WatsaQ: Repository of Al Hadith in Bahasa (Case Study: Hadith Bukhari)
نویسندگان
چکیده
منابع مشابه
Reconsidering Hadith al-Iftiraq
Hadith al-Iftiraqis a famous hadith attributed to Prophet Muhammad (s) in many Shi‘i and Sunni hadith collections, as well as in heresiographical sources. Among many books written by contemporary heresiographers, few have failed to mention this hadith in their writings. Many Shi‘i and Sunni traditionists have collected the traditions that deal with the future of the Muslim ummah under such titl...
متن کاملA Multilingual Datasets Repository of the Hadith Content
Knowledge extraction from unstructured data is a challenging research problem in research domain of Natural Language Processing (NLP). It requires complex NLP tasks like entity extraction and Information Extraction (IE), but one of the most challenging tasks is to extract all the required entities of data in the form of structured format so that data analysis can be applied. Our focus is to exp...
متن کاملHadith Web Browser Verification Extension
Internet users are more likely to ignore Internet content verification and more likely to share the content. When it comes to Islamic content, it is crucial to share and spread fake or inaccurate content. Even if the verification process of Islamic content is becoming easier every day, the Internet users generally ignore the verification step and jump into sharing the content. “How many clicks ...
متن کاملA semantic study of the Makarem al-Akhlaq hadith, focusing on its structure and literature
The Holy Prophet (PBUH) considers the purpose of his revelation to be the completion of moral virtues. This monopoly has caused doubt and brought sometimes to mind of conflict with the other goals of the Prophet (PBUH). Some, using the meaning of the hadith, have considered the only duty of the Holy Prophet (PBUH) as moral virtue and spirituality, and have thus concluded the separation of moral...
متن کاملAdopting Hadith Verification Techniques in to Digital Evidence Authentication
Problem statement: The needs of computer forensics investigators have been directly influenced by the increasing number of crimes performed using computers. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Without proper classification of digital evidence, the computer forensics investigator may ended up investigating using untrusted ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceeding of the Electrical Engineering Computer Science and Informatics
سال: 2017
ISSN: 2407-439X,2407-439X
DOI: 10.11591/eecsi.v4.976