{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:56:17Z","timestamp":1768287377416,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T00:00:00Z","timestamp":1452211200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004386","name":"University of Malaya","doi-asserted-by":"crossref","award":["RP003C-14HNE"],"award-info":[{"award-number":["RP003C-14HNE"]}],"id":[{"id":"10.13039\/501100004386","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10462-016-9458-x","type":"journal-article","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T03:43:34Z","timestamp":1452224614000},"page":"113-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Hadith data mining and classification: a comparative analysis"],"prefix":"10.1007","volume":"46","author":[{"given":"Mohammad Arshi","family":"Saloot","sequence":"first","affiliation":[]},{"given":"Norisma","family":"Idris","sequence":"additional","affiliation":[]},{"given":"Rohana","family":"Mahmud","sequence":"additional","affiliation":[]},{"given":"Salinah","family":"Ja\u2019afar","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Thorleuchter","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Gani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,8]]},"reference":[{"key":"9458_CR1","volume-title":"Utilizing data-driven and knowledge-based techniques to enhance Arabic speech recognition","author":"DEM Abuzeina","year":"2011","unstructured":"Abuzeina DEM (2011) Utilizing data-driven and knowledge-based techniques to enhance Arabic speech recognition. King Fahd University of Petroleum and Minerals, Saudi Arabia"},{"issue":"1","key":"9458_CR2","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0306-4573(02)00021-3","volume":"39","author":"A Aizawa","year":"2003","unstructured":"Aizawa A (2003) An information-theoretic perspective of tf-idf measures. Inf Process Manag 39(1):45\u201365. doi: 10.1016\/S0306-4573(02)00021-3","journal-title":"Inf Process Manag"},{"key":"9458_CR3","doi-asserted-by":"crossref","unstructured":"Al Kharashi IA, Al Sughaiyer IA (2002) Rule merging in a rule-based Arabic stemmer. In: Proceedings of the 19th international conference on computational linguistics, vol 1. Association for Computational Linguistics, Stroudsburg, PA, USA, pp 1\u20137. doi: 10.3115\/1072228.1072265","DOI":"10.3115\/1072228.1072265"},{"key":"9458_CR4","doi-asserted-by":"crossref","unstructured":"Aldhaln K, Zeki A, Zeki A (2010) Datamining and Islamic knowledge extraction: alhadith as a knowledge resources. In: Proceeding 3rd international conference on ICT4M, Jakarta, Indonesia, pp 21\u201325. Retrieved from http:\/\/irep.iium.edu.my\/17123\/1\/WA_17123_AKRAM_Datamining_and_Islamic_KnowledgeExtraction.pdf","DOI":"10.1109\/ICT4M.2010.5971934"},{"key":"9458_CR5","unstructured":"Aldhaln K, Zeki A, Zeki A (2012) Knowledge extraction in hadith using data mining technique. Int J Inf Technol Comput Sci 2:13\u201321. Retrieved from http:\/\/www.ijitcs.com\/2ndicekmt\/Kawther+AAldhaln.php"},{"key":"9458_CR6","doi-asserted-by":"crossref","unstructured":"Aldhaln K, Zeki A, Zeki A, Alreshidi H (2012a) Improving knowledge extraction of Hadith classifier using decision tree algorithm. In: 2012 international conference on information retrieval knowledge management, pp 148\u2013152. doi: 10.1109\/InfRKM.2012.6205024","DOI":"10.1109\/InfRKM.2012.6205024"},{"key":"9458_CR7","doi-asserted-by":"crossref","unstructured":"Aldhaln K, Zeki A, Zeki A, Alreshidi H (2012b) Novel mechanism to improve Hadith classifier performance. In: 2012 international conference on advanced computer science applications and technologies (ACSAT), pp 512\u2013517. doi: 10.1109\/ACSAT.2012.93","DOI":"10.1109\/ACSAT.2012.93"},{"issue":"2","key":"9458_CR8","first-page":"13","volume":"4","author":"MN Al-Kabi","year":"2007","unstructured":"Al-Kabi MN, Al-Sinjilawi SI (2007) A comparative study of the efficiency of different measures to classify Arabic text. Univ Sharjah J Pure Appl Sci 4(2):13\u201326","journal-title":"Univ Sharjah J Pure Appl Sci"},{"key":"9458_CR9","unstructured":"Alkhatib M (2010) Classification of Al-Hadith Al-Shareef using data mining algorithm. In: European, mediterranean and middle eastern conference on information systems, EMCIS2010, Abu Dhabi, UAE, pp 1\u201323. Retrieved from http:\/\/www.iseing.org\/emcis\/emcis2010\/Proceedings\/AcceptedRefereedPapers\/C20.pdf"},{"key":"9458_CR10","unstructured":"Alrazou HM (2004) Computerized frame of the Prophetic tradition. In: 17th national conferences for computer, Medina, Saudi Arabia, pp 596\u2013610"},{"key":"9458_CR11","unstructured":"Alrazou HM (2008) Data mining application on the Islamic knowledge resource. Alukah. Retrieved from http:\/\/www.alukah.net\/culture\/0\/3123\/"},{"issue":"7","key":"9458_CR12","first-page":"1","volume":"95","author":"R Al-tarawneh","year":"2014","unstructured":"Al-tarawneh R, Hamatta HSA, Muiadi H (2014) Novel approach for Arabic spell-checker: based on radix search tree. Int J Comput Appl 95(7):1\u20135","journal-title":"Int J Comput Appl"},{"key":"9458_CR13","unstructured":"Althobaiti M, Kruschwitz U, Poesio M (2014) AraNLP: a Java-based Library for the processing of Arabic text. In: Calzolari N (Conference Chair), Choukri K, Declerck T, Loftsson H, Maegaard B, Mariani J, et al (eds) Proceedings of the ninth international conference on language resources and evaluation (LREC\u201914), European Language Resources Association (ELRA), Reykjavik, Iceland"},{"key":"9458_CR14","unstructured":"Attia M, Toral A, Tounsi L, Monachini M, van Genabith J (2010) An automatically built named entity lexicon for Arabic. In: Calzolari N (Conference Chair), Choukri K, Maegaard B, Mariani J, Odijk J, Piperidis S, et al (eds) Proceedings of the seventh international conference on language resources and evaluation (LREC\u201910), European Language Resources Association (ELRA), Valletta, Malta"},{"key":"9458_CR15","unstructured":"Atwell E, Brierley C, Dukes K, Sawalha M, Sharaf A-B (2011) An Artificial intelligence approach to Arabic and Islamic content on the internet. In: Proceedings of NITS 3rd national information technology symposium, The University of Leeds, pp 1\u201313. doi: 10.13140\/2.1.2425.9528"},{"key":"9458_CR16","doi-asserted-by":"crossref","first-page":"4899","DOI":"10.1016\/j.sbspro.2014.01.1046","volume":"116","author":"M Batyrzhan","year":"2014","unstructured":"Batyrzhan M, Kulzhanova BR, Abzhalov SU, Mukhitdinov RS (2014) Significance of the hadith of the Prophet Muhammad in Kazakh proverbs and sayings. Proced Social Behav Sci 116:4899\u20134904. doi: 10.1016\/j.sbspro.2014.01.1046","journal-title":"Proced Social Behav Sci"},{"key":"9458_CR17","doi-asserted-by":"crossref","unstructured":"Bilal K, Mohsin S (2012) Muhadith: a cloud based distributed expert system for classification of ahadith. In: Proceedings of the 2012 10th international conference on frontiers of information technology, IEEE Computer Society, Washington, DC, USA, pp 73\u201378. doi: 10.1109\/FIT.2012.22","DOI":"10.1109\/FIT.2012.22"},{"key":"9458_CR18","volume-title":"Discovering data mining: from concept to implementation","author":"P Cabena","year":"1998","unstructured":"Cabena P, Hadjinian P, Stadler R, Verhees J, Zanasi A (1998) Discovering data mining: from concept to implementation. Prentice-Hall Inc, Upper Saddle River, NJ, USA"},{"key":"9458_CR19","unstructured":"Choi FYY (2000) Advances in domain independent linear text segmentation. In: Proceedings of the 1st North American chapter of the association for computational linguistics conference, Association for Computational Linguistics, Stroudsburg, PA, USA, pp 26\u201333. Retrieved from http:\/\/dl.acm.org\/citation.cfm?id=974305.974309"},{"key":"9458_CR20","unstructured":"Fatt\u0101hiz\u0101deh F, Afsh\u0101ri N (2010) An approach to understanding hadith in Was\u0101il al-Shia. Hadith Stud 4:67\u201398"},{"key":"9458_CR21","doi-asserted-by":"crossref","unstructured":"Flachsbart B, Bond WE, St. Clair DC, Holland J (1994) Using the ID3 symbolic classification algorithm to reduce data density. In: Proceedings of the 1994 ACM symposium on applied computing, ACM, New York, NY, USA, pp 292\u2013296. doi: 10.1145\/326619.326750","DOI":"10.1145\/326619.326750"},{"key":"9458_CR22","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/978-1-4020-8741-7_64","volume-title":"Advances in computer and information sciences and engineering","author":"M Ghazizadeh","year":"2008","unstructured":"Ghazizadeh M, Zahedi MH, Kahani M, Bidgoli BM (2008) Fuzzy expert system in determining hadith validity. In: Sobh T (ed) Advances in computer and information sciences and engineering. Springer, Netherlands, pp 354\u2013359. doi: 10.1007\/978-1-4020-8741-7_64"},{"key":"9458_CR23","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.sbspro.2014.01.1122","volume":"121","author":"HM Hanum","year":"2014","unstructured":"Hanum HM, Bakar ZA, Rahman NA, Rosli MM, Musa N (2014) Using topic analysis for querying halal information on Malay documents. Proced Social Behav Sci 121:214\u2013222. doi: 10.1016\/j.sbspro.2014.01.1122","journal-title":"Proced Social Behav Sci"},{"key":"9458_CR24","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1016\/j.chb.2013.06.035","volume":"30","author":"F Harrag","year":"2014","unstructured":"Harrag F (2014) Text mining approach for knowledge extraction in Sah\u00eeh Al-Bukhari. Comput Hum Behav 30:558\u2013566. doi: 10.1016\/j.chb.2013.06.035","journal-title":"Comput Hum Behav"},{"key":"9458_CR25","doi-asserted-by":"crossref","unstructured":"Harrag F, El-Qawasmeh E (2009) Neural network for Arabic text classification. In: Second international conference on the applications of digital information and web technologies, 2009. ICADIWT \u201909, pp 778\u2013783. doi: 10.1109\/ICADIWT.2009.5273841","DOI":"10.1109\/ICADIWT.2009.5273841"},{"key":"9458_CR26","doi-asserted-by":"crossref","unstructured":"Harrag F, El-Qawasmeh E, Pichappan P (2009) Improving arabic text categorization using decision trees. In: First international conference on networked digital technologies, 2009. NDT \u201909, pp 110\u2013115. doi: 10.1109\/NDT.2009.5272214","DOI":"10.1109\/NDT.2009.5272214"},{"key":"9458_CR27","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-642-22191-0_26","volume-title":"Software engineering and computer systems","author":"F Harrag","year":"2011","unstructured":"Harrag F, El-Qawasmeh E, Salman Al-Salman A (2011a) Extracting named entities from prophetic narration texts (hadith). In: Zain J, Wan Mohd W, El-Qawasmeh E (eds) Software engineering and computer systems, vol 180. Springer, Berlin, pp 289\u2013297. doi: 10.1007\/978-3-642-22191-0_26"},{"key":"9458_CR28","doi-asserted-by":"crossref","unstructured":"Harrag F, El-Qawasmeh E, Salman Al-Salman A (2011b) Stemming as a feature reduction technique for Arabic text categorization. In: 2011 10th international symposium on programming and systems (ISPS), pp. 128\u2013133. doi: 10.1109\/ISPS.2011.5898874","DOI":"10.1109\/ISPS.2011.5898874"},{"key":"9458_CR29","unstructured":"Harrag F, Hamdi-Cherif A (2007) UML modeling of text mining in Arabic language and application to the prophetic traditions \u201cHadiths.