Sebuah Kajian Pustaka: IT Journal Research and Development (ITJRD) Vol.7, No.1, August 2022, E-ISSN : 2528-4053 | P-ISSN : 2528-4061 DOI : 10.25299/itjrd.2022.7897 23 Journal homepage: http://journal.uir.ac.id/index/php/ITJRD Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project Dewi Nasien1 and Eka Putra Yansen2 Department of Information Technology, Faculty of Computer Science, Institut Bisnis dan Teknologi Pelita Indonesia 1,2 dewinasien@lecturer.pelitaindonesia.ac.id1, eka.yansen@student.pelitaindonesia.ac.id2 Article Info ABSTRACT Article history: Received Oct 21, 2021 Revised Mar 18, 2022 Accepted Aug 11, 2022 Title and research abstract in a university / college are things that are quite common. Every student who will do the final project will definitely encounter these two things. The number of titles and abstracts that have been scattered on the internet and collected at one university / college must have similarities. To detect the similarity of the title text and abstract, it is necessary to apply an algorithm to the system that can determine the similarity of the text, one of which is the winnowing algorithm. The winnowing algorithm is an algorithm that can be used to detect similarities in a document text, where the text will be converted into hash values which will then form a window based on the previous hash values and the similarity percentage will be searched. The evidence from this study shows that winnowing method is considered as a benchmark for the acceptance of the student's final project and reduce plagiarism activities from their title and abstract writing. With the creation of this system, universities / colleges can use this system as a benchmark for the acceptance of a title and research abstract at the university / college. Keyword: Plagiarism detection Winnowing algorithm Title and abstract Final project © This work is licensed under a Creative Commons Attribution- ShareAlike 4.0 International License. Corresponding Author: Dewi Nasien Department of Information Technology, Faculty of Computer Science Institut Bisnis dan Teknologi Pelita Indonesia Jl. Jend. Ahmad Yani, Pekanbaru, Indonesia Email: dewinasien@lecturer.pelitaindonesia.ac.id 1. INTRODUCTION Technology has become increasingly sophisticated in today's modern era, allowing most activity to be done quickly. Conversely, there are some people who still craving for maximum results without working hard for it. Simply by getting into the internet, all information is accessed quickly and efficiently [1]. Nonetheless, when surfing the internet to ascertain information, news content frequently looks almost similar or 100% similar. Information has been discovered easily through the internet, which is widely misused by numerous parties causing plagiarism [2]. The rapid development of technology also dramatically influences the level of plagiarism in education contexts [3]. For instance, in scientific research, when the researchers find writings that will be chosen as their related references, they tend to choose copypaste techniques to complete the tasks instantly [4]. The similarities are usually uncovered in final semester student research titles and abstracts. If undetected, plagiarism can facilitate students progressing through courses without achieving the desired learning goals, which affects both their ability to complete subsequent courses, program objectives or even final project [5]. mailto:dewinasien@lecturer.pelitaindonesia.ac.id1 IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 24 Talking about the thesis, of course, it cannot be detached from plagiarism owing to it is a scientific writing from the students’ original research as a requirement for obtaining a bachelor's degree [6]. This issue is encountered when searching for reference sources through internet media (Google Scholar, Scopus, and so forth) for students about to enter the final semester. Somehow, the lecturer's capacity to exercise control and selection is still restricted by needing to verify and find out with each lecturer's or supervisor's memory abilities, which may be limited, so that titles occasionally pass the observation, resulting in duplication [7]. It might lead the reader or their advisor to feel uninterested since they have read the title or abstract before. In resolving whether a thesis title is accepted or not, it is to prove or evaluate the title with a list of existing ones, but this will take time and considering there are many applicants for thesis titles [8]. Winnowing algorithm selection is assumed