To search, Click below search items.
All Published Papers Search Service
Title
Providing secure service in the cloud environment by using machine learning algorithms and Using SVD
Author
Bahreini Kambiz and Arjmandy Khadijeh
Vol. 19 No. 5 pp. 48-52
Keywords
Cloud Computing, Security, Modeling, Optimization, Intrusion Detection.
Switching behavior in mobile phone sector: The case of mobile number portability in Morocco
Ahmed Kensi, Hafid Barka, Nasr Hajji
Vol. 19 No. 5 pp. 53-61
mobile number portability, switching behavior, telecommunication service in Morocco, perception, competition.
Factors Contributing in Failures of Software Projects
Muhammad Hamid, Furkh Zeshan, Adnan Ahmad and Esma Aimeur
Vol. 19 No. 5 pp. 62-77
Software project management, Software development, Software failure factors
A connected graph with non-concurrent Longest Cycles
Abdul Hameed Junejo, Abdul Naem Kalhoro, Inayatullah soomro, Israr Ahmed, Raza Muhammad, Imdad Ali Jokhio, Rozina Chohan
Vol. 19 No. 5 pp. 78-80
C_i^j, C ?_i^j, P_i^j Hamiltonian cycle longest cycle Hypo-traceable Hypo-Hamiltonian Gallai¡¯s property