A review and analysis for a hierarchy from computational hadith to isnad authenticity examination

According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’. These days, there are an increasing number of studies in Information Technology (IT) has been done on...

Full description

Bibliographic Details
Main Authors: Ibrahim, Nuzulha Khilwani, Noordin, Mohamad Fauzan, Samsuri, Suhaila, Abu Seman, Muhamad Sadry, Ali, Ahmed El-Mogtaba Bannga Ahmed, Hasan Basari, Abd Samad
Format: Article
Language:English
Published: The Universal Academy of Science and Technology (UniTech), 2017
Subjects:
Online Access:http://irep.iium.edu.my/67385/
http://irep.iium.edu.my/67385/
http://irep.iium.edu.my/67385/1/%D8%A7%D9%84%D8%A5%D8%B3%D9%86%D8%A7%D8%AF2.pdf
id iium-67385
recordtype eprints
spelling iium-673852018-11-12T08:16:38Z http://irep.iium.edu.my/67385/ A review and analysis for a hierarchy from computational hadith to isnad authenticity examination Ibrahim, Nuzulha Khilwani Noordin, Mohamad Fauzan Samsuri, Suhaila Abu Seman, Muhamad Sadry Ali, Ahmed El-Mogtaba Bannga Ahmed Hasan Basari, Abd Samad BP135 Hadith literature. Traditions. Sunna According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’. These days, there are an increasing number of studies in Information Technology (IT) has been done on hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the hadith where most of them are based on the matching of test hadith with the authentic Ahadith in the database. However, there are limited computerized-based studies to authenticate the hadith based on scholars’ principles. This paper discusses an analysis to produce a hierarchy with different levels of related studies in computational hadith to link with the computational authentication of isnad al-hadith science. The result from the analysis is the deepest level of hadith authentication where we presented the existing studies conducting hadith authentication based on principles of hadith authentication in hadith science. While the future work of the analysis is a computational authentication of isnad al-hadith based on commonly agreed principles in hadith. The Universal Academy of Science and Technology (UniTech), 2017-09 Article PeerReviewed application/pdf en http://irep.iium.edu.my/67385/1/%D8%A7%D9%84%D8%A5%D8%B3%D9%86%D8%A7%D8%AF2.pdf Ibrahim, Nuzulha Khilwani and Noordin, Mohamad Fauzan and Samsuri, Suhaila and Abu Seman, Muhamad Sadry and Ali, Ahmed El-Mogtaba Bannga Ahmed and Hasan Basari, Abd Samad (2017) A review and analysis for a hierarchy from computational hadith to isnad authenticity examination. International Journal on Islamic Applications in Computer Science And Technology, 5 (3). pp. 46-60. E-ISSN 2289-4012 http://www.sign-ific-ance.co.uk/index.php/IJASAT/article/view/1686/1546
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic BP135 Hadith literature. Traditions. Sunna
spellingShingle BP135 Hadith literature. Traditions. Sunna
Ibrahim, Nuzulha Khilwani
Noordin, Mohamad Fauzan
Samsuri, Suhaila
Abu Seman, Muhamad Sadry
Ali, Ahmed El-Mogtaba Bannga Ahmed
Hasan Basari, Abd Samad
A review and analysis for a hierarchy from computational hadith to isnad authenticity examination
description According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’. These days, there are an increasing number of studies in Information Technology (IT) has been done on hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the hadith where most of them are based on the matching of test hadith with the authentic Ahadith in the database. However, there are limited computerized-based studies to authenticate the hadith based on scholars’ principles. This paper discusses an analysis to produce a hierarchy with different levels of related studies in computational hadith to link with the computational authentication of isnad al-hadith science. The result from the analysis is the deepest level of hadith authentication where we presented the existing studies conducting hadith authentication based on principles of hadith authentication in hadith science. While the future work of the analysis is a computational authentication of isnad al-hadith based on commonly agreed principles in hadith.
format Article
author Ibrahim, Nuzulha Khilwani
Noordin, Mohamad Fauzan
Samsuri, Suhaila
Abu Seman, Muhamad Sadry
Ali, Ahmed El-Mogtaba Bannga Ahmed
Hasan Basari, Abd Samad
author_facet Ibrahim, Nuzulha Khilwani
Noordin, Mohamad Fauzan
Samsuri, Suhaila
Abu Seman, Muhamad Sadry
Ali, Ahmed El-Mogtaba Bannga Ahmed
Hasan Basari, Abd Samad
author_sort Ibrahim, Nuzulha Khilwani
title A review and analysis for a hierarchy from computational hadith to isnad authenticity examination
title_short A review and analysis for a hierarchy from computational hadith to isnad authenticity examination
title_full A review and analysis for a hierarchy from computational hadith to isnad authenticity examination
title_fullStr A review and analysis for a hierarchy from computational hadith to isnad authenticity examination
title_full_unstemmed A review and analysis for a hierarchy from computational hadith to isnad authenticity examination
title_sort review and analysis for a hierarchy from computational hadith to isnad authenticity examination
publisher The Universal Academy of Science and Technology (UniTech),
publishDate 2017
url http://irep.iium.edu.my/67385/
http://irep.iium.edu.my/67385/
http://irep.iium.edu.my/67385/1/%D8%A7%D9%84%D8%A5%D8%B3%D9%86%D8%A7%D8%AF2.pdf
first_indexed 2023-09-18T21:35:41Z
last_indexed 2023-09-18T21:35:41Z
_version_ 1777412804412702720