Search Results - (( developing islamic source algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- source algorithm »
- java implication »
- implication tree »
- islamic source »
- tree algorithm »
-
1
Optimal source substation location selection in radial distribution networks
Published 2004Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
-
4
-
5
-
6
-
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Grid portal technology for web based education of parallel computing courses, applications and researches
Published 2009Get full text
Get full text
Conference or Workshop Item -
9
Recognizing Arabic alphabet by segmentation in Quran document / Mohd Firdaus Amran
Published 2009“…This paper provides a comprehensive review of method in segmenting focusing on source of one main document that is Al-Quran. Quran in Islamic definition is the sacred writings of Islam revealed by God to the prophet Muhammad during his life at Mecca and Medina [1]. …”
Get full text
Get full text
Thesis -
10
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
11
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…Five years‟ financial data from 2009 to 2013 were sampled from secondary sources like Thompson Reuters‟ DataStream, the bank‟s financial statements, and other sources such as market yields from Islamic Interbank Money Market website. …”
Get full text
Get full text
Get full text
Thesis -
12
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
13
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
14
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
15
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
16
COVID-19 fake news detection model on social media data using machine learning techniques
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Geometric feature descriptor and dissimilarity-based registration of remotely sensed imagery
Published 2024journal::journal article -
18
Fikr: AI chatbot powered with vector search
Published 2025“…Developed using a combination of Streamlit for the frontend, Flask for the backend, and Firebase for data storage and authentication, Fikr provides users with precise and reliable responses, complete with accurate citations from verified sources such as Hadiths and Quranic verses. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
20
Extracting Tweets Using R in The Context of Ethical Issues
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper
