Preferred Language
Articles
/
NhdNPo8BVTCNdQwC8GWw
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and Near-duplicate detection (PAN) Dataset 2009- 2011. Verbatim plagiarism, according to the researchers, plagiarism is simply copying and pasting. They then moved on to smart plagiarism, which is more challenging to spot since it might include text change, taking ideas from other academics, and translation into a more difficult-to-manage language. Other studies have found that plagiarism can obscure the scientific content of publications by swapping words, removing or adding material, or reordering or changing the original articles. This article discusses the comparative study of plagiarism detection techniques.

Publication Date
Fri Nov 20 2020
Journal Name
Solid State Technology
Comparative Study for Bi-Clustering Algorithms: Historical and Methodological Notes
...Show More Authors

View Publication
Publication Date
Thu Dec 15 2022
Journal Name
Bionatura
Comparative morphoanatomical study for the same rodents species in Iraq
...Show More Authors

Samples (4th) reviewed are deposited and stored in the Iraqi Natural History Museum (INHM), and there are 4th of them. Sciurus anomalous (Güldenstädt, 1785) species are preserved and mummified. It is a Caucasian squirrel (S. anomalus) that was medium in size, with a grayish-to-chestnut color, a golden gray back, and a golden tail. It is found in the forests of East and Southeast Asia. The variety possessed for the study was previously registered in the vertebrate literature by several authors and was stored by scientific methods in the museum. As a result of the multiplication and growth of these species, and to know the environmental changes that occurred in them, they were compared with models and samples found throughout Iraq

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Professional awareness among Riyadh teachers government and private (Comparative Study)
...Show More Authors

Take the teacher's key position in the educational system as a foundation stone and primarily responsible for achieving the goals of Education , and efficient teacher conscious is the teacher who prepared educationally and specialized training well add to the enjoyment of a range of features that enable them to adjust and compatibility with educational developments
Hence the problem of the study questioning the Kindergarten Does teacher professional awareness that enable it to perform its work learned from experienceThe research sought to measure
1-Professional awareness among teacher Kindergarten
2-Professional awareness of Kindergarten parameters depending on the type of kindergarten.
Limited search parameters Riyadh govern

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Room temperature flexible sensor based on F-MWCNT modified by polypyrrole conductive polymer for NO2 gas detection
...Show More Authors

This project sought to fabricate a flexible gas sensor based on a short functionalized multi-walled carbon nanotubes (f-MWCNTs) network for nitrogen dioxide gas detection. The network was prepared by filtration from the suspension (FFS) method and modified by coating with a layer of polypyrrole conductive polymer (PPy) prepared by the oxidative chemical polymerization to improve the properties of the network. The structural, optical, and morphological properties of the f-MWCNTs and f-MWCNTs/PPy network were studied using X-ray diffraction (XRD), Fourie-transform infrared (FTIR), with an AFM (atomic force microscopy). XRD proved that the structure of f-MWCNTs is unaffected by the synthesis procedure. The FTIR spectra verified the existence o

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Ieee Transactions On Circuits And Systems I: Regular Papers
Crosstalk-Aware Multiple Error Detection Scheme Based on Two-Dimensional Parities for Energy Efficient Network on Chip
...Show More Authors

Achieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o

... Show More
View Publication
Scopus (25)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (9)
Scopus Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The Problems of Teaching Computer Material Concerning Fourth Grade Students’ Point of View of in the Department of Computer College of Education for Women / University of Baghdad
...Show More Authors

The aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Proceedings Of First International Conference On Mathematical Modeling And Computational Science: Icmmcs 2020
Study the Stability for Ordinary Differential Equations Using New Techniques via Numerical Methods
...Show More Authors

Nonlinear differential equation stability is a very important feature of applied mathematics, as it has a wide variety of applications in both practical and physical life problems. The major object of the manuscript is to discuss and apply several techniques using modify the Krasovskii's method and the modify variable gradient method which are used to check the stability for some kinds of linear or nonlinear differential equations. Lyapunov function is constructed using the variable gradient method and Krasovskii’s method to estimate the stability of nonlinear systems. If the function of Lyapunov is positive, it implies that the nonlinear system is asymptotically stable. For the nonlinear systems, stability is still difficult even though

... Show More
Scopus (8)
Scopus