Keyword Index

A

  • Agile process ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
  • Arabic Natural Language Processing Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Arabic Text Mining Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]

B

  • Boolean Operation Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]

C

  • Chinese Remainder Theorem A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Cryptography A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Cryptography Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]

D

  • Database Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Data mining Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]

E

  • ERP implementation approaches ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
  • ERP life cycle ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]

F

  • Fax Machine Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]

I

  • Image enhancement Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
  • Indexing Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Information Retrieval Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]

L

  • Legacy system ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]

M

  • Multimedia A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]

O

  • OCR Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]

P

  • Probabilistic Encryption A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Public-key A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]

Q

  • Quadratic Residues A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]

R

S

  • Software Engineering ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
  • Steganography A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]