Preferred Language
Articles
/
ijs-1154
Improved VSM Based Candidate Retrieval Model for Detecting External Textual Plagiarism
...Show More Authors

A rapid growth has occurred for the act of plagiarism with the aid of Internet explosive growth wherein a massive volume of information offered with effortless use and access makes plagiarism  the process of taking someone else’s work (represented by ideas, or even words) and representing it as other's own work  easy to be performed. For ensuring originality, detecting plagiarism has been massively necessitated in various areas so that the people who aim to plagiarize ought to offer considerable effort for introducing works centered on their research.

     In this paper, work has been proposed for improving the detection of textual plagiarism through proposing a model for candidate retrieval phase. The model proposed for retrieving candidates has adopted the vector space method VSM as a retrieval model and centered on representing documents as vectors consisting of average term  weights and considering them as queries for retrieval instead of representing them as vectors of term  weight. The detailed comparison task comes as the second phase wherein fuzzy semantic based string similarity has been applied. Experiments have been conducted using PAN-PC-10 as an evaluation dataset for evaluating the proposed system. As the problem statement in this paper is restricted to detect extrinsic plagiarism and works on English documents, experiments have been performed on the portion dedicated to extrinsic detection and on documents in English language only. For evaluating performance of the proposed model for retrieving candidates, Precision, Recall, and F-measure have been used as an evaluation metrics. The overall performance of the proposed system has been assessed through the use of the five standard PAN measures Precision, Recall, F-measure, Granularity and . The experimental results have clarified that the proposed model for retrieving candidates has a positive impact on the overall performance of the system and the system outperforms the other state-of-the-art methods. They clarified that the proposed model has detected about 80% of the plagiarism cases and about 90% of the detections were correct. The proposed model has the ability to detect literal plagiarism in addition to cases containing paraphrasing. Performance comparison has clarified that the proposed system is either comparable or outperforms the other baseline systems in terms of the five  evaluation metrics.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Efficiency of Thematic Mapper Data for Detecting the Changes of Land Use -Land Cover in Mosul Lake and Surrounding Area Northern Iraq
...Show More Authors

The study area lies in the northern part of Iraq, This study depends on one scene of Thematic Mapper (TM5) data of Landsat, these data are subset by using region of interest (ROI) file within the ERDAS 9.2 software. RS and GIS have been used as tools for detecting the desertification during the periods 1990-2000-2009 by using Normalized Difference Vegetation Index NDVI, Water Index WI and Barren Land Index BLI. The indicators of Desertification which used in this study for period  1990-2000 and 2000-2009 are represented by decrease the vegetation cover and increase water body and barren land.

View Publication Preview PDF
Publication Date
Sat Apr 09 2022
Journal Name
Engineering, Technology & Applied Science Research
A Semi-Empirical Equation based on the Strut-and-Tie Model for the Shear Strength Prediction of Deep Beams with Multiple Large Web Openings
...Show More Authors

The behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The Aesthetic of the Textual Interferences in the Poetry of the Ghawani's" A Miracle Nice of your Imagination as a symbol"
...Show More Authors

     إنّ التّأمّل في الدّراسات الأدبيّة النّقديّة الحديثة الّتي تنظر إلى النّصّ أنّه لوحة تتشكّل من مجموعة تداخلات نصّيّة سابقة للنصّ المُنتج أو مُعاصرة له، تدفع القارئ إلى الغوص في أعماق النّصوص وتحليلها والكشف عن الآليّات والإجراءات الّتي اعتمدت في إنتاجه، وإظهار الجماليّات الفنّيّة التي شكلت في مُجملها كائنا حيّا يُعبّر عن حالات إنسانيّة مُستمرة الحدوث رغم تقادم الأزمان.

فالبحث هذا يعمد

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
The Simulation of Old Human Remains Detecting Utilizing Ground Penetrating Radar Image Processing
...Show More Authors

     Many Iraqi provinces had collective cemeteries, especially in the middle and southern regions of Iraq, but many of those cemetery locations are undefined yet. Ground penetration radar has two features that make it optimal from a geophysical perspective for shallowly detecting sensitive materials near the surface. First, the instantaneous image is formed upon scanning, called a radargram. Second, the non-destructive inference of the scanned materials. For these two reasons, this technique was chosen to conduct a simulation process to reveal the old human remains in Iraq's central and southern areas using another model with the same physical feature (old burial) at the AL-Khamisiya site, Thi-Qar province.

The demanded stage

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Mar 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
External Morphological Study of Pieris rapae (Limmaeus, 1758), (Lepidoptera: Pieridae) Mid and North of Iraq.
...Show More Authors

The work included study of external morphology of white cabbage butterfly Pieris rapae (Linnaeus, 1758). The study included the external morphological characters of different body regions in addition to the male and female genitalia. The studied morphological characters were supported by photos and illustrations. Specimens of the work were collected from north and middle of Iraq and dates and sites of collection were fixed. 

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
Crossref (4)
Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Estimate the Parallel System Reliability in Stress-Strength Model Based on Exponentiated Inverted Weibull Distribution
...Show More Authors
Abstract<p>In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (<italic>R<sub>k</sub> </italic>) contain <italic>K<sup>th</sup> </italic> parallel components in the stress-strength model, when the stress and strength are independent and non-identically random variables and they follow two parameters Exponentiated Inverted Weibull Distribution (EIWD). Comparisons among the proposed estimators were presented depend on simulation established on mean squared error (MSE) criteria.</p>
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Kinetic Model for Solute Diffusion in Liquid Membrane Systems
...Show More Authors

In this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Improved Weighted 0-1 Knapsack Method (WKM) to Optimize Resource Allocation
...Show More Authors

In this paper an improved weighted 0-1 knapsack method (WKM) is proposed to optimize the resource allocation process when the sum of items' weight exceeds the knapsack total capacity .The improved method depends on a modified weight for each item to ensure the allocation of the required resources for all the involved items. The results of the improved WKM are compared to the traditional 0-1 Knapsack Problem (KP). The proposed method dominates on the other one in term of the total optimal solution value of the knapsack .

View Publication Preview PDF