Sakinah Ali Pitchay
Sakinah Ali Pitchay
Associate Professor of Information Security Assurance, Universiti Sains Islam Malaysia
Verified email at - Homepage
Cited by
Cited by
Text steganography using extensions Kashida based on the moon and sun letters concept
AA Shaker, F Ridzuan, SA Pitchay
international journal of advanced computer science and applications, 2017
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing
SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi
17th UKSIM-AMSS International Conference on Modelling and Simulation, 2015
Significance of Parameters in Genetic Algorithm, the Strengths, Its Limitations and Challenges in Image Recovery
SM Shorman, SA Pitchay
Advancement in Information Technology International Conference (ADVCIT), 2014
A Review of Skew Detection Techniques for Document
ALK Arwa, SA Pitchay, M Al-qudah
17th UKSIM-AMSS International Conference on Modelling and Simulation, 316-321, 2015
Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran
FN MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan
International Journal of Engineering & Technology 7 (15), 69-74, 2018
Single-frame image recovery using a Pearson type VII MRF
A Kabán, SA Pitchay
Neurocomputing 80, 111-118, 2012
Intelligent Automation and Systems Engineering
SI Ao, M Amouzegar, BB Rieger
Springer Science & Business Media, 2011
Implementing location-based cryptography on mobile application design to secure data in cloud storage
NSM Shamsuddin, SA Pitchay
Journal of Physics: Conference Series 1551 (1), 012008, 2020
A Review of Rain Streaks Detection and Removal Techniques for Outdoor Single Image
SM Shorman, SA Pitchay
International Conference on Telecommunication, Electronic and Computer …, 2015
Geo-Covid: Movement Monitoring Based on Geo-Fence Framework for Covid-19 Pandemic Crisis
AP Murtadha Arif Bin Sahbudin, M Sakinah, Scarpa
Advances in Mathematics: Scientific Journal 9 (Special Issue on ICCEMS …, 2020
A Systematic Review Analysis for Quran Verses Retrieval
FR Muhammad Afifi Mohamad Safee, Madihah Mohd Saudi, Sakinah Ali Pitchay
Journal of Engineering and Applied Sciences 100 (3), 629-634, 2016
A review of skew detection techniques for document. In 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim)
A Al-Khatatneh, SA Pitchay, M Al-qudah
IEEE, March, 2015
Transformative Cyber Security Model for Malaysian Government Agencies
SAPSHA Sundresan Perumal, Ganthan Narayana Samy, Bharanidharan Shanmugam ...
International Journal of Engineering & Technology 7 (15), 87-92, 2018
Compound Binarization for Degraded Document Images
AM AL-Khatatneh, SA Pitchay, MK Al-qudah
Advancement in Information Technology International Conference (ADVCIT), 2014
Android mobile malware classification using a tokenization approach
IN Ahmad, F Ridzuan, MM Saudi, SA Pitchay, N Basir, NF Nabila
Transactions on Engineering Technologies: World Congress on Engineering and …, 2019
Retrieval Performance for USIM's Quranic Search Engine
FRSAP Nurlida Basir, NF Nabila, Nurzi Juana Mohd Zaizi, Madihah Mohd Saudi
International Journal of Engineering & Technology 7 (15), 126-129, 2018
Location-Based Cryptographic Techniques for Data Protection
NS Mohd Shamsuddin, S Ali Pitchay
Malaysian Journal of Science, Health & Technology, 2019
Location-based Cryptographic Techniques: Its Protocols and Parameters
NSM Shamsuddin, SA Pitchay
RITA 2018,Lecture Notes in Mechanical Engineering, 79-86, 2018
Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption
FRSP Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem
International Journal of Engineering & Technology 7 (15), 98-102, 2018
A new mobile malware classification for camera exploitation based on system call and permission
MM Saudi, LH Zahari, F Ridzuan, N Basir, SA Pitchay, NF Nabila
Lecture Notes in Engineering and Computer Science, 2017
The system can't perform the operation now. Try again later.
Articles 1–20