Preferred Language
Articles
/
Sxe_NY8BVTCNdQwComKK
Mining Deviations in Document Writing Style through Vector Dissimilarity
...Show More Authors

     Doubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent.      The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average  weight of their word  are constructed. Second, the degree of closeness is calculated through applying Cosine similarity to measure for each segment, the deviation of its center vector from the center vector of the entire document. Additionally, word n-gram length will be investigated to show its effect on the proposed system performance wherein, center vectors are computed considering word n-grams for different values of n (n= 1, 2, and 3). Performance evaluation of the proposed method was accomplished through the use of Precision, Recall, F-measure, Granularity, and Plagdet as evaluation measures. Moreover, PAN-PC-09 and PAN-PC-11 were used for detecting intrinsic plagiarism as evaluation corpora. It is shown that the proposed approach has achieved results that are comparable to the state-of-the-art methods. Positive impact was observed through discovering deviations in document writing style by computing weight vectors dissimilarity rather than calculating the difference between the word n-grams that exist in segments and their corresponding word n-grams in the suspicious document. Furthermore, when considering the length of word n-gram, better results were recorded for system performance when word bi-grams was used compared to word uni-grams and word tri-grams.

Scopus Crossref
View Publication
Publication Date
Wed Jan 01 2025
Journal Name
Ieee Access
Enhanced Spectral Efficiency in RIS-Assisted MIMO Systems Through Joint Precoding and RIS Configuration
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Effectiveness of enrichment activities through using software program for second graders in Conversation article
...Show More Authors

Today we are witnessing huge scientific and technical progress so we need more skills and methods of thinking that needs to be acquired by the teacher, as the importance of computers in education  there are  many teachers  suffering  of the difficulty in teaching for pupils . researchers tried to  find a good suitable way with the technological  interests for now which represent by  computer design software and the introduction of enrichment activities in the curriculum because it is one of a contemporary trends for the development of the Arabic language with various levels of education and knowing if this program has negative or positive impact.

So&nbsp

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2026
Journal Name
Journal Of Physical Education
The Effect of Inclusion Style Using Electronic Device On Learning Front and Side Movement in Squash For Beginners Aged 13 – 15 Years Old
...Show More Authors

View Publication
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
The proportionality of decision taken to sign the AL-Ayadi residential investment project within the Hittin neighborhood in Baghdad by Urban filling style
...Show More Authors

This research will deal in a simple way with the concept of urban expansion and taking the decision to sign the spatial signature of residential investment projects in order to reach through them in a real way to the extent of the proportionality of the decision taken, in light of the fulfillment of the conditions that must be met in the matter of making the decision of the spatial signature of the residential investment project and the extent of commitment to them, in which the conditions are: (Ease of access to services and transportation, adequacy of services, commitment to urban land uses) when establishing the investment project represented by the Al-Ayad residential project in the Hittin neighborhood of Al

... Show More
View Publication Preview PDF
Publication Date
Sun May 01 2022
Journal Name
Rimak International Journal Of Humanities And Social Sciences
BUILDING THE MEDIA MESSAGE AND DESIGNING IT THROUGH INFOGRAPHICS
...Show More Authors

The study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the

... Show More
View Publication
Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Educational values when Imam Shafie i through his hair
...Show More Authors

In this research was the study of the educational values ​​when Shafei, contained in hair Shafi'i, and that what the role of these values ​​in the education of generations, and the possibility of their application in the educational curriculum. Find addressed Shafei life and his time. The values ​​derived from his hair, as well as quoting from the Koran and influenced by it, which is evident in the hair, governance and eating Alomthal.okzlk Find the importance of this thought in modern education, so as to realism and ease of application. It is the search results, the Shafi'i put thought educationally integral based on the Koran rise to the level of theory. Find and conclusions: that education in its present situation

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Studying properties of propagated transverse modes through optical fibers
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Developing the investment budgeting through evaluation of investment projects
...Show More Authors

The aim of the research is to determine the impact of evaluating the investment projects in the development and preparation of investment budgets prepared by the economic units, since the investment projects are of an important and vital nature of the economic units, because these projects include the length of time for preparation and implementation and the accompanying period of this risk and uncertainties as well as need To the many funds to complete the project , The process of evaluating the implemented projects, which have been prepared an investment budget previously will contribute to the extent of matching the estimated data with the actual results or deviations, which is a step to avoid these errors in future p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Aip Conference Proceedings
Improving efficiency of solar cell for MnS through annealing
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref