Text steganography using extensions Kashida based on the moon and sun letters concept AA Shaker, F Ridzuan, SA Pitchay international journal of advanced computer science and applications 8 (8), 2017 | 33 | 2017 |
Significance of Parameters in Genetic Algorithm, the Strengths, Its Limitations and Challenges in Image Recovery SM Shorman, SA Pitchay Advancement in Information Technology International Conference (ADVCIT), 2014 | 23 | 2014 |
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi 17th UKSIM-AMSS International Conference on Modelling and Simulation, 2015 | 22 | 2015 |
A Review of Skew Detection Techniques for Document ALK Arwa, SA Pitchay, M Al-qudah 17th UKSIM-AMSS International Conference on Modelling and Simulation, 316-321, 2015 | 21* | 2015 |
Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran FN MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan International Journal of Engineering & Technology 7 (15), 69-74, 2018 | 19 | 2018 |
Single-frame image recovery using a Pearson type VII MRF A Kabán, SA Pitchay Neurocomputing 80, 111-118, 2012 | 13 | 2012 |
Implementing location-based cryptography on mobile application design to secure data in cloud storage NSM Shamsuddin, SA Pitchay Journal of Physics: Conference Series 1551 (1), 012008, 2020 | 11 | 2020 |
Intelligent Automation and Systems Engineering SI Ao, M Amouzegar, BB Rieger Springer Science & Business Media, 2011 | 11 | 2011 |
Geo-Covid: Movement Monitoring Based on Geo-Fence Framework for Covid-19 Pandemic Crisis AP Murtadha Arif Bin Sahbudin, M Sakinah, Scarpa Advances in Mathematics: Scientific Journal 9 (Special Issue on ICCEMS …, 2020 | 9 | 2020 |
A review of skew detection techniques for document. In 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim) A Al-Khatatneh, SA Pitchay, M Al-qudah IEEE, March, 2015 | 9 | 2015 |
A Review of Rain Streaks Detection and Removal Techniques for Outdoor Single Image SM Shorman, SA Pitchay International Conference on Telecommunication, Electronic and Computer …, 2015 | 9 | 2015 |
A Systematic Review Analysis for Quran Verses Retrieval FR Muhammad Afifi Mohamad Safee, Madihah Mohd Saudi, Sakinah Ali Pitchay Journal of Engineering and Applied Sciences 100 (3), 629-634, 2016 | 8* | 2016 |
Transformative Cyber Security Model for Malaysian Government Agencies SAPSHA Sundresan Perumal, Ganthan Narayana Samy, Bharanidharan Shanmugam ... International Journal of Engineering & Technology 7 (15), 87-92, 2018 | 7* | 2018 |
Compound Binarization for Degraded Document Images AM AL-Khatatneh, SA Pitchay, MK Al-qudah Advancement in Information Technology International Conference (ADVCIT), 2014 | 7 | 2014 |
Android mobile malware classification using a tokenization approach IN Ahmad, F Ridzuan, MM Saudi, SA Pitchay, N Basir, NF Nabila Transactions on Engineering Technologies: World Congress on Engineering and …, 2019 | 6 | 2019 |
Retrieval Performance for USIM's Quranic Search Engine FRSAP Nurlida Basir, NF Nabila, Nurzi Juana Mohd Zaizi, Madihah Mohd Saudi International Journal of Engineering & Technology 7 (15), 126-129, 2018 | 5* | 2018 |
Location-Based Cryptographic Techniques for Data Protection NSM Shamsuddin, SA Pitchay Malaysian Journal of Science Health & Technology 4, 2019 | 4 | 2019 |
Location-based Cryptographic Techniques: Its Protocols and Parameters NSM Shamsuddin, SA Pitchay RITA 2018,Lecture Notes in Mechanical Engineering, 79-86, 2018 | 3 | 2018 |
Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption FRSP Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem International Journal of Engineering & Technology 7 (15), 98-102, 2018 | 3 | 2018 |
A new mobile malware classification for camera exploitation based on system call and permission MM Saudi, LH Zahari, F Ridzuan, N Basir, SA Pitchay, NF Nabila Proceedings of the World Congress on Engineering and Computer Science 1, 2017 | 3 | 2017 |