Showing
1 - 8
results of
8
for search '
Ibrahim, Subariah
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Ibrahim, Subariah
Showing
1 - 8
results of
8
for search '
Ibrahim, Subariah
'
, query time: 0.08s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Adaptive image steganography based on optimal embedding and robust against chi-square attack
by
Zanganeh, Omid
,
Ibrahim
,
Subariah
Published 2011
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
2
A Review on Biological Inspired Computation in Cryptology
by
Ibrahim
,
Subariah
,
Maarof, Mohd Aizaini
Published 2005
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
3
Electronic Voting System: Preliminary Study
by
Ibrahim
,
Subariah
,
Salleh, Mazleena
,
Kamat, Maznah
Published 2000
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
4
Enhanced chaotic image encryption algorithm based on Baker's map
by
Salleh, Mazleena
,
Ibrahim
,
Subariah
,
lsnin, Fauz
Published 2003
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
5
Classification of aircraft images using different architectures of radial basis function neural network : a performance comparison
by
Saad, Puteh
,
Ibrahim
,
Subariah
,
Mahshos, Nur Safawati
Published 2008
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
6
New method to optimize initial point values of spatial fuzzy c-means algorithm
by
Tehrani, Iman Omidvar
,
Ibrahim
,
Subariah
,
Haron, Habib
Published 2015
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
7
Image encryption algorithm based on chaotic mapping
by
Salleh, Mazleena
,
Ibrahim
,
Subariah
,
Isnin, Ismail Fauzi
Published 2003
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
8
A steganography method based on hiding secrete data in Mpeg/audio layer III
by
Atoum, Mohammed Salem
,
Al Rababaa, Mamoun Suleiman
,
Ibrahim
,
Subariah
,
Abdulgader Ahmed, Osamah
Published 2011
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
QA75 Electronic computers. Computer science
QA76 Computer software
TK Electrical engineering. Electronics Nuclear engineering
Loading...