Skip to main content
The inherent dynamical in grid computing has made it extremely difficult to come up with near-optimal solutions to efficiently schedule tasks in grids. Task Scheduling plays crucial role in Grid computing. It is a challenge-able issue... more
    • by  and +1
    •   54  
      BioinformaticsGrid ComputingQuantum ComputingArtificial Intelligence
"Networks are mathematically directed (in practical applications also undirected) graphs and a graph is a one-dimensional abstract complex, i.e., a topological space. Network theory focuses on various topological structures and... more
    • by  and +2
    •   204  
      BioinformaticsEvolutionary BiologyMathematicsOptimization (Mathematical Programming)
[Alexander Nizini] Agile methodologies - both in the context of product management and project management - have advantages, challenges, and uncertainties. Unlike the waterfall method, agile focuses on process efficiency and aims to... more
    • by 
    •   11  
      BusinessMarketingSoftware EngineeringProject Management
    • by 
    •   28  
      Software EngineeringSoftware Process Improvement and AssessmentMobile TechnologyOpen Source Software
    • by 
    •   4  
      Software EngineeringDesign PatternsSQL SERVERNET Software Development
    • by 
    •   343  
      Discourse AnalysisHistoryModern HistoryCultural History
    • by 
    •   28  
      Quantum ComputingArtificial IntelligenceInformation Systems (Business Informatics)Machine Learning
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   5  
      Software EngineeringNoSQLNET Software DevelopmentDomain Driven Design
The transformative global economy posed challenges to businesses in service management. In this computing age, the perceptual and operational edge of a certain business or organization manifested on the kind of technology it offers in the... more
    • by 
    •   16  
      Lean Software DevelopmentLean ManufacturingSoftware DevelopmentAspect Oriented Software Development
    • by 
    •   13  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Evaluating software quality is an important and essential issue in the development process because it helps to deliver a competitive software product. A decision of selecting the best software based on quality attributes is a type of... more
    • by 
    •   24  
      Computer ScienceSoftware EngineeringComputer EngineeringComputer Networks
To improve plant operation efficiency, an effort was embarked on to develop in-house software tools. Using the industrial data access standards, the software tools have the ability to transfer plant data for viewing, processing, storage... more
    • by 
    •   4  
      MySQLNET Software DevelopmentPower and Industrial ElectronicsOPC DA protocol
Airborne software is invisible and intangible, it can have a significant impact on the safety of the aircraft. However, it cannot be exhaustively tested, and can only be assured through a structured, process, activity, and objective-based... more
    • by 
    •   19  
      Software EngineeringSoftware Process Improvement and AssessmentOpen Source SoftwareSoftware Testing
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Business Process Re-engineering increases enterprise's chance to survive in competition among organizations , but failure rate among re-engineering efforts is high, so new methods that decrease failure, are needed, in this paper a... more
    • by  and +1
    •   23  
      Software EngineeringAristotleComputer NetworksSoftware Testing
"PURPOSE: To evaluate the accuracy of detecting cephalometric landmarks automatically by computer. MATERIALS AND METHODS: Digital image processing algorithms (edge-based and morphological) in addition to mathematical algorithms... more
    • by 
    •   180  
      Computer ScienceQuantum ComputingComputer GraphicsSoftware Engineering
    • by 
    •   20  
      Computer ScienceLean Software DevelopmentSoftware DevelopmentLife Cycle Assessment
    • by 
    •   20  
      Computer ScienceLean Software DevelopmentSoftware DevelopmentLife Cycle Assessment
This paper develops a prototyping technique for information systems security policies. Starting from the algebraic specification of a security policy, we derive an executable specification that represents a prototype of the actual policy.... more
    • by 
    •   34  
      Quantum ComputingArtificial IntelligencePhilosophy of MindLogic
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, a secure and computationally feasible Algorithm called Optimized Multiple Huffman Tables... more
    • by 
    •   16  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
This work is focused on a project that integrates the curriculum such as thermodynamic, chemical reactor engineering, linear algebra, differential equations and computer programming. The purpose is that students implement the most... more
    • by  and +2
    •   32  
      Software SecuritySoftware Process Improvement and AssessmentSoftware TestingAgile Software Process Improvement
    • by 
    •   2  
      Database SystemsNET Software Development
