• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • Tagged with
  • 7
  • 7
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Plagiarism and Scholarly Publications: An Ethical Analysis

Gotterbarn, Donald, Miller, Keith, Impagliazzo, John 01 January 2006 (has links)
All professional organizations that have a publication component should have a strongly articulated position against plagiarism. Such a position has a solid foundation in common understandings of ethical principles including the encouragement of honesty and the discouragement of stealing. Having a strong, ethical position against plagiarism is different from the implementation of a strong, enforceable policy against plagiarism. This paper examines some practical challenges to enforcement policies, including legal liability. These challenges may complicate the development of a broad, enforceable policy against plagiarism that includes sanctions against authors found to be plagiarists. Additionally, such sanctions are needed to deter authors from submitting plagiarized works. One important aspect of discouraging plagiarism is a better use of computer applications that detect copying. Authors can use these applications to avoid unintentional plagiarism; reviewers and publishers can use these applications to keep plagiarized articles from being published.
2

Uncharted Territory: Receptions of Philosophy in Apollonius Rhodius’ Argonautica

Marshall, Laura Ann January 2017 (has links)
No description available.
3

Analysis of an aerobic membrane bioreactor with the application of event detection software and variable operational filtration modes

Leow, Aaron S. January 2015 (has links)
No description available.
4

More Obstacles for the Graduate Student Author: Open Access ETDs Trigger Plagiarism Detectors

Dawson, DeDe, Langrell, Kate 14 December 2023 (has links) (PDF)
Supporting graduate students as authors is one of the many services we provide at the University Library, University of Saskatchewan (USask). Graduate students often submit articles to journals based on content from their electronic theses or dissertations (ETDs). Recently, we have noticed an increase in the number of such article submissions being flagged for possible rejection on “plagiarism” or “prior publication” grounds. We suspect this may be because plagiarism detection software is increasingly being integrated into publishers’ article submission systems. This software is triggered by the existence of the student’s open access (OA) ETD in our institutional repository. This happens despite OA ETD inclusion in repositories being a common practice and despite journal policies often allowing submission of articles based on ETDs. We review common practices and guidelines around publishing of ETD content, two recent cases of journals initially rejecting such submissions by graduate student authors of our institution, and our reflections on this issue and how to address it.
5

Exploring Faculty Responses to Student Plagiarism

McCorkle, Sarah 02 June 2020 (has links)
No description available.
6

Fault prediction in information systems

Walden, Love January 2019 (has links)
Fault detection is a key component to minimizing service unavailability. Fault detection is generally handled by a monitoring system. This project investigates the possibility of extending an existing monitoring system to alert based on anomalous patterns in time series.The project was broken up into two areas. The first area conducted an investigation whether it is possible to alert based on anomalous patterns in time series. A hypothesis was formed as follows; forecasting models cannot be used to detect anomalous patterns in time series. The investigation used case studies to disprove the hypothesis. Each case study used a forecasting model to measure the number of false, missed and correctly predicted alarms to determine if the hypothesis was disproved.The second area created a design for the extension. An initial design of the system was created. The design was implemented and evaluated to find improvements. The outcome was then used to create a general design.The results from the investigation disproved the hypothesis. The report also presents a general software design for an anomaly detection system. / Feldetektering är en nyckelkomponent för att minimera nedtid i mjukvarutjänster. Feldetektering hanteras vanligtvis av ett övervakningssystem. Detta projekt undersöker möjligheten att utöka ett befintligt övervakningssystem till att kunna skicka ut larm baserat på avvikande mönster i tidsserier.Projektet bröts upp i två områden. Det första området genomförde en undersökning om det är möjligt att skicka ut larm baserat på avvikande mönster i tidsserier. En hypotes bildades enligt följande; prognosmodeller kan inte användas för att upptäcka avvikande mönster i tidsserier. Undersökningen använde fallstudier till att motbevisa hypotesen. Varje fallstudie använde en prognosmodell för att mäta antalet falska, missade och korrekt förutsedda larm. Resultaten användes sedan för att avgöra om hypotesen var motbevisad.Det andra området innefattade skapadet av en mjukvarudesign för utökning av ett övervakningssystem. En initial mjukvarudesign av systemet skapades. Mjukvarudesignen implementerades sedan och utvärderades för att hitta förbättringar. Resultatet användes sedan för att skapa en generell design. Resultaten från undersökningen motbevisade hypotesen. Rapporten presenterar även en allmän mjukvarudesign för ettanomalitetsdetekteringssystem.
7

A Topic Modeling approach for Code Clone Detection

Khan, Mohammed Salman 01 January 2019 (has links)
In this thesis work, the potential benefits of Latent Dirichlet Allocation (LDA) as a technique for code clone detection has been described. The objective is to propose a language-independent, effective, and scalable approach for identifying similar code fragments in relatively large software systems. The main assumption is that the latent topic structure of software artifacts gives an indication of the presence of code clones. It can be hypothesized that artifacts with similar topic distributions contain duplicated code fragments and to prove this hypothesis, an experimental investigation using multiple datasets from various application domains were conducted. In addition, CloneTM, an LDA-based working prototype for code clone detection was developed. Results showed that, if calibrated properly, topic modeling can deliver a satisfactory performance in capturing different types of code clones, showing particularity good performance in detecting Type III clones. CloneTM also achieved levels of performance comparable to already existing practical tools that adopt different clone detection strategies.

Page generated in 0.1206 seconds