Results for 'Plagiarism Detection'

621 found
Order:
  1. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Plagiarism Software is a Creator or Destroyer for Effective Writing.A. Subaveerapandiyan - 2022 - DESIDOC Journal of Library and Information Technology 42 (2): 114-118.
    Plagiarism is malpractice, the fabrication of others’ “ideas or work” published without the proper permission or citation of the original contributors. Plagiarism is detected through different software, i.e., Turnitin, before publishing any research data. The present survey study assesses whether academicians, researchers, and scholars around the world perceive this software as a creator or destroyer of new thoughts and ideas. A survey of this research data was conducted with academicians, researchers, and scholars around the globe. The number of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Academic Integrity: Understanding Essence of Undergraduates’ Plagiarism in Their Research Writing at a Southern Chinese University.Zhengyan Guo - 2022 - The 5Th World Conference on Research in Education.
    In China, plagiarism among undergraduate students has been a protuberant issue preventing the robust development of tertiary education. The purpose of this Interpretative Phenomenological Analysis (IPA) research was to acquire a profound understanding of the essence of the phenomenon through the process of students’ research writing at Shaoyang University (SYU), a southern Chinese University. Employing a step-wise combination of purposive and random sampling techniques, 11 participants were selected to partake in the study’s online, face-to-face, and one-on-one semi-structured interviews. On (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. A Study of Obstacles in Plagiarism Software Subscribing by Colleges in Tamil Nadu.A. Subaveerapandiyan & N. Sakthivel - 2022 - DESIDOC Journal of Library and Information Technology 42 (5):318-324.
    This article attempts to comprehend the current issues and hurdles that Indian colleges affiliated with Tamil Nadu State Universities encounter when trying to subscribe to a software that detects plagiarism. The study’s goals are to determine whether colleges employ anti-plagiarism software, whether they ensure that their student-given assignments are free of copyright infringement, whether tutors teach about academic misconduct, and what people seem to think of anti-plagiarism software. We surveyed for this study and distributed the questionnaires among (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. CONTRACT CHEATING IN ISRAEL DURING THE COVID-19 PANDEMIC.Yovav Eshet - 2022 - European Conference on Academic Integrity and Plagiarism 2022.
    Academic integrity is an essential pillar of any educational system. It is defined as acting in a manner consistent with the values and accepted standards of ethical practices in teaching, learning, and scholarship (Fishman, 2015). Contract cheating, or ghostwriting, is currently one of the most severe violations of academic integrity. It involves students engaging a third party, usually an online essay writing service, to complete their academic works on their behalf (Draper et al., 2021). Some of these services offer pre-written (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Does AI Make It Impossible to Write an 'Original' Sentence (Is it Fair to Mechanically Test Originality).William M. Goodman - 2023 - The Toronto Star 2023 (September 28):A19.
    As a retired professor, I join in the growing concerns among educators, and others, about plagiarism, especially now that AI tools like ChatGPT are so readily available. However, I feel more caution is needed, regarding temptations to rely on supposed automatic detection tools, like Turnitin, to solve the problems. Students can be unfairly accused if such tools are used unreflectingly. The Toronto Star's online version of this published Op Ed is available at the link shown below. The version (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Reviving the Philosophical Dialogue with Large Language Models.Robert Smithson & Adam Zweber - forthcoming - Teaching Philosophy.
    Many philosophers have argued that large language models (LLMs) subvert the traditional undergraduate philosophy paper. For the enthusiastic, LLMs merely subvert the traditional idea that students ought to write philosophy papers “entirely on their own.” For the more pessimistic, LLMs merely facilitate plagiarism. We believe that these controversies neglect a more basic crisis. We argue that, because one can, with minimal philosophical effort, use LLMs to produce outputs that at least “look like” good papers, many students will complete paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  25
    Reviving the Philosophical Dialogue with Large Language Models.Robert Smithson & Adam Zweber - forthcoming - Teaching Philosophy.
    Many philosophers have argued that large language models (LLMs) subvert the traditional undergraduate philosophy paper. For the enthusiastic, LLMs merely subvert the traditional idea that students ought to write philosophy papers “entirely on their own.” For the more pessimistic, LLMs merely facilitate plagiarism. We believe that these controversies neglect a more basic crisis. We argue that, because one can, with minimal philosophical effort, use LLMs to produce outputs that at least “look like” good papers, many students will complete paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. 'Tortured phrases' in post-publication peer review of materials, computer and engineering sciences reveal linguistic-related editing problems.Jaime A. Teixeira da Silva - 2022 - Publishing Research 1:6.
