A Review and Analysis for A Hierarchy from Computational Hadith to Isnad Authenticity Examination

Nuzulha Khilwani Ibrahim, Mohamad Fauzan Noordin, Suhaila Samsuri, Muhamad Sadry Abu Seman, Ahmed ElMogtaba Ali, Abd Samad Hasan Basari

Abstract


According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’.  These days, there are an increasing number of studies in Information Technology (IT) has been done on hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the hadith where most of them are based on the matching of test hadith with the authentic Ahadith in the database. However, there are limited computerized-based studies to authenticate the hadith based on scholars’ principles. This paper discusses an analysis to produce a hierarchy with different levels of related studies in computational hadith to link with the computational authentication of isnad al-hadith science. The result from the analysis is the deepest level of hadith authentication where we presented the existing studies conducting hadith authentication based on principles of hadith authentication in hadith science. While the future work of the analysis is a computational authentication of isnad al-hadith based on commonly agreed principles in hadith.


Full Text:

PDF

References


Aldhaln, K. A. (2013). Data Mining for Hadith Classification. International Islamic University Malaysia.

Aldhaln, K. A., & Zeki, A. M. (2012). Knowledge Extraction In Hadith Using Data Mining Technique. In 2 nd International Conference on E-Learning & Knowledge Management Technologies ( ICEKMT 2012 ) Venue : Hotel Corus , Malaysia Knowledge Extraction In Hadith Using Data Mining Technique 2 nd International Conference on E-Learning & Knowledge Management T.

Aldhaln, K., Zeki, A., Zeki, A., & Alreshidi, H. (2012). Improving Knowledge Extraction Of Hadith Classifier Using Decision Tree Algorithm 1.

Aldhlan, K. A., Zeki, A. M., Zeki, A. M., & Alreshidi, H. A. (2013). Novel mechanism to improve hadith classifier performance. Proceedings - 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012, 512–517. http://doi.org/10.1109/ACSAT.2012.93

Alginahi, Y. M., Tayan, O., & Kabir, M. N. (2013). Verification of Qur ’ anic Quotations Embedded in Online Arabic and Islamic Websites, 1(2), 10–16.

Alias, N., & Rahman, N. A. (2016). Pengkelasan Teks Hadis dalam Kitab Shahih Bukhari berdasarkan kepada Perawi dengan menggunakan Teori Graf. In Persidangan Autentikasi Al-Quran dan Al-Hadith (SAHIH) 2016 (pp. 61–65).

Alsmadi, I., & Zarour, M. (2015). Online integrity and authentication checking for Quran electronic versions. Applied Computing and Informatics, (August). http://doi.org/10.1016/j.aci.2015.08.001

Azmi, A., & Badia, N. (2010). An Application for Creating an Ontology of Hadiths Narration Tree Semantically and Graphically. The Arabian Journal for Science and Engineering (AJSE), 35(2C), 7–24. Retrieved from http://ajse.kfupm.edu.sa/articles/352C_P.04.pdf

Bilal, K., & Mohsin, S. (2012). Muhadith: A Cloud Based Distributed Expert System for Classification of Ahadith. In 2012 10th International Conference on Frontiers of Information Technology (pp. 73–78). http://doi.org/10.1109/FIT.2012.22

Ebrahimi, A. (2015). Publications on Islamic Studies from 1980 to 2015 : An Overview, 1–3.

Ghazizadeh, M., Zahedi, M. H., Kahani, M., & Bidgoli, B. M. (2008). Fuzzy Expert System In Determining Hadith 1 Validity, 354–359.

Hakak, S., Kamsin, A., Gani, A., & Zerdoumi, S. (2016). ْ م ا ؤ م ل ع ل ْ ا ه ِ ا ب ع ِ د ِ ن ِ لله ا ى ش خ. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 89–92).

Hanum, H. M., Bakar, Z. A., Rahman, N. A., Rosli, M. M., & Musa, N. (2014). Using Topic Analysis for Querying Halal Information on Malay Documents. Procedia - Social and Behavioral Sciences, 121(19 March 2014), 214–222.

Harrag, F. (2014). Text Mining Approach for Knowledge Extraction in Sahih Al-Bukhari. Computers in Human Behaviour, 30, 558–566.

