|
Application of the Structural Analysis on a Three Axis Manipulator Robot
|
Yasmine Derdour, Hafid Haffaf, Kheireddine Bouazza
|
pp.
15-23
|
DOI:
10.5923/j.computer.20130302.01 5467 Views 1861 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
Internet Penetration in Africa Compared to the Rest of the World
|
Percy Okae, Kojo Gyasi
|
pp.
24-28
|
DOI:
10.5923/j.computer.20130302.02 3932 Views 1790 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
Cipher: A Crypto Model for Improving Confidentiality and Non-Tampering of Data
|
Adetokunbo A. A. Adenowo, Basirat A. Adenowo, Afeez A. Ajasa
|
pp.
29-34
|
DOI:
10.5923/j.computer.20130302.03 3233 Views 1259 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
Method of Converting a Microprocessor Software Performance Model to FPGA-based Hardware Simulator
|
Yuri Baida, Andrey Efimov, Alexander Butuzov
|
pp.
35-41
|
DOI:
10.5923/j.computer.20130302.04 3435 Views 1531 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
Dynamic Network Reconfiguration Algorithm
|
Khalid Kh. Sharaf, AbuBaker ElHussein
|
pp.
42-49
|
DOI:
10.5923/j.computer.20130302.05 5562 Views 2447 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|