Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and Near-duplicate detection (PAN) Dataset 2009- 2011. Verbatim plagiarism, according to the researchers, plagiarism is simply copying and pasting. They then moved on to smart plagiarism, which is more challenging to spot since it might include text change, taking ideas from other academics, and translation into a more difficult-to-manage language. Other studies have found that plagiarism can obscure the scientific content of publications by swapping words, removing or adding material, or reordering or changing the original articles. This article discusses the comparative study of plagiarism detection techniques.
Piracy is one of the most important problems faced by sound record producers, because it is a problem that evolves with the development of time and technology, and although piracy is not a new problem, it has received great attention in recent years, because of the means by which (the Internet) and its size result from it, even In many of the ruler, describing it as (the crime of the electronic age) and she participated in the great harm it causes to all the groups involved in it producing the sound recording, because there are three categories that contribute to the production of the sound recording, which is (the author of the recorded work, the artist who performs the work and the producer who performs an operation Performance recordi
... Show MoreThe purpose of the current investigation is to distinguish between working memory ( ) in five patients with vascular dementia ( ), fifteen post-stroke patients with mild cognitive impairment ( ), and fifteen healthy control individuals ( ) based on background electroencephalography (EEG) activity. The elimination of EEG artifacts using wavelet (WT) pre-processing denoising is demonstrated in this study. In the current study, spectral entropy ( ), permutation entropy ( ), and approximation entropy ( ) were all explored. To improve the classification using the k-nearest neighbors ( NN) classifier scheme, a comparative study of using fuzzy neighbourhood preserving analysis with -decomposition ( ) as a dimensionality reduction technique an
... Show MoreThe study of civil liability is one of the most important issues of interest in all jurisprudential, judicial and legislative direction, because of the problems and difficulties it requires. the solution requires a focused effort that sets its source, basis, scope, and control with extreme care and accuracy to achieve the right and enable the injured party to obtain fair compensation both with scope of the contractual or tort liability.
In fact, the contract of the maritime agency is what is called the comparative jurisprudence (the contract of the ship's agency) connecting between the terminals of the maritime carrier on the on hand and the maritime agent on the other hand. It is the source of responsibility of each party to the
... Show MoreThe continuous increases in the size of current telecommunication infrastructures have led to the many challenges that existing algorithms face in underlying optimization. The unrealistic assumptions and low efficiency of the traditional algorithms make them unable to solve large real-life problems at reasonable times.
The use of approximate optimization techniques, such as adaptive metaheuristic algorithms, has become more prevalent in a diverse research area. In this paper, we proposed the use of a self-adaptive differential evolution (jDE) algorithm to solve the radio network planning (RNP) problem in the context of the upcoming generation 5G. The experimental results prove the jDE with best vecto
Every body has a size and mass that distinguishes it from others and makes it different from others. Some of these bodies are huge and large in size, and some are small and light in weight. Among these masses and bodies are some that are dealt with by their size and weight, each according to its quantity, weight, and cheapness. This is why they created quantities by which these weights and quantities could be estimated, so they used measures and weights for that. Objectives: The research aims to know some measures and weights, such as the wife’s maintenance, the amount of zakat, etc.I found it to be a widely spread topic, and widely used in the folds of jurisprudence. During my reading of jurisprudence books, I found jurists using many qu
... Show MoreBackground: Suffering from recurrent boils (furunclosis) is a common problem in our locality as it is noticed by many dermatologists especially in association with increasingly hot weather. The most common causative organisms are staphylococci. Objective: The aim of the study was to shed the light upon this problem and compare two systemic therapeutic agents for the prevention of recurrence, doxycycline and rifampicin. Patient and method: One hundred thirty-five (135) Patients with recurrent boils from Al-Yarmouk teaching hospital dermatology outpatient department were included in this study; age ranged from 10 to 64 years old and out of total patients 32 were males and 103 were females. Patients were assessed by full history and cl
... Show MoreBedsore (pressure ulcers)is a major nurse-careoutcome. There are many influences that can contribute to the progress of pressure ulcers, but the final common pathway to ulceration is tissue ischemia. This study aimed to detect some etiological factors that predispose to bedsore. The study was conducted on patients attending intensive care departments. Out of 82 inpatients who suffered from pressure ulcer, 54were males and 28were females. Specimens were collected during the period of September, 2019 –February, 2020 from different Hospitals (Alkadhimiya Teaching Hospital, General Hospital of AlshaheedAl-Sadr, and Medical City/ Ghazi Al-Hariri hospital) in Baghdad, Iraq. Simultaneously, other 20 specimens were collected as control fromin
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More