These days, there are an increasing number of studies in ICT has been done on the hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the Ahadith where most of them are based on the matching of test Ahadith with the authentic Ahadith in the database. However, there are limited computerized-based studies to authenticate the ahadith based on scholars’ principles. The three objectives of this study are (1) the principles and specific criteria of the theoretical authentication of isnad al-hadith, (2) a new mechanism of authentication to be applied onto the criteria and (3) a validation phase including user acceptance test (UAT) and domain expert evaluation. Firstly, we need t...
Background and objective: With the widespread internet availability, now-a-days Hadith texts which a...
The digital era has an influence on understanding information or messages obtained from various soci...
One of the main problems of the information age is how to get the information that would be credible...
According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): hi...
It is a challenge to identify who actually holds the valid copy of the holy Quran, or whether one di...
The two fundamental sources of Islamic legislation are Qur’an and Hadith. Hadiths, or prophetic trad...
It is a challenge to identify who actually holds the valid copy of the holy Quran, or whether one di...
This paper examines ways in which Muslims authenticate revelation and tradition through the isnad ch...
Due to the increasing numbers of Hadith forgeries, it has become necessary to use artificial intelli...
The Hadith scholars have adopted a stern documentation methodology (Tawtheeq Approach) which may be ...
In this digital age, the presence of information is felt more and more day by day. When this informa...
The statement and conducts of Prophet Muhammad (SAW), was memorized, written down and later passed b...
Abstract-Science of Hadith gets a great attention in the last few years, in this paper we investigat...
Web 2.0 has changed the strategy of the world. The virtual world has a large impact on the society. ...
Abstract: Hadith functions as the second source of Islamic Shariah after al-Quran. This has been una...
Background and objective: With the widespread internet availability, now-a-days Hadith texts which a...
The digital era has an influence on understanding information or messages obtained from various soci...
One of the main problems of the information age is how to get the information that would be credible...
According to muhaddithun, hadith is ‘what was transmitted on the authority of The Prophet (PBUH): hi...
It is a challenge to identify who actually holds the valid copy of the holy Quran, or whether one di...
The two fundamental sources of Islamic legislation are Qur’an and Hadith. Hadiths, or prophetic trad...
It is a challenge to identify who actually holds the valid copy of the holy Quran, or whether one di...
This paper examines ways in which Muslims authenticate revelation and tradition through the isnad ch...
Due to the increasing numbers of Hadith forgeries, it has become necessary to use artificial intelli...
The Hadith scholars have adopted a stern documentation methodology (Tawtheeq Approach) which may be ...
In this digital age, the presence of information is felt more and more day by day. When this informa...
The statement and conducts of Prophet Muhammad (SAW), was memorized, written down and later passed b...
Abstract-Science of Hadith gets a great attention in the last few years, in this paper we investigat...
Web 2.0 has changed the strategy of the world. The virtual world has a large impact on the society. ...
Abstract: Hadith functions as the second source of Islamic Shariah after al-Quran. This has been una...
Background and objective: With the widespread internet availability, now-a-days Hadith texts which a...
The digital era has an influence on understanding information or messages obtained from various soci...
One of the main problems of the information age is how to get the information that would be credible...