Currently, master's and doctoral dissertations in colleges and universities need to pass the plagiarism detection system in order to pass. For undergraduates, most schools also use spot checks to test undergraduate papers.
There will be serious consequences if more than 30 plagiarisms are detected. In the mild case, graduation will be postponed, in the worst case, the degree will be cancelled. I worked so hard to go to college, but I feel so unhappy when my degree is reimbursed.
However, the software is a mechanism set manually after all, with a detection algorithm embedded in it. As long as we understand the mechanism and make simple modifications, we can successfully pass the detection.
This article is based on information collected from the Internet. The most important parts have been compiled for your reference.
Thesis plagiarism detection algorithm:
1. The paragraphs and format of the paper
Thesis detection basically involves uploading the entire article. After uploading, the paper detection software first Partitioning into sections and the format of the final manuscript submitted can have a significant impact on the plagiarism rate. The division of different paragraphs may cause small paragraphs with dozens of words not to be detected. Therefore, we can reduce the plagiarism rate by dividing more small paragraphs.
2. Database
Paper detection is mostly based on matching published graduation thesis, journal articles, and conference papers. Some databases also include some articles from the Internet. . Let me disclose to you that many books are not included in the detection database. Previously, a friend excerpted a large amount of text from a research book, but it was not found out. It can be seen that this method is still effective.
3. Chapter change
Many students have changed the order of chapters, or extracted different chapters from different articles and spliced ??them into articles, which has almost an impact on the results of plagiarism detection. zero. Therefore, the paper plagiarism detection experts suggest that you should not think that plagiarizing a few articles or dozens of articles will pass.
4. Mark references
How are reference to other people’s articles and plagiarism of other people’s articles defined in the detection software. In fact, it is very simple. We have added reference symbols to our paper, but in the plagiarism detection software. They are all treated uniformly. The threshold of the software is generally set to 1. For example, an article has 5,000 words, and 1 in the article means 50 words. If more than 50 words are plagiarized, even if references are added, it will be judged as plagiarism.
5. Word count matching
The paper plagiarism detection system is relatively strict. As long as more than 20 units of word count match, it will be considered plagiarized, but the premise is that point 4 is met. Annotation of references.
Methods for editing plagiarism papers:
The first is word changes. The professional vocabulary in the article can be retained and synonyms should be changed as much as possible;
Secondly, change the description method in the article, such as inverted sentences, passive sentences, and active sentences; disrupt the order of paragraphs, and divide paragraphs when plagiarizing the original text. and restructure.
Through the above methods, the plagiarism rate can be effectively reduced.
Here are a few examples for your reference:
Example A:
This article takes maximization of equipment utilization as the objective function, using integer encoding and The genetic algorithm combined with real number coding is used to study the construction problem of HFS. The chromosome encoding method and corresponding genetic operation method proposed in this article can achieve global stochastic optimization of the research object. Through the study of the car series standard calculation examples, it is shown that the method proposed in this article has high calculation repeatability and calculation efficiency.
Modification A:
This paper studies the construction of the HFS problem, which is solved through a genetic algorithm and a combination of integer and real number coding. The objective function is to maximize equipment utilization. The chromosome coding method and corresponding genetic algorithm operation in this article can effectively improve the global search capability of the algorithm. Through the study of a series of benchmark examples, the effectiveness of the algorithm in this paper is verified, and it has high calculation repeatability and high computing efficiency.
Example B:
Due to the strong regional nature of real estate products, real estate development companies usually need to establish project companies when investing in different regions. At this time, they will be faced with whether to establish a branch or Selection of subsidiaries. A subsidiary is an independent legal person, while a branch is not an independent legal person, and they have differences in tax benefits. A subsidiary is an independent legal person and is regarded as a taxpayer in the area where it is established. It usually bears the same comprehensive tax obligations as other companies in the area; a branch is not an independent legal entity and is not considered a taxpayer in the area where the branch is established. , only assumes limited tax liability, and the profits and losses incurred by the branch must be consolidated with the head office.
Modification B:
When real estate development companies invest in different regions, due to the strong regional nature of such goods, they need to establish project companies. At this point, the company needs to choose to establish a branch or subsidiary. The main difference is that a subsidiary has an independent legal person, while a branch is not an independent legal person. Secondly, in terms of tax benefits, since the branch is not an independent legal entity, it is not considered a taxpayer in the area where the branch is established, and only bears tax obligations. The head office needs to consolidate the profits and losses of the branches; while the subsidiaries It is an independent legal person and is considered a legal entity in the region where it is located. It is subject to the same full tax obligations as other companies in the region.
The methods for correcting plagiarism are nothing more than these. It is recommended that students first familiarize themselves with the reference papers you read, close the document, and write it in your own words, so that you will not be affected by too many references. Influence.
Some students raised a question here. The detection system used by the school is the academic misconduct detection system of CNKI, not the Wanfang data detection system purchased for a few yuan on Taobao.
In fact, there is not much difference in the algorithms of each detection system, but there are more and less databases. If you don’t have too many, you don’t need to be afraid of any system. Since you copied it, when you get the test report, you should first revise your article.
After copying it, you can change it to resemble it. You can remove the beginning and the end and leave the middle, so that the meanings are the same and the words are different.
1. Principles of plagiarism checking
1. CNKI dissertation detection requires the entire paper to be uploaded. The format may have an impact on the detection results. The final submission format needs to be submitted for detection and the The effect is minimized, and this effect may not be detected in small segments of a few digits. Papers with more text than 30,000 characters can be ignored.
The comparative databases are: China Academic Journal Online Publishing Database, China Doctoral Thesis Full Text Database/China Excellent Master’s Thesis Full Text Database, National Important Conference Paper Full Text Database, China Important Newspaper Full Text Database, and Chinese Patent Full Text Database, personal comparison library, other comparison libraries. Some books are not in the CNKI database and cannot be detected.
2. After uploading a paper, the system will automatically detect the chapter information of the paper. If there is automatically generated table of contents information, the system will detect the paper in sections, otherwise it will automatically detect sections.
3. Some students reported that they clearly quoted or plagiarized paragraphs or sentences from other documents in their paragraphs, but why they were not detected. This is normal. China National Knowledge Infrastructure has set a threshold for the sensitivity of this detection system. The threshold is 5, measured in paragraphs. Plagiarism or citations below 5 cannot be detected. This situation is common in small sentences in large paragraphs. Or small concepts. For example: If the detection paragraph 1 has 10,000 words, then citations of less than 500 words from a single document will not be detected. In fact, students are also told here a modification method, which is to never choose one article to cite for plagiarized paragraphs. Choose as many documents as possible and intercept a few sentences from each article. This will not be detected.
4. How can plagiarism in a paper be detected? The condition for CNKI paper detection is that 13 consecutive words that are similar or plagiarized will be marked in red letters, but the prerequisites in 3 must be met: that is, the total number of A document words you quoted or plagiarized must reach 5 in each of your detection paragraphs.
2. Seven methods to quickly pass the paper plagiarism check
Method 1: Foreign literature translation method
Check foreign literature in the research field, especially high-level journals Literature, such as Science, Nature, WaterRes, etc., translate the theoretical explanations into Chinese and put them in your own paper.
Advantages: 1. Everyone has different language habits, so the translated Chinese must be different. Therefore, even if the same text is translated by different people, there will be no plagiarism. 2. Reading foreign language literature can improve your English level and expand your horizons in professional fields.
Disadvantages: It is more difficult for students who are not good at English, especially those who are not good at professional English, to implement it.
Method 2: Change the wording
Rewrite the words in other people’s papers according to their meaning, or change the sentence structure, change the active and passive voice, or change the keywords, or by addition or subtraction. Of course, if it is a classic quote, it should still be quoted in the classic way.
Advantages: 1. After modifying the text, according to CNKI procedures and algorithms, as long as there are no repetitions of 13 consecutive words or keywords, it will not be marked red. 2. If you know every word and sentence of the thesis thoroughly, you will be at ease during the defense.
Disadvantages: Correcting word for word is time-consuming and laborious.
Method 3: Subtract the beginning and end, and change the word order in the middle
Replace the beginning and end of the text in other people’s papers and leave the remaining part in the middle into passive sentences. The formula and structure will change, and you can successfully avoid the duplication check by modifying the grammatical errors yourself.
Advantages: Convenient and fast, you can modify a large section.
Disadvantages: If you haven’t learned Chinese well, it will be very difficult and it will take you a long time to think about it.
Method 4: Convert Picture Method
Cut the text in other people’s papers into pictures and put them in your own paper. Because CNKI's duplication checking system can currently only check text, but not pictures and tables, it can avoid duplication checking.
Advantages: More convenient and faster than changing sentence order.
Disadvantages: If you use it smoothly, it is easy for the entire page to be filled with pictures, which will affect the word count of the entire paper.
