Mehreen Sirshar | Fatima Jinnah women university (original) (raw)
Papers by Mehreen Sirshar
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, 2015
Dengue fever is a widely spreading disease which can be fatal if not detected on time. Apart from... more Dengue fever is a widely spreading disease which can be fatal if not detected on time. Apart from other symptoms the basic CBC test for its detection is carried to see any alarming drop in blood components. This paper proposes an application which would detect such alarming change and identify if further tests are needed. Method for automatic counting RBC, WBC and platelets from blood smear images using spatial filtering and segmentation through morphological operations and blob processing technique is proposed and compared to the manual counting method used in laboratories. Our application is made in C # and it works for high quality images with resolution of 300dpi with clearly visible blood cells.
International Journal of Computer and Communication System Engineering Ijccse, Feb 28, 2015
Extreme Programming (XP) has gained value in business market from decade. It has built in charact... more Extreme Programming (XP) has gained value in business market from decade. It has built in characteristics that are supporting quality in the software's development. But there are some deficiencies which are present that can be removed to some extent by adopting the additional features described in the paper. The struggle is to cover every quality factor that can win over customer satisfaction and meet the desired product after following a standard. The techniques of comparing XP with two methodologies i.e. waterfall and spiral and comparing XP values with the CMMI (Capability Maturity Model Integration) standards are used. It is a methodology that has undisciplined behavior and dynamic requirements throughout the process, therefore not suitable for larger projects but after adapting additional characteristics will make XP an option for the developers to use in larger projects also. By using suggested features, it will make the process lengthy to a bit but will be helpful to drag the XP to greater quality level. XP practices help developers to improve Quality of products and ISO (International Organization for Standardization) 9001 certification helps in the improvement of software quality.
International Journal of Computer and Communication System Engineering Ijccse, Feb 28, 2015
Due to the recent technological advancements, Games have become one of the most demanding applica... more Due to the recent technological advancements, Games have become one of the most demanding applications. Gaming industry is rapidly growing and the key to success in this industry is the development of good quality games, which is a highly competitive issue. The ultimate goal of game developers is to provide player's satisfaction by developing high quality games. This research is the comprehensive survey of techniques followed by game industries to ensure games quality. After analysis of various techniques, it has been found that quality simulation according to ISO standards and play test methods are used to ensure games quality. Because game development requires cross disciplined team, an increasing trend towards distributed game development has been observed. This paper evaluates the strengths and weaknesses of current methodologies used in game industry and draws a conclusion. We have also proposed quality parameters which can be used as a heuristic framework to identify those attributes which have high testing priorities.
2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
A comparative Analysis of Various Methodologies of Agile Project Management Verses PMBOK: A Case Study, 2019
There are different strategies to obtaining significant advantage, enhancing resource scheduling,... more There are different strategies to obtaining significant advantage, enhancing resource scheduling, managing procedures and building trust of team work in the sense of project management methodologies. The purpose of this article is to contrast a standard collection of project management processes of PMBOK with a variety of agile project management processes. The first method is more conservative, suggested by the PMI (Project Management Institute) and the second one is distinguished by a more creative, versatile and modern approach. Agile project management technology follows the principle of concentration on client satisfaction, offer gradual improvements, function together, analyze and improve on an ongoing basis. The analysis was meant to recognize similarities, variations, inconsistencies, etc. In addition, a case study of tailored product innovation processes used in a partnership between Add Latent Ltd., an asset integrity and maintenance management consulting services provider in the energy sector, is investigated in which we focus on the SWOT methods in a quantitative way. Which considers the features of scrum technique in the application of the AGILE approach in the development of the project.
PLOS ONE, 2022
The automated generation of radiology reports provides X-rays and has tremendous potential to enh... more The automated generation of radiology reports provides X-rays and has tremendous potential to enhance the clinical diagnosis of diseases in patients. A new research direction is gaining increasing attention that involves the use of hybrid approaches based on natural language processing and computer vision techniques to create auto medical report generation systems. The auto report generator, producing radiology reports, will significantly reduce the burden on doctors and assist them in writing manual reports. Because the sensitivity of chest X-ray (CXR) findings provided by existing techniques not adequately accurate, producing comprehensive explanations for medical photographs remains a difficult task. A novel approach to address this issue was proposed, based on the continuous integration of convolutional neural networks and long short-term memory for detecting diseases, followed by the attention mechanism for sequence generation based on these diseases. Experimental results obtai...
