PLAGIARISM
http://people.sc.fsu.edu/~jburkardt/classes/pde_2015/plagiarism/plagiarism.html
Some policies:
-
acm_policy.pdf,
Plagiarism policy of the ACM (Association for Computing Machinery).
-
ieee_policy.pdf,
part of the plagiarism policy of the IEEE (Institute of Electrical
and Electronics Engineers).
-
siam_policy.pdf,
Plagiarism policy of SIAM (Society for Industrial and Applied Mathematics).
-
springer_policy.pdf,
Publication ethics policy for Springer journals.
Miscellaneous articles:
-
buy_a_essay.pdf,
the web page for a "non-plagiarized" essay writing service.
-
dorigo.pdf,
Tommaso Dorigo,
Fighting Plagiarism in Scientific Papers.
-
lundberg.pdf,
George Lundberg,
How to check your scientific paper for plagiarism.
-
scientific_american.pdf,
Charles Seife,
"For Sale: Your Name Here ina Prestigious Science Journal",
Scientific American,
http://www.scientificamerican.com/article/for-sale-your-name-here-in-a-prestigious-science-journal/
-
zilberberg.pdf,
Marya Zilberbeg,
How does it feel to have your scientific paper plagiarized?
And what can you do about it?
The case of Clifton Phua:
-
jayapriya.pdf
J R Jayapriya, A Karthikeyan,
Game Theory Approach for Identity Crime Detection,
IOSR Journal of Computer Engineering,
Volume 12, Issue 3, July-August 2013, pages 14-19.
-
latchoumi.pdf
R P Latchoumi, V M Vijay Kannan,
Synthetic Identity of Crime Detection,
International Journal of Advanced Research in Computer Science
and Software Engineering,
Volume 3, Issue 7, July 2013, pages 551-560.
-
phua.pdf
Clifton Phua,
Resilient Identity Crime Detection,
IEEE Transactions on Knowledge and Data Engineering,
Volume 24, Number 3, March 2012, pages 533-546.
-
phua_list.pdf
a list of papers which Clifton Phua feels have plagiarized his paper.
Only a few of them are included here.
-
priyadarshini.pdf
V Priyadharshini, G Adiline Macriga,
An Efficient Data Mining for Credit Card Fraud Detection
using Finger Print Recognition,
International Journal of Advanced Computer Research,
Volume 2, Number 4, Issue 7, December 2012, pages 58-61.
-
ramkumar.pdf
E Ramkumar, P Kavitha,
Online Credit Card Application and Identity Crime Detection,
International Journal of Engineering Research and Technology,
Volume 2, Issue 2, February 2013, pages 1-5.
-
suresh.pdf
Chandana Suresh, Betam Suresh,
Resilient Data Stream Mining using Spike detection,
International Journal of Computer Trends and Technology,
Volume 4, Issue 8, August 2013, pages 2641-2645.
-
swathi.pdf
M Swathi, K Kalpana,
Spirit of Identity Fraud and Counterfeit Detection,
International Journal of Computer Trends and Technology,
Volume 4, Issue 6, June 2013, pages ?.
The homework problem:
-
albinaa.pdf
T A Albinaa, I Arockiarani,
Soft Expert* Set,
Journal of Global Research in Mathematical Archives,
Volume 2, Number 3, March 2014, pages 29-35.
-
alkhazaleh.pdf
Shawkat Alkhazaleh, Abdul Razak Salleh,
Soft Expert Sets,
Advances in Decision Sciences,
Volume 2011, Article ID 757868, 12 pages.
-
shabir.pdf
Muhammad Shabir, Munazza Naz,
On soft topological spaces,
Computers and Mathematics with Applications,
Volume 61, 2011, pages 1786-1799.
Last revised on 03 June 2015.