{"updated":"2025-01-22T00:21:50.183127+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00068073","sets":["1164:4842:6041:6042"]},"path":["6042"],"owner":"10","recid":"68073","title":["類似性に基づくレポート剽窃の検出ツールのプラグイン化"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-02-27"},"_buckets":{"deposit":"63b3cc93-71d4-4717-a585-1ade1274298d"},"_deposit":{"id":"68073","pid":{"type":"depid","value":"68073","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"類似性に基づくレポート剽窃の検出ツールのプラグイン化","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"類似性に基づくレポート剽窃の検出ツールのプラグイン化"},{"subitem_title":"Plug-in Module of Detection Methods for Plagiarism of Online Reports based on Similarity","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2010-02-27","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"香川大学工学部"},{"subitem_text_value":"香川大学工学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Faculty of Engineering, Kagawa University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Engineering, Kagawa University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/68073/files/IPSJ-CE10103004.pdf"},"date":[{"dateType":"Available","dateValue":"2012-02-27"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CE10103004.pdf","filesize":[{"value":"872.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"19"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7dadc47d-62e8-4832-8b1f-cc791c9fcd76","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2010 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"上田, 和志"},{"creatorName":"富永, 浩之"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazushi, Ueta","creatorNameLang":"en"},{"creatorName":"Hiroyuki, Tominaga","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10096193","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"レポートのオンライン提出においては,学生が安易に答案の剽窃を行いやすい.そこで,類似性に基づくレポート剽窃の検出ツールを開発し,各種の教育支援システムにプラグインとして提供する.類似性の判定には,編集距離および圧縮比率に基づく 2 つの手法を併用する.適切な事前処理を行って,実用的な判定精度と効率化を目指す.特に,ソースコードの自動採点システムに導入し,不正行為の摘発だけでなく,レポート提出時の警告にも利用する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, the network environment in classroom has been much improved. However, the facilities may promote the imprudent plagiarism of other's answer in online report submission. We developed the detection tool for report plagiarism based on similarity. We adopt two kinds of approach for similarity judgment. The one is text base by edit distance. The another is binary base by file compression ratio. We prepare some preprocess for adequate judgment precision and cost performance. We apply it for source codes of C language. It is as a plug-in module of tProgrEss, a support server for programming exercise with a contest style. It uses not only for exposure of the fraudulent activity by a teacher but also for the warnings at the time of students' uploading.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータと教育(CE)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2010-02-27","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"2010-CE-103"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"created":"2025-01-18T23:28:12.837340+00:00","id":68073,"links":{}}