Professional Documents
Culture Documents
net/publication/304571200
CITATIONS READS
2 2,728
5 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Nurazzah Abdul Rahman on 29 June 2016.
Abstract - Hadith text consists of two parts which are chain of reputation/popularity [1]. [4] had identified complexity of
narrators’ and content. The authenticity of Hadith is depending on authenticity of the narrators is a repetitive/recurring process.
authentication of the chain of narrators’ and its content. Hadith The recurring process happens in a text which can be found
authentication process involves a lot of time because the process is in more than one collection of hadith (for example, ‘M’ is a
done manually. Manual means hadith researchers need to refer one
book to another book. If the numbers of books need to be referred collection of hadith), a text normally has more than one
by the hadith researchers could not be determined; and it depends chain of narrators (for example, chain ‘N’), one chain
on his or her knowledge. The first step in hadith authentication consists of a number of narrators (for example, narrators
process is to determine chain of narrators’ authentication. Chain of ‘P’), and several biography books need to be referred to
narrators’ can be representing in form of network graph. Network pertaining to a narrator (for example, ‘Q’ books).
graph has element of chain that can help to search chain of
narrators’ for hadith. This research aims to develop a TABLE I AUTOMATIC VERIFICATION ON NARRATOR’S’S
representation of chain of narrators’ in hadith text in form of DETAILS
network graph. This research uses 30 hadith Sahih Bukhari texts. References Domain Analysis Output Language
Thereafter, we develop the representation and searching algorithm Model Model
of authentic chain of narrators’ by using Python programming on
language. The algorithm is a prototype for helping hadith Hadith
researchers in facilitating them to search for existing authentic [5] Each - Visualize the Arabic
chain of narrators’ in Sahih Bukhari book. This helps to reduce narrator chain in tree
time in determining the authentic chain of narrators’ in hadith
[3] Each Refer to books Classification Arabic
authentication process. narrator on details of of trustworthy
narrator and
Keywords-searching; algorithm; authentic chain of narrators’ whether untrustworthy
authentic or narrator
I. INTRODUCTION not
[6] Each - Retrieve Arabic
Hadith comprises of words, acts, consistency and consent narrator narrator name
from Prophet Muhammad S.A.W. which later becomes in various
principles or law in the religion of Islam. Hadith is one of the type of entity
of name
sources of principles of law in Islam besides Book of God
(Al-Quran), The Agreement of all Muslims(Ijma’) and [1] Each Refer to books Classification Arabic
Qiyas. Hadith ranked second after Al-Quran as source of law narrator of Jami'u Al- of hadith
[14]. Termithi and which is
Hadith are narrated through the times. Hence, in order to Silsilat Al- authentic,
Ahadith Al- good, poor or
preserve the authenticity of the Hadith, scholars of Hadith Dae'ifah w' fake
reserved lists of narrators of the Hadith from generation to Al-Mawdhu'ah
the next one [1]. A research relating to chain of Hadith [3] Each Refer to Narrator Arabic
narrators and texts to distinguish authentic hadith with narrator biography graph
book entitles extraction
fabricated hadith is called Research On Hadith Knowledge. Al-Kassem
This research is focus merely on chain of hadith narrators in Al-Khoei and
hadith texts. Al-Waleed Al-
Standard process in doing research on the chain of hadith Baji
[7] Each Refer to books Ontology- Arabic
narrators is done manually [2] and time-consuming [3]. The narrator of Ibn Hajar based Isnad
aforesaid process requires books reference pertaining to Judgment
details of narrators wherein 10 to hundreds of books needed System (IJS)
to refer on one narrator’s depending on the narrator’s’s
[8] Each - Automatically Arabic The text of hadith comprises of two parts which are
narrator extracting the narrators’ chain and content [15].
