[HTML][HTML] Issues in global software development: A critical review

S ul Haq, M Raza, A Zia, MNA Khan - Journal of Software Engineering …, 2011 - scirp.org
A number of companies have employed Global Software Development (GSD) methodology
as a useful tool for their software development practices. GSD is a contractual relationship …

[PDF][PDF] An innovative approach to investigate various software testing techniques and strategies

SR Jan, STU Shah, ZU Johar, Y Shah… - International Journal of …, 2016 - academia.edu
Software testing is a way of finding errors from the system. It helps us to identify and debug
mistakes, errors, faults and failures of a system. There are many techniques and strategies …

[PDF][PDF] Enhanced and effective learning through mobile learning an insight into students perception of mobile learning at university level

SR Jan, F Ullah, H Ali, F Khan - International Journal of Scientific …, 2016 - researchgate.net
The objective of this research study is to better understand and measure student's attitudes
and perceptions towards the effectiveness of mobile learning in higher education settings …

[PDF][PDF] Military applications using wireless sensor networks: A survey

I Ahmad, K Shah, S Ullah - Int. J. Eng. Sci, 2016 - academia.edu
Wireless Sensor Networks (WSNs) received enormous attention in recent years due to its
phenomenal ability of implementation in various fields. WSNs consist of a large number of …

[PDF][PDF] Performance improvement in multihop wireless mobile adhoc networks

Q Jabeen, F Khan, S Khan, MA Jan - the Journal Applied …, 2016 - researchgate.net
In this paper, a cross layer scheme is proposed to accomplish the flow contention of TCP in
multi-hop adhoc networks. The proposed scheme collects the useful information from …

Secure communication and routing architecture in wireless sensor networks

F Khan - 2014 IEEE 3rd Global Conference on Consumer …, 2014 - ieeexplore.ieee.org
Security of wireless sensor networks (WSN) is an important feature, as they are used in
critical applications such as surveillance, monitoring, tracking and controlling etc. Secure …

Survey: dealing non-functional requirements at architecture level

F Khan, SR Jan, M Tahir, S Khan, F Ullah - VFAST Transactions on …, 2016 - vfast.org
Non-functional requirements (NFRs) are being addressed by the architecture. NFRs are not
focused properly as functional requirements (FRs) are dealt and focused. FRs are being …

A survey: Embedded systems supporting by different operating systems

Q Jabeen, F Khan, MN Hayat, H Khan, SR Jan… - arxiv preprint arxiv …, 2016 - arxiv.org
In these days embedded system have an important role in different Fields and applications
like Network embedded system, Real-time embedded systems which supports the mission …

[PDF][PDF] Framework for better reusability in component based software engineering

M Tahir, F Khan, M Babar, F Arif… - the Journal of Applied …, 2016 - researchgate.net
To develop software from existing component is done to reduce time and cost of the
software. Reusable modules and classes reduce implementation time, increase the …

[HTML][HTML] A quality of service-aware secured communication scheme for internet of things-based networks

F Khan, AU Rehman, A Yahya, MA Jan, J Chuma… - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is an emerging technology that aims to enable the
interconnection of a large number of smart devices and heterogeneous networks. Ad hoc …