Full report (help) Anti-plagiarism. Help How to use the Anti-Plagiarism system

The manual contains information about the purpose, capabilities, features of the system, as well as a description of actions that ensure checking text documents for the presence of borrowings.

Terms and Definitions

Definition

An online tool for working with text documents with a user interface on a website.

Borrowing

A fragment of the text of the document being checked that coincides or almost coincides with a fragment of the text of the source and is not formatted in accordance with the rules of citation, without providing complete bibliographic information about the source.

Citation

A fragment of the text of the document being checked, coinciding or almost coinciding with a fragment of the text of the source and formatted in accordance with the rules of citation, with complete bibliographic information about the source. Citations also include commonly used expressions, bibliographic lists, and fragments of text found in sources from collections of normative and legal documentation.

Borrowing percentage

The share of all borrowings found in relation to the total volume of the document in characters.

Citation percentage

The share of citations found relative to the total length of the document in characters.

Percentage of originality

The share of text fragments of the document being checked that were not found in any source used for checking, in relation to the total volume of the document in characters.

The result of checking the text for borrowings:

  • Brief report - represents the percentage of originality, a list of sources of borrowing.
  • Full report - represents the percentage of originality, a list of borrowing sources, the downloaded document text, marked with the borrowing blocks found.

Share in the report

The ratio of the volume of borrowings, which is taken into account within this source, to the total volume of the document. If the same text was found in several sources, it is taken into account only in one of them.

Share in text

The ratio of the volume of borrowed text from a given source to the total volume of the document. Shares in the text according to sources are not summed up.

Blocks in the report

The number of borrowing blocks from a source, taking into account the intersections of all found sources.

Blocks in text

The number of borrowing blocks from the source, excluding other found sources.

Search module

A software module that implements the search for borrowings. The module uses a search index or a special computational algorithm to generate reports. The system may have several modules. After gaining access to several search modules, you are given the opportunity to conduct checks, build both separate reports and a single report for all search modules.

Some modules perform searches in specialized databases with snapshots of the texts of source documents, but gaining access to the selected search module does not mean gaining access to the full texts of documents that this module can find. The received reports will contain links to documents (their names will also be given), and when viewing the text of the source, it will contain fragments that match the document being checked.

Software that allows users to view pages on Internet sites and access files and software associated with those pages. For example, Internet Explorer, Google Chrome, etc.

Text metrics

Semantic characteristics for each downloaded document.

Purpose and conditions of use

The service is designed to check text documents for borrowings. As a result of the scan, users receive scan reports. The report contains information about the sources and indicators of borrowing by source, as well as detailed information indicating those fragments of the document being checked that were identified as borrowing. Identification is accompanied by the presentation of a matching fragment of text from the borrowing source and/or a link to the original (URL). As a result of document verification, the user is provided with information that helps to determine which part of the document was written independently and which part was borrowed.

To use the service you need:

  • Connect to the Internet.
  • Install a browser or use one of the most common types of browser built into your operating system (MS Internet Explorer version 11 and higher, Mozilla Firefox version 58 and higher, Opera version 51 and higher, Chrome version 64 and higher).

The results of working with the Anti-Plagiarism system are not the basis for claims of copyright infringement; the service is intended to be used solely for informational purposes. In other words, we do not declare that a particular text is plagiarized, but only inform you that the same or similar fragment of text exists. It is possible that when working with the service you will find text with a copied fragment from other sources, including the possibility that the document you downloaded is the original source. In any case, when working with the service, be careful, try to be objective and do not rush to conclusions. Remember that the service is only a work tool, and only the system user himself can give a real assessment of the document.

Preparing for work

Workplace

To prepare a workplace when working with the Anti-Plagiarism system, just open your browser. To work with the service, the most common types of browsers can be used, such as MS Internet Explorer version 11 and higher, Mozilla Firefox version 58 and higher, Opera version 51 and higher, Chrome version 64 and higher.

To get started, go to the service website by entering the address of the system website in the address bar of your browser.

So, we have a ready-made workplace:

  • files are downloaded to the computer;
  • browser is open;
  • The service website page is open in the browser.

User registration

To register on the site, open the registration window by clicking on the “Register” button on the main page of the site.

“Register” and “Login” buttons

In the window that opens, you will be asked to read the user agreement and the agreement on the processing of personal data. To accept the user agreement, check the box next to “I agree to the terms...”. Acceptance of the agreement means that you have read, understood and unconditionally accept the terms of the user agreement and the agreement on the processing of personal data.

To continue registering in the system, enter your email address and click on the “Register” button.

Initial registration form

After some time, an email with a password will be sent to the email address you specified; enter the received password to enter your account.

If your email was used for registration previously, you will not be able to register using this email again. In this case, use the login form to access the system.

If the letter does not arrive by mail for a long time, try the procedure again. Make sure your email is entered correctly.

Login and logout

If you are a registered user, then use the login form to access the system; to do this, click on the “Login” link in the upper right corner of the page.

Enter your credentials in the login form that opens. Click on the “Show Password” button if you want to check that you entered the password correctly. Next, click “Login.”

Login form

After logging in on any page of the site, the “Menu” icon is displayed in the upper right corner of the page. By clicking on the icon, you can navigate through the sections of your account. To the left of the “Menu” icon you will see brief information about yourself: your role in the system and e-mail.

To log out, click on the “Menu” icon and then select “Log out”.

You can use social networks to log into your account. More details in the next paragraph.

Social media

When registering or regularly logging into your personal account, you can attach your social network accounts. Attaching an account will allow you to quickly log into your personal account using your credentials from the social network.

A special window will open to confirm sending data from the social network. If you have not yet introduced yourself to the social networking site, this window will prompt you to log in.

You will then be redirected back to the registration completion form. You can choose: to attach a social network account to an existing account on the system website or to register a new account by attaching a social network account.

If you select the “I am a new user” option, the site will offer a registration procedure. Register and click the “Create account” button. You will be sent a password as during regular registration. Enter the password you received and click “Create an account” again to complete registration.

Once registration is completed, you will be able to log in using your attached account.

Registration form after submitting credentials from a social network, “I am a new user” tab

If the entered email matches the email address of your account or was automatically entered using the data received from the social network, then entering a password will not be required - you will be logged into your account immediately after clicking “Create an account”. In case the social networking site fails, a password will still be sent to the specified email. Using this email and password, you will be able to log into your account in the usual way.

