{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:09:39Z","timestamp":1730344179049,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/iconac.2018.8749122","type":"proceedings-article","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T22:15:49Z","timestamp":1562278549000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Framework for Plagiarism Detection: A Case Study for Urdu Language"],"prefix":"10.23919","author":[{"given":"Waqar","family":"Ali","sequence":"first","affiliation":[]},{"given":"Tanveer","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Zobia","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Anwar Ur","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Ansar","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Ghulam","family":"Dustgeer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.08.008"},{"journal-title":"Intrinsic Plagiarism Detection Using Character Trigram Distance Scores","year":"2011","author":"kestemont","key":"ref11"},{"key":"ref12","first-page":"55","article-title":"The influence of text pre-processing on plagiarism detection","author":"ceska","year":"0","journal-title":"Proceedings of the International Conference RANLP-2009"},{"key":"ref13","article-title":"Using Natural Language Processing for Automatic Detection of Plagiarism","author":"chong","year":"2010","journal-title":"Language (Baltim)"},{"key":"ref14","first-page":"1880","article-title":"Combination of VSM and Jaccard coefficient for external plagiarism detection. In Machine Learning and Cybernetics (ICMLC)","volume":"4","author":"wang","year":"0","journal-title":"2013 International Conference on"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNIT.2011.6020940"},{"journal-title":"Similarity Matching Techniques","year":"2017","author":"lodhi","key":"ref16"},{"key":"ref17","article-title":"A Deep Learning Approach to Persian Plagiarism Detection","author":"gharavi","year":"2016","journal-title":"Fire"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1181"},{"journal-title":"Plagiarism Taxonomy Tools and Detection Techniques","year":"2018","author":"chowdhury","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9112-1"},{"key":"ref6","article-title":"Theory and Applications of Similarity Detection Techniques","author":"zaka","year":"2009","journal-title":"Science (80- )"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2014.7019659"},{"key":"ref8","article-title":"Turning it in: Experiences","author":"razon","year":"2017","journal-title":"Challenges and Recommendations for the Appropriate Use of Plagiarism Detection Software"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2012.10.10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223855"},{"key":"ref1","first-page":"79","article-title":"A Method For Arabic Documents Plagiarism Detection","volume":"15","author":"ali","year":"2017","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref9","first-page":"6733","article-title":"An Improved NLP Approach for Detection of Plagiarism in Scientific Paper","volume":"13","author":"pandey","year":"2018","journal-title":"International Journal of Applied Engineering Research"}],"event":{"name":"2018 24th International Conference on Automation and Computing (ICAC)","start":{"date-parts":[[2018,9,6]]},"location":"Newcastle upon Tyne, United Kingdom","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 24th International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8742895\/8748945\/08749122.pdf?arnumber=8749122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:09:35Z","timestamp":1598227775000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8749122\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/iconac.2018.8749122","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}