2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2018
Augmented Reality (AR) can extend digital world to real world. Augmented Reality not just develop... more Augmented Reality (AR) can extend digital world to real world. Augmented Reality not just developed; it had been around there for many years. Actual term of AR came around in 1990's. AR experienced by using headset or mobiles. AR has many applications in military, medical field, entertainment (games) and education. In this paper different AR games are analyzed that are categorize as entertainment and educational games, some tools to develop augmented reality games are also discussed. Some parameters are also used and describe in this paper to analyze survey papers and to analyze tools for making augmented reality games. As most people think that games are just for fun but AR games usage for educational purpose increases; for making lectures attractive, grasping attention of students, teaching history and for higher retention. Augmented reality in mobile games enhances learning methodologies and also provides paramount entertainment.
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, 2015
Design patterns are widely used to make the process of development easier as they greatly help th... more Design patterns are widely used to make the process of development easier as they greatly help the developers to develop the software. Different design patterns have been introduced till now but the behavior of same design pattern may differ in different domains that can lead to the wrong selection of the design pattern. The paper aims to discover the design patterns that suits best with respect to their domain thereby helping the developers to choose an effective design pattern. It presents the comprehensive analysis of design patterns based on different methodologies that include simulation, case study and comparison of various algorithms. Due to the difference of the domain the methodology used in one domain may be inapplicable to the other domain. The paper draws a conclusion based on strength and limitation of each design pattern in their respective domain.
With the advancement of modern technologies Graphical User Interface (GUI) is evolving rapidly. G... more With the advancement of modern technologies Graphical User Interface (GUI) is evolving rapidly. GUI offers an extensive attention to the needs, limitations and expectations of users. Effective GUI is major attainment on Human Computer Interaction (HCI). Based on user demands, the GUI provides visual and interactive interfaces. Different area of GUI remained neglected. Intent of this paper is to present brief comparative study of Command Line Interface (CLI) and GUI, how to design layouts of effective GUI, how to improve GUI based on user experiences, and how to test GUI using automated and manual testing. Due to the increasing use of technologies, an increasing trend towards the development of GUI has been observed. Evaluation of several parameters of different methodologies and techniques are conducted and are presented in the paper.
Accurate prediction of defects in software components plays a vital role in administrating the qu... more Accurate prediction of defects in software components plays a vital role in administrating the quality of the quality and efficiency of the system to be developed. So we have written a systematic literature review in order to evaluate the four main defect prediction techniques. Defect prediction paves way for the testers to find bugs and modify them in order to achieve input to output conformance. In this paper we have discussed the open issues in predicting software defects and have provided with a detailed analyzation of different methods including Machine Learning, Integrated Approach, Cross-Project and Deep Forest algorithm in order to prevent these flaws. However, it is almost impossible to rule which method is better than the other so every technique can be analyzed separately and the best technique according to the problem at hand can be used or can be altered to create hybrid technique suitable for the cause.
The main motto of this study is to examine and and study on behavior of Software Quality Assuranc... more The main motto of this study is to examine and and study on behavior of Software Quality Assurance (SQA) issues of project stakeholders in a Scrum environment and their consequences . This inductive case study identifies SQA principles relevant to Meeting User Expectations. The Stakeholders in the Scrum project having lack of Concrete Guidance on Scrum’s SQA approaches, methods, and techniques. The insufficiency of concrete guidelines in Scrum needs a management squad to develop concepts that can include implementing practices from other methodologies and wisely modifying the system structure to incorporate the practices adopted, ensuring improvement in the processes, and creating a shared ownership environment. Through explaining the incompleteness of Agile approaches with special attention to the lack of concrete instructions in Scrum, the study uses techniques to customize literature and advocate for Scrum’s versatility. The study uses strategies to adapt literature and argue for...