If you selected the “I already have a login” option, then you will be asked to log in using your credentials with which you registered.

Registration form after submitting your social network credentials and clicking “I already have a login”

Password recovery

If you cannot access your personal account because you have forgotten your password, use the password recovery procedure.

To recover your password, in the login window, click on “Recover Password”.

In the window that opens, enter your email and click the “Recover” button.

Password recovery window

An email will be sent to you with instructions on how to reset your password and a link. Following these instructions, follow the link. Next, an automatically generated password will be sent to you by email. Use it and your e-mail to log in to your account.

Profile

To go to your profile, click on the “Menu” icon in the upper right corner and select the “Profile” section.

A profile is a special section of your account in which you can view and edit your account credentials and additional information.

In the “Profile” section, you can enter your personal data and upload an image to be placed in the information block. To do this, enter your data in the fields and click the “Change” button, and to upload an image to your profile, click on “Upload image”. To return the standard portrait image, delete the uploaded picture in your profile by clicking on “Delete”.

Account section - “My Profile”

Change mail (email)

In order to change the email used to log in, enter your current password and your new email address and click the “Change” button.

By clicking on the button, you will see the message: “A link has been sent to your new email to confirm the email change.” Go to your mailbox, the address of which you specified as your new email, and then follow the link in the letter.

A letter received from the Antiplagiarism service website

Change Password

To change your password, you will need to enter your old password and then enter your new password in the appropriate fields.

You can first make sure that the password is entered correctly by clicking on the “Show password” button. After this, symbols will appear instead of dots.

If you are sure that you entered the password correctly, click on the “Change” button, and your password for accessing the Anti-Plagiarism service account will be changed to a new one.

If you made a mistake when entering a new password, you can use the password recovery procedure, but only if you have access to the mailbox specified in your profile.

Attaching a social network

You can log in to the system without entering an e-mail and password; to do this, you need to link your social network accounts to your profile. To attach a social network, just click on the “+” (plus) sign or the icon of the social network that you want to attach. After clicking, a social network window will open with a confirmation form for sending data; you need to confirm your consent to attach the social network.

Immediately after receiving your consent, the data necessary to enter your account is sent from the social network; now when logging in, you can use the “Login using a social network” icon.

On the “Profile” page, you can also perform the opposite action - unpin a social network account, to do this, click on the “X” sign located under the icon of the attached social network, or on the icon itself.

You can only attach one account from one social network. To attach a new account to a social network, you need to unpin the old account and then attach the new one.

Support

If you have not found answers to questions about working with the system, please contact the Support Service. To do this, click on “Menu” in the upper right corner and select the “Support Service” tab. The system will open a window with a form for sending a request.

Feedback form

Enter your question in the “Message” field and click on the “Submit” button. Our specialists will respond to your request via the email you used to log into the system.

Adding a site

Our Internet Search Module checks already explored areas on the Internet. If you find an interesting site or resource that is not included in the Internet Search Module, you can add it to our verification module. This will allow you to build more complete and reliable reports based on verification using the Internet Search Module.

To add a site for indexing, click on “Menu” and select “Add site”. Copy the link in the "URL" field and click "Add". You can also leave a comment about the site to which this link leads, for example, that this site hosts an open electronic library or an abstracts site.

Menu item “Add site”

If the site you specified is already known to our system, you will receive a message: “The site has already been processed by our system.”

Important! The submitted site will be included in the Internet Search Module over time in order of indexing queue.

Cabinet

The account provides the ability to upload and check documents. To access document verification, click on “Menu” and select the “Account” section.

On the account page you will see the “Folders” and “Documents” panels, with the help of which all basic actions are performed with folders and documents in the account.

Cabinet

Document verification

To upload documents for review, click the “Add Document” button and select files on your computer or drag and drop the required documents into the “Add Document” field.

In addition to downloading individual files, it is possible to download an archive folder. An archive folder means a file in RAR, ZIP or 7z format. In this case, all documents from the archive folder are processed separately.

After selecting the files, a window will open to configure document verification settings.

Window for adding one document

You can specify the parameters for saving the document and select the modules that will be used to check the document.

Important! For the title of the document, you can use the Russian, Belarusian and Kazakh alphabet.

If you do not enter parameters, the following default values ​​will be applied to the document: the folder that was opened when viewing the user account is selected, the document type is not specified, the name is the file name, all possible verification options will be set for search modules (depending on the connected services ).

Next, click on the “Continue” button, the document will be added to your account and sent for verification. In the folder to which the document was added, you will see the added document; in the line with the document, the date the document was uploaded will be indicated. After the check is completed, the results of the check will appear in the line.

Text checking

In some cases, it is more convenient and faster to use the text verification function; to do this, click on the “Add text” button. In the form that opens, enter or paste text into the field, select the modules for which the document will be checked, and then click the “Continue” button.

Adding text

After clicking the “Continue” button, a document will appear in your account, its name will be the same as the first word in the entered text (no more than 15 characters), then a check will start against this document.

Re-checking the document

If you want to check a previously downloaded document using other search modules, then you can use re-check. Mark the selected document with a checkmark, then in the top menu click on the “Recheck” button.

Marked documents for re-checking

In the window that opens, select search modules and click the “Continue” button.

Rechecking the document

The document will be sent for verification and after a while the results will appear in the document line. It is impossible to send a document for re-checking if it is still being checked.

Viewing and editing document information

Each document, when added or moved to the office, must be placed in some folder in the office. By clicking once on the name of the folder that contains documents, you will see the documents located inside the folder.

General view of the user account with uploaded documents and created folder structure

Documents are arranged in the form of a list. Each line of the list displays information about the document, the result of the check and a link to the report.

The assessment of originality in a document line is intended for an initial, superficial acquaintance with the results of the verification. To receive a detailed assessment of the inspection results, go to view the inspection report by clicking on the “Report” button.

To view information about a document, open the folder, select the document you need with a checkmark and click the “Information” button in the top menu. A window will open with document attributes and information about the date and duration of the download.

To view the text of a downloaded document, click on its name in the list of documents. The Reading Version page opens, displaying the text of the document in page-by-page mode.

To navigate through pages of text, use the paging bar located above and below the text field. You can display all pages of a document at once by clicking the “Show all pages” button under the text field.

Also on this page you can view the document attributes and change them if necessary by clicking on the “Change name and type” button.

View information about a document

The same operation can be performed by selecting the desired document in your account and clicking the “Change name and type” button in the top menu. In the window that opens, you can change the document name and assign a document type.

Move a Document

To maintain a hierarchical folder structure, use the “Folders” panel, displayed on the left in your personal account. The “Folders” panel contains active elements and buttons that allow actions with folders: adding, deleting (if the folder contains documents, they will also be deleted), renaming and moving the folder, as well as navigating through folders.

By default, a “Root folder” is automatically created in each account; all other folders are created in it; this folder cannot be deleted, moved or renamed.

To the right of the folder names you will see a numerical value - this is the number of documents in the folder, so you can further navigate the distribution of documents in the folder.

To move a document from one folder to another, select the document with a checkmark (you can select several documents to move), then click on the “Move” button in the top panel.

A navigation window will open showing the folder structure. Select the destination folder and click Continue, then the document will move to another folder.

Window for moving document(s)

Search for a document

To search for a document, enter the name of the document in whole or in part in the search bar, and then click on the button in the form of a magnifying glass or the Enter key.

Document search string

After starting the search, the list of documents will display the found documents for all folders nested inside the root folder. You can navigate through folders by leaving the request in action, then only documents on request will be visible in the folders.

Deleting a document

To delete a document from your account, check the box and click the “Delete” button in the top panel.

Removing a document from your account

Text metrics

The system provides for the calculation and display of various semantic characteristics for each downloaded document. This functionality allows you to evaluate the scientific nature of the text, determine the presence of certain sections of the document and calculate some indicators

Metrics are calculated automatically when loading a document. List of calculated semantic characteristics:


Borrowing check report

Full report

Once the document has been downloaded and verified, the user can proceed to the report. To go to the page for viewing the full report, you must click the “Report” button located on the line with the verified document.

The full report includes:

  • assessment of originality/borrowing/citation;
  • assessment of suspiciousness and the ability to go to the suspicious page;
  • a list of sources of borrowing with the ability to edit and go to a report on the source;
  • continuous or page-by-page display of the full text of the document being checked, highlighting the borrowed blocks found;
  • date of document verification;
  • displaying report adjustments.

The figure below shows an overview of the full report.

Full report

  • report export;
  • go to the user manual;
  • saving the edited report;
  • receiving a direct link to the report;
  • viewing text metrics;
  • View report history.

View the report

The report page consists of the text being checked, in which blocks of borrowings are highlighted, a list of sources, aggregated test results and navigation through blocks of borrowings (search by block).

To navigate through pages of text, use the paging bar located above and below the text field. To display all pages of a document at once, click on “Show all pages” at the bottom of the document page.

To see which specific fragments of text were borrowed and from which specific source, in the system all blocks of borrowings are highlighted in color, and at the end of each block there is a label with the serial number of the source.

When viewing borrowed blocks in a report, you can use block navigation (block search). Using it, you can go to the next or previous block by clicking on the “Previous” or “Next” buttons. You can also choose which blocks to navigate through – the quoting or borrowing blocks.

View source information

To view information about a source, expand the source you are interested in in the list of sources and click on the icon.

Source information in the source list

Parameters such as the share in the text, the number of blocks in the report, the number of blocks in the text are customizable. To do this, click on “Menu”, select the “Profile” section and go to the “Report Settings” tab. You can choose which options will not appear in the report by unchecking one of them.

Report settings

Another way to view information about a source is to click on the source number in the text of the full report. A window will appear containing basic information about the source.

Information about the source in the text of the full report

External source link

For most sources, an external link to the online location of the document or source text is available in the report source list.

A situation may arise when, when following a link, the source is unavailable. Perhaps the site administrators deleted the text, or the page “moved”. But in any case, this text was available at the specified address when the site was added to the index of the search module of the Anti-Plagiarism system.

The fact that one or more links to open sources on the Internet given in the report do not work at the time of viewing the report is not grounds for removing these links from the system index. The texts at these addresses were indexed; before they were deleted/moved, they were available to third parties and could be read, copied or otherwise used. In particular, they could be stored in the caches of search engines and web archives, where they can still be found.

View a report by source

To view a report by source, click on the link in the source name in the list of report sources. A page with the text of the source with which there was a match will open in a new tab in the browser. Instead of text that does not overlap by source, you will see a certificate about the number of missing characters.

If you want to view the source text in full, open the source link by clicking on the “Go to source site” button.

Source report

Click on another source in the Sources panel on the left to view a report for that source at once.

You can choose to view the report by source - page by page or in continuous text. By default, the source report is displayed page by page. To switch viewing mode, click on “Show full text”. When you switch to continuous text view mode, the button will change to “Show text page by page.” Click it to switch to page view mode.

Another way to view the source report is to go to the source report from the in-text citation block. Click on the source number at the end of the block, then click on the source name.

Go to the source report from the citation block

The Source Report page will open and the corresponding borrowing block will be shown at the top of the page.

Viewing report history

When you recheck a document or edit a report, all previous versions of reports are saved in the system. To view the report history, click the “More” button and select “Report History” in the top menu of the full report.

Viewing report history

A separate window will open where you will see brief information about all generated reports for this document. Reports in history are sorted in descending order of creation date.

To go to a detailed view or adjustment of one of the reports, click on the “Open” button. The report will open on a new page.

Report history

You can also view all report adjustments, go to a specific adjustment and change it. The adjustment is created automatically when editing the report.

Information about the edited report in the report history

Editing the Source List

In the full report, actions with sources are available, allowing you to make some changes in the calculation of the test results.

  • Adjusting the list of sources taken into account in the report – allows you to take into account or not take into account the sources you specify in the report.
  • Change Source Type – Allows you to change the source type of your choice.

To ignore sources, in the list of sources, uncheck the lines of these sources, and then click the “Recalculate” button. After recalculation, the overall score for the report will change, and the text of the report will no longer display citation blocks for this source.

To take the source into account again in the report, return the checkboxes and click “Recalculate”.

Adjusting the list of sources taken into account in the report

The system divides sources into two types: “Citations” and “Borrowings”.

When generating reports, the system automatically sets the source type: “Borrowings” - orange and “Citations” - green.

Important! The service makes only a preliminary assessment; only the user can give a real assessment of the source.

You can change the source type from “Citation” to “Borrowing” and vice versa. To change the source type from Borrowed to Cited, in the list of sources in the report, click on the orange percentage. The “Mark as correct borrowing” item will appear next to the cursor; click on it, then the “Recalculate” button.

Changing the source type

If you are satisfied with the current version of the report, you can save the report by clicking the “Save” button in the top panel of the document. A window for saving the edited report will open, in which you can leave your comments, for example, information about changes made to the report or the reason for the changes. After saving, a new adjustment will be created in the report history.

If the report was edited and the editing results were recalculated, it will be saved automatically; you can find the autosaved report in the report history and continue working with it. In the report history, autosaved reports have the following inscription in the comments: “Autosaved version.”

Brief report

The summary report presents the distribution of percentages of originality, borrowing and citation, as well as a list of sources of borrowing.

Brief report

For most sources, the report source list displays an external link to the location of the source document or text on the Internet. To go to the Internet page, click on the icon next to the source name.

In the top panel of the page you will see icon buttons that allow you to proceed to the following actions:

  • outputting the report to a page for printing;
  • downloading this report;
  • viewing report history;
  • link to user manual;
  • return to the office to the list of documents.

To obtain more detailed information about the results of this audit, open the full audit report by clicking on the “Full Report” button.

Suspicious document

A suspicious document is a document in which signs of technical means of changing the text or format were detected, for example, replacing characters, inserting invisible text, etc. Such signs may indicate that the author tried to circumvent the system in order to hide borrowings and artificially increase the percentage of originality. If such signs of circumvention were found in a document, then a special mark will be placed for it in the user’s account and the general list of company documents.

Displaying a suspicious document in your account

Important! If a suspicious flag appears, we recommend that you carefully read the scan report and any suspicious fragments found in the document. The functionality for detecting suspicious documents is an auxiliary analysis tool. The final decision always remains with the inspector.

Information that a document has detected signs of system bypass is displayed in scan reports, printable versions, and downloadable reports. The summary report for a suspicious document displays the page numbers on which potential attempts to circumvent the system were detected.

Brief report for a suspicious document

The printable version of the test report provides information about potential attempts to circumvent the system. The types of crawls and pages on which suspicious fragments were found are displayed here. Similarly, information is recorded in downloaded versions of reports.

Version for printing a report on a suspicious document

In the full report for a suspicious document, a special block is displayed with a mark of suspicion and a link to the “Suspicious Document” page - to go to the page, click “View”.

Full report for a suspicious document

Important! If the uploaded document does not have formatting, then instead of a link to the “Suspicious Document” page, the full report displays the page numbers on which potential attempts to bypass the system were detected.

The “Suspicious Document” page displays detailed information about the suspicious fragments found in the document. Here you can view the text of the document in the form in which it was loaded into the system (with the original formatting preserved). If a fragment is found on a document page that may be an attempt to bypass the system, it is marked in red.

Suspicious Document page

To view information about suspicious fragments for the entire document, click on the “In Document” tab in the right panel. To view page numbers, click on the desired crawl group name. To go to any of the listed pages, click on the desired number.

In Document Tab

The “On Page” tab provides information about suspicious fragments on the selected document page. To display certain types of walkthroughs, check the boxes for them, and uncheck the rest for others. Selected types of bypasses are highlighted in red on the page, and removed bypasses are underlined with a red line. To highlight all suspicious fragments on a document page at once, click on “Show all”. In order to deselect all suspicious fragments at once, click on “Hide All”.

It is also possible to view the crawl text if it was extracted during document processing.

View crawl text in the On Page tab

If the document does not contain crawls, you can unmark it as suspicious. To remove the mark, use the enable/disable button in the upper right corner of the Suspicious Document page. You can leave a comment explaining why you removed the suspicious flag. If you view the “Suspicious Document” page via a direct link, you will not be able to uncheck the suspicious flag.

Removing the suspicious flag

If you uncheck the suspicious flag:

  • the corresponding icon will not be displayed in the account;
  • the summary report will not display information about crawls;
  • in the downloadable report forms and in the printable version, in the “Suspicious Document” section, information will appear that the suspicious mark has been removed and a comment will be displayed;
  • in the full report you will see that the suspicious flag has been removed - the corresponding icon will turn gray;
  • Access to the “Suspicious Document” page is maintained.
Disabled suspicious flag in full report

Uploading a report

Report upload confirmation window

The Export Report page opens. To start generating a report, click on the “Export” button. After a while, the button will change to “Download”. Click on the "Download" button to download the file. The download will start automatically, or a dialog box will open to download and save the file, depending on your browser settings.

In the downloaded report you will see information about the report and the downloaded document, a terminological block with the meaning of the concepts “Borrowings”, “Citations”, “Originality”, a list of sources and text with markings of citation blocks (if the user downloads the full report).

Direct link to the report

To get a direct link to the report, open the report and click on “More” in the top menu, then click on the “Direct link to the report” button. A new tab will open with the report in view mode. Copy the address in your browser's address bar to pass the link to someone else.

An external user who follows a direct link will be able to view the report and text metrics (if this function is enabled), display the report on a page for printing, and export the report (if this function is enabled). You cannot edit a report using a direct link.

Purchasing services in the office

The free service is provided with limited account capabilities. As part of the free access, you get the opportunity to check for borrowings using the Internet search module and view only brief reports. If you want to get acquainted with the full functionality of the service or expand the functionality of your account (receive full reports, connect additional search modules, etc.), we recommend that you first familiarize yourself with the tariffs; to do this, go to the “Tariffs” page.

Go to the “Tariffs” page

Purchasing a subscription to a tariff

In the “Tariffs” tab you will see a tariff schedule to familiarize yourself with the functionality of the tariffs. In the “header” of the tariff schedule you will see our line of tariff plans. Each tariff plan is connected for a certain period with a certain maximum number of checks; tariff plans may also differ in functionality.

Tariff plans and tariff schedule on the “Tariffs” page

To purchase a subscription to a tariff, select the tariff plan line and validity period by clicking on the switch, and then click on the “Connect” button.

After clicking on the “Connect” button, a window will appear with a message about a successful purchase, and at the same time, as many points as the subscription to the tariff cost will be debited from your account.

