24 research outputs found

    Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Quran and Hadith.

    Get PDF
    Global Islamic finance assets grew from 200billionto200 billion to 1.8 trillion (IMF 2015) and is growing faster than the conventional banking sector. A large number of conventional financial institutions, especially banks are moving to an Islamic financial model that\u27s comply with the Shari\u27a Law with little change to current conventional practices (reverse eningineer current business processes) to accommodate the new situation. In this study we will design and develop the business processes for the Islamic financial institutions\u27 (IFIs) products by investigating and collecting information through Islamic literature, surveys and interviews of experts in Islamic jurisprudence, regulators, academic and Islamic finance and banking practitioners. Then we will assess and evaluate the findings by using a Qur\u27anic Financial Corpus and use computational and analytical approaches to mine the Qur\u27an (the Muslim Holy book) and the Hadith (actions and words of the prophet Muhammad peace be upon him) to uncover hidden knowledge on Islamic financial business processes. The knowledge acquired from this investigation will be translated into an Islamic financial process model to be adapted by Islamic and non-Islamic financial institutions. The outcome of this research will influence the future development, growth and diversification of Islamic Financial Services worldwid

    An approach to the acquisition of tacit knowledge based on an ontological model

    Get PDF
    © 2018 The Authors Our knowledge includes irreducible tacit elements which are related to the individual\u27s personal nature that go beyond what we can express, which makes it very difficult to formalize, communicate and share. As this tacit knowledge consists of either actions or personal attitudes, we propose an approach to acquisition of tacit knowledge based on an ontological model. The ontology is built top down by changing the actors’ cognitive focus from the focal to the subsidiary, or from the aim of an action to its detailed objectives. We also use explicitation interviews and self-confrontation techniques to identify the tacit elements in actors’ activities, such as the concepts of situation, know-how and know-that, which constitute our ontology for knowledge acquisition

    Correction to: A Recursive Co-occurrence Text Mining of the Quran to Build Corpora for Islamic Banking Business Processes

    Get PDF
    As the holy Quran text is time and place based and has “blockchain” like-structure where stories are spread like pieces of puzzles and linked to each other among 6,236 verses from 114 chapters, we present a new recursive co-occurrence text mining algorithm to mine the Holly Quran to build corpora which can be further processed to develop Islamic banking business processes complying which Islamic Sharia’ law. First, we create a list containing all the business process action terms and their synonyms in Arabic

    Social learning on the move - A research roadmap

    Get PDF
    © 2014 IEEE. While teaching using a mobile course content-management, it is not possible to decide if students are confused, bored, frustrated, surprised, focused, exhausted, angry, sad, or happy. These cues are extremely helpful to instructors in deciding whether to speed up, slow down, introduce new materials, or explain a concept in a different way. In this context, there is a strong desire to capture the social interactions between learners (i.e., instructor and student). These interactions could even arise while learners are on the move. This paper\u27s research question is how could social applications like Facebook and Instangram help improve the learning experience? It is clear that these applications are nowadays used for entertainment but someone can tap into the opportunities they offer to improve instructor-student and student-student interactions. These interactions could also occur on the move due to smartphone and tablet widespread, which poses additional challenges on those who aim at providing a positive learning experience

    Extracting semantic relations from the Quranic Arabic based on Arabic conjunctive patterns

    Get PDF
    © 2017 The Authors There is an immense need for information systems that rely on Arabic Quranic ontologies to provide a precise and comprehensive knowledge to the world. Since semantic relations are a vital component in any ontology and many applications in Natural Language Processing strongly depend on them, this motivates the development of our approach to extract semantic relations from the Quranic Arabic Corpus, written in Arabic script, and enrich the automatic construction of Quran ontology. We focus on semantic relations resulting from proposed conjunctive patterns which include two terms with the conjunctive AND enclosed in between. The strength of each relation is measured based on the correlation coefficient. Finally, we evaluate the significance of this method by using hypotheses testing and Student t-test. The obtained results are very promising since we combine an accurate Arabic grammar with strong statistical techniques to prove the existence and measure the strength of this type of semantic relations

    Screening of Murabaha business process through Quran and hadith: a text mining analysis

