Design and Frameworks with Experiment for A Basic Guide of Theoretical Isnad Al-hadith Authenticity Examination

Nuzulha Ibrahim, Suhaila Samsuri, Muhamad Sadry Abu Seman, Ahmed ElMogtaba Ali, Mira Kartiwi, Abd Samad Basari

Abstract


These days, there are an increasing number of studies in ICT which has been done on the hadith domain in different levels of knowledge of hadith. Several studies have been conducted in IT to validate the Hadiths where most of them are based on the matching of test Hadiths with the authentic Hadiths in the database. However, there are limited computerized-based studies to authenticate the Hadiths based on scholars’ principles. Therefore, in this study, firstly, we need to identify the principles of isnad al-hadith authentication theoretically, which the specific criteria will be proposed based on previous studies and knowledge of Hadith. Secondly, a new mechanism will be developed to achieve the authentication of the new criteria of the isnad al-hadith. This mechanism development includes the integration between Islamic knowledge and Information Technology (IT) which we proposed to develop an algorithm based on existing framework with a new element of facts probing from Islamic knowledge. The accuracy of the authentication process on the knowledge domain of Hadith will be evaluated by domain experts through interviews.


Full Text:

PDF

References


’Itar, N. (1988). Manhaj An-Naqad fi Ulum Al-Hadith. Dar Al-Fikr, Damsyiq, Syria.

Abidin, D. Z. (2013). The Power of Al-Quran – Meneroka Keajaiban Mukjizat Agung,. Selangor, Malaysia: PTS Millenia Sdn Bhd.

Aldhaln, K. A. (2013). Data Mining for Hadith Classification. International Islamic University Malaysia.

Aldhaln, K. A., & Zeki, A. M. (2011). Employing machine learning algorithms to extract Islamic knowledge.pdf. In Data Management: Issues, Challenges and Opportunities. IIUM Press.

Aldhaln, K. A., & Zeki, A. M. (2012). Knowledge Extraction In Hadith Using Data Mining Technique. In 2 nd International Conference on E-Learning & Knowledge Management Technologies ( ICEKMT 2012 ) Venue : Hotel Corus , Malaysia Knowledge Extraction In Hadith Using Data Mining Technique 2 nd International Conference on E-Learning & Knowledge Management T.

Aldhaln, K., Zeki, A., Zeki, A., & Alreshidi, H. (2012). Improving Knowledge Extraction Of Hadith Classifier Using Decision Tree Algorithm 1.

Aldhlan, K. A., Zeki, A. M., & Zeki, A. M. (2010). Datamining and Islamic knowledge extraction: Alhadith as a knowledge resource. In Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World: ICT Connecting Cultures, ICT4M 2010. http://doi.org/10.1109/ICT4M.2010.5971934

Aldhlan, K. A., Zeki, A. M., Zeki, A. M., & Alreshidi, H. A. (2013a). Novel mechanism to improve hadith classifier performance. Proceedings - 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012, 512–517. http://doi.org/10.1109/ACSAT.2012.93

Aldhlan, K. A., Zeki, A. M., Zeki, A. M., & Alreshidi, H. A. (2013b). Novel mechanism to improve hadith classifier performance. In Proceedings - 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012 (pp. 512–517). http://doi.org/10.1109/ACSAT.2012.93

Ghazizadeh, M., Zahedi, M. H., Kahani, M., & Bidgoli, B. M. (2008). Fuzzy Expert System In Determining Hadith 1 Validity, 354–359.

Harrag, F. (2014). Text Mining Approach for Knowledge Extraction in Sahih Al-Bukhari. Computers in Human Behaviour, 30, 558–566.

Harrag, F., Alothaim, A., Abanmy, A., Alomaigan, F., & Alsalehi, S. (2013). Ontology Extraction Approach for Prophetic Narration (Hadith) using Association Rules. International Journal on Islamic Applications in Computer Science And Technology, 1(2), 17–26.

Harrag, F., Hamdi-cherif, A., Al-salman, A. M. S., & El-qawasmeh, E. (2009). Experiments in Improvement of Arabic Information Retrieval, 71–81.

