Statistical techniques to serve quality of software
Within the rapid development of the recent computer-based applications; software quality becomes one of the critical issues to be considered. Software development is complex, costly, widely used and a core (heart) for critical and risky applications that have great affect on human life. Software t...
| Main Authors: | Hameed, Shihab A., AlJumaily, A. Asad, Ahmed, I. Mohammed, Daoud, Jamal Ibrahim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IDOSI Publication
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/29655/ http://irep.iium.edu.my/29655/1/9.pdf |
Similar Items
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Statistical techniques to serve quality of software
by: Shihab, A. Hameed, et al.
Published: (2012)
by: Shihab, A. Hameed, et al.
Published: (2012)
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013)
by: Khalifa, Othman Omran, et al.
Published: (2013)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Medical, healthcare, and emergency model : Mobile web to enhance patients’ facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Gateway sink placement for sensor node grid distribution in LoRa smart city networks
by: Zainal, Nur Aishah, et al.
Published: (2018)
by: Zainal, Nur Aishah, et al.
Published: (2018)
Plans for planar: phase-noise reduction techniques in voltage-controlled oscillators
by: Azam, S. M. Kayser, et al.
Published: (2019)
by: Azam, S. M. Kayser, et al.
Published: (2019)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
3D imaging techniques in documentation of cultural assets in Malaysia
by: Md. Sharif, Harlina, et al.
Published: (2015)
by: Md. Sharif, Harlina, et al.
Published: (2015)
An enhanced macro mobility management scheme in NEMO environment to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
A Review on energy consumption optimization techniques in IoT based smart building environments
by: Shah, Abdul Salam, et al.
Published: (2019)
by: Shah, Abdul Salam, et al.
Published: (2019)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework
by: Rind, M. Malook, et al.
Published: (2015)
by: Rind, M. Malook, et al.
Published: (2015)
Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan
by: Rind, M. M., et al.
Published: (2016)
by: Rind, M. M., et al.
Published: (2016)
CRF based feature extraction applied for supervised automatic text summarization
by: K. Batcha, Nowshath, et al.
Published: (2013)
by: K. Batcha, Nowshath, et al.
Published: (2013)
A novel wide-band dual function fiber amplifier
by: Hamida, Belal Ahmed, et al.
Published: (2011)
by: Hamida, Belal Ahmed, et al.
Published: (2011)
Quantum properties of the three-mode squeezed operator: triply concurrent parametric amplifiers
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
The design of a speech delay screening mobile application for Malaysian parents
by: Mohammed, Siti Asma, et al.
Published: (2019)
by: Mohammed, Siti Asma, et al.
Published: (2019)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
A review on optimization of vehicle frontal crashworthiness
for passenger safety
by: Ahmed Khatri, Naveed, et al.
Published: (2018)
by: Ahmed Khatri, Naveed, et al.
Published: (2018)
Interactive multi-media applications: quality of service
guaranteed under huge traffic
by: Yalli, Jameel, et al.
Published: (2014)
by: Yalli, Jameel, et al.
Published: (2014)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
A review of near field communication process: how do it works?
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Design and fabrication of POF/PCF based optical switch
for Local Area Network (LAN) system
by: Bhuiyan, Moinul, et al.
Published: (2014)
by: Bhuiyan, Moinul, et al.
Published: (2014)
The adoption of Knowledge Management Systems (KMS) among academicians in Nigeria universities
by: Salami, Ahmed, et al.
Published: (2019)
by: Salami, Ahmed, et al.
Published: (2019)
A linear atomic quantum coupler
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Similar Items
-
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2013) -
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2012) -
Statistical techniques to serve quality of software
by: Shihab, A. Hameed, et al.
Published: (2012) -
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013) -
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)