Search Results - (( developing islamic replication algorithm ) OR ( java pattern classification algorithm ))
Search alternatives:
- pattern classification »
- replication algorithm »
- islamic replication »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
3
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
4
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
5
Design of smart waste bin and prediction algorithm for waste management in household area
Published 2018“…Kulliyyah of Engineering (KOE) in International Islamic University Malaysia (IIUM) has been chosen as the sample size for household size factor. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Parameters of Artificial Intelligence (AI) in Fatwa Issuance: A Jurisprudential and Technological Ethics Analysis
Published 2026journal::journal article -
7
Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era
Published 2025“…Drawing on Qur’ānic exegesis, classical Islamic scholarship, and contemporary AI ethics, it contrasted natural intelligence with machine computation and highlighted the unique moral, spiritual, and teleological dimensions of humanity that cannot be replicated by algorithms. …”
Get full text
Get full text
Get full text
Article