After subscribing to a tariff, you will see the name of your current tariff in the upper right corner.

Information about the status of the user account to the left of the menu

After you top up your balance, return to the “Tariffs” page and select the tariff again.

You can get more detailed information about the purchased services in your account and current tariffs on the “Statistics” page.

Important! Only after connecting to a paid tariff, you will be able to connect additional services and search modules.

Connecting a package of additional services and search modules

If you want to access all possible functions of the system and get the maximum quality, then the easiest way is to purchase a combined collection that includes all available search modules and additional services by clicking one button.

Top up your account with an amount sufficient to connect and go to the “Tariffs” page in the “Packages of additional services and search modules” tariff schedule.

United collection

Select a tariff plan and click on the “Connect” button. The system automatically activates all available services and search modules.

Important! To connect to the full package of additional modules and services, you must have the "Basic", "Advanced" or "Highload" tariff activated.

You can also purchase additional services and search modules of your choice.

Connecting an additional text recognition service (OCR)

This service allows you to recognize and check for borrowing scanned documents, photographs from a digital camera and graphic images containing text data.

To activate this service, go to the bottom of the “Tariffs” page, you will see the tariff schedule for additional services. Select the tariff plan line and validity period by clicking on the switch, and then click on the “Connect” button.

Additional services on the “Tariffs” page

Connecting additional search modules

To view additional search modules, go to the bottom of the “Tariffs” page. There you will see a line of additional search modules with a brief description and connection conditions. Additional search modules are connected for a certain period and have a maximum number of checks per connection.

Connecting additional search modules is only possible in paid plans.

Additional search modules on the “Tariffs” page

After connecting the additional search module, you will see its name next to the “Menu” icon.

Top up your balance

To go to replenish your balance in the top panel of your account, hover the cursor over the number of points, then the “Top up” button will appear, click on it.

Proceed to replenish your balance

After proceeding to payment, a page for replenishing your account will open in front of you. Enter the amount to top up in the input field, and then click the “Next” button.

Important! After confirmation of payment, payment must be made within 24 hours, otherwise the payment application will be canceled. Also note that when you top up your account, you purchase points, and the cost of 1 point is indicated.

You can view all transactions with your points, as well as the status of completed payments, on the “Balance” page.

You can also go to replenish your personal account on the “Statistics” or “Balance” pages. To go to these pages, click on “Menu” in the upper right corner and select the page you need. After that, click the “Top up” button.

View your balance

On the “Balance” page you can see the history of transactions performed with your points in your account.

To go to the “Balance” page, click on the “Menu” icon, and then select the “Balance” menu item. After going to the page, you will see a page with a list of all purchase transactions, debiting points for subscribing to tariffs and connecting additional search modules.

List of transactions on the “Balance” page

To find out in detail the result of the operation, hover the cursor over the icon in the “Result” column; after hovering over it, a note with an explanation will be displayed. Information about the payment status will be especially useful if problems arise when making payment transactions.

If a lot of transactions have been made in your account, you may find it convenient to use the transaction filter. By default, the list of transactions is sorted by transaction date in descending order. You can change the sort order in the table header; the direction of the arrow will change, indicating the sorting method, and the column currently sorted by will be highlighted in bold.

View usage statistics

On the “Statistics” page you can view detailed information about the purchased services in your account.

To go to the connection statistics page, click on the “Menu” icon in the upper right corner and select “Statistics”.

The success of its online promotion depends on the quality and uniqueness of the content that fills the site. Uniqueness is also required from educational works, such as abstracts, coursework, diplomas, original works, etc.

When it is impossible to write a completely unique text, resort to rewriting, or rewriting (from the English rewrite, rewrite). Rewriting is somewhat reminiscent of a school presentation, when the source text is retold (rewritten) in your own words. However, rewriting can also be different - sometimes it is necessary to study not one, but several sources, change the structure of the text (the so-called deep rewriting), sometimes it is enough to simply replace some words with synonyms.

The uniqueness of the text is checked using special anti-plagiarism programs and measured as a percentage. If the text is completely or partially stolen from another resource, the program will show a low percentage of uniqueness, and will also highlight non-unique passages and show their source.

Below are useful tips on how to achieve uniqueness and deceive anti-plagiarism. We hope that these tips will help you create an original text that is loyal to the customer and search engines.

  • 1 How to make text unique: 4 steps
  • 2 How to make text unique: 6 honest ways
  • 3 How to deceive the anti-plagiarism program: dishonest methods
  • 4 Ways that will NOT help you make your text unique

How to make text unique: 4 steps

So, here is an approximate algorithm on how to bypass anti-plagiarism and achieve a unique result.

Step 1. Select a service to check

First we need to decide on a service that will check our work. There are many anti-plagiarism programs. If the customer has not specified a specific program, then it is better to check the uniqueness with 1-2 programs of your choice.

Some of them (like etxt, advego) require downloading and installation on your computer. Others, for example text.ru, are available to users online.

At the same time, you should be prepared for the fact that different services show different percentages of text uniqueness. The difference in readings can reach 50%!

The fact is that each of them has its own algorithm for counting and analyzing text material, which is inaccessible to most users.

Step 2. Save all text variations

The next step on the path to how to bypass anti-plagiarism is to save all versions of the text: both the original and all others.

The main thing is not to get confused and consistently change the structure and content, achieving the desired indicator of the anti-plagiarism program.

Step 3. Making the text unique

How to achieve this - read below. If 98-100% uniqueness is not required, it is better to play it safe and make the uniqueness 5-10% higher than necessary to pass verification on any service.


If free applications show a good indicator, then a paid one may underestimate it, and as a result, the uniqueness will not be what the customer required.

Knowledge is power! Or how to use shingle rules

A shingle is a small piece of text consisting of several words, which is used to check the uniqueness of what is written. If the shingle “3” is specified, this means that three words will be checked. Such data is set in the parameters of the program itself. It is easier to deceive the anti-plagiarist if you know this meaning.

The greater the shingle value, the easier it is to achieve original author material. But the optimal value for the customer and performer will be 4-5 words. Replace the first or last word in a phrase, and the text will immediately become original.

Step 4. Save the finished text

Once the required percentage of originality is obtained, the text must be saved and sent for verification.

All ways to bypass the anti-plagiarism program can be divided into honest (when the uniqueness of the text really increases) and dishonest (when the text remains the same, but the program perceives it as unique). Let's look at them.

How to make text unique: 6 honest ways

Below are working tools that will help make any source material unique for search engines.

Method 1. Deep processing of the source material/retelling in your own words

This is what is called rewriting, which literally means “rewriting” in English.

Method 2. Using synonyms

Do you want to know the answer to how to pass anti-plagiarism? Use synonyms. It is important to understand here: despite the fact that synonyms often make the material unique, the author is forced to constantly search for certain substitute words. As a result, he becomes fixated on this, which causes the meaning of the text to suffer.

Another interesting feature is to insert formulas and tables in the form of pictures. This technique allows you to increase the uniqueness of the text.

If the selection of synonyms goes poorly, use synonymizers. Synonymizers are special applications that allow you to quickly select words that are different in spelling, but similar in meaning to the original query. They are provided for a fee or free of charge.


They can request not only individual terms, but also entire phrases. This is convenient, but still does not make it possible to completely edit the previous material in a few seconds.

Method 3. Translating text from sources in another language

Translating text from sources in another language is a great way to fool etxt anti-plagiarism and any other program. The result is a completely unique work, because the source text for the rewrite was published in another language.

The problems are that

  • you need to find material that is suitable in content, written in a foreign language. Obviously, you will have to find several sources to obtain the required content.
  • you need to be able to translate it correctly.

translations themselves pay much better than rewriting. Read more in the article: “ How to make money by translating articles».

Method 4. Replacing frequently repeated words

Often these are some kind of conjunctions or words that are meaningfully related to the keys. We replace 1-2 synonyms that are close in meaning.

Method 5. Reworking the sentence from the end

Many sentences used in articles and other materials are complex. That is, they have two parts, one of which is subordinate to the other. It is enough to swap them in order to achieve not 100% uniqueness, but a good coefficient.

Again, a lot will depend on the size of the shingle. But in many cases, the meaning of a particular phrase can be conveyed to the reader in reverse order.

Method 6. Using words like “directly”

It is believed that using this or similar adverbs twice per 1000 characters will make the text more authorial, that is, original. With more frequent use, it may become noticeable. But here a certain skill is required in order to correctly and correctly enter these adverbs.

How to deceive the anti-plagiarism program: dishonest methods

In addition to honest (or relatively honest) methods, there are also dishonest methods that help to deceive the plagiarism program, forcing it to evaluate a non-unique text as unique.

  • Adding automatic transfers

On the one hand, a very simple way from the field of how to cheat anti-plagiarism for free. On the other hand, not all works welcome this.

For abstracts this may be a suitable solution, but when writing articles for publication on websites, customers will not accept work with transfers, and their removal will immediately reveal the true state of affairs. Therefore, it is necessary to discuss all technical nuances in advance.

  • Use of material not indexed by search engines

As a rule, search robots analyze material taken from a site and enter data about it into storage. The indexed text is thus the one that has already been checked by the search engines Google and others.

  • Using Word macros

Macros are convenient for the user in that he can record the key combinations he most often needs and then access them as many times as needed in a second. This makes it possible to simplify frequently used actions or their combinations.

Working with text fragments works in a similar way, which makes it possible to increase its uniqueness.

  • Visual Basic Macro Help

A method for programmers who know how to use Visual Basic, how to deceive anti-plagiarism and other programs. Everything is very simple: after each word or character, depending on the volume of text and the complexity of the task, a small dot of the 1st font is added.

It is almost impossible to see it visually. But in order to run this process for all words, you need to write a macro, and this will require knowledge of the basics of VB.

  • Replacing Russian letters with Greek ones

Here's another interesting technique that not all copywriters use - many don't even know about its existence.

The fact is that systems do not yet recognize the Greek symbols micron and omega, which successfully replace the letter “o”, since they look almost the same, but for anti-plagiarism programs it is a completely different symbol. And just as replacing one letter in a passport makes you a different person, replacing one letter in each word can make the text unique to search engines and anti-plagiarism programs.

The system does not detect the presence of plagiarism. According to Ozhegov’s dictionary, plagiarism is passing off someone else’s work as one’s own or illegally publishing someone else’s work under one’s own name, appropriation of authorship. Checking in the system shows the presence of matches in the text (similar or similar fragments). At the same time, the system does not determine the original source and does not compare the publication dates of documents. The result of the check in the system cannot be interpreted as evidence of plagiarism and has no legal force.

The system does not store copies of source documents (website pages, documents published on the Internet, etc.). When a new source is detected, the system performs indexing, i.e. construction of special blocks of information - indexes and digital copies of documents. These new structures are used for further searching.

Every year, information technologies are becoming increasingly widespread in the world, which give users, in addition to extensive opportunities for acquiring knowledge, also the opportunity to use the works of others under the guise of their own. There are many Internet sites that provide files with essays, term papers and other educational works. The use of other people's works has an extremely negative impact on the quality of education of young specialists. On the Internet you can find many diplomas and coursework that are 99.9% identical, with the only difference being the title page.

Therefore, the problem of identifying borrowings in educational works faces society more and more acutely. To avoid copying information, works must be checked for borrowings. This practice is widespread in the West and has been actively implemented in Russia and the CIS countries since 2005.

Yes, of course, you can trust the verification in the system. It was developed by highly qualified scientists and programmers. The system uses modern analysis algorithms that make it possible to identify borrowings even if the following adjustments are made to the text: changing the form of a word, rearranging words, and so on. However, in any case, you must carefully review the report and not focus only on the final grade given by the system.

The best way to “beat” the system and increase your originality score is to write the paper yourself.

There are several technical ways that you can visually increase your originality score (replacing letters, adding hidden characters and text fragments, adding text as a graphic, and many others), but all of them are easy to spot when viewing the report.

The document uploaded by the user for verification is converted by the system and divided into small fragments. The system then compares each fragment with available sources (depending on the search modules used).

This search algorithm was based on the principles of operation of the Yandex search engine, described in the article by Ilya Segalovich “How search engines work.”

All search modules constantly expand the list of indexed documents. The more sources are used when checking, the more effective the search.

Yes, all search modules are regularly updated with new sources. The Internet search module is updated on average with at least 5 million sources every month (link to page). Preference in indexing is given to educational materials: scientific articles, abstracts, published diplomas and other materials that can often be used when writing academic papers.

The system for private clients assumes personal use. The user independently pays for the services he needs and no one else has access to the results of his checks in the system.

The system for corporate clients assumes a hierarchy of users, which is created by the system administrator in the organization. The search can be carried out using a larger list of search modules, including the internal collection of the organization and the “Ring of Universities” collection. The scan results can be made available to the system administrator in the organization and the scanned documents can be added to the internal collection index.

The following search modules are available for private clients to connect to in the system:

  • Internet module. Contains about 400 million sources in Russian, English and other languages. Available with any access, including free access.
  • Module "RSL Collection". Includes abstracts of dissertations, master's and doctoral dissertations of the Russian State Library.
  • Module "eLIBRARY.RU". Contains more than 11 million scientific articles and publications.
  • Module "Garant". Contains regulatory documentation. All borrowings found using it are defined by the system as citations (except for original articles).
  • Module "Medicine". Contains more than 42 thousand documents (scientific and educational literature) on medicine and pharmaceuticals.
  • Module "Patents". Contains about 11.5 million documents.
  • “Internet paraphrasing search module.” Allows you to find borrowings from Internet sources, taking into account replacing words with synonyms, inserting/deleting words, changing word forms, rearranging parts of a sentence.
  • “Paraphrasing search module eLIBRARY.RU.” Allows you to find borrowings from sources in the eLIBRARY.RU collection, taking into account replacing words with synonyms, inserting/deleting words, changing word forms, rearranging parts of a sentence.

To register in the system, you only need an email. On the main page, you must click “Registration” and enter your email address. A login password will be sent to it.

You can also use an account from one of the common social networks to register (the account is linked to the email from the corresponding social network account).

To upload a document, you need to go to the “Account” tab and click “Add document”. You will be asked to select a file from your computer. When adding a document, you will need to specify the search modules that will be used for checking.

If the user has forgotten the private client login password, you can use the password update feature. To do this, in the authorization window you need to click “Forgot your password?” and enter the email address that was used during registration. A link will be sent to you to update your password.

If the letter is not in the “Inbox” section, you need to look in the “Junk Mail” or “Spam” folder.

Yes, document verification is available in the system as part of free access. In this case, checking for the presence of borrowings is carried out only using the “Internet” module and only a short report with the first three sources from which borrowings were found is available.

You can get a more complete check result (full report, check using additional search modules) within the framework of paid tariffs. More details about their connection conditions can be found on the “Tariffs” tab.

As part of the brief report, the user has access to a list of sources and final estimates of borrowings, citations and originality in percentage terms.

In the full report, in addition to this, the user receives:

  • full text of the work with blocks of borrowing and citation highlighted in color;
  • ability to edit the report (excluding sources and blocks);
  • reports on sources.

Only users with a paid connection have the ability to download a report. To export the report, we suggest using the “Export” button to generate a file in pdf format, or use a direct link to provide access to view the report.

The “Suspicious Document” symbol is informative and indicates that attention should be paid to the document. Its appearance may indicate that a technical bypass of the system has occurred. It could also appear due to the presence in the document of a large number of long or foreign words or specific terms.

Please note that the “Suspicious Document” symbol cannot serve as a basis for refusing to accept work.

To obtain access to the Anti-Plagiarism system for corporate clients, you must contact the system administrator in the organization.

We do not guarantee the identity of the test results. The difference may be due to the fact that the organization:

  • more search modules are connected than on the account in the system for private clients;
  • extensive internal collection (works of past graduates, methodological instructions, etc.)

To correctly display borrowings from regulations in the text of the document, verification must be carried out using the “Garant” module. This module includes most of the existing types of legal information, as well as links to tax law and Russian GOSTs.

Additional search modules are connected and paid separately. You can familiarize yourself with the conditions for their connection on the “Tariffs” tab.

When using the Citation module, text fragments enclosed in quotation marks are recognized as quotations. The exception is when the quote is part of a larger borrowing block. In this case, the entire fragment is considered by the system as borrowing.

Citation is defined in the report as a separate indicator and is not included in either borrowing or originality.

The “Citing” module appears automatically when you connect to any paid tariff. Information about tariffs is contained in the “Tariffs” tab.

According to the license agreement, the Anti-Plagiarism system does not store copies of documents uploaded for verification in the form of a source file with illustrations and formatting. Only the texts of documents read by the system, which are accessible to the person who uploaded them, are saved in the user’s account. To view the text, click on the document title.

In order for your work to be indexed by the Anti-Plagiarism system, it must be published in an open source on the Internet.

Our system is constantly updated with new sources. Sometimes it turns out that rarely used sites remain unattended by our module.

You can expand the area of ​​checking for borrowing by adding the necessary link to the source.

To do this, in the “Profile” section you need to open the “Add a site for indexing” form. In the window that appears, you need to specify a link, and if necessary, you can leave a comment.

When checking documents in the Anti-Plagiarism system for private clients, the texts of works are not indexed by the system; they do not take part in further searches for borrowings and are available only to the person who uploaded the document.

It is possible that the page containing the text being checked has not been indexed. For example, this may be due to the fact that the site on which this text is posted is of an entertaining nature or belongs to social networks. Texts from such sites are not indexed by the system.

The Anti-Plagiarism system constantly indexes new pages and documents. If you have a resource that can be useful when searching for borrowings, offer it to us for indexing. This can be done using the menu, section “Add site”.

When checking a document, the Anti-Plagiarism system does not take into account the authorship of the article, but finds all similar or similar fragments of text among the sources.

When working with a full report, it is possible to remove this source from consideration. To do this, next to the name of the source, you need to uncheck the box and click “Recalculate” under the table. In this case, the disabled source will not participate in calculating the final percentage of originality.

To delete an account in the Anti-Plagiarism system for private clients, you need to contact technical support. An application to delete an account may be accepted in the following cases:

  • the file size should not exceed 20 MB;
  • format one from the list pdf, txt, html, htm, docx, doc, rtf, odt, odf or archive 7z, tar, gz, bz2, rar, zip.

Also, a similar error can occur if the document was saved incorrectly. You can try changing the format of the downloaded document. To save a document in a different format, you need to open it in Microsoft Word (or another similar program), then click “File” - “Save as” and in the “File type” column select a different one from the current one.

You are probably using free access. When using free access, there is a time limit for checking documents - no more than one document every 6 minutes. If you upload a document for verification before 6 minutes have passed since the previous verification, the document will be uploaded to your account, but will not be automatically added for verification. To check the specified document (after 6 minutes have passed), you need to tick it in the list of documents in your account and select “Recheck” in the “Select action” menu.

Perhaps the site administrators deleted the text, or the page “moved”. But in any case, this text was available at the specified address when the site was added to the index of the search module of the Anti-Plagiarism system.

The fact that one or more links to open sources on the Internet given in the report do not work at the time of viewing the report is not grounds for removing these links from the system index. The texts at these addresses were indexed; before they were deleted/moved, they were available to third parties and could be read, copied or otherwise used. In particular, they could be stored in the caches of search engines and web archives, where they can still be found.

Anti-plagiarism online The site allows you to check the text completely free of charge.

Efficient Algorithms anti-plagiarism online make the check in-depth and high-quality.

Procedure plagiarism checks is simple: just a few clicks - and you will find out the percentage of text uniqueness. If there are duplicate texts on the network, they will definitely be found. You can also check the text for errors using a spell check service.

When registering for the service, you will automatically have the verification restrictions intended for guests removed, and you will be able to check a much larger number of texts using our online plagiarism service.

New algorithm for checking for plagiarism

The website service uses an algorithm for checking texts for uniqueness, which analyzes texts using an improved technique. To make your work with the verification service transparent and comfortable, we will give some recommendations for interacting with the current algorithm.

What texts does the algorithm not like?

This algorithm for checking text for plagiarism online is fundamentally different from checking using the shingle method. What implications does this have for working with texts?

  • The technique of low-quality rewriting is a thing of the past changing every fifth or fourth word. In texts written in this way, a high percentage of matches with the source will be found.
  • We are also pleased to announce that our the algorithm detects plagiarism even after rearranging words, phrases and sentences in places.
  • When working with anti-plagiarism uniqueness will not increase from changes in cases, tenses and other grammatical categories of words.
  • “Adding” new words to the original sentence, the rewriter will also not get rid of plagiarism.

Thus our free anti-plagiarism online highlights matches most accurately and completely.

What texts does the algorithm like?

To achieve 100% uniqueness when rewriting, you must complete high-quality text processing.

  • Pay special attention to densely illuminated areas- by getting rid of them, you will increase the uniqueness of the text.
  • It is recommended to do deeper rewriting: replacing words with synonyms, reformulating phrases, etc.

Let's make the algorithm even more careful!

If in the results of the check you find an extraneous link, in your opinion, where the matches are random, or, on the contrary, the results do not display a link to a page where there are matches with the text being checked, then write to support@site (be sure to include a link to the check result ).

Date of publication: 01/24/2019

Recently, teachers have begun to require students to provide them with an anti-plagiarism report, which displays the main results of checking the text for uniqueness. Many people still don’t know what it is and how to download it.

Now we will tell you how to make an anti-plagiarism report for free, how to print it, what is the difference between a full report and a short one, and you will also find out what advantages a full university anti-plagiarism report will give you.

1. What is an anti-plagiarism report? - sample

2. How to make an anti-plagiarism report for free?

3. How to print an anti-plagiarism report?

4. Advantages of a full report over a short one

1. WHAT IS AN ANTI-PLAGIARITY REPORT? - SAMPLE

The anti-plagiarism report is a letterhead that displays the results of text checking in the anti-plagiarism system.

What does the report show? If we are talking about a free report, then it will indicate what percentage of originality the text has, what percentage of citations and borrowings (plagiarism).

In addition, the free report contains links to sources and sites from which the text was copied. There are only three links in the free report of the antiplagiarism ru website. The rest can only be obtained for a fee. Also, the report displays which modules were analyzed. There is only one module in free anti-plagiarism - Internet Search Module.

The photo shows a report from the website antiplagiarism ru, which you can do yourself, absolutely free.


2. HOW TO MAKE AN ANTI-PLAGIARISM REPORT FOR FREE?

Now we will tell you step by step how to make an anti-plagiarism report for free and on your own.

After you have checked the text in anti-plagiarism, an active “Brief Report” button will appear on the right. Click it.

An expanded menu will open in front of us, where we need to select “Print version”

That's all. The very same free anti-plagiarism report will open in front of you.

3. HOW TO PRINT AN ANTI-PLAGIARISM REPORT?

As you may have noticed, there is no button to “download” or print the report in the menu. To save it on your computer, proceed as follows.

Press the button on the PRT SCR keyboard - it is located at the top right. Popularly, this key is called “print screen”, an analogue of the “screen photo” button on iPhones and Galaxy.

After clicking the “print screen” button, the screen image will be saved in the computer’s memory.

To upload an image to your computer and be able to print a report, we will proceed as follows.

1) Open regular Paint

2) Press the CTRL+V keys simultaneously - this is a combination of buttons for unloading a picture from memory. After pressing the combination of these buttons, a photo of the screen with our report will appear in Paint.

3) After the screen photo is displayed in Paint, trim the edges and save the file.

Ready. Now you can easily print it out, or insert a picture on the last page of your coursework or dissertation.

4. ADVANTAGES OF A FULL REPORT OVER A SHORT REPORT

Unfortunately, there have been few free reports for teachers lately. Most of them ask you to provide a full report of your work and upload it from the University Anti-Plagiarism system.

Full report anti-plagiarism university provides a large number of advantages compared to free:

1) Significance in the eyes of the teacher (downloading the report from the teacher’s version of anti-plagiarism)

2) The indisputability of the result (University anti-plagiarism, as is known, underestimates the percentage of originality and the result of free anti-plagiarism is not counted by many teachers)

3) The ability to use the full report as an aid in increasing the uniqueness of the text (in the full report, in addition to links, the entire text of the work will be expanded, where it is indicated which phrases and sentences require correction)

Therefore, in the next article we will tell you how to make a full anti-plagiarism report, what it even is and how else it differs from a short and free one. We will also tell you where you can order the full version of the Anti-Plagiarism University report.

P.S. It makes sense to print out the anti-plagiarism report if your text already reaches the passing level of originality at your university. If the percentage is not enough, work on the text, our tips will help you with this, which you can read in the article - How to increase the originality of the text in anti-plagiarism.

Useful materials