    A surge in post-publication activity related to editing, including by technical editors and copyeditors, is worthy of some discussion. One of these issues involves the issue of 'tortured phrases', which are bizarre terms and phrases in academic papers that replace standard English expressions or jargon. This phenomenon may reveal an attempt to avoid the detection of textual similarity or to masquerade plagiarism, and yet remain undetected by editors, peer reviewers and text editors. Potentially thousands of cases have already (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Plagiarism in the age of massive Generative Pre-trained Transformers (GPT-3).Nassim Dehouche - 2021 - Ethics in Science and Environmental Politics 21:17-23.
    As if 2020 were not a peculiar enough year, its fifth month has seen the relatively quiet publication of a preprint describing the most powerful Natural Language Processing (NLP) system to date, GPT-3 (Generative Pre-trained Transformer-3), by Silicon Valley research firm OpenAI. Though the software implementation of GPT-3 is still in its initial Beta release phase, and its full capabilities are still unknown as of the time of this writing, it has been shown that this Artificial Intelligence can comprehend prompts (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Awareness of Plagiarism among Student Teachers of Indian Teacher Educational Institutions.Subaveerapandiyan A. & R. Nandhakumar - 2023 - Indian Journal of Educational Technology 5 (2):44-54.
    Today, the Internet is a rich source of study materials, and Google Scholar offers free access to a large number of scientific articles. There are excellent research publications available in many more databases. Students have the option of easily copying the material. Reusing, paraphrasing, patchwriting, and ghostwriting without citing the original documents are plagiarism. Plagiarism is increasing in academics, particularly in research. This study aims to study the awareness of plagiarism and to analyze the reasons for (...). The study samples are the student teachers in India. For this study, we used a survey method, and the author prepared a questionnaire to collect data from the student teachers. Study respondents are the student teachers of the Regional Institute of Education Mysore; Purposive sampling was used to select samples. The total number of study respondents is 207. The findings of the study revealed that over 70 per cent of respondents mentioned reasons for plagiarism as lack of relevant literature studying, lack of preparation and time, difficulty checking every piece of work, do not know the manual citation style, lack of knowledge about bibliographic management software and also they stated that getting easily available materials on the internet is also a reason for plagiarism. The study recommends that teachers teach or conduct awareness programs on plagiarism, avoiding plagiarism, citation style, and software. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Plagiarism in the Sacred Sciences.Michael V. Dougherty - 2020 - Philosophy and Theology 32 (1-2):27-61.
    This article diagnoses the problem of plagiarism in academic books and articles in the disciplines of philosophy and theology. It identifies three impediments to institutional reform. They are: (1) a misplaced desire to preserve personal and institutional reputations; (2) a failure to recognize that attribution in academic writing admits of degrees; and (3) a disproportionate emphasis on the socalled “intention to plagiarize.” A detailed case study provides an illustration of the need for institutional reform in the post-publication processes in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  15. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  16.  49
    Avoiding Plagiarism In Academic Genres.Zukhra Turayeva - 2024 - American Journal of Language, Literacy and Learning in Stem Education 2 (2):92-93.
    EAP course teaches how the program concerns and provides us with a valuable way of organizing our thinking about conceptual disciplinary within the particular community. The area of EAP is referred with genres. The process of writing academically requires creating a text where the writer takes it for granted the reader is about to recognize. To group texts together, writers utilize language in order to respond to recurring situations and this case is +represented with the term genre.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Ctrl C + Ctrl V: Plagiarism and Knowledge on Referencing and Citation among Pre-service Teachers.Jupeth Pentang & Ronalyn M. Bautista - 2022 - International Journal of Multidisciplinary: Applied Business and Education Research 3 (2):245-257.
    Issues on plagiarism among pre-service teachers (PSTs) have increased in modular and online learning. To confirm this, the study determined the PSTs’ level of awareness on plagiarism; their knowledge on referencing and citation; and the correlation between their level of awareness on plagiarism and knowledge on referencing and citation, with their academic performance. The study employed a descriptive-correlational research design participated by 235 PSTs randomly sampled through strata. The data were gathered through a web-based survey. Results showed (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  18. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Download  
     
    Export citation  
     
    Bookmark   90 citations  
  19. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  20. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  22. True Detective: Buddhism, Pessimism or Philosophy?Finn Janning - 2014 - Journal of Philosophy of Life 4 (4).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. True Detective : Pessimism, Buddhism or Philosophy?Finn Janning - 2015 - Journal of Philosophy of Life 5 (1).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Introspection Is Signal Detection.Jorge Morales - forthcoming - British Journal for the Philosophy of Science.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise ratio) (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  25.  48
    Direct Detection of Relic Neutrino Background remains impossible: A review of more recent arguments.Florentin Smarandache & Victor Christianto - manuscript
    The existence of big bang relic neutrinos—exact analogues of the big bang relic photons comprising the cosmic microwave background radiation—is a basic prediction of standard cosmology. The standard big bang theory predicts the existence of 1087 neutrinos per flavour in the visible universe. This is an enormous abundance unrivalled by any other known form of matter, falling second only to the cosmic microwave background (CMB) photon. Yet, unlike the CMB photon which boasts its first (serendipitous) detection in the 1960s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Use and Plagiarism of Descartes’s Traité de l’homme by Henricus Regius: A Reassessment.Andrea Strazzoni - 2023 - Perspectives on Science 31 (5):627-683.
    In this article I discuss a particular aspect of the Dutch reception of the ideas of René Descartes, namely the use of his Traité de l’homme by Henricus Regius. I analyze the use that Regius made of the theory of the movement of muscles, passions, hunger, and more generally of the neurophysiology expounded by Descartes in his book (not printed until 1662–1664). In my analysis, I reconstruct the internal evolution of Regius’s neurophysiology, I illustrate its sources beyond Descartes (i.e., Jean (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Pedestrian detection based on hierarchical co-occurrence model for occlusion handling.Xiaowei Zhang, HaiMiao Hu, Fan Jiang & Bo Li - 2015 - Neurocomputing 10.
    In pedestrian detection, occlusions are typically treated as an unstructured source of noise and explicit models have lagged behind those for object appearance, which will result in degradation of detection performance. In this paper, a hierarchical co-occurrence model is proposed to enhance the semantic representation of a pedestrian. In our proposed hierarchical model, a latent SVM structure is employed to model the spatial co-occurrence relations among the parent–child pairs of nodes as hidden variables for handling the partial occlusions. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Detecting the Factors Affecting Classroom Dialogue Quality.Chrysi Rapanta, Merce Garcia-Milà, Andrea Miralda Banda & Fabrizio Macagno - 2023 - Linguistics and Education 77:101223.
    Despite the emphasis on dialogue and argumentation in educational settings, still not much is known about how best we can support learners in their interthinking, reasoning, and metadialogic understanding. The goal of this classroom intervention study is to explore the degree of students’ dialogicity and its possible increase during a learning programme implementing dialogic and argument-based teaching goals and principles. In particular, we focus on how students from 5 to 15 years old engage with each other's ideas, and whether/how this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game addictions (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  96
    Retribution of Plagiarism Founded on Reason-based Actions.Ignace Haaz - 2021 - In Ike Obiora F., Mbae Justus, Onyia Chidiebere & Makinda Herbert (eds.), Mainstreaming Ethics in Higher Education The Teacher: Between Knowledge Transmission and Human Formation Vol. 2, Obiora Ike / Justus Mbae / Chidiebere Onyia / Herbert Makinda (Eds.). Globethics. pp. 135-162.
    This chapter as the whole book are a result of a Globethics conference in March 2018 at the Catholic University of East Africa (CUEA) in Kenya, focused on the integration of Ethics in Higher Education. The book captures the potential for sharing of knowledge, and triggering interdisciplinary collaboration and research across a wide variety of issues ranging from research practice, religion, entrepreneurship, leadership, fundraising and corruption. While some of the chapters focus on the understanding of ethics and its relationship with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Failure to detect mismatches between intention and outcome in a simple decision task.Petter Johansson, Lars Hall, Sverker Sikstrom & Andreas Olsson - 2005 - Science 310 (5745):116-119.
    A fundamental assumption of theories of decision-making is that we detect mismatches between intention and outcome, adjust our behavior in the face of error, and adapt to changing circumstances. Is this always the case? We investigated the relation between intention, choice, and introspection. Participants made choices between presented face pairs on the basis of attractiveness, while we covertly manipulated the relationship between choice and outcome that they experienced. Participants failed to notice conspicuous mismatches between their intended choice and the outcome (...)
    Download  
     
