Order:
Disambiguations
Ali Ahmad [3]Ali M. Ahmad [1]
See also
  1.  11
    Extension of Shari'ah in Northern Nigeria: Human Rights Implications for Non-Muslim Minorities.Ali Ahmad - 2005 - Muslim World Journal of Human Rights 2 (1).
    States in northern Nigeria are the latest in a list of political entities around the world formalizing religious law, or institutionalizing Shari'ah, into their public law system. Shari'ah applies in many Muslim-majority countries in the realm of personal law. However, when it is expanded and made to apply as part of public law, it carries enormous constitutional implications. This article examines the institutionalization of Shari'ah in twelve northern states of Nigeria in year 2000 and the likely implications on the constitutionally (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  6
    Vertex-Edge-Degree-Based Topological Properties for Hex-Derived Networks.Ali Ahmad & Muhammad Imran - 2022 - Complexity 2022:1-13.
    A topological index can be focused on uprising of a chemical structure into a real number. The degree-based topological indices have an active place among all topological indices. These topological descriptors intentionally associate certain physicochemical assets of the corresponding chemical compounds. Graph theory plays a very useful role in such type of research directions. The hex-derived networks have vast applications in computer science, physical sciences, and medical science, and these networks are constructed by hexagonal mesh networks. In this paper, we (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  4
    A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors.Eshrag A. Refaee & Ali Ahmad - 2021 - Complexity 2021:1-7.
    There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly connected to the central computer but (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  33
    Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding.Tanzila Saba, Mohammed Hazim Alkawaz, Amjad Rehman, Ghazali Sulong & Ali M. Ahmad - 2014 - Journal of Intelligent Systems 23 (4):451-459.
    The rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its performance heavily relies on three major factors, payload, imperceptibility, and robustness, which are always in trade-offs. Thus, this study aims to hide a large amount of secret message inside a grayscale host image without sacrificing its quality (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark