Journal of Shanghai Jiaotong University ›› 2012, Vol. 46 ›› Issue (06): 989-993.
• Automation Technique, Computer Technology • Previous Articles Next Articles
YUAN Song-Xiang, LIU Gong-Shen
Received:2011-09-04
Online:2012-06-28
Published:2012-06-28
CLC Number:
YUAN Song-Xiang, LIU Gong-Shen. Research of Ch-En Cross-Lingual Plagiarism Detection Based on Translation Features[J]. Journal of Shanghai Jiaotong University, 2012, 46(06): 989-993.
| [1]鲍军鹏, 沈钧毅, 刘晓东, 等. 自然语言文档复制检测研究综述[J]. 软件学报,2003,14(10):17531760.BAO Junpeng, SHEN Junyi, LIU Xiaodong, et al. A surver on natural language text copy detection[J]. Journal of Software, 2003, 14(10): 17531760.[2]金博, 史彦军, 滕弘飞. 中文文档复制检测系统研究[J]. 计算机工程,2005, 31(10): 7981.JIN Bo, SHI Yanjun, TENG Hongfei. Study on documents copy detection system[J]. Computer Engineering, 2005, 31(10): 7981.[3]聂规划, 付志超, 陈冬林, 等. 基于本体的论文复制检测系统[J]. 计算机工程,2009, 35(6):7984.NIE Guihua, FU Zhichao, CHEN Donglin, et al. Ontologybased thesis copy detection system[J]. Computer Engineering, 2009, 35(6): 7984.[4]朱一凡. 翻译误区与汉语的畸形欧化[J]. 民族论坛, 2008, 21(2):5658.ZHU Yifan. Erros in translation and europeanization deformity of Chinese[J]. Forum of People, 2008, 21(2): 5658.[5]贺阳. 现代汉语欧化语法现象研究[J]. 世界汉语教学,2008, 8(4):1631.HE Yang. Study on the phenomenon of Europeanization in Modern Chinese[J]. World Chinese Teaching, 2008, 8(4): 1631.[6]Parker A, Hamblen J O. Computer algorithms for plagiarism detection[J]. IEEE Transactions on Education, 1989,32(2):9499.[7]BarrónCede〖KG-*4〗n〖DD(-*2/3〗〖KG*4〗〖HT4.〗~〖DD)〗o A, Rosso P, Pinto D, et al. On crosslingual plagiarism analysis using a statistical model[C]∥ECAI’08 PAN Workshop Uncovering Plagiarism. Patras, Greece: Authorship, and Social Software Misuse, 2008: 913.[8]Brin S, Davis J, GarciaMolina H. Copy detection mechanisms for digital documents[C]∥SIGMOD ’95, Proceedings of the ACM SIGMOD Annual Conference. New York, USA: ACM Press, 1995: 398409.[9]Brown P F, Della Pietra S A, Della Pietra V J, et al. The mathematics of statistical machine translation: Parameter estimation[J]. Computational Linguistics, 1993, 19(2):263311.[10]Ceska Z, Toman M, Jezek K. Multilingual plagiarism detection[C]∥AIMSA’08: Proceedings of the 13th International Conference on Artificial Intelligence. Berlin, Heidelberg: SpringerVerlag, 2008: 8392.[11]Kumarn S, Molnah G. SCAM: A copy detection mechanism for digital documents[C]∥Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries.Austin: Texas A & M University, 1995: 201210. |
| [1] | ZHANG Baolei1, WU Yuke2, TANG Yufeng2. Fault Diagnosis of Electric Slip Ring of EPSO Single Point Mooring Base on CART Decision Tree [J]. Ocean Engineering Equipment and Technology, 2024, 11(2): 95-100. |
| [2] | CHEN Xiao1,2 (陈潇), ZHANG Rui1,2 (张瑞), TANG Xinyi1,2 (汤心溢), QIAN Juan3∗ (钱娟). Prediction of Pediatric Sepsis Using a Deep Encoding Network with Cross Features [J]. J Shanghai Jiaotong Univ Sci, 2024, 29(1): 131-140. |
| [3] | LI Chuan, NIE Yiwen, LIU Junwei, MENG Fanqin, SHEN Xiaojing . A Robust Multi-Algorithm Fusion Track Initiation Algorithm Based on Machine Learning [J]. Air & Space Defense, 2022, 5(1): 20-24. |
| [4] | HUANG Jinchao,MA Yinghua,QI Kaiyue,LI Yichen,XIA Yuanyi. An Ensemble-Based Intrusion Detection Algorithm [J]. Journal of Shanghai Jiao Tong University, 2018, 52(10): 1382-1387. |
| [5] | ZIA-UR REHMAN Muhammad1, LI Tian-rui1 (李天瑞), LI Tao2 (李涛). Exploiting Empirical Variance for Data Stream Classification [J]. Journal of shanghai Jiaotong University (Science), 2012, 17(2): 245-250. |
| [6] | ZHU Haodong. Research on Improvement and Simplification of ID3 Algorithm [J]. Journal of Shanghai Jiaotong University, 2010, 44(07): 883-0886. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||