    Export citation  
     
    Bookmark   114 citations  
  32.  82
    Change detection, attention, and the contents of awareness.Daniel J. Simons & Ronald A. Rensink - 2000 - Consciousness and Cognition 9 (2):S18 - S19.
    Download  
     
    Export citation  
     
    Bookmark  
  33. “How did researchers get it so wrong?” The acute problem of plagiarism in Vietnamese social sciences and humanities.Quan-Hoang Vuong - 2018 - European Science Editing 44 (3):56-58.
    This paper presents three cases of research ethics violations in the social sciences and humanities that involved major educational institutions in Vietnam. The violations share two common points: the use of sophistry by the accused perpetrators and their sympathisers, and the relative ease with which they succeeded unpunished. The strategies the violators used to avoid punishment could be summarised as: (i) relying on people not paying enough attention when asked to do something relatively quickly, (ii) asking for the benefit of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. An Attribution Theory Lens on Plagiarism: Examining the Beliefs of Preservice Teachers.Lauren Goegan & Lia Daniels - 2023 - Canadian Perspectives on Academic Integrity 6 (2):1-21.
    Academic misconduct is a prominent issue at postsecondary institutions. This issue includes the act of plagiarism, which has received considerable attention on campuses. There is a growing body of research examining why students engage in plagiarism, and what they know about plagiarism, but little of this research is guided by a theoretical framework. Although all students may be tempted to plagiarize, students in teacher education programs represent a unique population because they are concerned with developing their own (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Lung Cancer Detection Using Artificial Neural Network.Ibrahim M. Nasser & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):17-23.
    In this paper, we developed an Artificial Neural Network (ANN) for detect the absence or presence of lung cancer in human body. Symptoms were used to diagnose the lung cancer, these symptoms such as Yellow fingers, Anxiety, Chronic Disease, Fatigue, Allergy, Wheezing, Coughing, Shortness of Breath, Swallowing Difficulty and Chest pain. They were used and other information about the person as input variables for our ANN. Our ANN established, trained, and validated using data set, which its title is “survey lung (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  36. Detecting Ideology in Our Understanding of Objectivity.Markus Gabriel - 2015 - In Channa van Dijk, Eva van der Graaf, Michiel den Haan, Rosa de Jong, Christiaan Roodenburg, Dyane Til & Deva Waal (eds.), Under Influence - Philosophical Festival Drift (2014). Omnia. pp. 44-63.
    Download  
     
    Export citation  
     
    Bookmark  
  37. Ontology-based error detection in SNOMED-CT.Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Proceedings of Medinfo 2004:482-6.
    Quality assurance in large terminologies is a difficult issue. We present two algorithms that can help terminology developers and users to identify potential mistakes. We demon­strate the methodology by outlining the different types of mistakes that are found when the algorithms are applied to SNOMED-CT. On the basis of the results, we argue that both formal logical and linguistic tools should be used in the development and quality-assurance process of large terminologies.
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  38. Intention Involvement in the Nature of Plagiarism.Hossein Atrak - 2019 - International Journal of Ethics and Society (IJES) 2 (1):1-7.
    Background: This article addressed one of the issues of research ethics that is called the nature of plagiarism coupled with involvement of intention. By definition, plagiarism is the attribution of others’ works to one’s own. This may be done intentionally and/or unintentionally. Some researchers believe that intention is not involved in the nature of plagiarism and an author who forgets to make references to the used sources has committed plagiarism since this forgetfulness has led to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Human Symmetry Uncertainty Detected by a Self-Organizing Neural Network Map.Birgitta Dresp-Langley - 2021 - Symmetry 13:299.
    Symmetry in biological and physical systems is a product of self-organization driven by evolutionary processes, or mechanical systems under constraints. Symmetry-based feature extraction or representation by neural networks may unravel the most informative contents in large image databases. Despite significant achievements of artificial intelligence in recognition and classification of regular patterns, the problem of uncertainty remains a major challenge in ambiguous data. In this study, we present an artificial neural network that detects symmetry uncertainty states in human observers. To this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Wave detected by LIGO is not gravitational wave.Alfonso Leon Guillen Gomez - manuscript
    General Relativity defines gravity like the metric of a Lorentzian manifold. Einstein formulated spacetime as quality structural of gravity, i.e, circular definition between gravity and spacetime, also Einstein denoted "Space and time are modes by which we think, not conditions under which we live" and “We denote everything but the gravitational field as matter”, therefore, spacetime is nothing and gravity in first approximation an effect of coordinates, and definitely a geometric effect. The mathematical model generates quantitative predictions coincident in high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Can We Detect Bias in Political Fact-Checking? Evidence from a Spanish Case Study.David Teira, Alejandro Fernandez-Roldan, Carlos Elías & Carlos Santiago-Caballero - 2023 - Journalism Practice 10.
    Political fact-checkers evaluate the truthfulness of politicians’ claims. This paper contributes to an emerging scholarly debate on whether fact-checkers treat political parties differently in a systematic manner depending on their ideology (bias). We first examine the available approaches to analyze bias and then present a new approach in two steps. First, we propose a logistic regression model to analyze the outcomes of fact-checks and calculate how likely each political party will obtain a truth score. We test our model with a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Prolog detects pathological self reference in the Gödel sentence.P. Olcott - manuscript
    This sentence G ↔ ¬(F ⊢ G) and its negation G ↔ ~(F ⊢ ¬G) are shown to meet the conventional definition of incompleteness: Incomplete(T) ↔ ∃φ ((T ⊬ φ) ∧ (T ⊬ ¬φ)). They meet conventional definition of incompleteness because neither the sentence nor its negation is provable in F (or any other formal system). -- .
    Download  
     