Global journal of computer science and technology, 2015
In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space... more In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is a major enigmawhich needs to be resolved.With vulnerabilities everywhere, data security and privacy is always at risk. This specially comes in play when services of third party are used knowingly or unknowingly. Government and business organizations are testing and implementing security and monitoring techniques to stand a better chance in raging war against cyber-crimes. Moreover, the formulation of new methods also poses new limitations of the systems as well as the users like lack of efficiency or complexity which need to be resolved in order to get better results. In this research paper some of those limitations and their solutions are discussed.
ArXiv, 2015
Security concerns has been kept on increasing, so it is important for everyone to keep their prop... more Security concerns has been kept on increasing, so it is important for everyone to keep their property safe from thefts and destruction. So the need for surveillance techniques are also increasing. The system has been developed to detect the motion in a video. A system has been developed for real time applications by using the techniques of background subtraction and frame differencing. In this system, motion is detected from the webcam or from the real time video. Background subtraction and frames differencing method has been used to detect the moving target. In background subtraction method, current frame is subtracted from the referenced frame and then the threshold is applied. If the difference is greater than the threshold then it is considered as the pixel from the moving object, otherwise it is considered as background pixel. Similarly, two frames difference method takes difference between two continuous frames. Then that resultant difference frame is thresholded and the amoun...
In this paper we have discussed the importance of human resource management in project management... more In this paper we have discussed the importance of human resource management in project management. As a concept human resource management emerged in 1980 [9]. It is very important to utilize resources effectively in any organization. Like triple constrains (cost, quality, scope) human resources are also considered as one of the most important factor for the success of any project. Management of human resources involve hiring experienced workers, giving appropriate training, acknowledgement about the significance of the project and the effective use of techniques and tools in order to get the project done productively with in time and budget. It becomes the responsibility of the project manager to effectively manage human resources as it is more challenging than managing other technical resources. In this paper we have also discussed the challenges that an organization faced during the management of the resources and use of some strategic human practices in order to overcome these ch...
Global journal of computer science and technology, 2017
Requirement engineering is the most important process in software development life cycle. Quality... more Requirement engineering is the most important process in software development life cycle. Quality assurance in requirement engineering has a great impact on the product quality. It checks whether the requirements meet the desired quality attributes i.e. adequacy, completeness, consistency etc. Quality Assurance of the requirement is important because the cost of requirements failure is very high. The proposed research is based on the survey of the quality assurance in requirement engineering. The major focus of this research paper is to analyze the quality parameters which assure the overcome of the issues related to the requirements. The research papers include brief overview of those parameters.
Communication has become much easier with the advent of internet. Now user can use internet and c... more Communication has become much easier with the advent of internet. Now user can use internet and conduct their activities electronically. Spyware is a major internet threat. Spyware is software which is installed on web browsers to steal important and personal information or data like, credit card number etc. Spyware use internet to send stealing data to malicious databases without the user knowledge. Spyware is harmful for the security and privacy of the system data. . The Virtual Machines gets 300,000 suspicious URLs daily. Due to the lack of awareness; consumer are unaware about this serious threat that how their computer system is affected by it. Web crawler is a part of search engine which browses through the hyperlinks and store that links for future use. Crawler maintains the data and improves efficiency for search.
Immense challenges arise in the Quality Assurance area due to contemporary development in Interne... more Immense challenges arise in the Quality Assurance area due to contemporary development in Internet of Things (IoT) technology. Current issues are mainly related to test coverage, test diversity, IoT Stability, Use of Cellular Networks in IoTs, IoT Devices updates, Security, Data Integration, and interoperability. In this paper, we present all those issues with suggestions for tackling those issues.
