algorithms {Di} and the constructive-synthesizing model (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) – (
        <xref ref-type="bibr" rid="ref11">11</xref>
        ) make up the
method of comparing structured documents, the scheme of which is shown in Fig. 1.
Block markings s1  s8 comply with the rules (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) – (
        <xref ref-type="bibr" rid="ref11">11</xref>
        ) and its combinations of
constructor (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) – (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ).
In the scheme, text graphs sets in the action (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) were constructed in accordance with
the text graph representation models and the text-weight graph compression method
[25, 26].
      </p>
      <p>The main idea of the graph representation of the text is to form a directed graph
with weighted vertices and edges. The vertex weight is symbols of text; the weight of
the edge is the set of cycle numbers into which this edge enters. It is advisable to
preprocess of the text before form the graph.</p>
      <p>Compression of text-weight graph occurs by combining vertices that are connected
by edges of equal weight. It reduces the needed memory volume by approximately
97%. Moreover, the graph structure is simplified by 90 – 97%.
5</p>
    </sec>
    <sec id="sec-7">
      <title>Computerized Comparison of Structured Documents</title>
      <p>Object-oriented modeling of a structured document and other components were
performed for the computerized implementation of the proposed method of comparison
(Fig. 2).
The document model is represented by the DocSection class, which includes such
attributes as level of a part of the document (section, paragraph, subparagraph, up to
the ninth degree of nesting), title, section text that belongs to a part of the document
and delimits by headings.</p>
      <p>The base of DocSection is Composite pattern, which integrates objects into a tree
structure to represent the hierarchy from part to whole</p>
      <p>Parsing of the document according to the structure is assigned to the FileWorker
class, which creates DocSection object by the xml structure of the document file.
DocHandler coordinates the rest of DocSection processing. Thus, three classes
perform representation, initialization and access to a structured document.</p>
      <p>To determine the general content of the sections, a structural template modeled by
the classes StructureTemplate, SectionTemplate is used. The template contains
information about the section and sub-sections headings of the document and keywords
sets.</p>
      <p>To compare the text of structural sections, a graph representation of the text is used
[26]. Here it is represented by classes Graph and Vertex. A text attribute of the
DocSection class represents the text of the compared section. The compared text is
presented as a set of graphs – Work class.</p>
      <p>To implement the method of comparing structured documents (Fig. 1) and the
corresponding constructive and object-oriented (Fig. 2) models [26], a software system
"StructuredDocComparission" (SDC) was developed with the graphic user interface
(GUI). It provides cooperation with the document structure (Fig. 3).</p>
      <p>Fig. 3. The main window of the program for comparison by template</p>
      <p>(GUI language – Ukrainian)
Features of the SDC system are:
─ usage a template for construction tree structure of document and text separation by
section. It helps decrease texts volume that use in comparison stage.
XMLrepresentation of template makes it understandable to the user and facilitates its
correction;
─ check of separated sections of the document and obtaining a percentage of text
borrowings by sections and the entire document. It allows performing further
qualitative analysis of the submitted document content;
─ results filtration for structured documents. It allows user to determine the size of
text fragments that are considered to be borrowed and to obtain a recalculated
estimate without re-comparing the document;
─ storage in the base of graph representation of texts. This allows not to waste time
preparing the texts of the database for comparison;
─ usage the principles of friendliness and feedback to design a user interface simplify
interaction with the system.
6</p>
    </sec>
    <sec id="sec-8">
      <title>Experimental Research</title>
      <p>Authors performed experimental researches to determine the time efficiency of the
SDC system.</p>
      <p>Experimental base – 25 files in docx format. Files are the documentation for the
diploma thesis of the Bachelor of Software Engineering DNURT-2018 (size: 0.7 MB
– 27.3 MB, 107.2 – 310.3 thousand characters). Each file contains 32-35 sections
(explanatory note and technical documentation), each of which is matched by
template to determine the general content and subsequent selection of data from text
documents database. Primary language of documents – Ukrainian, languages of section
“Program text”: C/C++, C#, html, javascript etc. The domain is determined by the
specialty and area of IT knowledge. Text databases of the above mentioned diploma
thesis, size 5,10..25 qualifying works, which are formed by the developed software.
Local web server xampp v 3.2.2 (components used: Apache, MariaDB). The
experiment was executed on a PC with the following specifications: Intel Pentium (R) Dual
Core CPU, L1 code / L1 data cache / L2 – 2 * 32/2 * 32 / 1024K, clock speed /
system bus frequency / memory frequency – 2.3 GHz / 400 MHz / 400 MHz, OP access
time (read / write) 5751/4253 MB / s, operating system – MS Windows 7 Ultimate
SP1.</p>
      <p>Execution of the experiment. Each of the 25 files of the experimental database is
compared with the bases of 5,10..25 works formed from the same files. The texts of
the checked files and the texts of the database were pre-processed (removal of
unnecessary spaces, unification of punctuation marks, etc.). Comparison accuracy is one
word. A word is a sequence of letters and / or numbers separated by spaces or / and
punctuation delimiters. The files in the database are not duplicated. Time efficiency
metrics are determined by a text matching operation. The matching operation involves
the following stages: pre-processing (selection of information in the database,
allocation of memory for storing results, text pre-processing); constructing text graph
representation from base (multiple sets of graphs); comparison of the submitted text with
the texts of the base; work evaluation (determination of the total percentage of
borrowings according to all works of the base).</p>
      <p>Experiment results. It is established that the average time of comparison of the
structured document is from 11 to 65 seconds on a base of 0.6 to 3.8 million
characters. It has a linear dependence on the size of the checked document and base.