Harrag, F., Hamdi-Cherif, A., & El-Qawasmeh, E. (2008). Vector space model for Arabic information retrieval—application to “Hadith” indexing. In 1st International Conference on the Applications of Digital Information and Web Technologies ICADIWT 2008 (pp. 107–112). Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4664328

Ibrahim, N. K., Noordin, M. F., Samsuri, S., Seman, M. S. A., & Ali, A. E. B. (2016). Isnad Al-hadith Computational Authentication : An Analysis Hierarchically. In 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M) (pp. 344–349). http://doi.org/10.1109/ICT4M.2016.68

Ibrahim, N. K., Samsuri, S., Seman, M. S. A., Ali, A. E. B., & Kartiwi, M. (2016). Frameworks for A Computational Isnad Authentication and Mechanism Development. In 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M) (pp. 154–159). http://doi.org/10.1109/ICT4M.2016.36

Ismail, M. (1989). Al-Adab Al-Mufrad. (م. ف. ع. الباقي, Ed.). Beirut, Lubnan: Dar-al-Basyaair al-Islamiyyah.

Kamsin, A., Gani, A., Suliaman, I., Jaafar, S., Mahmud, R., Sabri, A. Q., … Yusoff, M. Y. Z. M. (2014). Proposing the Pogram for Developing the Novel Quran and Hadith Authentication System. In 2nd International Conference on Islamic Application in Computer Science and Technology (pp. 1–8).

Kamsin, A., Gani, A., Suliaman, I., Jaafar, S., Sabri, A. Q. M., Idris, M. Y. I., & Razak, Z. (2015). Program for Developing the Novel Quran and Hadith Authentication System. International Journal on Islamic Applications in Computer Science and Technology, 3(1), 8–17.

Mustafa, M., & Najeeb, A. (2016a). Processing Of “ Hadith Isnad ” Based On Hidden Markov Model, 6(1), 50–55.

Mustafa, M., & Najeeb, A. (2016b). XML Database for Hadith and Narrators. http://doi.org/10.3844/ajassp.2016.55.63

Najeeb, M., Abdelkader, A., Al-Zghoul, M., & Osman, A. (2015). A Lexicon for Hadith Science Based on a Corpus. International Journal of Computer Science and Information Technologies, 6(2), 1336–1340.

Najeeb, M. M. (2014). Towards Innovative System for Hadith Isnad Processing ISSN : 2231-2803. International Journal of Computer Trends and Technology (IJCTT), 18(6), 257–259. http://doi.org/10.14445/22312803/IJCTT-V18P154

Najeeb, M. M. (2015). Multi-Agent System for Hadith Processing, 9(9), 153–166.

Noordin, M. F., & Othman, R. (2006). An Information Retrieval System for Quranic Texts: A Proposed System Design. 2006 2nd International Conference on Information & Communication Technologies, 1, 1704–1709.

ttp://doi.org/10.1109/ICTTA.2006.1684642

Othman, R., & Wahid, F. A. (2014). Quranic texts retrieval in Indri. 2014 the 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014. http://doi.org/10.1109/ICT4M.2014.7020619

Philips, A. A. B. (2005). Usool At-Tafseer: The Methodology of Qur’anic Interpretation (English Ed). Riyadh, Saudi Arabia: International Islamic Publishing House.

Rahman, N. A., Bakar, Z. A., & Sembok, T. M. T. (2010). Query expansion using thesaurus in improving Malay Hadith retrieval system. In Proceedings 2010 International Symposium on Information Technology - System Development and Application and Knowledge Society, ITSim’10 (Vol. 3, pp. 1404–1409). http://doi.org/10.1109/ITSIM.2010.5561518

Rasyidi, I., Romadhony, A., & Wibowo, A. T. (2013). Indonesian Hadith Retrieval System using thesaurus. In Proceeding - 2013 International Conference on Computer, Control, Informatics and Its Applications: “Recent Challenges in Computer, Control and Informatics”, IC3INA 2013 (pp. 285–288). http://doi.org/10.1109/IC3INA.2013.6819189

Rebhi S. Baraka; Yehya M. Dalloul. (2014). Building Hadith Ontology to Support the Authenticity of Isnad. International Journal on Islamic Applications in Computer Science And Technology, 2(1), 25–39.

Ruwaatu Tahzeebeen, Shamela Program Ver 3.15. (2017).

Shamela Library. (n.d.). Retrieved August 11, 2017, from Shamela.ws

Shamela Library Software Ver 3.15. (n.d.).

Shamela Library Software Ver 3.61. (n.d.).

Siddiqui, M. A., Saleh, M. E., & Bagais, A. A. (2014). Extraction and Visualization of the Chain of Narrators from Hadiths using Named Entity Recognition and Classification. International Journal of Computational Linguistics Research, 5(1), 14–25.

Stepney, S., Smith, R. E., Timmis, J., Tyrrell, A. M., Neal, M. J., & Hone, A. N. W. (2005). Conceptual Frameworks for Artificial Immune Systems. International Journal of Unconventional Computing, 1, 1–24.


Refbacks

  • There are currently no refbacks.