A
-
Agile process
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
-
Arabic Natural Language Processing
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Arabic Text Mining
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
B
-
Boolean Operation
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
C
-
Chinese Remainder Theorem
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Cryptography
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Cryptography
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
D
-
Database
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Data mining
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
E
-
ERP implementation approaches
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
-
ERP life cycle
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
F
-
Fax Machine
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
I
-
Image enhancement
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
-
Indexing
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Information Retrieval
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
L
-
Legacy system
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
M
-
Multimedia
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
O
-
OCR
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
P
-
Probabilistic Encryption
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Public-key
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
Q
-
Quadratic Residues
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
S
-
Software Engineering
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
-
Steganography
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
Your query does not match with any item