Preferred Language
Articles
/
NhdNPo8BVTCNdQwC8GWw
Computer-based plagiarism detection techniques: A comparative study

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and Near-duplicate detection (PAN) Dataset 2009- 2011. Verbatim plagiarism, according to the researchers, plagiarism is simply copying and pasting. They then moved on to smart plagiarism, which is more challenging to spot since it might include text change, taking ideas from other academics, and translation into a more difficult-to-manage language. Other studies have found that plagiarism can obscure the scientific content of publications by swapping words, removing or adding material, or reordering or changing the original articles. This article discusses the comparative study of plagiarism detection techniques.

Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Entry cost based on activity-based cost specifications and comparative study

Several recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Assessing road networks properties based on GIS techniques: Al-Karrada Region/Baghdad as a case study

Transportability refers to the ease with which people, goods, or services may be transferred. When transportability is high, distance becomes less of a limitation for activities. Transportation networks are frequently represented by a set of locations and a set of links that indicate the connections between those places which is usually called network topology. Hence, each transmission network has a unique topology that distinguishes its structure. The most essential components of such a framework are the network architecture and the connection level. This research aims to demonstrate the efficiency of the road network in the Al-Karrada area which is located in the Baghdad city. The analysis based on a quantitative evaluation using graph th

... Show More
Scopus Crossref
View Publication
Publication Date
Tue Nov 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
A Comparative Study between Flapped and Flapless Surgical Techniques in Dental Implant Stability According to Resonance Frequency Analysis

Background: Recent implant surgical approach aims to cause less trauma, invasiveness and pain as much as possible and to reduce patient and surgeon discomfort, time of surgery and time needed for functional implant loading. Flapless surgical techniques considered recently as one of the most popular techniques that may achieve these aims especially enhancing osseointegration and subsequently implant stability within less time than the traditional flapped surgical technique. So this study aimed to make a comparison between flapped and flapless surgical techniques in resulted implant stability according to resonance frequency analysis RFA and in duration of surgical operation. Materials and methods: A total of 26 patients with 41 implants (o

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Automatic Vehicles Detection, Classification and Counting Techniques / Survey

Vehicle detection (VD) plays a very essential role in Intelligent Transportation Systems (ITS) that have been intensively studied within the past years. The need for intelligent facilities expanded because the total number of vehicles is increasing rapidly in urban zones. Traffic monitoring is an important element in the intelligent transportation system, which involves the detection, classification, tracking, and counting of vehicles. One of the key advantages of traffic video detection is that it provides traffic supervisors with the means to decrease congestion and improve highway planning. Vehicle detection in videos combines image processing in real-time with computerized pattern recognition in flexible stages. The real-time pro

... Show More
Scopus (4)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 01 2008
Journal Name
J Bagh College Of Dentistry
A comparative study of the sealing ability of two different obturation techniques with and without the use of sealers.

Background: The final stage of endodontic therapy is complete obturation of the root canal system to provide as perfect as possible at the cementodentinal junction of the apical foramen. The purpose of this in vitro study was to evaluate the sealing ability of injection molded thermoplasticized gutta percha and lateral condensation techniques with and without the use of sealers. Materials and Methods: Forty freshly extracted adult human maxillary central incisors with complete formed apices were utilized in this study. The teeth were randomly divided into four groups for evaluation of the apical seal. Group (1) lateral condensation gutta percha technique without sealer, (2) lateral condensation gutta percha technique with sealer, (3) Inject

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
Crossref
View Publication
Publication Date
Fri Nov 30 2007
Journal Name
Alustath Journal For Human And Social Sciences
Plagiarism in Theses and Dissertations: Methods of Detecting and Avoiding

The present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2006
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Crossref
View Publication Preview PDF
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Multiwavelet based-approach to detect shared congestion in computer networks

Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
Crossref
View Publication