Doubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent. The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average weight of their word are constructed. Second, the degree of closeness is calculated through applying Cosine similarity to measure for each segment, the deviation of its center vector from the center vector of the entire document. Additionally, word n-gram length will be investigated to show its effect on the proposed system performance wherein, center vectors are computed considering word n-grams for different values of n (n= 1, 2, and 3). Performance evaluation of the proposed method was accomplished through the use of Precision, Recall, F-measure, Granularity, and Plagdet as evaluation measures. Moreover, PAN-PC-09 and PAN-PC-11 were used for detecting intrinsic plagiarism as evaluation corpora. It is shown that the proposed approach has achieved results that are comparable to the state-of-the-art methods. Positive impact was observed through discovering deviations in document writing style by computing weight vectors dissimilarity rather than calculating the difference between the word n-grams that exist in segments and their corresponding word n-grams in the suspicious document. Furthermore, when considering the length of word n-gram, better results were recorded for system performance when word bi-grams was used compared to word uni-grams and word tri-grams.
This research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreThe present study includs the isolation and identification of Keratinophilic fungi in fresh water samples collected from Tigris river in Baghdad, Iraq. Samples were collected from different districts of Baghdad (Al-Rustumia, Madina Al-Teb, Al-Azamia, Al-Kadimia, Al-Dorha and Al-Kanah). The water samples were examined for keratinophilic fungi by the plating method culturing and Hair Baiting Technique. A total number of 18 genera are recorded, in which the Tigris water indicates an impressive diversity of fungi. A variety of fungal strains were isolated from river water, out of 814 fungal colonies, Aspergillus terrus (5.5%) was the most frequent species, followed by Asperg
... Show MoreThe present research aims at recognizing the difficulties and problems which hamper teachers and educators alike when using the internet for educational purposes.It discusses the benefits of the internet as a source of information or publication and as a communicative tool.Arandom sample of (30) teachers working at schools in Baghdad / Second Risafa,was selected.Three of the sample members use the internet for student project plans via internet centers, whereas 16 of them use it for chatting, emailing and research purposes.The rest of the sample have limited knowledge of the internet. The researcher used the interviewing method to gather data from
... Show MoreThe goal of the research is to highlight the role of the governance and its characteristics in increasing the tax outcome by implementing the laws, regulations and annual controls issued annually from the general authority for taxation for the financing of the general treasury of the state, Additional development and economic capacity, As the search shares a view of the governance and its characteristics and its ideas from increasing tax output. The analytical transparent approach was used by adopting the practice of practicalities of the general authority for tax For quotations in the senior cabinet section ,the revealing of the ongoing operations was relied on the revenue for each financial year, The tools adopted in the process of ana
... Show MoreWe refer in this research into linguistic binaries, try rounding of simiaei news analysis. It is known that there are branches of Linguistics called social Linguistics, divided into communicative Linguistics and media. Perhaps the best justification for the inclusion of a new curriculum in media studies is a semiotic analysis of the news. I›ve turned the speech, language and communication studies in relation to different disciplines, many research projects, and returned only old curriculum, speed shift in thought, proportional to the revolution in information and communication technology, for reality imposed on the entire world, researchers are the first affected by this enormous humanitarian Almanza. Alsimiaaeon still shy away from an
... Show MoreIraq has the distinction of being a great potential of non-renewable natural resources,
especially crude oil and natural gas. Since the discovery of crude oil at the beginning of the
twentieth century in Iraq. Although the different of investment types, it contributed to the oil
sector in the provision of financial resources to the state treasury , since that date until the
present time.
Search has been marked by division ((The foreign investment in the oil sector in Iraq after
2003)) into three sections. The first section included a brief history of the development of
Iraq's oil potential in terms of oil reserves, and oil fields, and the quantities of production and
export. The second section reviewed the investm
Background :The cotton factories have difference steps, spinning and weaving are van important parts of the factories. Cotton industry workers are exposed to various hazards in the different departments of textile factories. The major health problems associated with cotton dust are respiratory problems. Cotton workers display an excess of lung function abnormalities when compared to a community control population.
Aim of Study: This study assessed the effect of exposure to cotton dust in spinning and weaving workers on the lung function in Iraq, by measuring Forced Vital Capacity (FVC),Forced Expiratory Volume in the first second(FEV1), FEV1 ∕ FVC Ratio, and Forced Expiratory Flow 50%(FEF50%),with varying degree of reduction in lung
Background: The prevalence of obesity is continuously rising world-wide. Obesity is an important risk factor of cardiovascular disease (CVD), metabolic syndrome (MS), and type 2 diabetes (T2D).
Objective: To estimate the frequency of MS in obese versus non-obese subjects in Basrah, Iraq .
Methods: This is a prospective clinical study performed in Al-Sadr Teaching Hospital, Basrah, and included 86 obese subjects (with a BMI ≥ 30), 39 males and 47 females, and 132 non-obese subjects ( with a BMI < 30 ), 60 males and 73 females as a control group. Measurement of height, weight, waist circumference (WC), blood pressure ( BP ), fasting blood glucose ( FBG ), total cholesterol (TC), triglycerides (TG ) and high density lipoprotein-
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the