International Journal of Scientific & Technology Research, 2015
Agile methodology that uses iterative and incremental approach is widely used in the industry pro... more Agile methodology that uses iterative and incremental approach is widely used in the industry projects as they can satisfy to the change of requirements. Efficient product delivery is achieved by using short iterations. But assuring the quality in any system is essential and imperative part which is very difficult task, which raises a question that: Is quality is assured in the software which is developed using agile methodology? The research paper proposed a solution and summarizes that how the quality is achieved or assure in agile software development using different factors. The major focus of this research paper is to analyse the quality parameter which assure quality in the agile methodology. The research paper includes the brief overview of the parameters which assure quality in agile. ————————————————————
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, 2015
Dengue fever is a widely spreading disease which can be fatal if not detected on time. Apart from... more Dengue fever is a widely spreading disease which can be fatal if not detected on time. Apart from other symptoms the basic CBC test for its detection is carried to see any alarming drop in blood components. This paper proposes an application which would detect such alarming change and identify if further tests are needed. Method for automatic counting RBC, WBC and platelets from blood smear images using spatial filtering and segmentation through morphological operations and blob processing technique is proposed and compared to the manual counting method used in laboratories. Our application is made in C # and it works for high quality images with resolution of 300dpi with clearly visible blood cells.
International Journal of Computer and Communication System Engineering Ijccse, Feb 28, 2015
Extreme Programming (XP) has gained value in business market from decade. It has built in charact... more Extreme Programming (XP) has gained value in business market from decade. It has built in characteristics that are supporting quality in the software's development. But there are some deficiencies which are present that can be removed to some extent by adopting the additional features described in the paper. The struggle is to cover every quality factor that can win over customer satisfaction and meet the desired product after following a standard. The techniques of comparing XP with two methodologies i.e. waterfall and spiral and comparing XP values with the CMMI (Capability Maturity Model Integration) standards are used. It is a methodology that has undisciplined behavior and dynamic requirements throughout the process, therefore not suitable for larger projects but after adapting additional characteristics will make XP an option for the developers to use in larger projects also. By using suggested features, it will make the process lengthy to a bit but will be helpful to drag the XP to greater quality level. XP practices help developers to improve Quality of products and ISO (International Organization for Standardization) 9001 certification helps in the improvement of software quality.
International Journal of Computer and Communication System Engineering Ijccse, Feb 28, 2015
Due to the recent technological advancements, Games have become one of the most demanding applica... more Due to the recent technological advancements, Games have become one of the most demanding applications. Gaming industry is rapidly growing and the key to success in this industry is the development of good quality games, which is a highly competitive issue. The ultimate goal of game developers is to provide player's satisfaction by developing high quality games. This research is the comprehensive survey of techniques followed by game industries to ensure games quality. After analysis of various techniques, it has been found that quality simulation according to ISO standards and play test methods are used to ensure games quality. Because game development requires cross disciplined team, an increasing trend towards distributed game development has been observed. This paper evaluates the strengths and weaknesses of current methodologies used in game industry and draws a conclusion. We have also proposed quality parameters which can be used as a heuristic framework to identify those attributes which have high testing priorities.
2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
A comparative Analysis of Various Methodologies of Agile Project Management Verses PMBOK: A Case Study, 2019
There are different strategies to obtaining significant advantage, enhancing resource scheduling,... more There are different strategies to obtaining significant advantage, enhancing resource scheduling, managing procedures and building trust of team work in the sense of project management methodologies. The purpose of this article is to contrast a standard collection of project management processes of PMBOK with a variety of agile project management processes. The first method is more conservative, suggested by the PMI (Project Management Institute) and the second one is distinguished by a more creative, versatile and modern approach. Agile project management technology follows the principle of concentration on client satisfaction, offer gradual improvements, function together, analyze and improve on an ongoing basis. The analysis was meant to recognize similarities, variations, inconsistencies, etc. In addition, a case study of tailored product innovation processes used in a partnership between Add Latent Ltd., an asset integrity and maintenance management consulting services provider in the energy sector, is investigated in which we focus on the SWOT methods in a quantitative way. Which considers the features of scrum technique in the application of the AGILE approach in the development of the project.
PLOS ONE, 2022
The automated generation of radiology reports provides X-rays and has tremendous potential to enh... more The automated generation of radiology reports provides X-rays and has tremendous potential to enhance the clinical diagnosis of diseases in patients. A new research direction is gaining increasing attention that involves the use of hybrid approaches based on natural language processing and computer vision techniques to create auto medical report generation systems. The auto report generator, producing radiology reports, will significantly reduce the burden on doctors and assist them in writing manual reports. Because the sensitivity of chest X-ray (CXR) findings provided by existing techniques not adequately accurate, producing comprehensive explanations for medical photographs remains a difficult task. A novel approach to address this issue was proposed, based on the continuous integration of convolutional neural networks and long short-term memory for detecting diseases, followed by the attention mechanism for sequence generation based on these diseases. Experimental results obtai...
