2016 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2016
DOI: 10.1109/ict4m.2016.041
|View full text |Cite
|
Sign up to set email alerts
|

Frameworks for a Computational Isnad Authentication and Mechanism Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
2
0
1
Order By: Relevance
“…The scheme essentially automates the process by formulating the rules used by Hadith scholars to authenticate and rate the validity of 2800 Hadiths from Sunan Al-Tirmizi based on the Sanad. Similarly, based on four main criteria concerning only Sanad, namely the reliability and preservation of the narrators, the flaw in the chain of transmission, and connected chain, Ibrahim et al [13] offered a theoretical authentication framework that would determine if a Hadith is Sahih or not. Taking a different tack at authenticating Hadiths using the Sanad, Balgasem and Zakaria [47] addresses the problem by recognising the Arabic names in the chain of narrators using Part-of-Speech (POS) and Named Entity Recognition (NER).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The scheme essentially automates the process by formulating the rules used by Hadith scholars to authenticate and rate the validity of 2800 Hadiths from Sunan Al-Tirmizi based on the Sanad. Similarly, based on four main criteria concerning only Sanad, namely the reliability and preservation of the narrators, the flaw in the chain of transmission, and connected chain, Ibrahim et al [13] offered a theoretical authentication framework that would determine if a Hadith is Sahih or not. Taking a different tack at authenticating Hadiths using the Sanad, Balgasem and Zakaria [47] addresses the problem by recognising the Arabic names in the chain of narrators using Part-of-Speech (POS) and Named Entity Recognition (NER).…”
Section: Related Workmentioning
confidence: 99%
“…Hadith scholars consult both the Sanad and Matn to establish the reliability of a certain Hadith. Because the narrators in the Sanad must not be disconnected, researchers examine each narrator's status to determine whether or not they are consistently trustworthy and connected [13]. Hadith scholars also examine Hadith's Matn to see if it agrees or disagrees with the grammar of Arabic, authentic Hadiths, or what is being said in the Quran.…”
Section: Introductionmentioning
confidence: 99%
“…Melalui perkembangan teknologi dalam penulisan dan percetakan, pelbagai hadis palsu (mawḍū') didapati telah dimasukkan dalam penerbitan buku-buku bergenre Islam tanpa menafikan tujuan murni penulis tersebut (Ibrahim et al, 2016). Penerbitan buku-buku agama tanpa seliaan dan pemantauan isi kandungan dari pihak yang berautoriti memungkinkan hadis-hadis palsu diterima serta disebarkan dalam masyarakat.…”
Section: Pendahuluanunclassified