Ibrahim, N. K., Noordin, M. F., Samsuri, S., Abu Seman, M. S., & Ahmed Ali, A. E. B. (2016). Isnad Al-hadith computational authentication: An analysis hierarchically. The Institute of Electrical and Electronics Engineers, Inc.
Chicago Style (17th ed.) CitationIbrahim, Nuzulha Khilwani, Mohamad Fauzan Noordin, Suhaila Samsuri, Muhamad Sadry Abu Seman, and Ahmed El-Mogtaba Bannga Ahmed Ali. Isnad Al-hadith Computational Authentication: An Analysis Hierarchically. The Institute of Electrical and Electronics Engineers, Inc, 2016.
MLA (9th ed.) CitationIbrahim, Nuzulha Khilwani, et al. Isnad Al-hadith Computational Authentication: An Analysis Hierarchically. The Institute of Electrical and Electronics Engineers, Inc, 2016.
Warning: These citations may not always be 100% accurate.