Authentication of Hadith

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adopting Hadith Verification Techniques in to Digital Evidence Authentication

Problem statement: The needs of computer forensics investigators have been directly influenced by the increasing number of crimes performed using computers. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Without proper classification of digital evidence, the computer forensics investigator may ended up investigating using untrusted ...

متن کامل

the status of content criticism in authentication of the shi’a hadith

the examination of the method of authenticating the hadith dates back to the history of hadith itself. authenticating the hadith was common among shiites in different periods of time. content criticism of the texts, attributed to shiite imams, was the criterion for authenticating the hadith in the time of imams and previous shiite scholars. in this research, the factors of authentication approa...

متن کامل

Hadith Web Browser Verification Extension

Internet users are more likely to ignore Internet content verification and more likely to share the content. When it comes to Islamic content, it is crucial to share and spread fake or inaccurate content. Even if the verification process of Islamic content is becoming easier every day, the Internet users generally ignore the verification step and jump into sharing the content. “How many clicks ...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

A Multilingual Datasets Repository of the Hadith Content

Knowledge extraction from unstructured data is a challenging research problem in research domain of Natural Language Processing (NLP). It requires complex NLP tasks like entity extraction and Information Extraction (IE), but one of the most challenging tasks is to extract all the required entities of data in the form of structured format so that data analysis can be applied. Our focus is to exp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: American Journal of Islam and Society

سال: 2010

ISSN: 2690-3741,2690-3733

DOI: 10.35632/ajis.v27i4.1299