Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and Near-duplicate detection (PAN) Dataset 2009- 2011. Verbatim plagiarism, according to the researchers, plagiarism is simply copying and pasting. They then moved on to smart plagiarism, which is more challenging to spot since it might include text change, taking ideas from other academics, and translation into a more difficult-to-manage language. Other studies have found that plagiarism can obscure the scientific content of publications by swapping words, removing or adding material, or reordering or changing the original articles. This article discusses the comparative study of plagiarism detection techniques.
Background: The association between periodontal diseases incidence and development and the metabolic diseases as Diabetes Mellitus and Obesity are recently have attract great deal of researchers attention and investigation. The periodontal health proved to reduce the systemic inflammatory reactions and positively improve the glycemic control of diabetes Type2 patients. The aim of the study was to investigate the influence of oral hygiene control on the glycemic control of obese and normal weight moderately controlled Diabetic Type 2 patients, in addition to study the association of obesity with the gingival inflammation. Materials and Methods: Cross sectional study of three months duration. Included 30 moderately controlled diabetic type2 p
... Show MoreObjective: To compare two insertion techniques of intramedullary interlocking nails (medial parapatellar versus intrapatellar insertion) in patients with tibial fractures. Methodology: This study was performed at Al-Kindy Teaching Hospital from August 2020 until March 2022. All 32 patients with tibial fractures (29 males and 3 females) were included for tibial closed nail fixation and then followed up for 6 months. We categorized these patients into two groups; Group A (16 patients), those treated by medial parapatellar insertion of an interlocking nail, and Group B (16 patients) with transpatellar tibial nail insertion. All patients were treated by the same surgical team. Results: The range of movement in two weeks (from extension
... Show MoreBackground: Presence of maxillary sinus septa has been known to be a complicating factor for sinus elevation procedure and implant placement in posterior maxilla. The maxillary sinuses septa are thin walls of cortical bone inside the sinus. They vary in number, location, and height. This study aimed to discover the accuracy of Spiral Computed Tomographic Scan in evaluation the maxillary sinus septa (prevalence, location, height) in subjects with dentate, partially edentulous and completely edentulous maxilla. Material and method: This study included (267) subjects ranged from (20-70 years), (132) male and (135) female divided into three groups, (97) fully dentate group, (102) partially edentulous group and (68) completely edentulous group w
... Show MoreYohimbine is actually confirmed in the United States to be utilized for erectile dysfunction; and recently such drug has become commonly used in body-building communities for its presumed lipolytic and sympathomimetic effects. But ingestion of such drug can bring about epileptic neurotoxic effects.
Many antiepileptic drugs can be utilized to counteract myoclonic seizure; furthermore, diazepam can be used to oppose such type of seizure; in addition, surrogate therapeutic options such as omega 3 may also be utilized.
In this study, twenty-four (24) mice of both sexes weighing 20-25g were randomly-allocated into 4 groups (6 animals each group) as follows: Group I-
... Show More: The Aluminium (Al) material emerged as a plasmonic material in the wavelength ranges from the ultraviolet to the visible bands in different on-chip plasmonic applications. In this paper, we demonstrate the effect of using Al on the electromagnetic (EM) field distribution of a compact hybrid plasmonic waveguide (HPW) acting as a polarization rotator. We compare the performance of Al with other familiar metals that are widely used as plasmonic materials, which are Silver (Ag) and Gold (Au). Furthermore, we study the effect of reducing the geometrical dimensions of the used materials on the EM field distributions inside the HPW and, consequently, on the efficiency of the polarization rotation. We perform the study based o
... Show MoreThis paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show More