[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 7, Issue 1January 2017
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1462-4613
EISSN:1741-8003
Reflects downloads up to 12 Jan 2025Bibliometrics
Skip Table Of Content Section
article
An UHD video handling system using a scalable server over an IP network

Ultra-high definition UHD videos, such as 4K and 8K, have four times higher resolution than current HDTV videos. Broadcasting stations want to deliver these videos with as little loss as possible. However, uncompressed UHD video handling systems, such ...

article
Korea's strategies for mobile technology standards in smart ecosystem

Prior to the introduction of smartphones, South Korea's mobile market had already recognised the early construction of 3.5G technology HSDPA, WiBro, commercial networks, and advanced networks as an important strategy to gain competitive advantage over ...

article
Decision support system for course enrolment management using qualitative information

Most higher education institutions offer general guidelines and course information in regards to specific majors and future careers. However, one of the main problems faced by students is making optimal decisions in relation to their academic progress ...

article
Business computing education: a radical approach for efficient streamlining of an effective education process and relevant curriculum

College courses in computer system development are divided into discrete, term based subjects, with systems analysis and design, programming and database design as separate and distinct subject areas presented by different academics with different ...

article
Detection of metamorphic malicious mobile code on android-based smartphones

By repackaging a malicious code into reverse compiled legitimate mobile code, malware authors can bypass detection step on existing mobile vaccine software using inserting AES-encrypted root exploits to loading some payload from a malicious remote ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.