NET Software Development
13,521 Followers
Recent papers in NET Software Development
[Alexander Nizini] Agile methodologies - both in the context of product management and project management - have advantages, challenges, and uncertainties. Unlike the waterfall method, agile focuses on process efficiency and aims to... more
The transformative global economy posed challenges to businesses in service management. In this computing age, the perceptual and operational edge of a certain business or organization manifested on the kind of technology it offers in the... more
Evaluating software quality is an important and essential issue in the development process because it helps to deliver a competitive software product. A decision of selecting the best software based on quality attributes is a type of... more
To improve plant operation efficiency, an effort was embarked on to develop in-house software tools. Using the industrial data access standards, the software tools have the ability to transfer plant data for viewing, processing, storage... more
Airborne software is invisible and intangible, it can have a significant impact on the safety of the aircraft. However, it cannot be exhaustively tested, and can only be assured through a structured, process, activity, and objective-based... more
"PURPOSE: To evaluate the accuracy of detecting cephalometric landmarks automatically by computer. MATERIALS AND METHODS: Digital image processing algorithms (edge-based and morphological) in addition to mathematical algorithms... more
This paper develops a prototyping technique for information systems security policies. Starting from the algebraic specification of a security policy, we derive an executable specification that represents a prototype of the actual policy.... more
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, a secure and computationally feasible Algorithm called Optimized Multiple Huffman Tables... more
The proliferation of multimedia encryption techniques allows securing various applications including tele-browsing and visio-conferencing. However, these techniques may also constitute useful tools for malicious users to transmit... more
Keywords: Windows Xp, arabic, keyboard, cell, acronyms, wizard
ويندوز إيكسبي، ويندوز إكس بي بالعربية، لوحة المفاتيح مفتاح تعديل، ثبات المفاتيح،
خلية، معالج،أحرف، مركز التعليمات والدعم،
ويندوز إيكسبي، ويندوز إكس بي بالعربية، لوحة المفاتيح مفتاح تعديل، ثبات المفاتيح،
خلية، معالج،أحرف، مركز التعليمات والدعم،
Information technology (IT) organizations are increasing the use of agile practices, which are based on a people-centred culture alongside the software development process. Thus, it is vital to understand the social and human factors of... more
There is a lack of formal risk management technique s in agile software development methods Scrum. The need to manage risks in agile project managemen t is also identified by various authors. Authors conducted a survey to find out the... more
With the increasing popularity of Agile Methods, many software organisations are moving away from traditional methods to adopt Agile development methodologies. Instead of being predictive, Agile is rather adaptive and people-focussed. It... more
In recent past every discipline and every industry have their own methods of developing products. It may be software development, mechanics, construction, psychology and so on. These demarcations work fine as long as the requirements are... more
What programming language is used for Block chain? Blockchain Technology has been regarded as a revolution ever since its inception. The term first came into existence in 2008 when its inventors, Satoshi Nakamoto devised the technology... more
I'm searching for new opportunity, here is my CV if any one can help I appreciate that......Many Thanks
Although initially designed for co-located teams, agile methodologies promise mitigation to the challenges present in distributed software development with their demand for frequent communication. We examine the application of agile... more
Integration testing is one the important phase in software testing life cycle (STLC). With the fast growth of internet and web services, web-based applications are also growing rapidly and their importance and complexity is also... more
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum... more
This paper proposes a chaotic encryption scheme for image data transmission and multimedia communication. To this end, we first extend the definition of the well-known Arnold 2-D chaotic map to the four-dimensional context. We demonstrate... more
The main role of Security Risk Analysis (SRA) is to identify the relevant vulnerabilities in order to put the organization in a better position to manage the faced uncertainties. In fact, SRA is achieved by a team of different experts. In... more
This paper presents the computer timing mechanism and its relationship with the packet transmission delay at the protocol stack. The experiment platform uses two general purpose personal computers connected directly via a network... more