A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases

H Mohd, F Baharom, N Muhd Darus… - … Journal of Supply …, 2016 - repo.uum.edu.my
Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use
of e-Tendering solution by large organizations, there is a need to construct a secured e …

Bayesian estimation of subpixel-resolution motion fields and high-resolution video stills

RR Schultz, RL Stevenson - Proceedings of International …, 1997 - ieeexplore.ieee.org
Multiframe resolution enhancement methods are used to estimate a high-resolution video
still (HRVS) from several low-resolution image sequence frames, provided that objects …

Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model

H Mohd, MAM Robie, F Baharom, NM Darus… - AIP Conference …, 2016 - pubs.aip.org
e-Tendering is an electronic processing of the tender document via internet and allow
tenderer to publish, communicate, access, receive and submit all tender related information …

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

K RahimiZadeh, MA Torkamani… - Signal and Data …, 2020 - jsdp.rcisp.ac.ir
Designing a secure software is one of the major phases in developing a robust software.
The McGraw life cycle, as one of the well-known software security development approaches …

Implementation and evaluation of mobile ticket validation systems for value-added services

D Skarica, H Belani, S Illes - SoftCOM 2009-17th International …, 2009 - ieeexplore.ieee.org
Although barcode was invented about sixty years ago, barcode technology became
applicable for value-added services in telecommunication industry just few years back …

Acessibilidade nas fases de engenharia de requisitos, projeto e codificação de software: uma ferramenta de apoio

RG Branco - 2013 - repositorio.ufms.br
Fornecer produtos acess veis deixou de ser um diferencial de determinadas empresas.
Acessibilidade, nos dias atuais, e um requisito fundamental de qualquer solu c~ ao …

Providing a Maturity Assessment Model for Security Requirements Engineering From the Point of Explaining the Requirements Process (Multiple Case Study of Iran …

A Arabsorkhi - Iranian Journal of Information Management, 2020 - aimj.ir
Nowadays, information technology and communication are an integral part of everyday life
of individuals and the condition of the organizations survival. Every business uses the …

Representation and selection of quality attribute techniques for software development process

YK Chiam - 2011 - unsworks.unsw.edu.au
Representation and selection of quality attribute techniques for software development
process Page 1 Representation and selection of quality attribute techniques for software …

[PDF][PDF] Implementation and evaluation of mobile ticket validation systems for value-added services

D Škarica, H Belani, S Illeš - 17th International Conference on Software …, 2009 - ieee.hr
Although barcode was invented about sixty years ago, barcode technology became
applicable for value-added services in telecommunication industry just few years back …

[PDF][PDF] Conceptual Model of Smart Tailor Architecture for Garment Industry

R Dahari, H Mohd, NI Yusop, ZM Aji - Int. J Sup. Chain. Mgt Vol, 2018 - core.ac.uk
Smart Tailor is an architecture that integrates various stakeholders such as tailors,
designers, and customers in a garment industry. The architecture provides the ability to …