on [9], which states that the winnowing algorithm is one of the algorithms in the document fingerprinting method. The input of this algorithm is a text document that is administered in order to get an output hash value [10]. This method accurately identifies copy text, including small parts similar in a set of documents through the resulting fingerprint. Through fingerprint matching, similarity values will be collected between documents. Meanwhile, as states by [11] the Winnowing Algorithm is performed to detect the similarity of words/sentences (common subsequence) in two or more texts being assessed. [12] elaborate winnowing algorithm is classified as an extrinsic plagiarism detection method. This algorithm identifies parts of sentences or words that have similarities from the document tested for plagiarism with the source document [13, 17]. Derived from the explanation, the researchers explored how to build a website design to check the similarity of titles and abstracts and apply the winnowing method, which is expected to examine it on students' final assignments. A winnowing algorithm can be utilized to detect similarities in text and documents. As defined by [16], the title in final project is an initial description of the document content. It is the preliminary direction of the research content, where there is a resemblance to the final project with the content which suspected to be similar to the existing ones. Finally, research by [6] entitled “Implementasi Pengecekan Plagiarisme Proposal Tugas Akhir Mahasiswa Teknik Informatika UPN Veteran Yogyakarta”, they conducted the winnowing algorithm to check the similarity of the proposal document. The results explicated that the smaller the N-gram selection, the higher the percentage of similarity values (76% and 89%). This happens because, with fewer N-grams, the string is cut smaller, the probability of finding the same character set is more outstanding. The larger the N-gram, the more characters it contains compared to the smaller N-gram, affecting the character set to decrease so that the similarity values (up to 57% and 68%). From the explanation above, two questions are needed to be adjust for this study; 1) How to design a website to examine the similarity of titles and abstracts? 2) How the winnowing method thoroughly check the similarity of titles and abstracts in the final project? This study proposes creating a website design to verify the similarity of titles and abstracts, then using the winnowing method to accomplish the similarity in the final project. It is expected to contribute to presenting information related to the similarity of the title and abstract in the final project as a benchmark for accepting it by the campus. Furthermore, with this application program, it is hoped that the plagiarism activities for titles and abstracts of students' final assignments can be minimized. It also provides insights and great opportunities for other researchers to fill the gaps in this study as future research. 2. RELATED LITERATURE In this study, many were inspired by previous research related to resolving similarity of text or documents by using one of the methods such as the winnowing method, which can assist authors in completing this research. According to [2], the Final Project is a document that represents research conducted by undergraduate students. In producing a quality Final Project, competent research is required; one of the factors is originality. The ability of students to create original research is an essential factor. Plagiarized text is the most common form of plagiarism. Detection of plagiarism is divided into two based on the task, i.e., intrinsic and extrinsic. The winnowing algorithm is an IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 25 extrinsic plagiarism detection method; it extends the Rabin-Karp Fingerprint method by adding a window feature to optimize the detection results. This study applies a Winnowing algorithm to detect text-similarity in the final project document of Dian Nuswantoro University students. In [11] is also conducted study entitled “Implementasi deteksi plagiarisme menggunakan metode N-gram dan Jaccard similarity terhadap algoritma Winnowing”. The method is N-gram, Jaccard similarity and winnowing. The results exhibited that the right N-gram is necessitated. The degree of similarity between the two documents/samples produced similarity values of different values if the N-gram and W-gram values entered are of different values. If the value entered is small, the degree of similarity outcome has a high value. If the N-gram and W-gram values entered are greater, the similarity value or the degree of similarity between documents had low results. As stated by [18], from research, about 89% of students agree and understand the meaning of plagiarism in education and suggest that the material about it is explained at the beginning of the lecture. Nevertheless, about 65% admitted that they felt perplexed about the meaning of plagiarism, 59% stated that they were not given enough tutorials to avoid plagiarism in completing their assignments. Winnowing algorithm is an algorithm used for plagiarism detection. The input of this algorithm is a text document that is processed to produce output in a collection of hash values. The hash value is a numeric value formed from the ASCII calculation of each character. These sets of hash values are, from now on, referred to as fingerprints. Base value, gram, and window length are very influential in calculating the similarity of document similarity. If the greater the gram, the smaller the document similarity. According to [14], the process of managing existing thesis titles and distributing information to students, and determining whether or not the titles submitted by students are accepted. It is still done manually, namely by checking one by one, and it is less effective. The winnowing algorithm's detection system makes it easier for the final project coordinator or the Head of the Study Program to delimit the percentage of similarity with an existing title. The system will ask for input in a title that will be checked for similarities and display the results to the user. Of the 117 existing thesis titles, 11 titles are similar to the submitted ones, with a more remarkable similarity equal 20 percent. With this system, it is expected that these processes will become more accessible, faster, and more effective. According to [15], one of the challenges in the academic field is preventing the proliferation of plagiarism activities. One way that can be done is to detect plagiarism early on student work, especially thesis. The application of detection of plagiarism indications using the n-grams and winnowing method is the goal of this study and finding an effective nominal n. The words in the thesis document are represented in hash form. Then a selection is made using a winnowing algorithm to determine the document's fingerprint to be stored in the database. The test was performed using a sample of student thesis documents. The final result shows that the system can detect plagiarism according to word similarity consistently based on several run test scenarios. The n is the most effective in word similarity detection, namely n=7, with a percentage of 3.07% based on the difference between testing using the system and testing manually. The subsequent research came from [14], which explored “Sistem Pendeteksian Kemiripan Judul Skripsi Menggunakan Algoritma Winnowing.” Determining whether or not to accept the titles submitted by students is performed manually, namely by checking one by one, time-consuming and is less effective. The detection system by the winnowing algorithm is designed to facilitate the final project coordinator or the Head of Study Program in establishing the percentage of similarity with an existing title. The system probed for input in a title will be tested for similarities and display the results to the user. Of the 117 existing thesis titles, 11 titles are the same as the submitted ones, with a greater degree of similarity equal to 20 per cent. IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 26 3. METHODOLOGY A step is needed to get cluster data with the optimal K number, as illustrated in Figure 1. Figure 1. Plagiarism Detection System Flowchart 3.1. Formulation How to implement the winnowing algorithm in the abstract similarity detection system and research titles on students' final assignments to be able to provide a presentation of similarities using PHP and Mysql languages and become a benchmark for the acceptance of an abstract or research title. At this stage, checking the sample titles and abstracts that have been downloaded from Google Scholar. Some several titles and abstracts are similar to each other, only in different ways of writing. The results of the similarity level calculation can be acknowledged as a benchmark for the acceptance of a title or research abstract at other universities. 3.2. Data Collection Abstract and Research Title In this study, the data used was dummy data from the Google Scholar journal. The data is applied as a reference for conducting experiments on the system that will be created later as presented in Table 1. Table 1. The Dummy Data No Researchers’ Name Research Title 1 (Tjiawi et al., 2018) Perancangan Aplikasi Pendeteksi Tingkat Kesamaan Antar Dokumen dengan Algoritma Winnowing Collecting the Abstract Data & Research Title Database Design System Implementation Database Testing Formulation Masalah Similarity Results Error Rate Start End Algorithm Design Interface Testing Algorithm Testing Interface Design IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 27 2 (Wulan et al., 2018) Deteksi Plagiasi Dokumen Skripsi Mahasiswa Menggunakan Metode N-Grams dan Winnowing 3 (Nurdin & Amin, 2017) Sistem Pendeteksian Kemiripan Judul Skripsi Menggunakan Algoritma Winnowing 4 (Alamsyah, 2017) Perbandingan Algoritma Winnowing dengan Algoritma Rabin Karp Untuk Mendeteksi Plagiarisme Pada Kemiripan Teks Judul Skripsi Fakultas 5 (Ulfa et al., 2016) Pendeteksian Tingkat Similaritas Dokumen Berbasis Web Menggunakan Algoritma Winnowing 3.3 Database Design At this stage, the database design that will be employed for the similarity detection system in titles and abstracts will be done. The database design contains a login table, abstract fingerprint table, title fingerprint table, research abstract table, research title table, category table and basic word table. Each table will have an input form. 3.4. Algorithm Design For the algorithm design, Winnowing is a fingerprint document algorithm to perform the process of checking word similarity, which produces output in the form of a collection of hash values formed from the ASCII calculation of each character. This collection of hashes is called a fingerprint used to check for plagiarism. The steps of the winnowing algorithm are: removing irrelevant characters, forming an n-gram series, calculating the hash of each gram (rolling hash), forming a window, selecting the smallest fingerprint hash from each window, and calculating the equation with the Jaccard Coefficient. 3.5 Interface Design In interface design, it consists of login menu design, register menu, main menu, and research menu list. This design is the initial stage for users before accessing or using the application. 3.5.1 Register Menu Design Figure 2. Login Menu Figure 2 demonstrated that a login page design will be found when the user accesses the system first. Here, the user is required to enter an email and password to log into the system. 3.5.2 Register Menu Design IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 28 Figure 3. Register menu The register menu design is presented in Figure 3, where users can register to enter the system. Users are asked to fill in their username, email, password, and confirm password. 3.5.3 Register Menu Design Figure 4. Main Menu There is a design for the main menu when the user has logged in, visible in Figure 4. Other sub-menus include the category menu, research title menu, and abstract research menu. 3.5.4 Register Menu Design Figure 5. Research List Menu Figure 5 describes the text results from the title and abstract that have been converted into fingerprints and are ready to be juxtaposed. 3.5 System Implementation Calculating the similarity with the winnowing algorithm begins with removing punctuation marks (noise and whitespace) which is then performed by a series of grams according to the predetermined K value. Each series will be in the form of a hash value, which its functions will then process to generate a window along with the K value. After the window is formed, start the IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 29 fingerprint process to choose the smallest hash value from each window to be used as a fingerprint. The final step is to process the fingerprint using the Jaccard coefficient equation. 3.5.1 Database Testing For instance, researchers took two article titles entitled “Sistem Deteksi Kemiripan Pada Judul dan Abstrak Tugas Akhir Mahasiswa Menggunakan Algoritma Winnowing” and “Sistem Deteksi Plagiarisme Pada Judul dan Abstrak Tugas Akhir Mahasiswa Menggunakan Algoritma Rabin Karp”. Performing similarity calculations takes at least two texts to be compared with each other. After getting the fingerprint hash value from the window, the next step is to calculate the similarity, error rate, and sensitivity values. 3.5.2 Interface Testing This section of the research also included user interface design. The system is examined to see whether the method was appropriately built or whether the system functioned properly. The interface testing would be explained in the next session. 3.5.3 Algorithm Testing 1. Undertaking stemming such as removing spaces between sentences, changing capital letters to normal, removing punctuation marks, and finding the sentence core. Test Text : sistemdeteksimiripjudulabstraktugasmahasiswaalgoritmawinnowing Compared Text : sistemdeteksiplagiarismejudulabstraktugasmahasiswaalgoritmarabinkarp 1. K-gram circuit with K= 3. Test Text: "sis","ist","ste","tem","emd","mde","det","ete","tek","eks","ksi","sim","imi","mir","iri","ri p","ipj","pju","jud","udu","dul","ula","lab","abs","bst","str","tra","rak","akt","ktu","tug","u ga","gas","asm","sma","mah","aha","has","asi","sis","isw","swa","waa","aal","alg","lgo"," gor","ori","rit","itm","tma","maw","awi","win","inn","nno","now","owi","win","ing" Compared Text: "sis","ist","ste","tem","emd","mde","det","ete","tek","eks","ksi","sip","ipl","pla","lag","agi ","gia","iar","ari","ris","ism","sme","mej","eju","jud","udu","dul","ula","lab","abs","bst","s tr","tra","rak","akt","ktu","tug","uga","gas","asm","sma","mah","aha","has","asi","sis","is w","swa","waa","aal","alg","lgo","gor","ori","rit","itm","tma","mar","ara","rab","abi","bin ","ink","nka","kar","arp" 2. Determine the hash value by entering a series of grams into the hash function. Test Text: 10375,9656,10460,10414,9262,9830,9125,9326,10412,9259,9807,10369,9591,9888,9636, 10291,9619,10143,9739,10494,9261,10546,9719,8854,9089,10473,10519,10214,8936,982 8,10552,10501,9331,9001,10393,9806,8890,9412,8997,10375,9659,10483,10609,8838,89 32,9786,9456,10122,10295,9658,10474,9821,9033,10694,9605,10011,10028,10167,10694 ,9598 IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 30 Compared Text : 10375,9656,10460,10414,9262,9830,9125,9326,10412,9259,9807,10372,9621,10141,9724 ,8889,9385,9492,8988,10294,9649,10397,9844,9252,9739,10494,9261,10546,9719,8854,9 089,10473,10519,10214,8936,9828,10552,10501,9331,9001,10393,9806,8890,9412,8997, 10375,9659,10483,10609,8838,8932,9786,9456,10122,10295,9658,10474,9816,8980,1020 5,8844,8993,9602,9970,9654,8995 3. Create windows along with the k=3 Test Text: [10375,9656,10460],[9656,10460,10414],[10460,10414,9262],[10414,9262,9830],[9262,9 830,9125],[9830,9125,9326],[9125,9326,10412],[9326,10412,9259],[10412,9259,9807],[9 259,9807,10369],[9807,10369,9591],[10369,9591,9888],[9591,9888,9636],[9888,9636,102 91],[9636,10291,9619],[10291,9619,10143],[9619,10143,9739],[10143,9739,10494],[9739 ,10494,9261],[10494,9261,10546],[9261,10546,9719],[10546,9719,8854],[9719,8854,9089 ],[8854,9089,10473],[9089,10473,10519],[10473,10519,10214],[10519,10214,8936],[1021 4,8936,9828],[8936,9828,10552],[9828,10552,10501],[10552,10501,9331],[10501,9331,90 01],[9331,9001,10393],[9001,10393,9806],[10393,9806,8890],[9806,8890,9412],[8890,94 12,8997],[9412,8997,10375],[8997,10375,9659],[10375,9659,10483],[9659,10483,10609], [10483,10609,8838],[10609,8838,8932],[8838,8932,9786],[8932,9786,9456],[9786,9456,1 0122],[9456,10122,10295],[10122,10295,9658],[10295,9658,10474],[9658,10474,9821],[1 0474,9821,9033],[9821,9033,10694],[9033,10694,9605],[10694,9605,10011],[9605,10011, 10028],[10011,10028,10167],[10028,10167,10694],[10167,10694,9598] Compared text: [10375,9656,10460],[9656,10460,10414],[10460,10414,9262],[10414,9262,9830],[9262,9 830,9125],[9830,9125,9326],[9125,9326,10412],[9326,10412,9259],[10412,9259,9807],[9 259,9807,10372],[9807,10372,9621],[10372,9621,10141],[9621,10141,9724],[10141,9724, 8889],[9724,8889,9385],[8889,9385,9492],[9385,9492,8988],[9492,8988,10294],[8988,10 294,9649],[10294,9649,10397],[9649,10397,9844],[10397,9844,9252],[9844,9252,9739],[ 9252,9739,10494],[9739,10494,9261],[10494,9261,10546],[9261,10546,9719],[10546,971 9,8854],[9719,8854,9089],[8854,9089,10473],[9089,10473,10519],[10473,10519,10214],[ 10519,10214,8936],[10214,8936,9828],[8936,9828,10552],[9828,10552,10501],[10552,10 501,9331],[10501,9331,9001],[9331,9001,10393],[9001,10393,9806],[10393,9806,8890],[ 9806,8890,9412],[8890,9412,8997],[9412,8997,10375],[8997,10375,9659],[10375,9659,10 483],[9659,10483,10609],[10483,10609,8838],[10609,8838,8932],[8838,8932,9786],[8932 ,9786,9456],[9786,9456,10122],[9456,10122,10295],[10122,10295,9658],[10295,9658,104 IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 31 74],[9658,10474,9816],[10474,9816,8980],[9816,8980,10205],[8980,10205,8844],[10205, 8844,8993],[8844,8993,9602],[8993,9602,9970],[9602,9970,9654],[9970,9654,8995] 4. Selecting the fingerprint hash value from the window Test Text: 9656,9262,9125,9259,9591,9636,9619,9739,9261,8854,9089,10214,8936,9828,9331,9001, 8890,8997,9659,8838,8932,9456,9658,9033,9605,10011,10028,9598 Compared text: 9656,9262,9125,9259,9621,8889,8988,9649,9252,9261,8854,9089,10214,8936,9828,9331, 9001,8890,8997,9659,8838,8932,9456,9658,8980,8844,8993,9602,8995 5. Calculating similarity, error rate, and sensitivity. Number of slices (title1, title2): 19 Number of combined (head11, title2): 38 Similartias (slice/merge): 19 38 𝑥100% = 50% 4. RESULT AND DISCUSSION 4.1 Program Module Design The form and appearance of the program module design can be seen below. (a) (b) Figure 6. Program Module Design (a) User Login Form (b) Register Form The user must register an e-mail and password in the login form to enter the system, as given in Figure 6 part (a). While in part (b), the registration form allows users to register their accounts to access the system. IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 32 (a) (b) (c) (d) (e) IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 33 (f) Figure 7. Program Module Design (a) Main menu (b) Category list menu (c) Research title menu list (d) Research abstract menu list (e) Compare title menu (f) Compare abstract menu It appears from Figure 7, part (a) is the main menu form which will emerge when the user successfully logs into the system for the first time. From the figure (b), the category list menu is a display that will present a list of categories that have been put into the database. In this menu, there are other sub-menus that the user can access later. Part (c) is a research title list where the user opens the research title list menu. This menu will expose all research titles that have been input into the database. Additionally, when they want to proceed with the abstract list form, it is in part (d) where the user may see the abstract data. Users may compare one title to another, as seen in figure (e), where the title will be processed first with the Winnowing algorithm and Jaccard coefficient before being exhibited. Users may oppose abstracts with each other as well. Before the abstract is showed, it will be processed first by the Winnowing algorithm and Jaccard coefficients, as shown in part (f). 4.2 System Implementation and Maintenance Plan After designing the program, the following step is to develop the implementation and maintenance of the system. At this implementation stage, software in Windows 10 as an operating system, Laravel Programming Language (PHP), a database with XAMPP, Visual Studio Code as a text editor and Google Chrome as a browser to run applications. The hardware operated is a Toshiba laptop with 6GB RAM specifications, 250GB SSD, Intel Core i3 3100 processor. In addition to the implementation stage, a system maintenance stage is required, carried out if an error or damage occurs to the system has been made. The result of this study is coherent with several previous research related to the implementation of winnowing algorithm in detecting plagiarism. The research by [14] who determined the detection system by the winnowing algorithm. It is designed to facilitate the final project coordinator or the Head of Study Program in establishing the percentage of similarity with an existing title. The system probed for input in a title will be tested for similarities and display the results to the user. Of the 117 existing thesis titles, 11 titles are the same as the submitted ones, with a greater degree of similarity equal to 20 per cent. The previous research from [15] has discovered the effective nominal n. The words in the thesis document are represented in hash form. Subsequently, a selection is executed by a winnowing algorithm to determine the document's fingerprint to be stored in the database. The final result of the research indicated that the system could detect plagiarism conforming to word similarity consistently. As attested by various run test scenarios, nominal n is the most effective in word similarity detection, namely n = 7 with a percentage of 3.07% pertaining to the difference between testing with the system and testing manually. [11] is also conducted study in detecting plagiarism by the N-gram method and Jaccard similarity to the Winnowing algorithm. The results exhibited that the right N-gram is necessitated. When the N-gram and W-gram values were entered, the similarity value or degree of similarity between documents was low. IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 34 4. CONCLUSION These findings enhance our understanding of applying the winnowing method