International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 10 Issue: 09 | Sep 2023
p-ISSN: 2395-0072
www.irjet.net
A Plagiarism Checker: Analysis of time and space complexity Mr. Prashanth Kumar HM1 & Dr. Subramanya Bhat S2 1Research Scholar, College of Computer Science, Srinivas University, Mangalore, India 2 Professor, College of Computer Science, Srinivas University, Mangalore, India
---------------------------------------------------------------------***--------------------------------------------------------------------diagnostics, financial transactions, and more. As such, the Abstract - In Plagiarism processing, the time and space accuracy of these systems holds immense.
complexity are important concepts in software internal process, that describe the efficiency and resource requirements of algorithms and programs. The time of the plagiarism process called time complexity, refers to the amount of time an algorithm takes to complete its document execution as a function of the input size. It provides an upper bound on the number of basic operations (such as searching data, matching, arithmetic operations, indexing etc.) an algorithm performs in relation to the input size. Plagiarism time complexity is usually expressed using big O notation, which represents the worst-case scenario. Space complexity refers to the amount of memory space an algorithm or program uses to solve a problem as a function of the input size. It includes the memory required for variables, data structures, recursion call stacks, and other memory allocations during the algorithm's execution. Like time complexity, space complexity is often expressed using big O notation and describes the worst-case scenario. It's important to note that time and space complexity are interrelated but distinct concepts. An algorithm that is very time-efficient might have a higher space complexity, and vice versa. When designing algorithms or choosing between different algorithms to solve a problem, you often aim to strike a balance between time and space complexity based on the specific requirements and constraints of the problem and the underlying hardware. Here we expose accuracy and fast execution of plagiarism document checking is dependent on two complexity levels.
Significance in various domains. Accuracy starts with clear and comprehensive requirements gathering. An accurate understanding of user needs, and system functionality is essential to building software that meets expectations. A well-thought-out design phase of plagiarism considers potential sources of errors and inefficiencies, aiming to minimize them. Design decisions influence how data is stored, processed, and communicated within the software, directly affecting its accuracy. Skilled coding practices and adherence to design principles are crucial for translating a design into accurate software. Inaccurate coding can introduce bugs, security vulnerabilities, and unexpected behaviors. Rigorous testing is a cornerstone of ensuring software accuracy. Then testing includes unit tests to examine individual components, integration tests to assess interactions between components, and system-level tests to verify the software. The validation covers whether the software satisfies user needs, while verification confirms that the software meets its specified requirements. These processes involve comparing plagiarism outputs to expected results and validating its behavior under various input documents. The result of delay or failure often interacts with software in ways unforeseen by developers, leading to the discovery of issues and improvements that enhance accuracy. Accuracy is an ongoing effort. Regular updates, bug fixes, and security patches are essential to maintaining accuracy as the software evolves and new challenges arise. The challenges and strategies for ensuring plagiarism accuracy are defined in different levels, but both levels are dependent on duration of process and memory usage. Software systems are becoming increasingly complex. Managing this complexity requires careful design and modularization to reduce the likelihood of errors and ease debugging. Inaccurate input data can lead to inaccurate outputs. Implementing data validation and error-handling mechanisms can help mitigate this issue. In multi-threaded or distributed systems, managing concurrency and ensuring accuracy in shared data access is a significant challenge. Proper synchronization and coordination mechanisms are necessary. Security breaches can compromise the accuracy and integrity of software systems. Implementing strong security measures, encryption, and authentication helps maintain accurate data and functionality. Employing a mix of testing strategies, including automated testing, manual testing, and exploratory testing, can help uncover different
Key Words:
Time Complexity, Space Complexity, Searching, File Processing, Indexing.
1. INTRODUCTION In plagiarism, the accuracy refers to the degree to which a software system produces correct and reliable results that align with the intended functionality and result expectations. In the realm of software development, achieving high accuracy is a fundamental goal, as inaccuracies can lead to errors, misinformation, financial losses, compromised security, and user dissatisfaction. Ensuring software accuracy involves a combination of thorough design, meticulous testing, continuous validation, and diligent maintenance. In our process relies heavily on plagiarism to perform an array of tasks, from basic calculations to complex data analysis, critical infrastructure management, healthcare
© 2023, IRJET
|
Impact Factor value: 8.226
|
ISO 9001:2008 Certified Journal
|
Page 52