7</p>
    </sec>
    <sec id="sec-9">
      <title>Conclusion</title>
      <p>To processing natural language text constructive-synthesizing model of comparison
process was developed. Special comparison method was form using this model.</p>
      <p>Constructive-synthesizing and object-oriented models of the text graph
representation previously developed by authors are used to increase time effectiveness of
comprising process.</p>
      <p>That allowed to develop software system for text borrowings detect in structural
digital document. When designing the system architecture, an object-oriented model
of a structured document and algorithms for its processing were developed.</p>
      <p>The advantage of the developed system compared to analog tools is that the
percentage of text borrowings is calculated not only for the entire document, but also for
any separate section (unit).</p>
      <p>Promising scopes for research are parallel graphs processing and optimization of
procedures for restoring graphs sets from a database to increase the time efficiency of
the system.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Byvaltsev</surname>
            ,
            <given-names>V. A.</given-names>
          </string-name>
          et al.:
          <article-title>Plagiarism and academic integrity in science</article-title>
          .
          <source>Bulletin of the Russian Academy of Medical Sciences</source>
          . vol.
          <volume>72</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>299</fpage>
          -
          <lpage>304</lpage>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .15690/vramn788
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Pierce</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zilles</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Investigating student plagiarism patterns and correlations to grades</article-title>
          .
          <source>In: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education</source>
          , pp.
          <fpage>471</fpage>
          -
          <lpage>476</lpage>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1145/3017680.3017797
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Pàmies</surname>
            ,
            <given-names>M. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Valverde</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cross</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          : Organising research on university student plagiarism:
          <article-title>a process approach</article-title>
          .
          <source>Assessment &amp; Evaluation in Higher Education</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1080/02602938.
          <year>2019</year>
          .1658714
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Svyrydenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          et al.:
          <article-title>Plagiarism challenges at Ukrainian science and education</article-title>
          .
          <source>Studia Warmińskie</source>
          , vol.
          <volume>53</volume>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>75</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Preventing the plagiarism in digital age with special reference to Indian Universities</article-title>
          .
          <source>International Journal of Information Dissemination and Technology</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>281</fpage>
          -
          <lpage>287</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Sanz</surname>
            ,
            <given-names>J. J. G.</given-names>
          </string-name>
          :
          <article-title>Detecting plagiarism in micro-blogging social networks</article-title>
          .
          <source>In: Proceedings of the 5th International Conference on Technological Ecosystems for Enhancing Multiculturality</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1145/3144826.3145438
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lovepreet</surname>
            ,
            <given-names>V. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
          </string-name>
          , R.:
          <source>Survey on Plagiarism Detection Systems and Their Comparison</source>
          .
          <source>In: Proceedings of the International Conference on ICCIDM 2018</source>
          , vol.
          <volume>990</volume>
          , no.
          <source>27</source>
          . Springer (ed).
          <source>Computational Intelligence in Data Mining</source>
          (
          <year>2019</year>
          ). - doi: 10.1007/
          <fpage>978</fpage>
          -981- 13-8676-
          <issue>3</issue>
          _
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Heres</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hage</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A quantitative comparison of program plagiarism detection tools</article-title>
          .
          <source>In: Proceedings of the 6th computer science education research conference</source>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>82</lpage>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1145/3162087.3162101
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Chowdhury</surname>
            ,
            <given-names>H. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bhattacharyya</surname>
            ,
            <given-names>D. K.</given-names>
          </string-name>
          :
          <article-title>Plagiarism: Taxonomy, tools and detection techniques</article-title>
          . arXiv preprint arXiv:
          <year>1801</year>
          .
          <volume>06323</volume>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boriwal</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          : Plagiarism Issues: Types, Tools and Remedies.
          <source>Indian Journal of Agricultural Library and Information Services</source>
          , vol.
          <volume>35</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>477</fpage>
          -
          <lpage>482</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Mahmoodi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varnamkhasti</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          :
          <article-title>Design a Persian Automated Plagiarism Detector (AMZPPD)</article-title>
          .
          <source>International Journal of Engineering Trends and Technology (IJETT) ISSN 2231-5381</source>
          . Vol.
          <volume>8</volume>
          , No. 8. pp.
          <fpage>465</fpage>
          -
          <lpage>467</lpage>
          (
          <year>2014</year>
          ). doi:
          <volume>10</volume>
          .14445/22315381/IJETT-V8P280
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>