A Review and Analysis for A Hierarchy from Computational Hadith to Isnad Authenticity Examination

According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors’.  These days, there are an increasing number of studies in Information Technology (IT) has been done on hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the hadith where most of them are based on the matching of test hadith with the authentic Ahadith in the database. However, there are limited computerized-based studies to authenticate the hadith based on scholars’ principles. This paper discusses an analysis to produce a hierarchy with different levels of related studies in computational hadith to link with the computational authentication of isnad al-hadith science. The result from the analysis is the deepest level of hadith authentication where we presented the existing studies conducting hadith authentication based on principles of hadith authentication in hadith science. While the future work of the analysis is a computational authentication of isnad al-hadith based on commonly agreed principles in hadith.

[1]  Muhammad Khurram Khan,et al.  Authentication and Tamper Detection of Digital Holy Quran Images , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[2]  Adamu Abubakar,et al.  User awareness in the authenticity of mobile Quran apps , 2016 .

[3]  Fouzi Harrag,et al.  Experiments in Improvement of Arabic Information Retrieval , 2009 .

[4]  Zainab Abu Bakar,et al.  Query expansion using thesaurus in improving Malay Hadith retrieval system , 2010, 2010 International Symposium on Information Technology.

[5]  King Abdullah,et al.  Knowledge Discovery in Al-Hadith Using Text Classification Algorithm , 2010 .

[6]  A. M. Zeki,et al.  Novel Mechanism to Improve Hadith Classifier Performance , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[7]  Mira Kartiwi,et al.  Frameworks for a Computational Isnad Authentication and Mechanism Development , 2016, 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M).

[8]  Mohd Yamani Idna Idris,et al.  Quranic Verse Recitation Recognition Module for Support in j-QAF Learning: A Review , 2008 .

[9]  Addin Osman,et al.  A Lexicon for Hadith Science Based on a Corpus , 2015 .

[10]  Akram M. Zeki,et al.  Knowledge Extraction In Hadith Using Data Mining Technique , 2012 .

[11]  Yasser M. Alginahi,et al.  Verification of Qur’anic Quotations Embedded in Online Arabic and Islamic Websites , 2013 .

[12]  Abdullah Gani,et al.  Hadith data mining and classification: a comparative analysis , 2016, Artificial Intelligence Review.

[13]  D. Stipanicev,et al.  MULTI-AGENT SYSTEM , 2012 .

[14]  Moath M. Najeeb,et al.  Towards Innovative System for Hadith Isnad Processing , 2014 .

[15]  Moath M. Najeeb Multi-Agent System for Hadith Processing , 2015 .

[16]  Izzat Alsmadi,et al.  Online integrity and authentication checking for Quran electronic versions , 2017 .

[17]  Zainab Abu Bakar,et al.  Using Topic Analysis for Querying Halal Information on Malay Documents , 2014 .

[18]  Kawther Aldhaln,et al.  Improving knowledge extraction of Hadith classifier using decision tree algorithm , 2012, 2012 International Conference on Information Retrieval & Knowledge Management.

[19]  Noorzaily Mohamed Noor,et al.  Developing the novel Quran and Hadith authentication system , 2014, The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M).

[20]  Muhammad Khurram Khan,et al.  Exploiting Digital Watermarking to Preserve Integrity of the Digital Holy Quran Images , 2013, 2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences.

[21]  Riyad Al-Shalabi,et al.  Al-Hadith Text Classifier , 2005 .

[22]  Fouzi Harrag,et al.  Improving Arabic Text Categorization Using Neural Network with SVD , 2010, J. Digit. Inf. Manag..

[23]  Naomie Salim,et al.  Towards context-sensitive domain of Islamic knowledge ontology extraction , 2010 .

[24]  Kashif Bilal,et al.  Muhadith: A Cloud Based Distributed Expert System for Classification of Ahadith , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[25]  Mohd Faiz Hilmi,et al.  Authentication of Electronic Version of the Holy Quran: An Information Security Perspective , 2013, 2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences.

[26]  Fouzi Harrag Text mining approach for knowledge extraction in Sahîh Al-Bukhari , 2014, Comput. Hum. Behav..

[27]  Mohamad Fauzan Noordin,et al.  Isnad Al-Hadith Computational Authentication: An Analysis Hierarchically , 2016, 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M).

[28]  Saudi Arabia,et al.  The Holy Quran Digitization: Challenges and Concerns , 2013 .

[29]  Noor Jamaliah Ibrahim,et al.  Quranic verse Recitation Recognition Engine for Self Learning of Al-Jabari Method: A Review , 2013 .

[30]  Saudi Arabia,et al.  e-NARRATOR - AN APPLICATION FOR CREATING AN ONTOLOGY OF HADITHS NARRATION TREE SEMANTICALLY AND GRAPHICALLY , 2010 .