IIUM Repository

Isnad Al-hadith computational authentication: An analysis hierarchically

Ibrahim, Nuzulha Khilwani and Noordin, Mohamad Fauzan and Samsuri, Suhaila and Abu Seman, Muhamad Sadry and Ahmed Ali, Ahmed El-Mogtaba Bannga (2016) Isnad Al-hadith computational authentication: An analysis hierarchically. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), 22nd-24th November 2016, Jakarta, Indonesia.

[img] PDF - Published Version
Restricted to Registered users only

Download (5MB) | Request a copy
[img] PDF (SCOPUS) - Supplemental Material
Restricted to Repository staff only

Download (147kB) | Request a copy

Abstract

According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’. These days, there are an increasing number of studies in Information Technology (IT) has been done on hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the hadith where most of them are based on the matching of test hadith with the authentic Ahadith in the database. However, there are limited computerizedbased studies to authenticate the hadith based on scholars’ principles. This paper discusses an analysis to produce a hierarchy with different levels of related studies in computational hadith to link with the computational authentication of isnad al-hadith science. The result from the analysis is the deepest level of hadith authentication where we presented the existing studies conducting hadith authentication based on principles of hadith authentication in hadith science. While the future work of the analysis is a computational authentication of isnad al-hadith based on commonly agreed principles in hadith.

Item Type: Proceeding Paper (Plenary Papers)
Additional Information: 1375/54641
Uncontrolled Keywords: Hadith, Isnad Al-hadith, Hadith Authentication, Isnad Al-hadith Computational Authentication.
Subjects: T Technology > T Technology (General) > T175 Industrial research. Research and development
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Islamic Revealed Knowledge and Human Sciences > Department of Arabic Language and Literature
Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System
Depositing User: Dr Suhaila Samsuri
Date Deposited: 10 Feb 2017 10:31
Last Modified: 16 Jan 2024 09:34
URI: http://irep.iium.edu.my/id/eprint/54641

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year