    Get PDF
    © 2020, Emerald Publishing Limited. Purpose: This paper revolves around the usage of data analytics in the Qur’an and Hadith through a new text mining technique to answer the main research question of whether the activities and the data flows of the Murabaha financing contract is compatible with Sharia law. The purpose of this paper is to provide a thorough and comprehensive database that will be used to examine existing practices in Islamic banks’ and improve compliancy with Islamic financial law (Sharia). Design/methodology/approach: To design a Sharia-compliant Murabaha business process originated on text mining, the authors start by identifying the factors deemed necessary in their text mining techniques of both texts; using a four-step strategy to analyze those text mining analytics; then, they list the three basic approaches in text mining used for new knowledge discovery in databases: the co-occurrence approach based on the recursive co-occurrence algorithm; the machine learning or statistical-based; and the knowledge-based. They identify any variation and association between the Murabaha business processes produced using text mining against the one developed through data collection. Findings: The main finding attained in this paper is to confirm the compatibility of all activities and the data flows in the Murabaha financing contract produced using data analytics of the Quran and Hadith texts against the Murabaha business process that was developed based on data collection. Another key finding is revealing some shortcomings regarding Islamic banks business process compliance with Sharia law. Practical implications: Given Murabaha as the most popular mode of Islamic financing with more than 75% in total transactions, this research has managed to touch-base on an area that is interesting to the vast majority of those dealing with Islamic finance instruments. By reaching findings that could improve the existing Islamic Murabaha business process and concluding on Sharia compliance of the existing Murabaha business process, this research is quite relevant and could be used in practice as well as in influencing public policy. In fact, Islamic Sharia law experts, Islamic finance professionals and Islamic banks may find the results of this study very useful in improving at least one aspect of the Islamic finance transactions. Originality/value: By using a novel, fresh text mining methods built on recursive occurrence of synonym words from the Qur’an and Hadith to enrich Islamic finance, this research study can claim to have been the first of its kind in using machine learning to mine the Quran, Hadith and in extracting valuable knowledge to support and consolidate the Islamic financial business processes and make them more compliant with the i

    Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur\u27an and Hadith

    Get PDF
    © 2017 IEEE. A large number of conventional financial institutions, especially banks are moving to an Islamic financial model that\u27s comply with the Shari\u27a Law with little change to current conventional practices (reverse eningineer current business processes) to accommodate the market for Islamic finance. This study is an attempt to design and develop the business processes for the Islamic financial institutions\u27 (IFIs) products by investigating and collecting information through Islamic literature, surveys and interviews of experts in Islamic jurisprudence, regulators, academic and Islamic finance and banking practitioners. Then the findings will be assessed and evaluated using a Qur\u27anic Financial Corpus and use computational and analytical approaches to mine the Qur\u27an and the Hadith to find hidden knowledge on Islamic financial business processes. The knowledge acquired from this investigation will be translated into an Islamic financial process model to be adapted by Islamic and non-Islamic financial institutions. The outcome of this research will influence the future development, growth and diversification of Islamic financial services worldwide

    A recursive co-occurrence text mining of the quran to build corpora for islamic banking business processes

    Get PDF
    © 2019, Springer Nature Switzerland AG. As the holy Quran text is time and place based and has “blockchain” like-structure where stories are spread like pieces of puzzles and linked to each other among 6,236 verses from 114 chapters, we present a new recursive co-occurrence text mining algorithm to mine the Holly Quran to build corpora which can be further processed to develop Islamic banking business processes complying which Islamic Sharia’ law. First, we create a list containing all the business process action terms and their synonyms in Arabic. Then for each term, we run the recursive co-occurrence algorithm to parse the holy Quran and extract all verses that contain the business process action term and all the verses where the action term co-occurs with any other term in the list. The retrieved verses along their chapter number and their verse number are saved and then compiled into business process corpora using. The resulting business processes could further be processed to generate Islamic Business processes that comply with Islamic Sharia Law

    Cloud-based Lineament Extraction of Topographic Lineaments from NASA Shuttle Radar Topography Mission Data

    Get PDF
    © 2016 The Authors. This paper presents initial results of a JavaTM based, feature extraction tool, which represents a standard implementation of a hill-shading algorithm that transforms a 2D image to pseudo 3D image to enhance edge contrast in combination with an edge detection Canny algorithm that performs segmentation to produce multidirectional sun-shaded images and their edges. Our goal is to firstly automate this processes in JavaTM to obtain multidirectional optimization of edge discovery and secondly scale this algorithm to the complete SRTM raster collection at multiple pixel resolutions to document the distribution of Earth topographic discontinuities from continental to regional and local scales, respectively on the order of 1000s, 100s and 10s of kilometers. This tool will support the automatic extraction of lineaments of the transformed images to predict the existence of linear features that can be often found in association with ore deposits and landslides, if they represent tectonic lineaments. The collection of processed big data, represents a multi-scale data repository that may find use for these and other geological and environmental applications. We present preliminary outputs from a case study conducted in the Flin-Flon greenstone belt in Canada, which is well known for its base-metal endowment. In this study, two main shaded relief images with multidirectional illumination were created in Java each with four azimuth angles of the light sources and from which our developed tool extracts automatically multiple lineaments. The extracted lineaments represent both positive and negative elevation breaks, due to sudden slope inversions identifying dominantly crest lines and valleys. Preliminary results show good agreement with drainage networks, mapped fault lines and orientations of structures measured in the field. The main trends of the extracted lineaments of both images are NW-SE, N-S, E-W and NE-SW

    Analyzing the Behavior of Autistic and Normal Developing Children Using Eye Tracking Data

    Get PDF
    © 2018, Springer Nature Singapore Pte Ltd. In this paper, we have utilized the eye tracking technology to analyze and compare the gaze pattern of autistic and normal developing children. We have used and combined different stimuli (banana, tomato, football and a child’s face). Within the child’s face we have defined two areas of interest (AOI) namely: face-eyes and face-mouth. Various metrics are used to analyze the difference in behavior between the two groups. The findings provide results to the non-typical ways in which autistic children look at different objects and in particular, the face
    corecore