Sakinah Ali Pitchay
Sakinah Ali Pitchay
Associate Professor of Information Security Assurance, Universiti Sains Islam Malaysia
Verified email at - Homepage
Cited by
Cited by
Text steganography using extensions Kashida based on the moon and sun letters concept
AA Shaker, F Ridzuan, SA Pitchay
international journal of advanced computer science and applications, 2017
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing
SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi
17th UKSIM-AMSS International Conference on Modelling and Simulation, 2015
A Review of Skew Detection Techniques for Document
ALK Arwa, SA Pitchay, M Al-qudah
17th UKSIM-AMSS International Conference on Modelling and Simulation, 316-321, 2015
Significance of Parameters in Genetic Algorithm, the Strengths, Its Limitations and Challenges in Image Recovery
SM Shorman, SA Pitchay
Advancement in Information Technology International Conference (ADVCIT), 2014
Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran
FN MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan
International Journal of Engineering & Technology 7 (15), 69-74, 2018
Single-frame image recovery using a Pearson type VII MRF
A Kabán, SA Pitchay
Neurocomputing 80, 111-118, 2012
Intelligent Automation and Systems Engineering
SI Ao, M Amouzegar, BB Rieger
Springer Science & Business Media, 2011
Geo-Covid: Movement Monitoring Based on Geo-Fence Framework for Covid-19 Pandemic Crisis
SAPMS Murtadha Arif Bin Sahbudin
Advances in Mathematics: Scientific Journal 9 (Special Issue on ICCEMS …, 2020
A Review of Rain Streaks Detection and Removal Techniques for Outdoor Single Image
SM Shorman, SA Pitchay
International Conference on Telecommunication, Electronic and Computer …, 2015
Implementing location-based cryptography on mobile application design to secure data in cloud storage
NSM Shamsuddin, SA Pitchay
Journal of Physics: Conference Series 1551 (1), 012008, 2020
Transformative Cyber Security Model for Malaysian Government Agencies
SAPSHA Sundresan Perumal, Ganthan Narayana Samy, Bharanidharan Shanmugam ...
International Journal of Engineering & Technology 7 (15), 87-92, 2018
A Systematic Review Analysis for Quran Verses Retrieval
FR Muhammad Afifi Mohamad Safee, Madihah Mohd Saudi, Sakinah Ali Pitchay
Journal of Engineering and Applied Sciences 100 (3), 629-634, 2016
Compound Binarization for Degraded Document Images
AM AL-Khatatneh, SA Pitchay, MK Al-qudah
Advancement in Information Technology International Conference (ADVCIT), 2014
Android mobile malware classification using a tokenization approach
IN Ahmad, F Ridzuan, MM Saudi, SA Pitchay, N Basir, NF Nabila
The World Congress on Engineering and Computer Science, 271-285, 2017
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
MM Saudi, F Ridzuan, N Basir, NF Nabila, SA Pitchay, IN Ahmad
17th UKSIM-AMSS International Conference on Modelling and Simulation, 176-181, 2015
Single-frame Signal Recovery using a Similarity-prior based on Pearson Type VII MRF.
SA Pitchay, A Kabán
ICPRAM (1), 123-133, 2012
Location-Based Cryptographic Techniques for Data Protection
NS Mohd Shamsuddin, S Ali Pitchay
Malaysian Journal of Science, Health & Technology, 2019
A Review Analysis for Text Steganography
AA Shaker, FHM Ridzuan, SA Pitchay
Malaysian Journal of Science Health & Technology 2, 2018
Location-based Cryptographic Techniques: Its Protocols and Parameters
NSM Shamsuddin, SA Pitchay
RITA 2018,Lecture Notes in Mechanical Engineering, 79-86, 2018
Challenges of Applying Scrum Model and Knowledge Management for Software Product Management
BAA Ammourah, SA Pitchay
RITA 2018, Lecture Notes in Mechanical Engineering, 123-130, 2018
The system can't perform the operation now. Try again later.
Articles 1–20