Isnad Al-hadith computational authentication: An analysis hierarchically

According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’. These days, there are an increasing number of studies in Information Technology (IT) has been done on...

Full description

Bibliographic Details
Main Authors: Ibrahim, Nuzulha Khilwani, Noordin, Mohamad Fauzan, Samsuri, Suhaila, Abu Seman, Muhamad Sadry, Ali, Ahmed Elmogtaba Banga
Format: Conference or Workshop Item
Language:English
English
Published: The Institute of Electrical and Electronics Engineers, Inc. 2016
Subjects:
Online Access:http://irep.iium.edu.my/54641/
http://irep.iium.edu.my/54641/
http://irep.iium.edu.my/54641/
http://irep.iium.edu.my/54641/1/54641_Isnad%20Al-hadith%20computational%20authentication.pdf
http://irep.iium.edu.my/54641/2/54641_Isnad%20Al-hadith%20computational%20authentication_SCOPUS.pdf
id iium-54641
recordtype eprints
spelling iium-546412017-04-20T06:45:25Z http://irep.iium.edu.my/54641/ Isnad Al-hadith computational authentication: An analysis hierarchically Ibrahim, Nuzulha Khilwani Noordin, Mohamad Fauzan Samsuri, Suhaila Abu Seman, Muhamad Sadry Ali, Ahmed Elmogtaba Banga T175 Industrial research. Research and development According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’. These days, there are an increasing number of studies in Information Technology (IT) has been done on hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the hadith where most of them are based on the matching of test hadith with the authentic Ahadith in the database. However, there are limited computerizedbased studies to authenticate the hadith based on scholars’ principles. This paper discusses an analysis to produce a hierarchy with different levels of related studies in computational hadith to link with the computational authentication of isnad al-hadith science. The result from the analysis is the deepest level of hadith authentication where we presented the existing studies conducting hadith authentication based on principles of hadith authentication in hadith science. While the future work of the analysis is a computational authentication of isnad al-hadith based on commonly agreed principles in hadith. The Institute of Electrical and Electronics Engineers, Inc. 2016 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/54641/1/54641_Isnad%20Al-hadith%20computational%20authentication.pdf application/pdf en http://irep.iium.edu.my/54641/2/54641_Isnad%20Al-hadith%20computational%20authentication_SCOPUS.pdf Ibrahim, Nuzulha Khilwani and Noordin, Mohamad Fauzan and Samsuri, Suhaila and Abu Seman, Muhamad Sadry and Ali, Ahmed Elmogtaba Banga (2016) Isnad Al-hadith computational authentication: An analysis hierarchically. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), 22nd-24th November 2016, Jakarta, Indonesia. http://ieeexplore.ieee.org/document/7814928/ 10.1109/ICT4M.2016.075
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
English
topic T175 Industrial research. Research and development
spellingShingle T175 Industrial research. Research and development
Ibrahim, Nuzulha Khilwani
Noordin, Mohamad Fauzan
Samsuri, Suhaila
Abu Seman, Muhamad Sadry
Ali, Ahmed Elmogtaba Banga
Isnad Al-hadith computational authentication: An analysis hierarchically
description According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’. These days, there are an increasing number of studies in Information Technology (IT) has been done on hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the hadith where most of them are based on the matching of test hadith with the authentic Ahadith in the database. However, there are limited computerizedbased studies to authenticate the hadith based on scholars’ principles. This paper discusses an analysis to produce a hierarchy with different levels of related studies in computational hadith to link with the computational authentication of isnad al-hadith science. The result from the analysis is the deepest level of hadith authentication where we presented the existing studies conducting hadith authentication based on principles of hadith authentication in hadith science. While the future work of the analysis is a computational authentication of isnad al-hadith based on commonly agreed principles in hadith.
format Conference or Workshop Item
author Ibrahim, Nuzulha Khilwani
Noordin, Mohamad Fauzan
Samsuri, Suhaila
Abu Seman, Muhamad Sadry
Ali, Ahmed Elmogtaba Banga
author_facet Ibrahim, Nuzulha Khilwani
Noordin, Mohamad Fauzan
Samsuri, Suhaila
Abu Seman, Muhamad Sadry
Ali, Ahmed Elmogtaba Banga
author_sort Ibrahim, Nuzulha Khilwani
title Isnad Al-hadith computational authentication: An analysis hierarchically
title_short Isnad Al-hadith computational authentication: An analysis hierarchically
title_full Isnad Al-hadith computational authentication: An analysis hierarchically
title_fullStr Isnad Al-hadith computational authentication: An analysis hierarchically
title_full_unstemmed Isnad Al-hadith computational authentication: An analysis hierarchically
title_sort isnad al-hadith computational authentication: an analysis hierarchically
publisher The Institute of Electrical and Electronics Engineers, Inc.
publishDate 2016
url http://irep.iium.edu.my/54641/
http://irep.iium.edu.my/54641/
http://irep.iium.edu.my/54641/
http://irep.iium.edu.my/54641/1/54641_Isnad%20Al-hadith%20computational%20authentication.pdf
http://irep.iium.edu.my/54641/2/54641_Isnad%20Al-hadith%20computational%20authentication_SCOPUS.pdf
first_indexed 2023-09-18T21:17:17Z
last_indexed 2023-09-18T21:17:17Z
_version_ 1777411647499927552