Plagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will leverage Jaccard similarity and Term Frequency-Inverse Document Frequency (TFIDF) techniques, while for semantic plagiarism detection, Doc2Vec and Sentence Bidirectional Encoder Representations from Transformers (SBERT) intelligent text representation models will be used. Following that, the system compares the suspicious text to the corpus text. Finally, a generated plagiarism report will show the total plagiarism ratio, the plagiarism ratio from each source, and other details.
Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation. Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.
It is known that language learners face multiple difficulties in writing and creating an inte
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreAir pollution is one of the important problems facing Iraq. Air pollution is the result of uncontrolled emissions from factories, car exhaust electric generators, and oil refineries and often reaches unacceptable limits by international standards. These pollutants can greatly affect human health and regular population activities. For this reason, there is an urgent need for effective devices to monitor the molecular concentration of air pollutants in cities and urban areas. In this research, an optical system has been built consisting of aHelium-Neonlaser,5mWand at 632.8 nm, a glass cell with a defined size, and a power meter(Gentec-E-model: uno) where a scattering of the laser beam occurs due to air pollution. Two pollutants were examin
... Show Morewhich is much useful in the Arabic Language generally in the Holly Quran especially. It is the pronoun I have taken in the semantic aspect from it and I have done on the surra sabba which varities the semantical pronoun in it among the pronoun of the speaker the conscience of the addressee the absent such the the siprat pronoun that comes in it with the explanation for its importance and its work and this is the subject of the first unit which I advanced it from the concept of the pronoun Linguistically and convention. After that I have lighten in some meanings which I have done in the surrat as a semantic , magnification , proud, reprimand and others which I ended my research I have reached the results from it
... Show MoreVarious semantic innovations and expansions have been tackled as factors and sources of neos. A variety of internal (linguistic) and external (extra-linguistic) motives and motifs leads to the appearance of new terms causing such changes in the political language. Some statesmen are productive in introducing new terms and creative in manipulating expressions and meanings.
New words are nonces that get metaphorical expansion for quadrilateral motivations resting on extra meaning innovation, new terms at the semantic expansions to be honed as neos. In tracing the phases of the semantic processes of neos and hulks, lexical and semantic changes might be of widening or narrowing of refe
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreIn modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show More