Preferred Language
Articles
/
NhdNPo8BVTCNdQwC8GWw
Computer-based plagiarism detection techniques: A comparative study

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and Near-duplicate detection (PAN) Dataset 2009- 2011. Verbatim plagiarism, according to the researchers, plagiarism is simply copying and pasting. They then moved on to smart plagiarism, which is more challenging to spot since it might include text change, taking ideas from other academics, and translation into a more difficult-to-manage language. Other studies have found that plagiarism can obscure the scientific content of publications by swapping words, removing or adding material, or reordering or changing the original articles. This article discusses the comparative study of plagiarism detection techniques.

Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Revealing the potentials of 3D modelling techniques; a comparison study towards data fusion from hybrid sensors
Abstract<p>The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc</p> ... Show More
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 21 2013
Journal Name
Nonlinear Dynamics
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 25 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection of Epicatechin in Camellia sinensis Leaves by Thin Layer Chromatography and High Performance Liquid Chromatography Techniques

    The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are  absolute ethanol, 50% aqueous ethanol and water  for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of The Faculty Of Medicine Baghdad
H1N1 Influenza epidemic in children in Baghdad… a hospital based study.

Background: A confirmed case of influenza A (H1N1) virus infection is defined as a person with an influenza-like illness with laboratory confirmed influenza A (H1N1) virus infection by real-time RT-PCR or viral culture.
Objectives: To identify demographic and clinical predictors, and outcome of proved cases of H1N1 influenza epidemic in children.
Patients and methods: This study was conducted in Children Welfare Teaching Hospital/ Medical City/ Baghdad on 67 hospitalized patients aged 1 month to 18 years with signs and symptoms suggestive of influenza during the period of outbreak of pandemic influenza A (H1N1) from 1st of October 2009 to 1st of January 2010. Demographic aspect, clinical coarse, labora

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jan 02 2013
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Respiratory Distress in Full Term Outborn Neonates: A Hospital Based Study

Summary:
Background: Respiratory distress remains a major problem post adaptation and one of the most common reasons for admission of neonates to Intensive Care.
Objectives: To study the causes and short term outcomes of respiratory distress in full term neonates and its correlation to mode of delivery.
Patients and Methods: A cross sectional study was carried out on 100 full termoutborn neonates with respiratory distress admitted to Neonatal care unit of Children Welfare Teaching Hospital, Medical City, Baghdad from 1st of April to 31st of August 2011.
Results: Hundred full term neonateswerestudied, 66% were boys and 81% born by cesarean section (elective cesarean sectionin 62%). In both sexes, Transient TachypneaofNewbornan

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Dec 14 2018
Journal Name
Journal Of Legal Sciences
Abuse of power is a defect of will in English law A comparative study of Iraqi law

Undue influence is considered as a vitiating factor or defect in English law. It is a dominating influence, with which the ascending party enjoys, and which enables him to exert an illegitimate pressure on the unduly influenced weaker party, in order to induce, or force him, to conclude a contract and enter into a transaction, against his will. It is also worth-bearing in mind that the doctrine of undue influence is an equitable one, originating from the rules of equity, applied by English courts of equity, and by which these courts set aside unconscionable bargains, in which one party is in a position to exploit the weakness of the other.  It is also worth-mentioning that this doctrine has been included in the English common law. W

... Show More
Crossref
View Publication
Publication Date
Wed Apr 07 2021
Journal Name
Journal Of Legal Sciences
Substitution as a consequence of liability arising from breach of the promise of preference: A comparative study

     The judicial transformation led by the French Court of Cassation about the consequence of liability arising from breach of the promise of preference led to the adoption of a new principle، whereby the beneficiary of the promise of preference would substitute with the third party in the concluded contract in violation of his right in preference. This shift، in turn، has been reflected on the legislative situation in France، where the French legislator adopted this principle in the New Contract Law of 2016.        

Crossref
View Publication Preview PDF
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Scopus Crossref
View Publication