透過您的圖書館登入
IP:3.21.43.192
  • 期刊

程式抄襲源頭偵測之研究

The Research of Source Code Detecting for Plagiarism Program

摘要


過去研究多著重於程式的抄襲比對,僅有少數的研究對於抄襲源頭與抄襲群組進行尋找,但這些方法均不是針對學生作業抄襲的領域而設計。本研究使用程式抄襲與複製偵測的文獻為基礎,將相似的作業結合為群組,並以程式“重要片段”的概念;利用重要片段的參考性、重要片段的傳遞性以及重要片段位於群內相似性與群間差異性,計算抄襲群組中的源頭可能性;最後再透過權重訓練模式訓練抄襲群組的權重,提升真正源頭被偵測的可能性。實驗結果顯示:(1)抄襲分數計算從一至五個群組的樣本,均可具有良好的源頭偵測率。(2)使用權重訓練模式能有效提升真實源頭的權重分數,並且降低非源頭的誤判率。(3)重要片段的三階段分數計算能有效形成組內分數差異,使得真實源頭更容易被偵測。當抄襲群組與真實源頭被分析出來後,授課老師即可進一步的藉由抄襲群組比對學生間的同儕群組競合關係,以評估同學之間是否有抄襲或被抄襲的動機。

並列摘要


In the past, studies focused on the plagiarism of programs. Only a few studies looked for plagiarism sources and plagiarism groups, but these methods were not designed for the field of student plagiarism. This study is based on the papers of plagiarism and copy detection, combining similar assignments into groups, and using the concept of "important fragments" of programs; using the reference of important fragments, the transitivity of important fragments, and the internal similarity and inter-group difference of important fragments located in the group, to calculate the source possibility in the plagiarism group; finally, the weight training mode is used to train the weight of the plagiarized group, and the possibility that the true source is detected is improved. The experimental results show that: (1) plagiarism scores can be sampled from one to five groups, all with good source detection rate. (2) The use of weight training mode can effectively improve the weight score of the real source and reduce the false positive rate of non-source. (3) The three-stage score calculation of important segments can effectively form the difference in scores within the group, making the real source more easily detected. After the plagiarism group and the real source are analyzed, the instructor can further evaluate the ambiguity of plagiarism or plagiarism between the students by plagiarizing the group to match the competing group relationship between the students.

參考文獻


張火燦、劉淑寧,從社會網絡理論探討員工知識分享,人力資源管理學報,第 2 卷第 2 期,2002,頁 101-113。
游景翔,混合式電腦程式抄襲偵測,國立台灣科技大學資訊工程系碩士論文,2007。
黃政傑、張嘉育(2010),讓學生成功學習:適性課程與教學之理念與策略,課程與教學季刊,第 3 卷第 13 期,頁 1-22。
Baker, B. S., Parameterized diff, In Proceedings of the 10th ACM-SIAM Symposium on Discrete Algorithms (SODA’99), USA, January 1999, pp. 854-855.
Baxter, I. D., Yahin, A., Moura, L., Sant’Anna, M. & Bier, L., Clone Detection Using Abstract Syntax Trees, 14th IEEE International Conference on Software Maintenance (ICSM'98), March 1998, pp. 368-377.

延伸閱讀