Preferred Language
Articles
/
Sxe_NY8BVTCNdQwComKK
Mining Deviations in Document Writing Style through Vector Dissimilarity
...Show More Authors

     Doubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent.      The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average  weight of their word  are constructed. Second, the degree of closeness is calculated through applying Cosine similarity to measure for each segment, the deviation of its center vector from the center vector of the entire document. Additionally, word n-gram length will be investigated to show its effect on the proposed system performance wherein, center vectors are computed considering word n-grams for different values of n (n= 1, 2, and 3). Performance evaluation of the proposed method was accomplished through the use of Precision, Recall, F-measure, Granularity, and Plagdet as evaluation measures. Moreover, PAN-PC-09 and PAN-PC-11 were used for detecting intrinsic plagiarism as evaluation corpora. It is shown that the proposed approach has achieved results that are comparable to the state-of-the-art methods. Positive impact was observed through discovering deviations in document writing style by computing weight vectors dissimilarity rather than calculating the difference between the word n-grams that exist in segments and their corresponding word n-grams in the suspicious document. Furthermore, when considering the length of word n-gram, better results were recorded for system performance when word bi-grams was used compared to word uni-grams and word tri-grams.

Scopus Crossref
View Publication
Publication Date
Sat Oct 05 2019
Journal Name
Pediatric Cardiology
Personalised Warfarin Dosing in Children Post-cardiac Surgery
...Show More Authors
Abstract<p>Warfarin dosing is challenging due to a multitude of factors affecting its pharmacokinetics (PK) and pharmacodynamics (PD). A novel personalised dosing algorithm predicated on a warfarin PK/PD model and incorporating CYP2C9 and VKORC1 genotype information has been developed for children. The present prospective, observational study aimed to compare the model with conventional weight-based dosing. The study involved two groups of children post-cardiac surgery: Group 1 were warfarin naïve, in whom loading and maintenance doses were estimated using the model over a 6-month duration and compared to historical case-matched controls. Group 2 were already established on maintenance therapy a</p> ... Show More
View Publication
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Applications of ecological theory in the urban environment
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Veterinary World
Therapeutic uses of epicatechin in diabetes and cancer
...Show More Authors

View Publication Preview PDF
Scopus (108)
Crossref (102)
Scopus Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
IL-17 in Protective Immunity to Vaginal Candidiasis
...Show More Authors

Vulvovaginal candidiasis (VVC) is caused by Candida albicans affects a significant number of women during their reproductive ages. Th17 cells play a major role in coordinating the host defense in oropharyngeal candidiasis. In this study we investigated the involvement of the Th17 response in an animal model of vulvovaginal candidiasis (VVC). The present study aimed to shed light on detect concentration of the IL-17 of infected animal and control . A direct Enzyme Linked Immunosorbent Assay (ELISA) was used to quantify IL-17 concentrations in 30 infected animal with VVC and 10 control group. Rats were intravaginally inoculated with C.albicans, and vaginal lavage fluids, serum were evaluated for proinflammatory cytokine IL-17 The data

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Physiological and Immunological Disturbance in Rheumatoid Arthritis Patients
...Show More Authors

            Rheumatoid arthritis (RA) is a systematic autoimmune disorder with chronic inflammation changes of unknown etiology. Various synovial inflammatory and proliferative alterations may contribute to the cartilaginous tissues and invasive bony tissues, leading to destructive joints and malformed bones. This disease is mostly due to infective microorganisms or genetic susceptibility causing immune system disturbances through triggering both T-cells and B-cells. Furthermore, different immune cells may secret cytokines, which are responsible for some RA pathogenesis activity. From ninety individuals, serum sample was collected; thirty of them were normal and sixty cases were patients with RA attended a privet medical clin

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Biochemical And Cellular Archives
Histological and histochemical studies of the duodenum in the small asian mongoose (herpestes javanicus, E. geoffroy saint. Hilaire, 1818) in Iraq
...Show More Authors

Scopus
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The effects of recently political transformations in changing democratic doing values in Iraq (( Theoretical – analytical vision between the reality and challenges ))
...Show More Authors

Iraq has confronted a huge political transformations after 2003 which resembled and presented rapid changes from totalitarian regime into democracy's system , this phenomenon has become a feature embodied in a new political system, specifically is being a price for previous deprivation and despotism .So that, the nature of political work has been changed as a result of practicing new democratic values ,but the real challenges appeared by depending on the conformity and political compromise in dealing with all of crises and problems in the political life .
The future of political work in this nascent democracy could be prepared according to fulfillment an active doings values stretched on national unity and forgiveness from one side ,t

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Monitoring Role of the Governmental council in improving the performance of local Committees: Applied Research in the Wasit Governmental Council
...Show More Authors

            The research aims to identify the elements of performance supervisory good and effective and availability in the Governmental council through examination and analysis of the reality and practice of censorship in this Council through study and evaluate the characteristics of the regulatory effective upon which the Governmental council in the performance of his work and knowledge of their adequacy by comparing the established criteria , and determine the effect of characteristics supervisory the performance standards for the Governmental council, Based search to two assumptions key to check the level of the relationship and the influence of the dimensions of the con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref