Plagiarism Policy

The Journal of Deep Intelligence and Computing (JDIC) is committed to maintaining the highest standards of academic integrity and publication ethics, in line with the principles promoted by IEEE, Scopus, and the Committee on Publication Ethics (COPE). All submissions are screened for textual similarity using industry-standard plagiarism detection software (e.g., Crossref Similarity Check/iThenticate). Manuscripts exhibiting a total similarity index above 10%, excluding references, standard methodological descriptions, and legally required boilerplate text, may be rejected without peer review. JDIC maintains zero tolerance for plagiarism and unethical reuse of published material in any form.


Definition and Scope

Plagiarism:The use or appropriation of ideas, data, methods, images, figures, tables, or words from another source without appropriate acknowledgment through proper citation and/or quotation. This includes close paraphrasing that substantially mirrors the structure, argument, or intellectual contribution of a source without due credit.

Self-plagiarism:The reuse of one’s own previously published or disseminated text, data, or figures—wholly or partially—without transparent citation, disclosure, or editorial justification. This includes duplicate submissions, redundant publication, and salami slicing.

Mosaic plagiarism:The interweaving of original text with unattributed material from one or more sources such that the resulting passage reproduces the source’s structure, expression, or conceptual flow.

Idea plagiarism:The use of another researcher’s hypotheses, interpretations, conceptual frameworks, or analytical models without attribution, even when the wording is changed.

Data/Figure plagiarism:The reuse, modification, or adaptation of datasets, tables, figures, charts, images, or visual materials without proper attribution and, where applicable, without obtaining prior permission.


Attribution and Quotation Standards

Ideas: Any idea, interpretation, methodology, or conclusion derived from another source must be cited at the relevant point in the manuscript. If the author extends or builds upon an existing idea, the original source must be clearly acknowledged before presenting the novel contribution.

Verbatim text: Verbatim use of text, including distinctive phrasing traceable to a source, must appear within quotation marks (or as a clearly formatted block quotation where appropriate) and be accompanied by a precise citation. A citation alone is insufficient for verbatim reproduction.

Paraphrasing: Paraphrased content must substantially transform the original language and structure and must always include proper citation. Superficial synonym replacement or minimal rewording is unacceptable.

Data and visuals: Reused or adapted tables, figures, images, or datasets must include explicit attribution in captions and in-text references, with clear indication of adaptation and documented permission where required.


Similarity Checking and Thresholds

All submissions are screened prior to peer review using similarity detection software. A similarity index exceeding approximately 20% may trigger immediate rejection or a request for revision, at the discretion of the editors.

The similarity threshold is a guideline, not an entitlement. Manuscripts with lower similarity scores may still be considered problematic if significant unattributed overlap, single-source duplication, or unethical reuse is identified.

Similarity reports are diagnostic tools, not definitive judgments. Editors and reviewers may identify ethical concerns that are not captured by software-generated similarity scores.


Author Responsibilities

  • Ensuring the originality of their submissions

  • Accurately citing all sources, including their own prior work

  • Transparently disclosing prior dissemination, including preprints, theses, conference papers, or overlapping manuscripts under review elsewhere

  • Clearly identifying reused text, data, or figures and obtaining necessary permissions prior to submission

Failure to meet these responsibilities constitutes a breach of publication ethics.


Editorial Actions and Consequences

Desk rejection: Manuscripts containing clear evidence of plagiarism, self-plagiarism, or duplicate submission may be rejected without peer review.

Investigation: Allegations of plagiarism raised at any stage will prompt an editorial investigation, which may include requests for explanations, source materials, or documentation.

Corrections and retractions: Confirmed ethical violations after acceptance or publication may result in withdrawal of acceptance, publication of corrections, expressions of concern, or retraction, following COPE-recommended procedures.

Notifications: In serious cases, the journal may notify authors’ institutions, funders, or relevant oversight bodies.

Bans: JDIC reserves the right to impose time-bound or permanent submission bans on authors involved in serious or repeated violations.


Education and Remediation: JDIC encourages responsible scholarly practices, including proper citation management, ethical reuse of prior work, and early use of plagiarism detection tools. Where overlap is deemed unintentional and correctable, editors may allow one opportunity for revision, accompanied by clear guidance.


Contact 

Questions regarding this policy, detected overlap, or attribution standards may be directed to the Editorial Office, Journal of Deep Intelligence and Computing (JDIC).


Acknowledgement

By submitting a manuscript to JDIC, authors acknowledge that they have read, understood, and agree to comply with this Plagiarism Policy and the journal’s publication ethics standards.


Additional Resources