Visualizing sharia law: an information retrieval approach based on key extraction algorithm

Document Type : Research Paper

Authors

1 Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Melaka Kampus Jasin, Melaka, Malaysia

2 Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia

3 Department of Computer Science Education, Universitas Pendidikan Indonesia, Bandung, Indonesia

4 Faculty of Social Sciences and Humanities, Universiti Teknologi Malaysia, Skudai, Johor Malaysia

Abstract

Islamic jurisprudence as it relates to every element of Muslim life that founds in Sharia. Many interpretations exist for Sharia, all based on differing Islamic schools of thought and multiple laws concerning Sharia. In Malaysia, there are 135 sections of Sharia law related to family and marriage in Act 303. The survey conducted proves that Malaysians struggled when looking for sharia law and took a toll of time. Therefore, we propose a web-based Sharia Law Finder (SLF) system that solves the sharia law’s information retrieval issues in Malaysia. The SLF adapted the key extraction (KE) algorithm, which is Term Frequency-Inverse Document Frequency (TF-IDF), and Rapid Automatic Keyword Extraction (RAKE). The testing for implementation of both algorithm effectiveness is using the functional and usability test. The solution enhances using visualization tools which are bubble charts and word cloud. Bubble charts visualize the related Sharia law based on users’ queries and word cloud to visualize keywords used by the users. A total of 30 respondents have tested the functionality and usability of SLF. As a result, the system successfully works as specified functionality, 96.58% for the System Usability Scale, indicating the proposed solution’s acceptance.

