 |
Application of the Structural Analysis on a Three Axis Manipulator Robot
|
Yasmine Derdour, Hafid Haffaf, Kheireddine Bouazza
|
pp.
15-23
|
DOI:
10.5923/j.computer.20130302.01 5731 Views 1929 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Internet Penetration in Africa Compared to the Rest of the World
|
Percy Okae, Kojo Gyasi
|
pp.
24-28
|
DOI:
10.5923/j.computer.20130302.02 4165 Views 1891 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Cipher: A Crypto Model for Improving Confidentiality and Non-Tampering of Data
|
Adetokunbo A. A. Adenowo, Basirat A. Adenowo, Afeez A. Ajasa
|
pp.
29-34
|
DOI:
10.5923/j.computer.20130302.03 3346 Views 1306 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Method of Converting a Microprocessor Software Performance Model to FPGA-based Hardware Simulator
|
Yuri Baida, Andrey Efimov, Alexander Butuzov
|
pp.
35-41
|
DOI:
10.5923/j.computer.20130302.04 3625 Views 1667 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Dynamic Network Reconfiguration Algorithm
|
Khalid Kh. Sharaf, AbuBaker ElHussein
|
pp.
42-49
|
DOI:
10.5923/j.computer.20130302.05 5716 Views 2541 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|