[1] Z. Abbasiantaeb and S. Momtazi, Text-based question answering from information retrieval and deep neural
network perspectives: A survey, 2021.
[2] Y. Ai, R. Gerling, M. Neumann, C. Nitschke, and P. Riehmann, TIRA: text based information retrieval architecture, in 2nd International Workshop on Text-Based Information Retrieval (TIR), (2005) 67–75.
[3] M. T. Artese and I. Gagliardi, What is this painting about? experiments on unsupervised keyphrases extraction
algorithms, IOP Conference Series: Materials Science and Engineering, 364 (2018) 1–8.
[4] Y. Auf, Islam and sharia law: Historical, constitutional, and political context in Egypt, 2016.
[5] V. Balakrishnan and L. Ethel, Stemming and lemmatization: a comparison of retrieval performances, Lecture
Notes on Software Engineering, 2 (3) (2014) 262–267.
[6] P. Bafna, P. Dhanya, and A. Vaidya, Document clustering: TF-IDF approach, in International Conference on
Electrical, Electronics, and Optimization Techniques (ICEEOT), (2016) 61–66.
[7] M. W. Berry and J. Kogan, Text mining: applications and theory. Wiley, 2010.[8] C. Biancalana, F. Gasparetti, A. Micarelli, and G. Sansonetti, Social semantic query expansion, in ACM Transactions on Intelligent Systems and Technology, (2013) 1–43.
[9] R. Campos, V. Mangaravite, A. Pasquali, A. M. Jorge, C. Nunes, and A. Jatowt, Yake! collection-independent
automatic keyword extractor, in European Conference on Information Retrieval, (2018) 806–810.
[10] R. K. Das and A. Jadab, Patterns of information seeking behaviour of law students in digital environment: a
study, Journal of Information Science Theory and Practice, 5 (1)(2017) 15–25.
[11] A. Doko, M. Stula, and L. ˇ Seri´c, ˇ Improved sentence retrieval using local context and sentence length, Information
Processing & Management, 49 (6)(2013) 1301–1312.
[12] M. Ebrahimi, Islamic identity, ethical principles and human values, European Journal of Multidisciplinary Studies, 2 (6) (2017) 325–336.
[13] M. Erritali, Information retrieval: Textual indexing using an oriented object database, Indonesian Journal of
Electrical Engineering and Computer Science, 2 (1) (2016) 205–214.
[14] R. T. Fern´andez and D. E. Losada, Effective sentence retrieval based on query-independent evidence, Information
Processing & Management, 48 (6)(2012) 1203–1229.
[15] S. Ganiger and K. M. M. Rajashekharaiah, Comparative study on keyword extraction algorithms for single extractive document, in Second International Conference on Intelligent Computing and Control Systems (ICICCS),
(2018) 1284–1287.
[16] H. Gulam, The application of shariah (islamic law) in some different countries and its implications, Jurnal
Syariah, 24 (2)(2016) 321–340.
[17] H. Gulam, Comparing the legal rules (ahkam-i shariah) in the maliki and shafii schools with the hanafi school of
thought, Jurnal Ilmiah Islam Futura, 16 (1) (2017) 1–8.
[18] H. M. Hasan, F. Sanyal, D. Chaki, and M. H. Ali, An empirical study of important keyword extraction techniques
from documents,” in 1st International Conference on Intelligent Systems and Information Management (ICISIM),
(2017) 91–94.
[19] H. M. M. Hasan, F. Sanyal, and D. Chaki, A novel approach to extract important keywords from documents
applying latent semantic analysis, in 10th International Conference on Knowledge and Smart Technology (KST),
(2018) 117–122.
[20] W. Jingjing, Improving product-related patent information access with automated technology ontology extraction,
National University of Singapore, 2013.
[21] T. Johnson and M. A. Sergie, Islam: governing under sharia, 2014.
[22] R.G. Juan and M.-G. Luc´ıa, A text mining-based approach for analyzing information retrieval in Spanish: music
data collection as a case study, in International Symposium on Distributed Computing and Artificial Intelligence,
(2018) 259–266.
[23] W. Khairuldin, W. Anas, and A. H. Embong, The binding of laws to personal opinion of muftis in Malaysia,
Sciences, Journal of Academic Research in Business and Social, 8 (11) (2018) 522–529.
[24] S. Lahiri, Keywords at work: investigating keyword extraction in social media applications, University of Michigan,
2018.
[25] F. Liu, D. Pennell, F. Liu, and Y. Liu, Unsupervised approaches for automatic keyword extraction using meeting
transcripts, in Human Language Technologies: The 2009 Annual Conference of the North American Chapter of
the ACL, (2009) 620–628.
[26] E. L. Lydia, P. K. Kumar, K. Shankar, S. K. Lakshmanaprabu, R. M. Vidhyavathi, and A. Maseleno, Charismatic document clustering through novel K-Means non-negative matrix factorization (KNMF) algorithm using
key phrase extraction, International Journal of Parallel Programming, 48 (3) (2020) 496–514.
[27] M. Mol et al., Dimensionality of the system usability scale among professionals using internet-based interventions
for depression: A confirmatory factor analysis, BMC Psychiatry, 20 (1) (2020) 1–10.
[28] N. Moratanch and C. Gopalan, A survey on extractive text summarization, in International Conference on Computer, Communication and Signal Processing (ICCCSP), (2017) 1–6.
[29] M. K. Muhammed and M. M. Ali, The shariah and law: An analysis, International Journal of Law, Government
and Communication, 2 (5) (2017) 48–64.
[30] D. L. Nkweteyim, Data structures for information retrieval, in IST-Africa Conference Proceedings, (2014) 1–8.
[31] S. Qaiser and R. Ali, Text mining: use of TF-IDF to examine the relevance of words to documents, International
Journal of Computer Applications, 181 (1) (2018) 25–29.
[32] K. A. F. A. Samah, N. F. S. Norhisam, S. F. A. Fesol, and R. Aminuddin, TF-IDF and data visualization for
syafie Madhhab hadith scriptures uuthenticity, in 11th IEEE Symposium on Computer Applications & Industrial
Electronics (ISCAIE), (2021) 65–70.
[33] R. Sandberg and S. Thompson, The sharia law debate: The missing family law context., Law and Justice, 177(2016) 181–192.
[34] S. Siddiqi and A. Sharan, Keyword and keyphrase extraction techniques: a literature review, International Journal
of Computer Applications, 109 (2) (2015) 18–23.
[35] P. Thalib, Distinction of characteristics sharia and fiqh on islamic law, Yuridika, 33 (3) (2018) 439–452.
[36] N. S. Tukiman and A. Ismail, Semantic-Based Information Retrieval for Java Learning Management System,
Australian Journal of Basic and Applied Sciences, 8 (1) (2014) 52–57.
[37] Z. Wu, S. Shen, X. Lian, X. Su, and E. Chen, A dummy-based user privacy protection approach for text information
retrieval, Knowledge-Based Systems, 195 (2020) 1–13.