sequence of
narrators
from Hadith
and
converting
these
sequences to
the graph
format
[9] Each Refer to books Classification Arabic
narrator of Ibn Hajar of hadith
entitled Taqrib which is
al-Tahzib authentic, Figure 1. Algorithm Development Process
good, poor or
fake
[4] Each Refer to books Visualization Malay Start Telah menceritakan kepada kami Adam
narrator of Ibn Hajar of narrator bin Abu Iyas berkata, Telah menceritakan
chain kepada kami Syu'bah dari Abdullah bin
Abu As Safar dan Isma'il bin Abu Khalid
dari Asy Sya'bi dari Abdullah bin 'Amru
Read a Hadith Input dari Nabi shallallahu 'alaihi wasallam,
There are some studies which developed the verification Texts bersabda: “"Seorang muslim adalah orang
process automatically as reflected in Table I. Table I shows yang Kaum Muslimin selamat dari lisan
[5], [3], [6], [4], [1], [2], [7], [8], [9] extracted each narrator
from the chain and evaluate the narrator based on narrator’s Separate sanad and Telah menceritakan kepada kami Adam
bin Abu Iyas berkata, Telah
information book. content until word Output menceritakan kepada kami Syu'bah dari
[5], [6] and [8] did not conduct the process of narrator’s “:” symbol Abdullah bin Abu As Safar dan Isma'il
bin Abu Khalid dari Asy Sya'bi dari
verification with information of a narrator. On the other Abdullah bin 'Amru dari Nabi
hand, [3], [1], [2], [7], [9] and [4] carried out verification on shallallahu 'alaihi wasallam, bersabda:
each narrator by automatically referring to information of a Replace relation words :menceritakan kepada kami Adam bin Abu
narrator’s. The most referred to book pertaining to the said “telah, dari”- “:”, Iyas berkata, : menceritakan kepada kami
Output
information is a book written by Ibn Hajar. [6] and [8] “dan”- “&” with Syu'bah : Abdullah bin Abu As Safar &
Isma'il bin Abu Khalid : Asy Sya'bi :
automatically extracted names of narrator’ss. [1] and [9] had Abdullah bin 'Amru : Nabi shallallahu
classified the text of Hadith into 3 types namely sahih 'alaihi wasallam
(authentic), hassan (good), daif (poor) and maudhu’ (fake). Remove stopword – : Adam bin Abu Iyas : Syu'bah :
[3] had also categorised narrator into two types which are remove all words
Output Abdullah bin Abu As Safar : Isma'il
trustworthy or untrustworthy. [5], [4] and [3] had illustrated beginning with small bin Abu Khalid : Asy Sya'bi :
Abdullah bin 'Amru : Nabi shallallahu
letters except “shallallahu
chain of narrators into chart and graphic for verification 'alaihi, wasallam” dan
'alaihi wasallam
purpose. “bin”, spaces and
Nonetheless, the whole studies specified in Table I apostrophe AdambinAbuIyas
Syu'bah
automatically indicate that each narrator needs to be verified AbdullahbinAbuAsSafar&Isma
with books on narrator’s information. The said method, 'ilbinAbuKhalid
AsySya'bi
repeating the manual process is done. Verification on Extract narrators’ names Abdullahbin'Amru
information of each narrator’s with books on narrator’s entity from left right with Output Nabi shallallahu'alaihiwasallam
noHadis = int(re.search(r'\d+',
hadithText).group())
Figure 9. Information on connections between narrators
is to get hadith number from the text. Variables level in
the following statements All those information collected is store in the graph.
Node information is created by using file in Figure 8 as
level = 0 input file in the following statements
for s in sanadEach:
level = level + 1 for item in individualNarratorAll:
print>>fileAllNarratorString,''.join(narratorName) x = ast.literal_eval(item)
, noHadis, level DG.add_node(x[0],noHadis = x[1], level = x[2])
are to count each of narrators location in the chain. All
Narrator name as node, hadith number and level are
information of each of narrators name, their level and their
attributes for the node. Relationship is created by using file
hadith number is extracted and save in a file as shown in in Figure 9 as input file in the following statements
Figure 8.
for item in narratorConnectionAll:
x = ast.literal_eval(item)
DG.add_edge(x[0],x[1], noHadis = x[2])