Harrag, F., Hamdi-cherif, A., Al-salman, A. M. S., & El-qawasmeh, E. (2009). Experiments in Improvement of Arabic Information Retrieval, 71–81.

Harrag, F., & Qawasmah, E. A.-. (2010). Improving Arabic Text Categorization using Neural Network with SVD. Journal of Digital Information Management.

Hilmi, M. F., Haron, M. F., Majid, O., & Mustapha, Y. (2013). Authentication of Electronic Version of the Holy Quran: An Information Security Perspective. 2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences, (March 2016), 61–65. http://doi.org/10.1109/NOORIC.2013.24

Ibrahim, N. (n.d.). Interac tive Website of Hadith in KBSM ’ s Islamic Education Textbook, 52–60.

Ibrahim, N. J., ZulkifliMohdYusoff, M. Y. @, & Idris, M. Y. I. (2013). Quranic Verse Recitation Recognition Engine for Self-Learning of Al-Jabari Method: A Review. In Proceedings: The 3rd Annual International Quranic Conference 2013 (pp. 317–331).

Ibrahim, N. K., Noordin, M. F., Samsuri, S., Seman, M. S. A., & Ali, A. E. B. (2016). Isnad Al-hadith Computational Authentication : An Analysis Hierarchically. In 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M) (pp. 344–349). http://doi.org/10.1109/ICT4M.2016.68

Ibrahim, N. K., Samsuri, S., Seman, M. S. A., Ali, A. E. B., & Kartiwi, M. (2016). Frameworks for A Computational Isnad Authentication and Mechanism Development. In 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M) (pp. 154–159). http://doi.org/10.1109/ICT4M.2016.36

Ibrahim, R. A. R., & Mohammed, A. (n.d.). A Comparative Analysis and Comprehensive Assessment to validate authentic apps from fake apps on Quran teaching and learning with a recommendation for the most credible apps ., 136–141.

Jbara, K. (2010). Knowledge Discovery in Al-Hadith Using Text Classification Algorithm, 6(11), 485–494.

Kalantari, A. (2016). The Research Trends of Islamic Studies : A Bibliometric Study. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 4–7).

Kamilen, N. A., & Suliaman, I. (2016). Autentik Teks Matan hadith: Aplikasi Ketepatan Matan Hadith terhadap Program Al-Maktabah Al-Shamilah Khusus terhadap Kitab Zakat Sunan Abu Dawud. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 11–20).

Kamsin, A., Gani, A., Suliaman, I., Jaafar, S., Mahmud, R., Sabri, A. Q., … Maah, M. J. (n.d.). Developing The Novel Quran and Hadith Authentication System. -NO Journal Details-.

Kamsin, A., Gani, A., Suliaman, I., Jaafar, S., Mahmud, R., Sabri, A. Q., … Yusoff, M. Y. Z. M. (2014). Proposing the Pogram for Developing the Novel Quran and Hadith Authentication System. In 2nd International Conference on Islamic Application in Computer Science and Technology (pp. 1–8).

Kamsin, A., Gani, A., Suliaman, I., Jaafar, S., Sabri, A. Q. M., Idris, M. Y. I., & Razak, Z. (2015). Program for Developing the Novel Quran and Hadith Authentication System. International Journal on Islamic Applications in Computer Science and Technology, 3(1), 8–17.

Khurram Khan, M., & Alginahi, Y. M. (2013). The holy quran digitization: Challenges and concerns. Life Science Journal, 10(2), 156–164.

Kurniawan, F., Khalil, M. S., Khan, M. K., & Alginahi, Y. M. (2013a). Authentication and tamper detection of digital Holy Quran images. Proceedings - 2013 International Symposium on Biometrics and Security Technologies, ISBAST 2013, 291–296. http://doi.org/10.1109/ISBAST.2013.51

Kurniawan, F., Khalil, M. S., Khan, M. K., & Alginahi, Y. M. (2013b). Exploiting Digital Watermarking to Preserve Integrity of The Digital Holy Quran Images, (DECEMBER).