The proliferation of multimedia encryption techniques allows securing various applications including tele-browsing and visio-conferencing. However, these techniques may also constitute useful tools for malicious users to transmit... more
    • by 
    •   82  
      Quantum ComputingArtificial IntelligencePolitical EconomyImage Processing
Keywords: Windows Xp, arabic, keyboard, cell, acronyms, wizard
ويندوز إيكسبي، ويندوز إكس بي بالعربية، لوحة المفاتيح مفتاح تعديل، ثبات المفاتيح،
خلية، معالج،أحرف، مركز التعليمات والدعم،
    • by 
    •   90  
      Discourse AnalysisComputer ScienceAlgorithmsOperating Systems
Information technology (IT) organizations are increasing the use of agile practices, which are based on a people-centred culture alongside the software development process. Thus, it is vital to understand the social and human factors of... more
    • by 
    •   17  
      Lean Software DevelopmentHuman FactorsMaritime Human FactorsSoftware Development
There is a lack of formal risk management technique s in agile software development methods Scrum. The need to manage risks in agile project managemen t is also identified by various authors. Authors conducted a survey to find out the... more
    • by 
    •   23  
      Computer ScienceSoftware EngineeringHuman Computer InteractionComputer Vision
    • by 
    •   12  
      Quantum ComputingArtificial IntelligenceWireless CommunicationsNetwork Security
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   20  
      Information SystemsParallel ComputingLean Software DevelopmentOpen Source Software
With the increasing popularity of Agile Methods, many software organisations are moving away from traditional methods to adopt Agile development methodologies. Instead of being predictive, Agile is rather adaptive and people-focussed. It... more
    • by 
    •   19  
      Software EngineeringLean Software DevelopmentSoftware DevelopmentSoftware Engineering education
In recent past every discipline and every industry have their own methods of developing products. It may be software development, mechanics, construction, psychology and so on. These demarcations work fine as long as the requirements are... more
    • by 
    •   20  
      Lean Software DevelopmentSoftware DevelopmentWeb ServicesLife Cycle Assessment
    • by 
    •   13  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   17  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
What programming language is used for Block chain? Blockchain Technology has been regarded as a revolution ever since its inception. The term first came into existence in 2008 when its inventors, Satoshi Nakamoto devised the technology... more
    • by 
    •   4  
      Software DevelopmentGlobal Software DevelopmentSoftware BusinessNET Software Development
I'm searching for new opportunity, here is my CV if any one can help I appreciate that......Many Thanks
    • by 
    • NET Software Development
    • by 
    •   17  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   17  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   17  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   20  
      Software EngineeringAristotleSoftware TestingSoft Computing
Although initially designed for co-located teams, agile methodologies promise mitigation to the challenges present in distributed software development with their demand for frequent communication. We examine the application of agile... more
    • by 
    •   14  
      Computer ScienceSoftware EngineeringInformation TechnologyResearch Design
Integration testing is one the important phase in software testing life cycle (STLC). With the fast growth of internet and web services, web-based applications are also growing rapidly and their importance and complexity is also... more
    • by 
    •   13  
      Software DevelopmentLife Cycle AssessmentLife Cycle CostingAspect Oriented Software Development
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum... more
    • by 
    •   13  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
This paper proposes a chaotic encryption scheme for image data transmission and multimedia communication. To this end, we first extend the definition of the well-known Arnold 2-D chaotic map to the four-dimensional context. We demonstrate... more
    • by 
    •   38  
      Quantum ComputingArtificial IntelligenceCommunicationNetwork Security
The main role of Security Risk Analysis (SRA) is to identify the relevant vulnerabilities in order to put the organization in a better position to manage the faced uncertainties. In fact, SRA is achieved by a team of different experts. In... more
    • by 
    •   47  
      Quantum ComputingArtificial IntelligenceQuality ManagementData Mining
This paper presents the computer timing mechanism and its relationship with the packet transmission delay at the protocol stack. The experiment platform uses two general purpose personal computers connected directly via a network... more
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
    • by 
    •   20  
      Computer ScienceLean Software DevelopmentSoftware DevelopmentLife Cycle Assessment