    Export citation  
     
    Bookmark  
  45. Logical thinking education to combat plagiarism.Wai Ling Lai & Chad Nilep - 2014 - Gengo bunka ronshu 36 (1):179-193.
    Plagiarism, which Indiana University’s Writing Tutorial Service defines as "using others' ideas and words without clearly acknowledging the source of that information", is often described as a major problem. However, standard definitions such as this one suggest only limited solutions to the problem: acknowledging sources or forbidding reuse. Since all scholarship involves engaging with the ideas of others and academic writing tends to reuse certain expressions, these solutions – though important – are of limited utility. This paper examines a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Can Gravitons be Detected?Tony Rothman & Stephen Boughn - 2006 - Foundations of Physics 36 (12):1801-1825.
    Freeman Dyson has questioned whether any conceivable experiment in the real universe can detect a single graviton. If not, is it meaningful to talk about gravitons as physical entities? We attempt to answer Dyson’s question and find it is possible concoct an idealized thought experiment capable of detecting one graviton; however, when anything remotely resembling realistic physics is taken into account, detection becomes impossible, indicating that Dyson’s conjecture is very likely true. We also point out several mistakes in the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. On the failure to detect changes in scenes across brief interruptions.Ronald A. Rensink, Kevin J. O'Regan & James J. Clark - 2000 - Visual Cognition 7 (1/2/3):127-145.
    When brief blank fields are placed between alternating displays of an original and a modified scene, a striking failure of perception is induced: the changes become extremely difficult to notice, even when they are large, presented repeatedly, and the observer expects them to occur (Rensink, O'Regan, & Clark, 1997). To determine the mechanisms behind this induced "change blindness", four experiments examine its dependence on initial preview and on the nature of the interruptions used. Results support the proposal that representations at (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  48. Detection and Mathematical Modeling of Anxiety Disorder Based on Socioeconomic Factors Using Machine Learning Techniques.Razan Ibrahim Alsuwailem & Surbhi Bhatia - 2022 - Human-Centric Computing and Information Sciences 12:52.
    The mental risk poses a high threat to the individuals, especially overseas demographic, including expatriates in comparison to the general Arab demographic. Since Arab countries are renowned for their multicultural environment with half of the population of students and faculties being international, this paper focuses on a comprehensive analysis of mental health problems such as depression, stress, anxiety, isolation, and other unfortunate conditions. The dataset is developed from a web-based survey. The detailed exploratory data analysis is conducted on the dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. In defence of gullibility: The epistemology of testimony and the psychology of deception detection.Kourken Michaelian - 2010 - Synthese 176 (3):399-427.
    Research in the psychology of deception detection implies that Fricker, in making her case for reductionism in the epistemology of testimony, overestimates both the epistemic demerits of the antireductionist policy of trusting speakers blindly and the epistemic merits of the reductionist policy of monitoring speakers for trustworthiness: folk psychological prejudices to the contrary notwithstanding, it turns out that monitoring is on a par (in terms both of the reliability of the process and of the sensitivity of the beliefs that (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  50. Detection of dopamine neurotransmission in ‘real time’.Rajendra Badgaiyan - 2013 - Frontiers in Neuroscience 7 (125).
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 621