Preferred Language
Articles
/
ijs-6542
Using Retrieved Sources for Semantic and Lexical Plagiarism Detection

     Plagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will leverage Jaccard similarity and Term Frequency-Inverse Document Frequency (TFIDF) techniques, while for semantic plagiarism detection, Doc2Vec and Sentence Bidirectional Encoder Representations from Transformers (SBERT) intelligent text representation models will be used. Following that, the system compares the suspicious text to the corpus text. Finally, a generated plagiarism report will show the total plagiarism ratio, the plagiarism ratio from each source, and other details.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Popular naming for goods and materials in the Iraqi slang "A Semantic Study"

The current research is concerned with the prices of Goods and materials in the Iraqi slang a descriptive, lexicographic , and semantic study expressing the meanings of these names and their positions , as well as expressing the imaginations of Human mind , the popular mind in describing these goods with evaluating them besides the semantic of each word accordingly
The current research is divided into two parts , the first part is consisted of Vocalizations" words" That are arisen through cognitive naming that concentrate on the mental imaginations for the most important and sensitive such as colors , taste , shapes and forms impacts of Goods and materials according to users' ' taste for those words , on other hand, the second part of

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Scopus (15)
Crossref (12)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Proceedings Of The 5th International Conference On Information Systems Security And Privacy
Scopus (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Favorite TV Channels / as News Sources for Iraqi University Professors.

The growing ability of Television to transfer and present events as they occur and sometimes transfer events alive makes it the most important sources to receive news and find out what is going on in the world. These channels form the importance of multiple sources and displayed content, especially news. What adds to the importance of the research is that the people under study are Iraqi professors
The problem of the study is represented by an essential inquiry about the favorite satellite channels to obtain news for Iraqi professors
The aims of the study are identified by finding out the most favorite satellite channels as a source of news for Iraqi professors and the habits of exposer to the news by them
The research is a des

... Show More
Crossref
View Publication
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Semantic differences between the Quran and abnormal


This research Find semantic relations between the Holy Quran and readings anomalous in particular, does not mention the readings anomalies are all but signed the examples of them where he found a marked contrast between them and what is known in the Holy Quran, and the intervention of research in the words of the commentators and between their views and stated what is unacceptable and what before, nor Luck meaning significantly different in some readings, leading to different Islamic ruling as well, also found that of the readings made clear what is meant by the blessed verse in the Holy Quran and signed to be even if it was abnormal.

 

Crossref
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Oct 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Computer Science (icecos)
Scopus (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

Scopus (1)
Scopus Crossref
View Publication