全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Muhammad Aamir , Muhammad Naeem Ahmed Khan
来源:[J].Sādhanā(IF 0.393), 2017, Vol.42 (7), pp.1051-1061
摘要:Scrum has become popular among the agile methodologies due to the substantial support that it provides to the project management teams. The scrum process delivers quick functionality in the form of sprints. Most of the quality assurance and quality control activities are skipped ...
作者:Muhammad Naeem Ahmed Khan
来源:[J].Computers & Security(IF 1.158), 2012, Vol.31 (4), pp.391-401
摘要:Abstract(#br)Precise comprehension of a file system state at any given time is vital for performing digital forensic analyses. To uncover evidence of the digital crime, the logical representation of file system activities helps reconstruct post-event timeline of the unauthorized ...
作者:Muhammad Naeem Ahmed Khan
来源:[J].Proceedings of the National Academy of Sciences, India Section A: Physical Sciences(IF 0.171), 2019, Vol.89 (2), pp.291-309
摘要:Abstract(#br)In this paper, we present a framework based on collaborative multi-agent approach for performing real-time forensic analysis on those infrastructures which involve storage networks such as storage area network, storage servers or network attached storage. For this ac...
作者:Muhammad Naeem Ahmed Khan , Muhammad Khalid , Sami ul Haq
来源:[J].International Journal of Modern Education and Computer Science(IJMECS), 2013, Vol.5 (1), pp.21-27
摘要:A requirement is a capability to which a product or service should conform to. A meticulous consideration to requirements engineering acts as a backbone of software projects. Ambiguous and unrealistic requirements are major source of failure in the software-intensive systems. Req...
作者:Anjum Hayat Gondal , Muhammad Naeem Ahmed Khan
来源:[J].International Journal of Modern Education and Computer Science(IJMECS), 2013, Vol.5 (2), pp.55-61
摘要:Radiologists use medical images to diagnose diseases precisely. However, identification of brain tumor from medical images is still a critical and complicated job for a radiologist. Brain tumor identification form magnetic resonance imaging (MRI) consists of several stages. Segme...
作者:Muhammad Khalid , Sami ul Haq , Muhammad Naeem Ahmed Khan
来源:[J].International Journal of Modern Education and Computer Science(IJMECS), 2013, Vol.5 (2), pp.41-47
摘要:Comprehensive requirement engineering (RE) process acts as a backbone of any successful project. RE processes are very complex because most of the requirement engineering documentation is written in natural languages, which are less formal and often distract the designers and dev...
作者:Raheel Ahmed , Muhammad Naeem Ahmed Khan
来源:[J].International Journal of Information Technology and Computer Science(IJITCS), 2013, Vol.5 (7), pp.80-86
摘要:Stereovision based on 3D environment reconstruction provides a true picture of real world situations for detection of objects’ locations. This approach has specific use in the scenarios like identifying traffic jams on the roads, locating curves and bends on the roads, findi...
作者:Muhammad Faizan , Muhammad Naeem Ahmed Khan , Sami Ulhaq
来源:[J].International Journal of Modern Education and Computer Science(IJMECS), 2012, Vol.4 (3), pp.14-20
摘要:Most of the software projects fail to meet the desired level of quality and standards due to different types of defects introduced during the course of requirement solicitation, designing and development. These defects inexorably hinder the secure deployment or smooth operations ...
作者:Tousif ur Rehman , Muhammad Naeem Ahmed Khan , Naveed Riaz
来源:[J].International Journal of Information Technology and Computer Science(IJITCS), 2013, Vol.5 (3), pp.40-48
摘要:Requirement engineering is an integral part of the software development lifecycle since the basis for developing successful software depends on comprehending its requirements in the first place. Requirement engineering involves a number of processes for gathering requirements in ...
作者:Muhammad Naeem Ahmed Khan , Naveed Riaz
来源:[J].網際網路技術學刊(IF 0.481), 2016, Vol.17 (4), pp.643-651
摘要:This paper presents a novel approach to devise an architectural framework for trusted cloud computing to help organizations and companies in curtailing data processing costs by outsourcing computations on-demand by ensuring confidentiality and integrity of the data sources and co...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×