Plagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will leverage Jaccard similarity and Term Frequency-Inverse Document Frequency (TFIDF) techniques, while for semantic plagiarism detection, Doc2Vec and Sentence Bidirectional Encoder Representations from Transformers (SBERT) intelligent text representation models will be used. Following that, the system compares the suspicious text to the corpus text. Finally, a generated plagiarism report will show the total plagiarism ratio, the plagiarism ratio from each source, and other details.
Digital change detection is the process that helps in determining the changes associated with land use and land cover properties with reference to geo-registered multi temporal remote sensing data. In this research change detection techniques have been employed to detect the changes in marshes in south of Iraq for two period the first one from 1973 to 1984 and the other from 1973 to 2014 three satellite images had been captured by land sat in different period. Preprocessing such as geo-registered, rectification and mosaic process have been done to prepare the satellite images for monitoring process. supervised classification techniques such maximum likelihood classification has been used to classify the studied area, change detection aft
... Show MoreDigital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show MoreA study is made about the size and dynamic activity of sunspot using automatically detecting Matlab code ''mySS .m'' written for this purpose which mainly finds a good estimate about Sunspot diameter (in km). Theory of the Sunspot size has been described using equations, where the growth and decay phases and the area of Sunspot could be calculated. Two types of images, namely H-alpha and HMI magnetograms, have been implemented. The results are divided into four main parts. The first part is sunspot size automatic detection by the Matlab program. The second part is numerical calculations of Sunspot growth and decay phases. The third part is the calculation of Sunspot area. The final part is to explain the Sunspot activit
... Show MoreRenewable energy sources - realities of the present and future options
Many of the directories indicate that the global energy system begin with a period of transition from total dependence on fossil energy sources, particularly oil, Into a new era in which renewable energy sources play an important role in meeting the growing needs of energy demand. There are many factors that will contribute to the strengthening of this trend towards transformation, which also will decide how quickly this transformation of renewable energy systems effectively in the global system of energy demand.
These factors, In brief: the size of environmental pollution and cl
... Show MoreToday’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati
... Show MoreSecure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
In this study, a preliminary economic feasibility study of the project of wind power at the site of Al-Shehabi (Wasit-Iraq) was conducted using measured wind data at altitudes of 10, 30, 50 and 52 m per 10 minutes. For the purpose of comparison, data from NASA were used at the same location at 50 m height. The lowest unit cost of electricity from wind energy was found to be 0.028 $/Kwh and 0.0399 $/Kwh by using the standard methodologies of Levelized Cost of Energy (LCOE) equation and Net Present Value (NPV) procedure, respectively. Furthermore, RETScreen software was used to perform the economic prefeasibility study of a proposed wind farm. The study concludes that this site is economically feasible if a wind fa
... Show MoreThe laboratory experiment was conducted in the laboratories of the Musayyib Bridge Company for Molecular Analyzes in the year 2021-2022 to study the molecular analysis of the inbreed lines and their hybrids F1 to estimate the genetic variation at the level of DNA shown by the selected pure inbreed lines and the resulting hybrids F1 of the flowering gene. Five pure inbreed lines of maize were selected (ZA17WR) Late, ZM74, Late, ZM19, Early ZM49WZ (Zi17WZ, Late, ZM49W3E) and their resulting hybrids, according to the study objective, from fifteen different inbreed lines with flowering time. The five inbreed lines were planted for four seasons (spring and fall 2019) and (spring and fall 2