Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and Near-duplicate detection (PAN) Dataset 2009- 2011. Verbatim plagiarism, according to the researchers, plagiarism is simply copying and pasting. They then moved on to smart plagiarism, which is more challenging to spot since it might include text change, taking ideas from other academics, and translation into a more difficult-to-manage language. Other studies have found that plagiarism can obscure the scientific content of publications by swapping words, removing or adding material, or reordering or changing the original articles. This article discusses the comparative study of plagiarism detection techniques.
The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc
Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreThe current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are absolute ethanol, 50% aqueous ethanol and water for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and
... Show MoreBackground: A confirmed case of influenza A (H1N1) virus infection is defined as a person with an influenza-like illness with laboratory confirmed influenza A (H1N1) virus infection by real-time RT-PCR or viral culture.
Objectives: To identify demographic and clinical predictors, and outcome of proved cases of H1N1 influenza epidemic in children.
Patients and methods: This study was conducted in Children Welfare Teaching Hospital/ Medical City/ Baghdad on 67 hospitalized patients aged 1 month to 18 years with signs and symptoms suggestive of influenza during the period of outbreak of pandemic influenza A (H1N1) from 1st of October 2009 to 1st of January 2010. Demographic aspect, clinical coarse, labora
Summary:
Background: Respiratory distress remains a major problem post adaptation and one of the most common reasons for admission of neonates to Intensive Care.
Objectives: To study the causes and short term outcomes of respiratory distress in full term neonates and its correlation to mode of delivery.
Patients and Methods: A cross sectional study was carried out on 100 full termoutborn neonates with respiratory distress admitted to Neonatal care unit of Children Welfare Teaching Hospital, Medical City, Baghdad from 1st of April to 31st of August 2011.
Results: Hundred full term neonateswerestudied, 66% were boys and 81% born by cesarean section (elective cesarean sectionin 62%). In both sexes, Transient TachypneaofNewbornan
Undue influence is considered as a vitiating factor or defect in English law. It is a dominating influence, with which the ascending party enjoys, and which enables him to exert an illegitimate pressure on the unduly influenced weaker party, in order to induce, or force him, to conclude a contract and enter into a transaction, against his will. It is also worth-bearing in mind that the doctrine of undue influence is an equitable one, originating from the rules of equity, applied by English courts of equity, and by which these courts set aside unconscionable bargains, in which one party is in a position to exploit the weakness of the other. It is also worth-mentioning that this doctrine has been included in the English common law. W
... Show MoreThe judicial transformation led by the French Court of Cassation about the consequence of liability arising from breach of the promise of preference led to the adoption of a new principle، whereby the beneficiary of the promise of preference would substitute with the third party in the concluded contract in violation of his right in preference. This shift، in turn، has been reflected on the legislative situation in France، where the French legislator adopted this principle in the New Contract Law of 2016.