Lai, N. F. M. F., & Suliaman, I. (2016). Autentik Terjemahan Teks Hadith Digital Dalam Aplikasi Ensiklopedi Hadits 9 Imam (Indonesia): Kajian Teks Hadith Al-Sawm dalam Sahih Al-Bukhari. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 35–44).

Mohamed, S. N. S. (2016). Peranan Jakim Dalam Menangani Penyebaran Hadith Palsu Di Internet : Satu Analisis Ringkas. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 120–125).

Mohammed Naji Al-Kabi. (2005). Al-Hadith Text Classifier. Journal of Applied Sciences, 5(3), 584–587.

Najeeb, M., Abdelkader, A., Al-Zghoul, M., & Osman, A. (2015). A Lexicon for Hadith Science Based on a Corpus. International Journal of Computer Science and Information Technologies, 6(2), 1336–1340.

Najeeb, M. M. (2014). Towards Innovative System for Hadith Isnad Processing ISSN : 2231-2803. International Journal of Computer Trends and Technology (IJCTT), 18(6), 257–259. http://doi.org/10.14445/22312803/IJCTT-V18P154

Najeeb, M. M. (2015). Multi-Agent System for Hadith Processing, 9(9), 153–166.

Rahim, N. S., Noor, S. F. M., & Judi, H. M. (2016). Reka Bentuk Model Visualisasi Syarah Hadis Berdasarkan Teknik Pohon Kon. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 48–51).

Rahman, N. A., Bakar, Z. A., & Sembok, T. M. T. (2010). Query expansion using thesaurus in improving Malay Hadith retrieval system. In Proceedings 2010 International Symposium on Information Technology - System Development and Application and Knowledge Society, ITSim’10 (Vol. 3, pp. 1404–1409). http://doi.org/10.1109/ITSIM.2010.5561518

Saad, S., Salim, N., & Zainal, H. (2010). Towards Context-Sensitive Domain of Islamic Knowledge Ontology Extraction, 3(1), 197–206.

Saloot, M. A., Idris, N., Mahmud, R., & Thorleuchter, D. (2016). Hadith data mining and classification : a comparative analysis, 1–17.

Saloot, M. A., Mahmud, R., Ja, S., & Idris, N. (2016). A Proposal : Supervised Co-reference Resolution in Hadith Text. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 45–47). Kuala Lumpur.

Sayuti, R., & Suliaman, I. (2016). AUTORITI HADITH DI DALAM TELEFON MUDAH ALIH : Pandangan Awal, Trend dan Cabaran Keabsahan. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 69–76).

Shah, F. A. (2012). Takhrij Hadith: Teknik Pencarian Hadith yang Tepat dan Berkesan (2nd Editio). Kuala Lumpur: Akademi Pengajian Islam, Universiti Malaya.

Shah, F. A. (2016). Kaedah Tepat Memahami Hadith. Kuala Lumpur: Penerbit Universiti Malaya.

Shah, F. A., Soroni, M. K., & Wazir, R. (2016). Manahij Al-Muhaddithin: Metode & Pendekatan Sarjana Hadith (2nd Editio). Kuala Lumpur: Akademi Pengajian Islam, Universiti Malaya.

Soroni, M. K. bin. (2012). Kaedah-kaedah Takhrij Al-Hadith: Teknik Berkesan Mencari Sumber Asal Hadith (2nd Editio). Selangor, Malaysia: Institut Kajian Hadis (INHAD), Kolej Universiti Islam Antarabangsa Selangor.

Tabrizi, A. A., & Mahmud, R. (2015). Computational Study of Quran Script : A review, (Table I), 21–25.

Talib, S., Ibrahim, A. A., & Mahmud, M. (2016). Users Awareness on the Authenticity of Mobile Quran Apps. In National Symposium on Al-Quran and Hadith Validation System (SAHIH 2016) (pp. 102–105).

Zaidi, R., N.Jamaliah, I., M.Yamani, I., Emran, M. T., Zulkifli, M. Y., & N.Naemah, A. R. (2008). Quranic Verse Recitation Recognition Module for Support in j-QAF Learning : A Review. IJCSNS International Journal of Computer Science and Network Security, 8(August 2015), 207–216.


Refbacks

  • There are currently no refbacks.