ischoood:一种识别具有明确内容的可疑复制作业文件的工具软件

Gang Lu, Jingyang Gao, Ruiqi Li
{"title":"ischoood:一种识别具有明确内容的可疑复制作业文件的工具软件","authors":"Gang Lu, Jingyang Gao, Ruiqi Li","doi":"10.1109/ICCSE49874.2020.9201869","DOIUrl":null,"url":null,"abstract":"For the homework that has a definitive result, identifying suspicious copied homework documents from a mass of submitted ones is usually a laborious work. Because the documents have almost the same contents, it is impossible to discover copied ones by reading and comparing their contents in detail. However, copied documents will have similar or even the same file properties to the original ones. That makes it possible to identify the suspicious copied documents with similar file properties. We develop a tool software to process the comparisons automatically. It is based on an open source third-party library, and is developed in .NET as a Windows Form application. It simply reads the file properties, and calculates the hash strings from them. It is not necessary to compare every pair of hash strings. It is just needed to sort all the files by their hash strings, then the files with the same hash strings will be put together. The tool software is named iSchood, which means Identifying Suspicious Copied HOmewOrk Documents. By this software, the suspicious copied documents can be identified in a fast and lightweight way.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"iSchood: a Tool Software for Identifying Suspicious Copied Homework Documents with Definitive Contents\",\"authors\":\"Gang Lu, Jingyang Gao, Ruiqi Li\",\"doi\":\"10.1109/ICCSE49874.2020.9201869\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the homework that has a definitive result, identifying suspicious copied homework documents from a mass of submitted ones is usually a laborious work. Because the documents have almost the same contents, it is impossible to discover copied ones by reading and comparing their contents in detail. However, copied documents will have similar or even the same file properties to the original ones. That makes it possible to identify the suspicious copied documents with similar file properties. We develop a tool software to process the comparisons automatically. It is based on an open source third-party library, and is developed in .NET as a Windows Form application. It simply reads the file properties, and calculates the hash strings from them. It is not necessary to compare every pair of hash strings. It is just needed to sort all the files by their hash strings, then the files with the same hash strings will be put together. The tool software is named iSchood, which means Identifying Suspicious Copied HOmewOrk Documents. By this software, the suspicious copied documents can be identified in a fast and lightweight way.\",\"PeriodicalId\":350703,\"journal\":{\"name\":\"2020 15th International Conference on Computer Science & Education (ICCSE)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 15th International Conference on Computer Science & Education (ICCSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSE49874.2020.9201869\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th International Conference on Computer Science & Education (ICCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSE49874.2020.9201869","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

对于有明确结果的作业,从大量提交的作业文件中识别可疑的复制作业文件通常是一项艰苦的工作。由于文件的内容几乎相同,因此不可能通过详细阅读和比较内容来发现复制文件。但是,复制的文档将具有与原始文档相似甚至相同的文件属性。这使得识别具有相似文件属性的可疑复制文档成为可能。我们开发了一个工具软件来自动处理比较。它是基于一个开源的第三方库,并在。net中作为Windows窗体应用程序开发的。它只是读取文件属性,并从中计算散列字符串。没有必要比较每一对哈希字符串。只需要按散列字符串对所有文件进行排序,然后将具有相同散列字符串的文件放在一起。这个工具软件被命名为ischoood,意思是识别可疑的复制作业文件。通过该软件,可以快速、轻松地识别可疑的复制文件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
iSchood: a Tool Software for Identifying Suspicious Copied Homework Documents with Definitive Contents
For the homework that has a definitive result, identifying suspicious copied homework documents from a mass of submitted ones is usually a laborious work. Because the documents have almost the same contents, it is impossible to discover copied ones by reading and comparing their contents in detail. However, copied documents will have similar or even the same file properties to the original ones. That makes it possible to identify the suspicious copied documents with similar file properties. We develop a tool software to process the comparisons automatically. It is based on an open source third-party library, and is developed in .NET as a Windows Form application. It simply reads the file properties, and calculates the hash strings from them. It is not necessary to compare every pair of hash strings. It is just needed to sort all the files by their hash strings, then the files with the same hash strings will be put together. The tool software is named iSchood, which means Identifying Suspicious Copied HOmewOrk Documents. By this software, the suspicious copied documents can be identified in a fast and lightweight way.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Introduction of the new Operating System Kernel Internals for the New Metrics for the Performance Prediction on the Clouds Abnormal Event Detection in Video Based on Sparse Representation The Mechanism of Intelligent Technology Reforming Education Based on the Perspective of Embodied Cognitive Theory* Multi-integrated Reform for the Course of Data Structure Intelligent Distribution Platform of Network Shared Resources Based on Cloud Computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1