Keywords

[1] Z. Abbasiantaeb and S. Momtazi, Text-based question answering from information retrieval and deep neural
network perspectives: A survey, 2021.
[2] Y. Ai, R. Gerling, M. Neumann, C. Nitschke, and P. Riehmann, TIRA: text based information retrieval architecture, in 2nd International Workshop on Text-Based Information Retrieval (TIR), (2005) 67–75.
[3] M. T. Artese and I. Gagliardi, What is this painting about? experiments on unsupervised keyphrases extraction
algorithms, IOP Conference Series: Materials Science and Engineering, 364 (2018) 1–8.
[4] Y. Auf, Islam and sharia law: Historical, constitutional, and political context in Egypt, 2016.
[5] V. Balakrishnan and L. Ethel, Stemming and lemmatization: a comparison of retrieval performances, Lecture
Notes on Software Engineering, 2 (3) (2014) 262–267.
[6] P. Bafna, P. Dhanya, and A. Vaidya, Document clustering: TF-IDF approach, in International Conference on
Electrical, Electronics, and Optimization Techniques (ICEEOT), (2016) 61–66.
[7] M. W. Berry and J. Kogan, Text mining: applications and theory. Wiley, 2010.[8] C. Biancalana, F. Gasparetti, A. Micarelli, and G. Sansonetti, Social semantic query expansion, in ACM Transactions on Intelligent Systems and Technology, (2013) 1–43.
[9] R. Campos, V. Mangaravite, A. Pasquali, A. M. Jorge, C. Nunes, and A. Jatowt, Yake! collection-independent
automatic keyword extractor, in European Conference on Information Retrieval, (2018) 806–810.
[10] R. K. Das and A. Jadab, Patterns of information seeking behaviour of law students in digital environment: a
study, Journal of Information Science Theory and Practice, 5 (1)(2017) 15–25.
[11] A. Doko, M. Stula, and L. ˇ Seri´c, ˇ Improved sentence retrieval using local context and sentence length, Information
Processing & Management, 49 (6)(2013) 1301–1312.
[12] M. Ebrahimi, Islamic identity, ethical principles and human values, European Journal of Multidisciplinary Studies, 2 (6) (2017) 325–336.
[13] M. Erritali, Information retrieval: Textual indexing using an oriented object database, Indonesian Journal of
Electrical Engineering and Computer Science, 2 (1) (2016) 205–214.
[14] R. T. Fern´andez and D. E. Losada, Effective sentence retrieval based on query-independent evidence, Information
Processing & Management, 48 (6)(2012) 1203–1229.
[15] S. Ganiger and K. M. M. Rajashekharaiah, Comparative study on keyword extraction algorithms for single extractive document, in Second International Conference on Intelligent Computing and Control Systems (ICICCS),
(2018) 1284–1287.
[16] H. Gulam, The application of shariah (islamic law) in some different countries and its implications, Jurnal
Syariah, 24 (2)(2016) 321–340.
[17] H. Gulam, Comparing the legal rules (ahkam-i shariah) in the maliki and shafii schools with the hanafi school of
thought, Jurnal Ilmiah Islam Futura, 16 (1) (2017) 1–8.
[18] H. M. Hasan, F. Sanyal, D. Chaki, and M. H. Ali, An empirical study of important keyword extraction techniques
from documents,” in 1st International Conference on Intelligent Systems and Information Management (ICISIM),
(2017) 91–94.
[19] H. M. M. Hasan, F. Sanyal, and D. Chaki, A novel approach to extract important keywords from documents
applying latent semantic analysis, in 10th International Conference on Knowledge and Smart Technology (KST),
(2018) 117–122.
[20] W. Jingjing, Improving product-related patent information access with automated technology ontology extraction,
National University of Singapore, 2013.
[21] T. Johnson and M. A. Sergie, Islam: governing under sharia, 2014.
[22] R.G. Juan and M.-G. Luc´ıa, A text mining-based approach for analyzing information retrieval in Spanish: music
data collection as a case study, in International Symposium on Distributed Computing and Artificial Intelligence,
(2018) 259–266.
[23] W. Khairuldin, W. Anas, and A. H. Embong, The binding of laws to personal opinion of muftis in Malaysia,
Sciences, Journal of Academic Research in Business and Social, 8 (11) (2018) 522–529.
[24] S. Lahiri, Keywords at work: investigating keyword extraction in social media applications, University of Michigan,
2018.
[25] F. Liu, D. Pennell, F. Liu, and Y. Liu, Unsupervised approaches for automatic keyword extraction using meeting
transcripts, in Human Language Technologies: The 2009 Annual Conference of the North American Chapter of
the ACL, (2009) 620–628.
[26] E. L. Lydia, P. K. Kumar, K. Shankar, S. K. Lakshmanaprabu, R. M. Vidhyavathi, and A. Maseleno, Charismatic document clustering through novel K-Means non-negative matrix factorization (KNMF) algorithm using
key phrase extraction, International Journal of Parallel Programming, 48 (3) (2020) 496–514.
[27] M. Mol et al., Dimensionality of the system usability scale among professionals using internet-based interventions
for depression: A confirmatory factor analysis, BMC Psychiatry, 20 (1) (2020) 1–10.
[28] N. Moratanch and C. Gopalan, A survey on extractive text summarization, in International Conference on Computer, Communication and Signal Processing (ICCCSP), (2017) 1–6.
[29] M. K. Muhammed and M. M. Ali, The shariah and law: An analysis, International Journal of Law, Government
and Communication, 2 (5) (2017) 48–64.
[30] D. L. Nkweteyim, Data structures for information retrieval, in IST-Africa Conference Proceedings, (2014) 1–8.
[31] S. Qaiser and R. Ali, Text mining: use of TF-IDF to examine the relevance of words to documents, International
Journal of Computer Applications, 181 (1) (2018) 25–29.
[32] K. A. F. A. Samah, N. F. S. Norhisam, S. F. A. Fesol, and R. Aminuddin, TF-IDF and data visualization for
syafie Madhhab hadith scriptures uuthenticity, in 11th IEEE Symposium on Computer Applications & Industrial
Electronics (ISCAIE), (2021) 65–70.
[33] R. Sandberg and S. Thompson, The sharia law debate: The missing family law context., Law and Justice, 177(2016) 181–192.
[34] S. Siddiqi and A. Sharan, Keyword and keyphrase extraction techniques: a literature review, International Journal
of Computer Applications, 109 (2) (2015) 18–23.
[35] P. Thalib, Distinction of characteristics sharia and fiqh on islamic law, Yuridika, 33 (3) (2018) 439–452.
[36] N. S. Tukiman and A. Ismail, Semantic-Based Information Retrieval for Java Learning Management System,
Australian Journal of Basic and Applied Sciences, 8 (1) (2014) 52–57.
[37] Z. Wu, S. Shen, X. Lian, X. Su, and E. Chen, A dummy-based user privacy protection approach for text information
retrieval, Knowledge-Based Systems, 195 (2020) 1–13.
Volume 12, Special Issue
December 2021
Pages 981-996
  • Receive Date: 24 June 2021
  • Accept Date: 07 September 2021