Page Length: 68

Size: 4643 KB

Format: PDF & Word

5,000.00

CHAPTER ONE

INTRODUCTION

1.1 Background of the Study

In this modern age, where information technology is changing the lives of people constantly across the globe, the computer system has become something of great importance to even the commonest of man. The number of application which computer have been put can be said to be virtually unlimited. This is no surprise, as there are no limits to the number of problems that old arise from all fields of human endeavor. In fact, any problem can be solved with a computer as long as its solution can be expressed as a logical sequence of executable steps.

The essence for one going to school is for better survival tomorrow wherein becoming what he or she is capable of becoming what he or she wants in life. And the desire of knowledge is the natural feeling of mankind and every human being whose mind is not debauched will be willing to give all that is required of him or her to get knowledge.

While academic dishonesty is not a new phenomenon, there is no agreement about why plagiarism is so prevalent in the academic world. It is broadly acknowledged that online plagiarism is really high because of the easy availability of information.

A mass survey conducted by Rutgers University reports that 38% of students involved in online plagiarism. These alarming figures show a gradual increase of the phenomenon (Heyward, 2020).

Most of graduating students nowadays go to library and choose four or five research project topics done some years back and submit to their supervisors for approval. When any of these topics is approved, they just go and copy everything verbatim, except preliminary pages claiming to be the pioneers of those research projects. This has devastating effect on our educational set up. To solve this situation from getting out of hand, a modern technological step needs to be taken. Even though, it cannot stop plagiarism in totality, still it reduces it into manageable level.

Maurer, Kappe, and Zaka (2019) considered Plagiarism to be a most serious scholastic misconduct; academia everywhere is undertaking efforts to educate the students and teachers, by offering guides and tutorials to explain types of plagiarism and how to avoid it.

Today academic research supervisors and reviewers of all scholarly journals look for the following for students’ chapter’s approval and selection of a paper for its inclusion in a journal:

  • Originality – what’s new about subject?
  • Relevance to the topic?
  • Research methodology – are conclusions valid and objective?
  • Clarity, structure and quality of writing – does it communicate well?
  • Sound, logical progression of argument
  • Currency of references
  • Compliance to the editorial scope and objectives of the journal (Navin, Soni, & Makhdumi, 2019).

A computer based academic research paper plagiarism checking system is important for the management of Federal Polytechnic Oko as well as for the staff and productivity. Unfortunately, the system seemed to be far-fetched, especially when it was done manually using many different methods of data manipulation. But with automation, only the administrator will have to be responsible for the manipulation of data using highly advanced and user friendly user interfaces. This of course will result in speed and accuracy in data handling.

 

 

 

  • Statement of the Problems

These problems includes:

  1. The traditional way of registering research paper and checking plagiarism in our higher institution always encounter challenges.
  2. There is much delay in registering research paper and checking research plagiarism.
  • There is lack of clarity across academic institutions about what constitutes plagiarism and a discrepancy in the way plagiarism is checkmated and enforced.
  1. Lecturers struggles to check research paper plagiarism due to the manual checking system.
  2. There is no fast track system for checking duplicated students’ proposed research topic. Conflict of topic between two individual or group of students in the same department.
  3. Loss of record: Information and records stored in cabinets could be physically damaged or due to lack of backup or lost due to theft.

 

1.3 Aim and Objectives of the Study

The main aim of this project is to design and implement an academic research paper plagiarism checking system for Federal Polytechnic Oko that will let the school get an up-to-date information of each and every research works. In achieving this, the specific objectives were formulated as:

  1. To provide a unified database to store research paper records.
  2. To develop a system that will checkmate plagiarized text on internet when searched.
  • To ensure that when plagiarized text are found, they are saved in the database using the system developed to avoid students from repeating the same project topic.
  1. To ensure fast track in checking duplicated students’ proposed research topic.
  2. To ensure data security by restricting access to the program and to the database.
  3. To ensure easy access and retrieval of data in the program.

 

  • Significance of the Study

The significance and benefit of this research work is to put an end to the above stated problems. This new system will benefit immensely from the features the platform will offer, which includes; the new system will provide a unified database to store research paper records, a system that will checkmate plagiarized text on internet when searched, checking duplicated students’ proposed research topic, and also it will reduce pressure of work on staffs in attempt to check plagiarized research paper, and also make data recovery stress-free, and finally it will benefit researcher to further enhance or modify the topic. Hence, the need for computerization of academic research paper plagiarism checking system cannot be over emphasized.

 

1.5 Scope of the Study

The scope of this research is limited to designing a Computer-based academic research paper plagiarism checking system for Federal Polytechnic, Oko, Anambra state, which will serve as a central repository for all information of her researchers.

 

1.6 Limitations of Study

In the course of carrying out this research work a number of problems were encountered.

  1. Lack of adequate fund to finance the project: this was another limitation to this work because much money is needed to carry out a detailed research work which is not easily borne by every student.
  2. The limited knowledge of ASP.net and Visual Basic programming was great challenge to this project. However, more research was made to complete this project successfully.

 

1.7 Definition of Terms

Automation: it is the replacement of human workers by technology; a system in which a workplace or processes has been converted to one that replaced or ministries human labor with electronic or mechanical equipment.

Checking: it is the act of examining (something) in order to determine its accuracy, quality, or condition, or to detect the presence of something.

Data processing: it is defined as the entire process of converting or manipulating data into definite meaningful information (Adigwe & Okoye, 2019).

Data Security: Data security prevents unauthorized users from viewing or updating the database by the use of passwords.

Data: is any collections of vital information that meant to be processed.

Database Management System (DBMS): it is software which controls the flow of data and checks and checks on how data are stored.

Database: is an organized /unique collection of related files. It is a collection of schemas, tables, queries, reports, views and other object.

Design: is the art or process of designing how something will look, work.

Documentation: material that provides official information or evidence that serves as record; written specifications and information that describes the product.

Drives: Computer Hard Disk, CD Plate use, External Hard Disk, Flash Disk, etc.

Folder: Computer Directory that stores files.

Implementation: The process of putting a newly developed computer program into the actual task which it is designed for.

Information: is a processed data that can be read and understand.

Management: it is act of getting people together to accomplish desired goals and objectives using available resources efficiently and effectively. It includes planning, organizing, staffing, leading or directing, and controlling an organization or a system to accomplish a goal.

Originality: First initiated/compiled information by researcher.

Plagiarism: is derived from the Latin word “plagiarius” which means kidnapper. It is defined as “the passing off of another person’s work as if it were one’s own, by claiming credit for something that was actually done by someone else” (Wikipedia, 2021).

Program: Set of instructions or commands written in a specific programming language to guide computer in executing a particular task.

Programming Language: Set of specific codes used to write computer program.

Research Topic Duplicate:   Another similar project research topic found.

Security: This helps to prevent unauthorized users from illegally accessing certain data within the database, it protects your data/ files.

Software: is a program or a set of programs written to carry out some task in the computer, it also perform logical related programs that works together to control the hardware.

Supervisor: Project Academic advisor.

Suspicious information/Text: Information that researcher claims ownership and Supervisor doubts it.

System: It is the collection of hardware and software, data information procedure and people.

Testing: Evaluation of designed/produced software.

DOWNLOAD COMPLETE WORK

DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.

WeCreativez WhatsApp Support
Administrator (Online)
Hello and welcome. I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.