{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:23:30Z","timestamp":1747196610585,"version":"3.40.5"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319135717"},{"type":"electronic","value":"9783319135724"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-13572-4_13","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T15:20:32Z","timestamp":1416583232000},"page":"163-172","source":"Crossref","is-referenced-by-count":2,"title":["Utilizing Text Similarity Measurement for Data Compression to Detect Plagiarism in Czech"],"prefix":"10.1007","author":[{"given":"Hussein","family":"Soori","sequence":"first","affiliation":[]},{"given":"Michal","family":"Prilepok","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Platos","sequence":"additional","affiliation":[]},{"given":"V\u00e1clav","family":"Sn\u00e1\u0161el","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3233\/WIA-2011-0203","volume":"9","author":"M.S. Pera","year":"2011","unstructured":"Pera, M.S., Ng, Y.K.: SimPaD: A word-similarity sentence-based plagiarism detection tool on Web documents. Web Intelligence and Agent Systems\u00a09(1), 27\u201341 (2011)","journal-title":"Web Intelligence and Agent Systems"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Gustafson, N., Pera, M.S., Ng, Y.K.: Nowhere to hide: Finding plagiarized documents based on sentence similarity. In: Proceedings of the 2008 IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology, vol.\u00a001, pp. 690\u2013696. IEEE Computer Society (2008)","DOI":"10.1109\/WIIAT.2008.16"},{"key":"13_CR3","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1007\/978-3-642-35326-0_56","volume-title":"Advanced Machine Learning Technologies and Applications","author":"P. Foudeh","year":"2012","unstructured":"Foudeh, P., Salim, N.: A Holistic Approach to Duplicate Publication and Plagiarism Detection Using Probabilistic Ontologies. In: Hassanien, A.E., Salem, A.-B.M., Ramadan, R., Kim, T.-h. (eds.) AMLTA 2012. CCIS, vol.\u00a0322, pp. 566\u2013574. Springer, Heidelberg (2012)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Liu, C., Chen, C., Han, J., Yu, P.S.: GPLAG: detection of software plagiarism by program dependence graph analysis. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 872\u2013881. ACM (August 2006)","DOI":"10.1145\/1150402.1150522"},{"issue":"7","key":"13_CR5","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TIT.2004.830793","volume":"50","author":"X. Chen","year":"2004","unstructured":"Chen, X., Francia, B., Li, M., Mckinnon, B., Seker, A.: Shared information and program plagiarism detection. IEEE Transactions on Information Theory\u00a050(7), 1545\u20131551 (2004)","journal-title":"IEEE Transactions on Information Theory"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Schleimer, S., Wilkerson, D.S., Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 76\u201385. ACM (June 2003)","DOI":"10.1145\/872757.872770"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-45111-9_24","volume-title":"Advances in Soft Computing and Its Applications","author":"M. Pr\u00edlepok","year":"2013","unstructured":"Pr\u00edlepok, M., Platos, J., Snasel, V.: Similarity based on data compression. In: Castro, F., Gelbukh, A., Gonz\u00e1lez, M. (eds.) MICAI 2013, Part II. LNCS, vol.\u00a08266, pp. 267\u2013278. Springer, Heidelberg (2013)"},{"key":"13_CR8","series-title":"LNEE","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-642-41968-3_22","volume-title":"AETA 2013: Recent Advances in Electrical Engineering and Related Sciences","author":"H. Soori","year":"2014","unstructured":"Soori, H., Prilepok, M., Platos, J., Berhan, E., Snasel, V.: Text Similarity Based on Data Compression in Arabic. In: Zelinka, I., Duy, V.H., Cha, J. (eds.) AETA 2013. LNEE, vol.\u00a0282, pp. 211\u2013220. Springer, Heidelberg (2014)"},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.aei.2008.05.001","volume":"22","author":"J. Platos","year":"2008","unstructured":"Platos, J., Snasel, V., El-Qawasmeh, E.: Compression of small text files. Advanced Engineering Informatics\u00a022(3), 410\u2013417 (2008)","journal-title":"Advanced Engineering Informatics"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Chuda, D., Uhlik, M.: The plagiarism detection by compression method. In: Proceedings of the 12th International Conference on Computer Systems and Technologies, pp. 429\u2013434. ACM (June 2011)","DOI":"10.1145\/2023607.2023679"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Tversky, A.: Similarity features. Psychological Review (84), 327\u2013352 (1977)","DOI":"10.1037\/0033-295X.84.4.327"},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1109\/TIT.2005.844059","volume":"51","author":"R. Cilibrasi","year":"2005","unstructured":"Cilibrasi, R., Vit\u00e1nyi, P.M.: Clustering by compression. IEEE Transactions on Information Theory\u00a051(4), 1523\u20131545 (2005)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"12","key":"13_CR13","doi-asserted-by":"publisher","first-page":"3250","DOI":"10.1109\/TIT.2004.838101","volume":"50","author":"M. Li","year":"2004","unstructured":"Li, M., Chen, X., Li, X., Ma, B., Vitanyi, P.M.: The similarity metric. IEEE Transactions on Information Theory\u00a050(12), 3250\u20133264 (2004)","journal-title":"IEEE Transactions on Information Theory"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Landau, Z.: Randomizing the replacement attack. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2004), vol.\u00a05, p. V-381. IEEE (May 2004)","DOI":"10.1109\/ICASSP.2004.1327127"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Crnojevic, V., Senk, V., Trpovski, Z.: Lossy lempel-ziv algorithm for image compression. In: 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, TELSIKS 2003, vol.\u00a02, pp. 522\u2013525. IEEE (October 2003)","DOI":"10.1109\/TELSKS.2003.1246280"},{"issue":"5","key":"13_CR16","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TIT.1978.1055934","volume":"24","author":"J. Ziv","year":"1978","unstructured":"Ziv, J., Lempel, A.: Compression of individual sequences via variable-rate coding. IEEE Transactions on Information Theory\u00a024(5), 530\u2013536 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"key":"13_CR17","unstructured":"Khoja, S., Garside, R.: Stemming Arabic text. Computing Department, Lancaster University, Lancaster, UK (1999)"},{"key":"13_CR18","unstructured":"iDNES.cz (2014), http:\/\/www.idnes.cz\/"},{"key":"13_CR19","unstructured":"Semantikoz (2014), http:\/\/www.semantikoz.com\/blog\/free-stop-word-lists-in-23-languages\/"}],"container-title":["Advances in Intelligent Systems and Computing","Afro-European Conference for Industrial Advancement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13572-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T20:16:09Z","timestamp":1747167369000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13572-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319135717","9783319135724"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13572-4_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}