\u201d In: The 1st international sysmposium on computers and Arabic language and exhibition, KACST & SCS, pp 11\u201320. Retrieved from iscal.org.sa"},{"key":"9458_CR30","doi-asserted-by":"crossref","unstructured":"Harrag F, Hamdi-Cherif A, El-Qawasmeh E (2008) Vector space model for Arabic information retrieval\u2014application to \u201cHadith\u201d indexing. In: First international conference on the applications of digital information and web technologies, 2008. ICADIWT 2008, pp 107\u2013112. doi: 10.1109\/ICADIWT.2008.4664328","DOI":"10.1109\/ICADIWT.2008.4664328"},{"key":"9458_CR31","unstructured":"Harrag F, Hamdi-Cherif A, Salman Al-Salman A, El-Qawasmeh E (2009) Experiments in improvement of Arabic information retrieval. In: 3rd IEEE international conference on Arabic language processing, Rabat, Morocco, pp 71\u201381"},{"issue":"2","key":"9458_CR32","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"C-W Hsu","year":"2002","unstructured":"Hsu C-W, Lin C-J (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13(2):415\u2013425. doi: 10.1109\/72.991427","journal-title":"IEEE Trans Neural Netw"},{"key":"9458_CR33","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-3-540-48061-7_53","volume-title":"New directions in rough sets, data mining, and granular-soft computing","author":"K Hu","year":"1999","unstructured":"Hu K, Lu Y, Zhou L, Shi C (1999) Integrating classification and association rule mining: a concept lattice framework. In: Zhong N, Skowron A, Ohsuga S (eds) New directions in rough sets, data mining, and granular-soft computing, vol 1711. Springer, Berlin, pp 443\u2013447. doi: 10.1007\/978-3-540-48061-7_53"},{"issue":"11","key":"9458_CR34","first-page":"485","volume":"6","author":"K Jbara","year":"2010","unstructured":"Jbara K (2010) Knowledge discovery in Al-Hadith Using text classification algorithm. J Am Sci 6(11):485\u2013494","journal-title":"J Am Sci"},{"issue":"3","key":"9458_CR35","doi-asserted-by":"crossref","first-page":"584","DOI":"10.3923\/jas.2005.584.587","volume":"5","author":"MNA Kabi","year":"2005","unstructured":"Kabi MNA, Kanaan G, Al-Shalabi R, Al-Sinjilawi SI, Al-Mustafa RS (2005) Al-Hadith text classifier. J Appl Sci 5(3):584\u2013587. doi: 10.3923\/jas.2005.584.587","journal-title":"J Appl Sci"},{"key":"9458_CR36","doi-asserted-by":"crossref","unstructured":"Kamsin A, Gani A, Suliaman I, Jaafar S, Mahmud R, Sabri AQM, et al (2014) Developing the novel Quran and Hadith authentication system. In: 2nd international conference on islamic applications in computer science and technology, Amman, Jordan, pp 1\u20138. Retrieved from http:\/\/umexpert.um.edu.my\/file\/publication\/00006192_111415.pdf","DOI":"10.1109\/ICT4M.2014.7020640"},{"issue":"2","key":"9458_CR37","first-page":"51","volume":"10","author":"NSA Karim","year":"2005","unstructured":"Karim NSA, Hazmi NR (2005) Assessing islamic information quality on the internet: a case of information about hadith. Malays J Libr Inf Sci 10(2):51\u201366","journal-title":"Malays J Libr Inf Sci"},{"issue":"1","key":"9458_CR38","first-page":"6","volume":"21","author":"S Lacroix","year":"2008","unstructured":"Lacroix S (2008) Al-Albani\u2019s revolutionary approach to hadith. ISIM Rev 21(1):6\u20137","journal-title":"ISIM Rev"},{"issue":"4","key":"9458_CR39","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1504\/IJBIDM.2012.051712","volume":"7","author":"F Maazouzi","year":"2012","unstructured":"Maazouzi F, Bahi H (2012) Using multi decision tree technique to improving decision tree classifier. Int J Bus Intell Data Min 7(4):274\u2013287. doi: 10.1504\/IJBIDM.2012.051712","journal-title":"Int J Bus Intell Data Min"},{"issue":"3\u20134","key":"9458_CR40","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1478-1913.2002.tb03750.x","volume":"92","author":"C Melchert","year":"2002","unstructured":"Melchert C (2002) Early renunciants as Had\u012bth transmitters. Muslim World 92(3\u20134):407\u2013418. doi: 10.1111\/j.1478-1913.2002.tb03750.x","journal-title":"Muslim World"},{"issue":"6","key":"9458_CR41","doi-asserted-by":"crossref","first-page":"257","DOI":"10.14445\/22312803\/IJCTT-V18P154","volume":"18","author":"MM Najeeb","year":"2014","unstructured":"Najeeb MM (2014) Towards innovative system for Hadith Isnad processing. Int J Comput Trends Technol 18(6):257\u2013259. doi: 10.14445\/22312803\/IJCTT-V18P154","journal-title":"Int