An Islamic Distributed Information Retrieval Approach

An Islamic Distributed Information Retrieval Approach

Falah Hassan Ali Al-akashi
Copyright: © 2020 |Volume: 12 |Issue: 3 |Pages: 17
ISSN: 1942-9045|EISSN: 1942-9037|EISBN13: 9781799806110|DOI: 10.4018/IJSSCI.2020070104
Cite Article Cite Article

MLA

Falah Hassan Ali Al-akashi. "An Islamic Distributed Information Retrieval Approach." IJSSCI vol.12, no.3 2020: pp.38-54. http://doi.org/10.4018/IJSSCI.2020070104

APA

Falah Hassan Ali Al-akashi. (2020). An Islamic Distributed Information Retrieval Approach. International Journal of Software Science and Computational Intelligence (IJSSCI), 12(3), 38-54. http://doi.org/10.4018/IJSSCI.2020070104

Chicago

Falah Hassan Ali Al-akashi. "An Islamic Distributed Information Retrieval Approach," International Journal of Software Science and Computational Intelligence (IJSSCI) 12, no.3: 38-54. http://doi.org/10.4018/IJSSCI.2020070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The majority of Islamic and Muslim related search engines fail due to non-profit and content filtering issues due to explicit adult, hateful, and harmful content from Muslim perspectives are not addressed. While this is a crucial and noble initiative, it is controversial because it does not deal with all the needs of Muslim demography, including trustworthiness and aspects of life rather than Islam and religion. Custom search engines employ automatic REST API capability to provide results, and this can cause systemic engagement and compromises with their partners to search for and filter output results to cater customer needs. In reality though, this type of approach usually works with a small number of searches, it cannot be commercialized to serve a massive target audience of 1.8 billion Muslims around the world. To overcome this, the authors propose a novel information retrieval approach that uses homogeneous Islamic content available in distributed selective resources over the Internet to meet all Muslim needs. A difficult engagement algorithm is used to compromise highly relevant resources. Promising results were achieved with the proposed mutual approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.