| Risk Management Framework for Cloud Computing : A Critical Review |
| Rana Alosaimi and Mohammad Alnuem, King Saud University, Saudi Arabia |
| Volume : 8 volume number : 4 pdf |
| Text Plagiarism Checker Using Friendship Graphs |
| Soumajit Adhya1 and S. K. Setua2, 1J. D. Birla Institute, India and 2University of Calcutta, India |
| Volume : 8 volume number : 4 pdf |
| The Vices of Social Media on Students Success at the Adamawa State Polytechnic, Yola - Nigeria |
| Oye, N. D and Ibrahim Inuwa, MAUTECH, Nigeria |
| Volume : 8 volume number : 4 pdf |
| Statistical Approach to Determine Most Efficient Value for Time Quantum in Round Robin Scheduling |
| Shreyank N Gowda, Indian Institute of Science, India |
| Volume : 8 volume number : 4 pdf |
| A Replicated Assessment of the Critical Success Factors for the Adoption of Mobile Government Services : The Case of Jordan |
| Yousef Elsheikh and Mohammad Hijjawi, Applied Science University, Jordan |
| Volume : 8 volume number : 4 pdf |
| Adaptive Watermarking Technique for Speech Signal Authentication |
| Methaq Talib Gaata and Refah Aamer Jaafar, University of Mustansiriyah, Iraq |
| Volume : 8 volume number : 4 pdf |
| Discoverability a New Learnability Principle for Childrens Application Software |
| Bethuel Kipchirchir Okelo1 and Samuel Mungai Mbuguah2, 1Masinde Muliro University of Science and Technology, Kenya and 2Kibabii University, Kenya |
| Volume : 8 volume number : 4 pdf |