Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Issues in global software development: A critical review
A number of companies have employed Global Software Development (GSD) methodology
as a useful tool for their software development practices. GSD is a contractual relationship …
as a useful tool for their software development practices. GSD is a contractual relationship …
[PDF][PDF] An innovative approach to investigate various software testing techniques and strategies
SR Jan, STU Shah, ZU Johar, Y Shah… - International Journal of …, 2016 - academia.edu
Software testing is a way of finding errors from the system. It helps us to identify and debug
mistakes, errors, faults and failures of a system. There are many techniques and strategies …
mistakes, errors, faults and failures of a system. There are many techniques and strategies …
[PDF][PDF] Enhanced and effective learning through mobile learning an insight into students perception of mobile learning at university level
The objective of this research study is to better understand and measure student's attitudes
and perceptions towards the effectiveness of mobile learning in higher education settings …
and perceptions towards the effectiveness of mobile learning in higher education settings …
[PDF][PDF] Military applications using wireless sensor networks: A survey
Wireless Sensor Networks (WSNs) received enormous attention in recent years due to its
phenomenal ability of implementation in various fields. WSNs consist of a large number of …
phenomenal ability of implementation in various fields. WSNs consist of a large number of …
[PDF][PDF] Performance improvement in multihop wireless mobile adhoc networks
Q Jabeen, F Khan, S Khan, MA Jan - the Journal Applied …, 2016 - researchgate.net
In this paper, a cross layer scheme is proposed to accomplish the flow contention of TCP in
multi-hop adhoc networks. The proposed scheme collects the useful information from …
multi-hop adhoc networks. The proposed scheme collects the useful information from …
Secure communication and routing architecture in wireless sensor networks
F Khan - 2014 IEEE 3rd Global Conference on Consumer …, 2014 - ieeexplore.ieee.org
Security of wireless sensor networks (WSN) is an important feature, as they are used in
critical applications such as surveillance, monitoring, tracking and controlling etc. Secure …
critical applications such as surveillance, monitoring, tracking and controlling etc. Secure …
Survey: dealing non-functional requirements at architecture level
F Khan, SR Jan, M Tahir, S Khan, F Ullah - VFAST Transactions on …, 2016 - vfast.org
Non-functional requirements (NFRs) are being addressed by the architecture. NFRs are not
focused properly as functional requirements (FRs) are dealt and focused. FRs are being …
focused properly as functional requirements (FRs) are dealt and focused. FRs are being …
A survey: Embedded systems supporting by different operating systems
In these days embedded system have an important role in different Fields and applications
like Network embedded system, Real-time embedded systems which supports the mission …
like Network embedded system, Real-time embedded systems which supports the mission …
[PDF][PDF] Framework for better reusability in component based software engineering
To develop software from existing component is done to reduce time and cost of the
software. Reusable modules and classes reduce implementation time, increase the …
software. Reusable modules and classes reduce implementation time, increase the …
[HTML][HTML] A quality of service-aware secured communication scheme for internet of things-based networks
The Internet of Things (IoT) is an emerging technology that aims to enable the
interconnection of a large number of smart devices and heterogeneous networks. Ad hoc …
interconnection of a large number of smart devices and heterogeneous networks. Ad hoc …