Novel mechanism to improve Hadith classifier performance
Abstract— Muslims believe that the Sunnah of the Prophet Muhammad (SAAW) is the second of the two revealed fundamental sources of Islam, after the Holy Qur'an. Hadith provides a Gold Standard "ground truth" for Artificial Intelligent (AI) knowledge extraction and knowledge repres...
| Main Authors: | Aldhlan, Kawther A., Zeki, Akram M., Zeki, Ahmed M., Alreshidi, Hamad |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/30804/ http://irep.iium.edu.my/30804/1/06516408.pdf |
Similar Items
Enhanced mechanism to handle missing data of Hadith classifier
by: Aldhlan, Kawther A., et al.
Published: (2011)
by: Aldhlan, Kawther A., et al.
Published: (2011)
Improving knowledge extraction of Hadith classifier using decision tree algorithm
by: Aldhaln, Kawther, et al.
Published: (2012)
by: Aldhaln, Kawther, et al.
Published: (2012)
Employing machine learning algorithms to extract Islamic knowledge
by: Aldhlan, Kawther A., et al.
Published: (2011)
by: Aldhlan, Kawther A., et al.
Published: (2011)
Datamining and Islamic knowledge extraction: Alhadith as a knowledge resources
by: Aldhlan, Kawther A., et al.
Published: (2010)
by: Aldhlan, Kawther A., et al.
Published: (2010)
Introduction to E- learning
by: Aldhlan, Kawther A., et al.
Published: (2011)
by: Aldhlan, Kawther A., et al.
Published: (2011)
Classifying users emotions towards the quranic recitation using EEG: a preliminary study
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
أسماء التفضيل في القرآن الكريم والحديث النبوي الشريف - دارسة دلالية
The names of preference in the Quran and Hadith - Semantic Study
by: Zeki, Akram M., et al.
Published: (2018)
by: Zeki, Akram M., et al.
Published: (2018)
Introduction to computer graphics
by: Zeki, Akram M.
Published: (2015)
by: Zeki, Akram M.
Published: (2015)
Application of multimedia in digital watermarking
by: Zeki, Akram M.
Published: (2015)
by: Zeki, Akram M.
Published: (2015)
Recognition techniques for online Arabic handwriting recognition systems
by: Abuzaraida, Mustafa Ali, et al.
Published: (2012)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2012)
Online recognition system for handwritten Hindi digits based on matching alignment algorithm
by: Abuzaraida, Mustafa Ali, et al.
Published: (2014)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2014)
Problems of writing on digital surfaces in online handwriting recognition systems
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
Feature extraction techniques of online handwriting arabic text recognition
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
Difficulties and challenges of recognizing Arabic text
by: Abuzaraida, Mustafa Ali, et al.
Published: (2011)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2011)
Online databases on Quranic handwritten words
by: Abuzaraida, Mustafa Ali, et al.
Published: (2014)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2014)
The effect of external factors on the students' acceptance of virtual learning.
by: Aleshidi, Hamad A., et al.
Published: (2011)
by: Aleshidi, Hamad A., et al.
Published: (2011)
A Novel Performance Metric for Building an Optimized Classifier
by: Hossin, M., et al.
Published: (2011)
by: Hossin, M., et al.
Published: (2011)
Segmentation Techniques for Online Arabic Handwriting Recognition:A Survey
by: Abuzaraida, Mustafa Ali, et al.
Published: (2010)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2010)
Virtual learning environment
by: Aleshidi, Hamad A., et al.
Published: (2011)
by: Aleshidi, Hamad A., et al.
Published: (2011)
Security issues with health care information technology
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
The important dimensions for assessing organization's readiness toward business intelligence systems from the perspective of Malaysian organization
by: H. Anjariny, Ahmed, et al.
Published: (2013)
by: H. Anjariny, Ahmed, et al.
Published: (2013)
The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia
by: Ahmed, Aldossary Alia, et al.
Published: (2014)
by: Ahmed, Aldossary Alia, et al.
Published: (2014)
Management dimension for assessing organizations' readiness toward business intelligence systems
by: Anjariny, Ahmed H., et al.
Published: (2014)
by: Anjariny, Ahmed H., et al.
Published: (2014)
The important dimensions for assessing organizations' readiness toward business intelligence systems from the perspective of Malaysian organization
by: Anjariny, Ahmed H., et al.
Published: (2014)
by: Anjariny, Ahmed H., et al.
Published: (2014)
Development of model for assessing organizations’ readiness toward successful Business Intelligence Systems
by: Anjarini, Ahmed H., et al.
Published: (2011)
by: Anjarini, Ahmed H., et al.
Published: (2011)
التقنيات الحديث في خدمة ضيوف الرحمن = Al-Taqniyāh al-ḥadīthah fi khidmah ḍuyūf al-raḥman.
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
How technology affected our privacy
by: Sehnaz, Ahmetoglu, et al.
Published: (2015)
by: Sehnaz, Ahmetoglu, et al.
Published: (2015)
Web assisted language learning system for enhancing Arabic language learning using cognates
by: Shehab, Roaya, et al.
Published: (2015)
by: Shehab, Roaya, et al.
Published: (2015)
Arabic text
by: Abuzaraida, Mustafa, et al.
Published: (2015)
by: Abuzaraida, Mustafa, et al.
Published: (2015)
Application of multimedia in teaching Hajj
by: Isa, Hafizuddin, et al.
Published: (2015)
by: Isa, Hafizuddin, et al.
Published: (2015)
Arabic-Malay cognates as a computer assisted language learning
by: Shehab, Roaya, et al.
Published: (2014)
by: Shehab, Roaya, et al.
Published: (2014)
Career guidance and employment management system
by: Seng, Kasem, et al.
Published: (2014)
by: Seng, Kasem, et al.
Published: (2014)
Fundamentals of computer networks: wired/wireless
by: Abubakar, Adamu, et al.
Published: (2015)
by: Abubakar, Adamu, et al.
Published: (2015)
Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students
by: Hamid, Habiba, et al.
Published: (2015)
by: Hamid, Habiba, et al.
Published: (2015)
Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation
by: Yousfi, Bilal, et al.
Published: (2017)
by: Yousfi, Bilal, et al.
Published: (2017)
Mini-ATX Computer System in Vehicle
by: Sami, Muhammad, et al.
Published: (2015)
by: Sami, Muhammad, et al.
Published: (2015)
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
An unsupevised package for multi-spectral image processing for remote data
by: Zaid, Muhsin A., et al.
Published: (2015)
by: Zaid, Muhsin A., et al.
Published: (2015)
Online recognition system for handwritten Arabic chemical symbols
by: Abuzaraida, Mustafa Ali, et al.
Published: (2014)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2014)
Similar Items
-
Enhanced mechanism to handle missing data of Hadith classifier
by: Aldhlan, Kawther A., et al.
Published: (2011) -
Improving knowledge extraction of Hadith classifier using decision tree algorithm
by: Aldhaln, Kawther, et al.
Published: (2012) -
Employing machine learning algorithms to extract Islamic knowledge
by: Aldhlan, Kawther A., et al.
Published: (2011) -
Datamining and Islamic knowledge extraction: Alhadith as a knowledge resources
by: Aldhlan, Kawther A., et al.
Published: (2010) -
Introduction to E- learning
by: Aldhlan, Kawther A., et al.
Published: (2011)