Development of a web-extension for authentication of online hadith texts
Background and objective: With the widespread internet availability, now-a-days Hadith texts which are essential sources of Islamic knowledge appear on many websites. In this paper, a client-based web-extension program that can authenticate online Hadith texts from Sahih Bukhari and Sahih Muslim is...
| Main Authors: | Kabir, M. Nomani, Hasan, Md Munirul, Rahman, Md. Arafatur, Tao, Hai |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publishing Corporation
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/23483/ http://umpir.ump.edu.my/id/eprint/23483/1/Development%20of%20a%20web-extension%20for%20authentication%20of%20online%20hadith%20texts.pdf |
Similar Items
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017)
by: Ali, Jahan, et al.
Published: (2017)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
The Development and Deployment of an Online Exam System A Web Application
by: Islam, Md. Monarul, et al.
Published: (2023)
by: Islam, Md. Monarul, et al.
Published: (2023)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
Breast cancer prediction: A comparative study using machine learning techniques
by: Islam, Md. Milon, et al.
Published: (2020)
by: Islam, Md. Milon, et al.
Published: (2020)
Search and rescue operation in flooded areas: A survey on emerging sensor networking-enabled IoT-oriented technologies and applications
by: Hasan, Md. Munirul, et al.
Published: (2021)
by: Hasan, Md. Munirul, et al.
Published: (2021)
A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm
by: Hasan, Md Munirul
Published: (2019)
by: Hasan, Md Munirul
Published: (2019)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
by: Saqib Iqbal , Hakak
Published: (2018)
by: Saqib Iqbal , Hakak
Published: (2018)
IoT Enabled Intra-Vehicular Communication for Designing A Smart Car
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
IoT Enabled Relay Network for Designing An Energy Efficient Highway Lighting System
by: Muhammad Adib, Abid, et al.
Published: (2016)
by: Muhammad Adib, Abid, et al.
Published: (2016)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
A connection probability model for communications networks under regional failures
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
An energy functional model by gradient vector-driven active contour for local fitted image segmentation
by: Wang, Jing, et al.
Published: (2019)
by: Wang, Jing, et al.
Published: (2019)
Use Word Cloud Image Of Web Page Text Content On Convolutional Neural Network (CNN) For Classification Of Web Pages
by: Siti Hawa, Apandi, et al.
Published: (2024)
by: Siti Hawa, Apandi, et al.
Published: (2024)
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
A mathematical model of lung functionality using pressure signal for volume-controlled ventilation
by: Al-Hetari, Husam Y., et al.
Published: (2020)
by: Al-Hetari, Husam Y., et al.
Published: (2020)
An overview of effect of activation functions on training and performance of artificial neural network modelling
by: Md Munirul, Hasan, et al.
Published: (2022)
by: Md Munirul, Hasan, et al.
Published: (2022)
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
A review of user authentication model for online banking system based on mobile IMEI number
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
Guidelines and Assessment Tool for Making Web Text Legible on Full High Definition Display
by: Ahmad Affendi, Hashim, et al.
Published: (2012)
by: Ahmad Affendi, Hashim, et al.
Published: (2012)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Online health & beauty web site / Salwa Faharudin
by: Salwa , Faharudin
Published: (2003)
by: Salwa , Faharudin
Published: (2003)
Feature extraction techniques of online handwriting arabic text recognition
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
Text animation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Text effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Artificial intelligent model to enhance thermal conductivity of TiO2-Al2O3/water-ethylene glycol-based hybrid nanofluid for automotive radiator
by: Hasan, Md. Munirul, et al.
Published: (2024)
by: Hasan, Md. Munirul, et al.
Published: (2024)
Performance evaluation of various training functions using ANN to predict the thermal conductivity of EG/water-based GNP/CNC hybrid nanofluid for heat transfer application
by: Md Munirul, Hasan, et al.
Published: (2025)
by: Md Munirul, Hasan, et al.
Published: (2025)
Authentication of hadith : redefining the criteria
by: Khan, Israr Ahmad
Published: (2010)
by: Khan, Israr Ahmad
Published: (2010)
Advanced Web Application Development
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
Web application development process
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
Introduction
by: Kabir, M. Nomani, et al.
Published: (2019)
by: Kabir, M. Nomani, et al.
Published: (2019)
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016)
by: Alginahi, Yasser M., et al.
Published: (2016)
Conclusion
by: Alginahi, Yasser M., et al.
Published: (2019)
by: Alginahi, Yasser M., et al.
Published: (2019)
Staircase Detection to Guide Visually Impaired People: A Hybrid Approach
by: Habib, Ahsan, et al.
Published: (2019)
by: Habib, Ahsan, et al.
Published: (2019)
Similar Items
-
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019) -
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017) -
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020) -
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al. -
The Development and Deployment of an Online Exam System A Web Application
by: Islam, Md. Monarul, et al.
Published: (2023)