 |
|
Application of the Structural Analysis on a Three Axis Manipulator Robot
|
|
Yasmine Derdour, Hafid Haffaf, Kheireddine Bouazza
|
|
pp.
15-23
|
|
DOI:
10.5923/j.computer.20130302.01 5767 Views 1951 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Internet Penetration in Africa Compared to the Rest of the World
|
|
Percy Okae, Kojo Gyasi
|
|
pp.
24-28
|
|
DOI:
10.5923/j.computer.20130302.02 4237 Views 1927 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Cipher: A Crypto Model for Improving Confidentiality and Non-Tampering of Data
|
|
Adetokunbo A. A. Adenowo, Basirat A. Adenowo, Afeez A. Ajasa
|
|
pp.
29-34
|
|
DOI:
10.5923/j.computer.20130302.03 3371 Views 1317 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Method of Converting a Microprocessor Software Performance Model to FPGA-based Hardware Simulator
|
|
Yuri Baida, Andrey Efimov, Alexander Butuzov
|
|
pp.
35-41
|
|
DOI:
10.5923/j.computer.20130302.04 3667 Views 1701 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Dynamic Network Reconfiguration Algorithm
|
|
Khalid Kh. Sharaf, AbuBaker ElHussein
|
|
pp.
42-49
|
|
DOI:
10.5923/j.computer.20130302.05 5758 Views 2575 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|