2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2018
Augmented Reality (AR) can extend digital world to real world. Augmented Reality not just develop... more Augmented Reality (AR) can extend digital world to real world. Augmented Reality not just developed; it had been around there for many years. Actual term of AR came around in 1990's. AR experienced by using headset or mobiles. AR has many applications in military, medical field, entertainment (games) and education. In this paper different AR games are analyzed that are categorize as entertainment and educational games, some tools to develop augmented reality games are also discussed. Some parameters are also used and describe in this paper to analyze survey papers and to analyze tools for making augmented reality games. As most people think that games are just for fun but AR games usage for educational purpose increases; for making lectures attractive, grasping attention of students, teaching history and for higher retention. Augmented reality in mobile games enhances learning methodologies and also provides paramount entertainment.
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, 2015
Design patterns are widely used to make the process of development easier as they greatly help th... more Design patterns are widely used to make the process of development easier as they greatly help the developers to develop the software. Different design patterns have been introduced till now but the behavior of same design pattern may differ in different domains that can lead to the wrong selection of the design pattern. The paper aims to discover the design patterns that suits best with respect to their domain thereby helping the developers to choose an effective design pattern. It presents the comprehensive analysis of design patterns based on different methodologies that include simulation, case study and comparison of various algorithms. Due to the difference of the domain the methodology used in one domain may be inapplicable to the other domain. The paper draws a conclusion based on strength and limitation of each design pattern in their respective domain.
With the advancement of modern technologies Graphical User Interface (GUI) is evolving rapidly. G... more With the advancement of modern technologies Graphical User Interface (GUI) is evolving rapidly. GUI offers an extensive attention to the needs, limitations and expectations of users. Effective GUI is major attainment on Human Computer Interaction (HCI). Based on user demands, the GUI provides visual and interactive interfaces. Different area of GUI remained neglected. Intent of this paper is to present brief comparative study of Command Line Interface (CLI) and GUI, how to design layouts of effective GUI, how to improve GUI based on user experiences, and how to test GUI using automated and manual testing. Due to the increasing use of technologies, an increasing trend towards the development of GUI has been observed. Evaluation of several parameters of different methodologies and techniques are conducted and are presented in the paper.
Accurate prediction of defects in software components plays a vital role in administrating the qu... more Accurate prediction of defects in software components plays a vital role in administrating the quality of the quality and efficiency of the system to be developed. So we have written a systematic literature review in order to evaluate the four main defect prediction techniques. Defect prediction paves way for the testers to find bugs and modify them in order to achieve input to output conformance. In this paper we have discussed the open issues in predicting software defects and have provided with a detailed analyzation of different methods including Machine Learning, Integrated Approach, Cross-Project and Deep Forest algorithm in order to prevent these flaws. However, it is almost impossible to rule which method is better than the other so every technique can be analyzed separately and the best technique according to the problem at hand can be used or can be altered to create hybrid technique suitable for the cause.
The main motto of this study is to examine and and study on behavior of Software Quality Assuranc... more The main motto of this study is to examine and and study on behavior of Software Quality Assurance (SQA) issues of project stakeholders in a Scrum environment and their consequences . This inductive case study identifies SQA principles relevant to Meeting User Expectations. The Stakeholders in the Scrum project having lack of Concrete Guidance on Scrum’s SQA approaches, methods, and techniques. The insufficiency of concrete guidelines in Scrum needs a management squad to develop concepts that can include implementing practices from other methodologies and wisely modifying the system structure to incorporate the practices adopted, ensuring improvement in the processes, and creating a shared ownership environment. Through explaining the incompleteness of Agile approaches with special attention to the lack of concrete instructions in Scrum, the study uses techniques to customize literature and advocate for Scrum’s versatility. The study uses strategies to adapt literature and argue for...
Global journal of computer science and technology, 2015
In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space... more In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is a major enigmawhich needs to be resolved.With vulnerabilities everywhere, data security and privacy is always at risk. This specially comes in play when services of third party are used knowingly or unknowingly. Government and business organizations are testing and implementing security and monitoring techniques to stand a better chance in raging war against cyber-crimes. Moreover, the formulation of new methods also poses new limitations of the systems as well as the users like lack of efficiency or complexity which need to be resolved in order to get better results. In this research paper some of those limitations and their solutions are discussed.
ArXiv, 2015
Security concerns has been kept on increasing, so it is important for everyone to keep their prop... more Security concerns has been kept on increasing, so it is important for everyone to keep their property safe from thefts and destruction. So the need for surveillance techniques are also increasing. The system has been developed to detect the motion in a video. A system has been developed for real time applications by using the techniques of background subtraction and frame differencing. In this system, motion is detected from the webcam or from the real time video. Background subtraction and frames differencing method has been used to detect the moving target. In background subtraction method, current frame is subtracted from the referenced frame and then the threshold is applied. If the difference is greater than the threshold then it is considered as the pixel from the moving object, otherwise it is considered as background pixel. Similarly, two frames difference method takes difference between two continuous frames. Then that resultant difference frame is thresholded and the amoun...
In this paper we have discussed the importance of human resource management in project management... more In this paper we have discussed the importance of human resource management in project management. As a concept human resource management emerged in 1980 [9]. It is very important to utilize resources effectively in any organization. Like triple constrains (cost, quality, scope) human resources are also considered as one of the most important factor for the success of any project. Management of human resources involve hiring experienced workers, giving appropriate training, acknowledgement about the significance of the project and the effective use of techniques and tools in order to get the project done productively with in time and budget. It becomes the responsibility of the project manager to effectively manage human resources as it is more challenging than managing other technical resources. In this paper we have also discussed the challenges that an organization faced during the management of the resources and use of some strategic human practices in order to overcome these ch...
Global journal of computer science and technology, 2017
Requirement engineering is the most important process in software development life cycle. Quality... more Requirement engineering is the most important process in software development life cycle. Quality assurance in requirement engineering has a great impact on the product quality. It checks whether the requirements meet the desired quality attributes i.e. adequacy, completeness, consistency etc. Quality Assurance of the requirement is important because the cost of requirements failure is very high. The proposed research is based on the survey of the quality assurance in requirement engineering. The major focus of this research paper is to analyze the quality parameters which assure the overcome of the issues related to the requirements. The research papers include brief overview of those parameters.
Communication has become much easier with the advent of internet. Now user can use internet and c... more Communication has become much easier with the advent of internet. Now user can use internet and conduct their activities electronically. Spyware is a major internet threat. Spyware is software which is installed on web browsers to steal important and personal information or data like, credit card number etc. Spyware use internet to send stealing data to malicious databases without the user knowledge. Spyware is harmful for the security and privacy of the system data. . The Virtual Machines gets 300,000 suspicious URLs daily. Due to the lack of awareness; consumer are unaware about this serious threat that how their computer system is affected by it. Web crawler is a part of search engine which browses through the hyperlinks and store that links for future use. Crawler maintains the data and improves efficiency for search.
Immense challenges arise in the Quality Assurance area due to contemporary development in Interne... more Immense challenges arise in the Quality Assurance area due to contemporary development in Internet of Things (IoT) technology. Current issues are mainly related to test coverage, test diversity, IoT Stability, Use of Cellular Networks in IoTs, IoT Devices updates, Security, Data Integration, and interoperability. In this paper, we present all those issues with suggestions for tackling those issues.
International Journal of Scientific & Technology Research, 2015
Agile methodology that uses iterative and incremental approach is widely used in the industry pro... more Agile methodology that uses iterative and incremental approach is widely used in the industry projects as they can satisfy to the change of requirements. Efficient product delivery is achieved by using short iterations. But assuring the quality in any system is essential and imperative part which is very difficult task, which raises a question that: Is quality is assured in the software which is developed using agile methodology? The research paper proposed a solution and summarizes that how the quality is achieved or assure in agile software development using different factors. The major focus of this research paper is to analyse the quality parameter which assure quality in the agile methodology. The research paper includes the brief overview of the parameters which assure quality in agile. ————————————————————