Method 5: Insert document method
Insert some referenced text into the paper in the form of a word document.
Advantages: This method is better than method 4, because this method can also be re-edited in the inserted document in the future, while the image conversion method is not easy to modify later.
Disadvantages: Not discovered yet.
Method 6: Insert spaces method
Insert spaces between all the words in the article, and then adjust the spacing between spaces and words to the minimum. Because the basis for duplication checking is based on words, and spaces cut off words, the duplication checking system will naturally be skipped.
Advantages: Based on the principle of duplication checking system, it has high reliability.
Disadvantages: The workload is huge. The class can be completed through macros, but the preparation of macros needs to be studied.
Method 7: Original method
Write your own paper. When writing, either copy and paste the original text or add citations correctly.
Advantages: Basically, you will never worry about failing the duplication check, no matter how low the threshold of the duplication check system is adjusted.
Disadvantages: If we talk about advantages and disadvantages, it is that after writing a graduation thesis, more brain cells may die. hehe. . .
Detailed description of CNKI system calculation standards:
1. After reading the introduction of this system, I have a question. This system is good for text copy identification, but can it detect other aspects of content, such as data and charts? If it can't be detected, wouldn't it still be useless?
Among various behaviors of academic misconduct, text copying is the most common and serious. At present, the detection of text copying by this detection system has reached a very high level, and it is for plagiarism and tampering of charts, formulas, and data The detection of other behaviors is currently under development and has made considerable progress. You are welcome to continue to pay attention to the progress of this detection system and provide more critical and constructive comments and suggestions.
2. According to this system, anything below 39 is displayed in yellow, so does it mean that it is within the tolerable limit? Recently, I saw the news that the National Social Science Fund project for a teacher at Shanghai University was withdrawn because of two papers he published. There are plagiarism cases, accounting for 25 and 30 respectively. Please indicate what is the warning line?
The percentage only describes the proportion of overlapping text in the detected document, and does not refer to the severity of plagiarism in the document. All we can say is that the greater the percentage and the more overlapping words, the greater the possibility of plagiarism. Whether plagiarism is considered plagiarism and the severity of the plagiarism must be determined by experts after review.
3. How to prevent the dissertation academic misconduct detection system from becoming a platform for personal revenge?
This is something we are seriously considering. Currently, this detection system is only used by institutional-level users. We have developed a strict management process. At the same time, technically, we have also adopted a variety of means to prevent malicious behaviors as much as possible, including a series of strict identity authentication, logging, etc.
4. The smallest detection unit is a sentence, so if one or two words are changed in each sentence, it will not be detected?
We also process sentences accordingly and have a sentence similarity algorithm. The sentences are not judged to be the same if they are exactly the same. Sentences have a sentence-level similarity algorithm, and paragraphs have a paragraph-level similarity algorithm. Calculating whether a document or a paragraph is similar to other documents is based on this comprehensive calculation.
5. If it is the original words extracted from relevant books, but the words have been copied into the relevant documents in the database, that is to say, the previous article also extracted the same words from relevant books, but the words marked in my paper This passage comes from a related book. Is this considered academic plagiarism?
The detection system cannot draw a conclusion. Whether it is plagiarism or not is still subject to manual review. Therefore, if it is the situation you describe, experts will make corresponding judgments. Our system only provides various clues and basis so that people can quickly grasp the information of the detection literature.
6. How authoritative is the CNKI detection system?
The academic misconduct document detection system does not draw conclusions, that is, the detection system does not characterize the detection documents, but only displays the parts of the detection documents that are similar to other published documents and lists the objective facts. This Whether a test document constitutes academic misconduct requires final review and confirmation by experts.
How can plagiarism in a paper be detected? The condition for CNKI paper detection is that 13 consecutive words that are similar or plagiarized will be marked in red, but the prerequisites in 3 must be met: that is, the total number of A document texts you quoted or plagiarized must reach 5 in each of your detection paragraphs.
The rules for checking for plagiarism and revising papers:
1. If it is a quotation, do not use a period after the quotation mark. If you write a period, what follows the period is plagiarism (although (I think it is a quotation), so try to use a semicolon before the quotation ends. Some people put the superscript of the quotation after the period. This is incorrect and should be before the period.
2. You can convert text into tables and hide table borders.
3. If you read a lot of foreign languages ??and have them translated and quoted by yourself, I personally think that you can treat them as your own without the need for endnotes, because the duplicate checking database only matches characters and cannot Match Chinese and English.
4. Duplicate checking is a matching process, which is based on sentences. If a sentence is repeated, it is easy to determine that it is repeated, so:
It is indeed a classic sentence , just use superscript endnotes to express it in the reference, or use: the "name" of the author of the original article and quotation marks to frame the quoted content. Things within quotation marks will be recognized by the system as quotations
If it is a general quotation, use the wordy method to add all the subjects, predicates, etc. that are omitted in the original sentence. Anyway, even if there is one more word, Even for victory, you can also use the horizontal knife method to remove some components of the sentence and replace them with some pronouns. Or use the foreign devil method. If the foreign name in the original text is in Chinese, just use it in English. If it is in English, use it in Chinese. Or if it is a full name in Chinese, use the Chinese name. If it is a Chinese name, just use it. Found it all and replaced it with the Chinese name.
Deliberately add (notes) next to some abbreviations in English (superfluous method). In short, every sentence can be changed. Even if one word is added or one word is reduced, it is a victory. .
Pay special attention to punctuation marks, change them, turn a compound sentence in English into two or more single sentences, etc., and master it flexibly.
Because it is rare to actually write a paper that is all your own, and it is almost impossible. However, quoting a lot of other people's things shows that you have strong comprehensive ability and that you have read a lot of information. This is A process, a process of learning and summarizing.
For everything, don’t let the instructor criticize you on the forum. This is the most uneconomical thing to do. The instructor hates irregular layouts because he is only responsible for the content, but he cannot bear to have his disciples kicked out because of layout issues.
5. The following is what I have tried as a silly girl, and it is absolutely no match for me: Select other people’s text and part of your own text, copy it (into a block, rectangle), and create another one on the desktop. Empty file, copy the contents to the file, save, and close. Select the icon of this file, copy it, and paste it directly in the position of your text. It will become a picture and cannot be edited. This operation actually inserts the content file as an object, so it is a picture. This operation actually inserts the content file as an object. So here are the pictures.
To summarize the above things again:
Duplicate checking is a matching process, which is based on sentences. If a sentence is repeated, it is easy to determine the repetition, so:
1) If it is indeed a classic sentence, express it in the reference using superscript endnotes.
2) If it is a general quotation, use the wordy method and add all the subjects, predicates, etc. that are omitted in the original sentence. Anyway, even one more word is a victory.
3) You can also use the horizontal knife method to remove some sentence components and replace them with some pronouns.
4) Or use the foreign devil method. If the foreign name in the original text is in Chinese, use it directly in English. If it is in English, use it in Chinese. Or if it is the full name in Chinese, use the Chinese name. , if it is a Chinese name, it will be found and replaced with the Chinese name.
5) Deliberately add (notes) next to some abbreviations in English (superfluous method). In short, every sentence can be changed, even if one word is added or one word is reduced, it will be Victory.
6) If it is a quotation, do not use a period after the quotation mark. If you write a period, the thing after the period is plagiarism (even though you think it is a quotation), so before the quotation ends, try to Use semicolons. Some people put the superscript of the quotation after the period. This is incorrect and should be before the period.
7) Text can be converted into tables. Tables can basically not be checked for plagiarism. Texts can be turned into graphics, and tables can be turned into graphics. It is clear at a glance, and it will never be detected as repeated plagiarism.
The school’s requirements for paper plagiarism checking and revision: 1. Paper title: accurate, concise, eye-catching, and novel.
2. Table of contents: The table of contents is a brief list of the main paragraphs in the paper.
(Short papers do not need to be listed in the table of contents)
3. Abstract: It is an excerpt of the main content of the article and must be short, precise and complete. The number of words can be as few as a few characters, and no more than three hundred words is appropriate.
4. Keywords or subject words: Keywords are selected from the title, abstract and text of the paper. They are words of substantial significance to express the central content of the paper. Keywords are words used by computer systems to index the content characteristics of papers, making it easier for information systems to collect and search for readers. Each paper generally selects 3-8 words as keywords, starts a new line, and ranks them at the bottom left of the "Summary".
Topic words are standardized words. When determining the topic words, the paper must be thematically converted into standard words in the topic word list according to the indexing and grouping rules.
5. Text of the paper:
(1) Introduction: The introduction is also called the preface, preface and introduction, and is used at the beginning of the paper. The introduction generally summarizes the author's intention, explains the purpose and significance of the topic, and points out the scope of the paper. The introduction should be short, concise and stick to the topic.
<2) Thesis text: The main text is the main body of the paper. The main text should include arguments, arguments, argumentation process and conclusion. The main part includes the following content: