Preferred Language
Articles
/
ijs-1154
Improved VSM Based Candidate Retrieval Model for Detecting External Textual Plagiarism
...Show More Authors

A rapid growth has occurred for the act of plagiarism with the aid of Internet explosive growth wherein a massive volume of information offered with effortless use and access makes plagiarism  the process of taking someone else’s work (represented by ideas, or even words) and representing it as other's own work  easy to be performed. For ensuring originality, detecting plagiarism has been massively necessitated in various areas so that the people who aim to plagiarize ought to offer considerable effort for introducing works centered on their research.

     In this paper, work has been proposed for improving the detection of textual plagiarism through proposing a model for candidate retrieval phase. The model proposed for retrieving candidates has adopted the vector space method VSM as a retrieval model and centered on representing documents as vectors consisting of average term  weights and considering them as queries for retrieval instead of representing them as vectors of term  weight. The detailed comparison task comes as the second phase wherein fuzzy semantic based string similarity has been applied. Experiments have been conducted using PAN-PC-10 as an evaluation dataset for evaluating the proposed system. As the problem statement in this paper is restricted to detect extrinsic plagiarism and works on English documents, experiments have been performed on the portion dedicated to extrinsic detection and on documents in English language only. For evaluating performance of the proposed model for retrieving candidates, Precision, Recall, and F-measure have been used as an evaluation metrics. The overall performance of the proposed system has been assessed through the use of the five standard PAN measures Precision, Recall, F-measure, Granularity and . The experimental results have clarified that the proposed model for retrieving candidates has a positive impact on the overall performance of the system and the system outperforms the other state-of-the-art methods. They clarified that the proposed model has detected about 80% of the plagiarism cases and about 90% of the detections were correct. The proposed model has the ability to detect literal plagiarism in addition to cases containing paraphrasing. Performance comparison has clarified that the proposed system is either comparable or outperforms the other baseline systems in terms of the five  evaluation metrics.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 29 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oxidation Desulphurization of Heavy Naphtha Improved by Ultrasound Waves
...Show More Authors

The oxidation desulphurization assisted by ultrasound waves was applied to the desulphurization of heavy naphtha. Hydrogen peroxide and acetic acid were used as oxidants, ultrasound waves as phase dispersion, and activated carbon as solid adsorbent. When the oxidation desulphurization (ODS) process was followed by a solid adsorption step, the performance of overall Sulphur removal was 89% for heavy naphtha at the normal condition of pressure and temperature. The process of (ODS) converts the compounds of Sulphur to sulfoxides/ sulfones, and these oxidizing compounds can be removed by activated carbon to produce fuel with low Sulphur content. The absence of any components (hydrogen peroxide, acetic acid, ultrasound waves and activated car

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Credit Card Fraud Detection Using Improved Deep Learning Models
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s law to detecting earnings management Application on a sample of listed companies in the Iraqi market for securities
...Show More Authors

 

Abstract

The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users  of financial statements who depend on reported earnings in their deci

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The aesthetic formation of metaphor Textual reading in the office of Majd al-Din al-Nashabi (D. 656 A.H)
...Show More Authors

وظَّفَ الشاعرُ مجد الدين النُّشَّابي الصورة الاستعارية التي شكلت سمةً جمالية بارزة من سماتِ التشكيل الشعري عنده, وأحد المكونات الأساسية في بنية قصائده الشعرية وهي جوهر الإبداع ومحط التذوق عند المتلقي, إذ يشكل الشاعر صوره الاستعارية المتنوعة متولدة من خياله وعواطفه ومتوافقة مع الموضوع لتصبح الصورة  الاستعارية ركنًّا من أركان التشكيل الفني الشعري عند الشاعر .

والتصوير الاستعاري له القدرة بالتشكيل ا

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improved optical and mechanical characteristics of multilayered Cu/TiON/CrO2 coating via heat treatment for solar absorbing applications
...Show More Authors

In the last few decades, growing interest has been shown in the development of new solar selective coatings based on transition metal nitride and/or oxinitride for solar absorbing applications. Solar thermal collectors are well thought out to be the most effective process of converting and harvesting solar radiation. In this investigation, Cu/TiON/CrO2 multilayered solar selective absorber coatings have been coated onto Al substrates using the dip-coating process followed by an annealing process at (400, 450, 500, 550, and 600 °C. The XRD analysis showed excellent crystalline quality for the prepared thin films along with enhanced surface features as proved by FESEM images, and the grains are in the range of (27–81) nm. The optical in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 24 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The Impact of External Environment Factors on the Quality of Educational Services (An Empirical Study): The Impact of External Environment Factors on the Quality of Educational Services (An Empirical Study)
...Show More Authors

This research aims to identify the role of external environment factors on the quality of educational services, from the academic point of view, where the distribution of a questionnaire to a random sample of (100) university professors, and then analyzing a model, and test the validity of this model using structural modeling (SEM) (Structural Equation Modeling).
And then test the relationships between variables using the software of Statistical Package for Social Sciences (SPSS V.18), the research found a number of conclusions, the most important conclusion is: the external environment factors has significant impact on the quality of educational services.

View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Econometrics analysis of the impact of external shocks on foreign direct investment in Iraq for the period (1995-2016)
...Show More Authors

The external shocks are one of the phenomena that the Iraqi economy is exposed to over a period of time. It is referred to as changes and events that come from outside the economic system and extends to many economic variables. However, foreign direct investment may be severely affected due to the extreme sensitivity to changes and local and international developments. This type of trauma and its characteristics to help manage and cope with external shocks, and in order to avoid the standard problems experienced by some models of simple linear regression, multi-linear regression models were used with variables Scientific and other dummy variables .

        The study foun

... Show More
View Publication Preview PDF
Crossref (2)
Crossref