J Comput Trends Technol"},{"key":"9458_CR42","doi-asserted-by":"crossref","unstructured":"Papadimitriou CH, Tamaki H, Raghavan P, Vempala S (1998) Latent semantic indexing: a probabilistic analysis. In: Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems, ACM, New York, NY, USA, pp. 159\u2013168. doi: 10.1145\/275487.275505","DOI":"10.1145\/275487.275505"},{"key":"9458_CR43","doi-asserted-by":"crossref","unstructured":"Ragas H, Koster CHA (1998) Four text classification algorithms compared on a Dutch corpus. In: Proceedings of the 21st annual international ACM SIGIR conference on research and development in information retrieval, ACM, New York, NY, USA, pp 369\u2013370. doi: 10.1145\/290941.291059","DOI":"10.1145\/290941.291059"},{"key":"9458_CR44","unstructured":"Rennie JD, Shih L, Teevan J, Karger D (2003) Tackling the poor assumptions of naive bayes text classifiers. In: Proceedings of the twentieth international conference on machine learning, ICML-2003, Washington DC, pp 616\u2013623"},{"key":"9458_CR45","volume-title":"Finite-state language processing","year":"1997","unstructured":"Roche E, Shabes Y (eds) (1997) Finite-state language processing. MIT Press, Cambridge, MA, USA"},{"issue":"11","key":"9458_CR46","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613\u2013620. doi: 10.1145\/361219.361220","journal-title":"Commun ACM"},{"issue":"1","key":"9458_CR47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34(1):1\u201347. doi: 10.1145\/505282.505283","journal-title":"ACM Comput Surv"},{"key":"9458_CR48","author":"MQ Shatnawi","year":"2012","unstructured":"Shatnawi MQ, Abuein QQ, Darwish O (2012) Verification hadith correctness in islamic web pages using information retrieval techniques. Int J Comput Appl. doi: 10.5120\/6327-8680","journal-title":"Int J Comput Appl"},{"issue":"4","key":"9458_CR49","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1361348.1361351","volume":"36","author":"S Tata","year":"2007","unstructured":"Tata S, Patel JM (2007) Estimating the selectivity of tf-idf based cosine similarity predicates. SIGMOD Rec 36(4):75\u201380. doi: 10.1145\/1361348.1361351","journal-title":"SIGMOD Rec"},{"key":"9458_CR50","unstructured":"The Encyclopedia of the Nine Books for the Honorable Prophetic Traditions! (1997). Sakhr Company. Retrieved from http:\/\/www.harf.com"},{"key":"9458_CR51","doi-asserted-by":"crossref","unstructured":"Yang Y, Liu X (1999) A re-examination of text categorization methods. In: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, ACM, New York, NY, USA, pp 42\u201349. doi: 10.1145\/312624.312647","DOI":"10.1145\/312624.312647"},{"issue":"6","key":"9458_CR52","doi-asserted-by":"crossref","first-page":"613","DOI":"10.3844\/jcssp.2010.613.618","volume":"6","author":"Y Yusoff","year":"2010","unstructured":"Yusoff Y, Ismail R, Hassan Z (2010) Adopting hadith verification techniques in to digital evidence authentication. J Comput Sci 6(6):613\u2013618","journal-title":"J Comput Sci"},{"key":"9458_CR53","doi-asserted-by":"crossref","unstructured":"Zhang M-L, Zhou Z-H (2005) A k-nearest neighbour based algorithm for multi-label classification. In: 2005 IEEE international conference on granular computing, vol. 2, pp 718\u2013721. doi: 10.1109\/GRC.2005.1547385","DOI":"10.1109\/GRC.2005.1547385"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-016-9458-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-016-9458-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-016-9458-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T04:45:57Z","timestamp":1567485957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-016-9458-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,8]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["9458"],"URL":"https:\/\/doi.org\/10.1007\/s10462-016-9458-x","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,8]]}}}