can assist in locating similar results from the title and abstract of the student's final project. The evidence from this study indicates that winnowing method is considered as a benchmark for the acceptance of the student's final project and reduce plagiarism activities against their title and abstract writing. Regarding previous research, the system created may produce a percentage of the title and abstract research similarity in this study. After observations have been made, there has been no research that simultaneously offers a similar value to the title and research. Considerably more work will need to be done to determine developers in establishing systems with a more attractive appearance and indulgent users in terms of platforms such as mobile. REFERENCES [1] R. Purnamasari, M. Fairuzabadi, and A. Riyadi. "Sistem Pengecekan Plagiasi Judul Tugas Akhir Menggunakan Algoritma Winnowing di Fakultas Sains dan Teknologi Universitas PGRI Yogyakarta." In Seri Prosiding Seminar Nasional Dinamika Informatika, vol. 5, no. 1, 2021. [2] R. K. Wibowo, and K. Hastuti. "Penerapan Algoritma Winnowing Untuk Mendeteksi Kemiripan Teks Pada Tugas Akhir Mahasiswa." Techno. Com, vol. 15, no. 4, pp. 303-311, 2016. [3] M. N. Khidfi, and J. Y. Sari. "Rancang bangun aplikasi pendeteksian kesamaan pada dokumen teks menggunakan algoritma enhanced confix stripping dan algoritma winnowing." no. September 2018. [4] A. H. Purba and Z. Situmorang. "Analisis Perbandingan Algoritma Rabin-Karp Dan Levenshtein Distance Dalam Menghitung Kemiripan Teks." Jurnal Teknik Informatika UNIKA Santo Thomas, vol. 2, no. 2, pp. 24-32. 2017. [5] J. Pierce and C. Zilles. "Investigating student plagiarism patterns and correlations to grades." In Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, pp. 471-476. 2017. [6] A. H. Pratomo, and A. P. Suryotomo. "Implementasi pengecekan plagiarisme proposal tugas akhir mahasiswa teknik informatika UPN Veteran Yogyakarta." In Seminar Nasional Informatika (SEMNASIF), vol. 1, no. 1, pp. 221-229, 2020. [7] N.I. Kurniati, A. Rahmatulloh and R. N. Qomar. “Web scraping and winnowing algorithms for plagiarism detection of final project titles.” Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, 10(2), pp.73-83. 2019. [8] N. Alamsyah. “Deteksi Plagiarisme Tingkat Kemiripan Judul Skripsi dengan Algoritma Winnowing.” Technologia: Jurnal Ilmiah. Vol. 8, no. 4, pp. 205-13, Oct, 2017. [9] N. F. Ulfa, M. Mustikasari. “Pembuatan Aplikasi Pengukuran Tingkat Kemiripandokumen Berbasis Web Menggunakan Algoritma Winnowing.” Jurnal Ilmiah Informatika Komputer. Vol 21, no. 2, Apr, 2017. [10] A. P. Tjiawi, D. E. Herwindiati, and L. Hiryanto. "Perancangan aplikasi pendeteksi tingkat kesamaan antar dokumen dengan algoritma winnowing." Computatio: Journal of Computer Science and Information Systems, vol. 2, no. 1, pp. 36-44, 2017. [11] S. Sunardi, A. Yudhana, and I. A. Mukaromah. "Implementasi Deteksi Plagiarisme Menggunakan Metode N-Gram Dan Jaccard Similarity Terhadap Algoritma Winnowing." 2018. [12] A. Setiawan. "Implementasi algoritma winnowing untuk deteksi kemiripan judul skripsi studi kasus stmik budidarma." Informasi dan Teknologi Ilmiah (INTI). vol 4, no. 2, 2017. [13] M. Maskur, D. Q. Putra, and N. Hayatin. "Deteksi Kemiripan Dokumen Pengajuan Proposal Menggunakan Algoritma Biword Winnowing Pada Sistem Informasi Penelitian Dan Pengabdian." Jurnal Repositor, vol. 2, no. 5, pp. 571-582, 2020. [14] N. Nurdin and A. Munthoha. "Sistem Pendeteksian Kemiripan Judul Skripsi Menggunakan Algoritma Winnowing." InfoTekJar: Jurnal Nasional Informatika dan Teknologi Jaringan.;vol. 2, no. 1, pp. 90-97, Sep, 2017. IT Jou Res and Dev, Vol.7, No.1, August 2022 : 23 - 35 Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project, Dewi Nasien 35 [15] F. R. N. Wulan, A. Kunaefi, and A. Permadi. "Deteksi Plagiasi Dokumen Skripsi Mahasiswa Menggunakan Metode N-Grams Dan Winnowing." Simetris: Jurnal Teknik Mesin, Elektro Dan Ilmu Komputer, vol 9. no. 2, pp. 1021-1032, 2018. [16] L. Sugiarto, C. Mulyadi, S. Rihastuti. "Analisa Algoritma String Matching Dan Winnowing Untuk Deteksi Kemiripan Judul Tugas Akhir Perguruan Tinggi." Jurnal Teknologi Informasi, vol. 6, no. 2. pp. 97-106, 2020. [17] Y. Nurdiansyah and F. N. Muharrom. "Implementation of winnowing algorithm based K-gram to identify plagiarism on file text-based document." In MATEC Web of Conferences, vol. 164, p. 01048. EDP Sciences, 2018. [18] F. Abror. "Implementasi Algoritma Winnowing pada Deteksi Penjiplakan." PhD diss., Universitas Muhammdiyah Jember, 2016.