Text steganography using extensions Kashida based on the moon and sun letters concept AA Shaker, F Ridzuan, SA Pitchay international journal of advanced computer science and applications, 2017 | 19 | 2017 |
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi 17th UKSIM-AMSS International Conference on Modelling and Simulation, 2015 | 18 | 2015 |
A Review of Skew Detection Techniques for Document ALK Arwa, SA Pitchay, M Al-qudah 17th UKSIM-AMSS International Conference on Modelling and Simulation, 316-321, 2015 | 17* | 2015 |
Significance of Parameters in Genetic Algorithm, the Strengths, Its Limitations and Challenges in Image Recovery SM Shorman, SA Pitchay Advancement in Information Technology International Conference (ADVCIT), 2014 | 16 | 2014 |
Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran FN MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan International Journal of Engineering & Technology 7 (15), 69-74, 2018 | 12* | 2018 |
Single-frame image recovery using a Pearson type VII MRF A Kabán, SA Pitchay Neurocomputing 80, 111-118, 2012 | 11 | 2012 |
Intelligent Automation and Systems Engineering SI Ao, M Amouzegar, BB Rieger Springer Science & Business Media, 2011 | 8 | 2011 |
Geo-Covid: Movement Monitoring Based on Geo-Fence Framework for Covid-19 Pandemic Crisis SAPMS Murtadha Arif Bin Sahbudin Advances in Mathematics: Scientific Journal 9 (Special Issue on ICCEMS …, 2020 | 7 | 2020 |
A Review of Rain Streaks Detection and Removal Techniques for Outdoor Single Image SM Shorman, SA Pitchay International Conference on Telecommunication, Electronic and Computer …, 2015 | 7 | 2015 |
Implementing location-based cryptography on mobile application design to secure data in cloud storage NSM Shamsuddin, SA Pitchay Journal of Physics: Conference Series 1551 (1), 012008, 2020 | 6 | 2020 |
A Systematic Review Analysis for Quran Verses Retrieval FR Muhammad Afifi Mohamad Safee, Madihah Mohd Saudi, Sakinah Ali Pitchay Journal of Engineering and Applied Sciences 100 (3), 629-634, 2016 | 6* | 2016 |
Compound Binarization for Degraded Document Images AM AL-Khatatneh, SA Pitchay, MK Al-qudah Advancement in Information Technology International Conference (ADVCIT), 2014 | 6 | 2014 |
Transformative Cyber Security Model for Malaysian Government Agencies SAPSHA Sundresan Perumal, Ganthan Narayana Samy, Bharanidharan Shanmugam ... International Journal of Engineering & Technology 7 (15), 87-92, 2018 | 5* | 2018 |
Android mobile malware classification using a tokenization approach IN Ahmad, F Ridzuan, MM Saudi, SA Pitchay, N Basir, NF Nabila The World Congress on Engineering and Computer Science, 271-285, 2017 | 4 | 2017 |
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept MM Saudi, F Ridzuan, N Basir, NF Nabila, SA Pitchay, IN Ahmad 17th UKSIM-AMSS International Conference on Modelling and Simulation, 176-181, 2015 | 3 | 2015 |
Single-frame Signal Recovery using a Similarity-prior based on Pearson Type VII MRF. SA Pitchay, A Kabán ICPRAM (1), 123-133, 2012 | 3 | 2012 |
Location-Based Cryptographic Techniques for Data Protection NS Mohd Shamsuddin, S Ali Pitchay Malaysian Journal of Science, Health & Technology, 2019 | 2 | 2019 |
Location-based Cryptographic Techniques: Its Protocols and Parameters NSM Shamsuddin, SA Pitchay RITA 2018,Lecture Notes in Mechanical Engineering, 79-86, 2018 | 2 | 2018 |
Challenges of Applying Scrum Model and Knowledge Management for Software Product Management BAA Ammourah, SA Pitchay RITA 2018, Lecture Notes in Mechanical Engineering, 123-130, 2018 | 2 | 2018 |
Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption FRSP Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem International Journal of Engineering & Technology 7 (15), 98-102, 2018 | 2* | 2018 |