Preferred Language
Articles
/
NhdNPo8BVTCNdQwC8GWw
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and Near-duplicate detection (PAN) Dataset 2009- 2011. Verbatim plagiarism, according to the researchers, plagiarism is simply copying and pasting. They then moved on to smart plagiarism, which is more challenging to spot since it might include text change, taking ideas from other academics, and translation into a more difficult-to-manage language. Other studies have found that plagiarism can obscure the scientific content of publications by swapping words, removing or adding material, or reordering or changing the original articles. This article discusses the comparative study of plagiarism detection techniques.

Publication Date
Wed Dec 23 2020
Journal Name
2020 International Conference On Advanced Science And Engineering (icoase)
A Comparative Study Using LZW with Wavelet or DCT for Compressing Color Images
...Show More Authors

As a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
A comparative anatomic study of leaves of the genus Stachys L. in Iraq
...Show More Authors

The anatomic characteristics of the leaves of 22 taxa of Stachys L. representing seven of the currently recognized sections distributed in northern Iraq, were examined. The study did not found any variations in the characteristics of the stomata system of the leaves.Therewere variations with a good taxonomic value in other anatomic characteristics.Thevariations in characters of the mesophyll tissue in S.kurdica var.brevidens Bom ex Bhattacharjeewas bifacial but in S.kurdica var.kurdica Boiss. & Hohen.was unifacial .The study also found that the taxa S.benthamiana Bioss., S.lanigera (Bornm.) Rech.f. andS.kotscyi Bioss. with 3 vascular bundles in the middle vein while the taxa S.ballotiformis Vatke., S.megalodonta Hausskn. &Bornm.exP.H.Davis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Journal Of The College Of Basic Education
A comparative study between students of smokers and non-smokers in endurance antenna
...Show More Authors

Subjects took physical fitness for health imposed on the area of research that have become an important and clear answer to the many problems resulting from the nature of dealing with modern life current actions that were needed to be hours of manual work has become accomplished by modern technology circumstance minutes, and mediated equipment And machinery. The lack of traffic rights and further burdens the intellectual and psychological pressures and the typical method of work has led to the identification of kinetic activity, thereby threatening public health in many ways stands at the forefront of these threats the problem of smoking, which causes many types of cancers, notably lung cancer. The most important reasons that led to This dr

... Show More
View Publication
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Personal tax exemptions "a comparative study with some Arab and European system legislations
...Show More Authors

This research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.      

View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
كلية التربية للبنات
The rights of orphans in the Old Testament and Islam, a Comparative Study
...Show More Authors

Allah Almighty has aggrandized the position of orphans and elevated their status in the society and has given the graces for those who sponsor the orphan and care for and protecting them, even those who rub their heads. The divine care is manifested in the verses of the Holy Bible and the Holy Quran. Therefore, the whole world cared for the orphan, and called for the rights of the orphans in the conferences and the channels. But all that was little effort that does not meet what the orphan need and some were only ink on paper that were not applied. All that mentioned above is necessary in dealing with the study (the rights of orphans in the Old Testament and Islam, a Comparative Study). The study was divided into a Preface and four inquirie

... Show More
Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Nov 19 2017
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques
...Show More Authors

Image compression is a serious issue in computer storage and transmission,  that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the  mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Journal Of The College Of Basic Education
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF