2022
DOI: 10.54489/ijtim.v2i2.77
|View full text |Cite
|
Sign up to set email alerts
|

Extreme Programming vs Scrum: A Comparison of Agile Models

Abstract: For past couple of years agile software methods have been quite popular among the researchers. Agile models are known as light weight in contrast with conventional software development methodologies, due to their casual, versatile and adaptable style. Agile frameworks became heartily accepted by the software society in view of their concentration towards timely software conveyance, product quality and user satisfaction. For the fulfillment of requirements and needs of different software projects multiple agile… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 74 publications
(43 citation statements)
references
References 43 publications
(48 reference statements)
0
35
0
1
Order By: Relevance
“…However, it usually take on an unique authorized meaning. These several forms of tainted and fake pharmaceuticals may show up as a result of drug theft and diversion, poor manufacturing practices or improper storage, importation of subpar medications without local authorization, and entry of subpar or fake items into grey markets [8]. Would blockchain technology be a better supply chain and anti-counterfeiting system than the ones we currently have?…”
Section: Problem Definitionmentioning
confidence: 99%
“…However, it usually take on an unique authorized meaning. These several forms of tainted and fake pharmaceuticals may show up as a result of drug theft and diversion, poor manufacturing practices or improper storage, importation of subpar medications without local authorization, and entry of subpar or fake items into grey markets [8]. Would blockchain technology be a better supply chain and anti-counterfeiting system than the ones we currently have?…”
Section: Problem Definitionmentioning
confidence: 99%
“…As a result, many of them lack privacy and security safeguards. In these investigations, researchers have concentrated on the utility and consumption of electricity, rather than the security and privacy of patient data [56]. An IoMT healthcare system called BSN-Care recently included authentication and encryption features.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This section explores potential IoT-based hospital system design from multiple aspects [49]. Has investigated the interaction of four parties-sensor owners, sensor publishers, extended service providers, and sensor data consumers is the foundation for how IoT sensing devices work in general [50]. SO might be a business that sells sensors, a government agency, a private individual, or another SO [51].…”
Section: Safety Challenges and Solutions Part2mentioning
confidence: 99%