Skip to main content

Plagiarism Detection in SQL Student Assignments

  • Conference paper
  • First Online:
Teaching and Learning in a Digital World (ICL 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 716))

Included in the following conference series:

Abstract

An original method for plagiarism detection in SQL student assignments has been proposed. The method is based on identifying so-called “SQL lexemes” - persistent elements of an SQL statement, and “SQL variables” - easily modifiable elements of SQL statements. Thus, any SQL statements can be replaced with a so-called token - sequence of SQL lexemes and SQL variables. Distance between SQL tokens can be calculated using such a well-known algorithm as Levenshtein Metric. Small values of Levenshtein distance between tokens detect such SQL statements that were built by modifications of others.

We also present first practical results of actual application of the algorithm, and discuss further developments of the method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Black, P.E. (ed.): Levenshtein distance. In: Dictionary of Algorithms and Data Structures [https://xlinux.nist.gov/dads/]. U.S. National Institute of Standards and Technology (2008). Accessed 4 May 2017

  2. Macfadyen, L.P., Dawson, S.: Mining LMS data to develop an “early warning system” for educators: a proof of concept. Comput. Educ. 54(2), 588–599 (2010)

    Article  Google Scholar 

  3. Wu, J.H., Tennyson, R.D., Hsia, T.L.: A study of student satisfaction in a blended e-learning system environment. Comput. Educ. 55(1), 155–164 (2010)

    Article  Google Scholar 

  4. Dietinger, T., Maurer, H.: GENTLE – General Network Training and Learning Environment. In: Proceedings of ED-MEDIA98/ED-TELECOM 1998, Freiburg, pp. 274–280 (1998)

    Google Scholar 

  5. Ebner, M., Scerbakov, N., Maurer, H.: New features for e-learning in higher education for civil engineering. J. Univ. Sci. Technol. Learn. 1(1), 93–106 (2016)

    Google Scholar 

  6. Scerbakov, A., Ebner, M., Scerbakov, N.: Using cloud services in a modern learning management system. J. Comput. Inf. Technol. 23(1), 75–86 (2015)

    Article  Google Scholar 

  7. Scerbakov, N.: TU Graz Teach-Center (2001). http://coronet-iicm.tugraz.at/wbtmaster/welcome.html. Accessed 13 Apr 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikolai Scerbakov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Scerbakov, N., Schukin, A., Sabinin, O. (2018). Plagiarism Detection in SQL Student Assignments. In: Auer, M., Guralnick, D., Simonics, I. (eds) Teaching and Learning in a Digital World. ICL 2017. Advances in Intelligent Systems and Computing, vol 716. Springer, Cham. https://doi.org/10.1007/978-3-319-73204-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73204-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73203-9

  • Online ISBN: 978-3-319-73204-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics