 |
Application of the Structural Analysis on a Three Axis Manipulator Robot
|
Yasmine Derdour, Hafid Haffaf, Kheireddine Bouazza
|
pp.
15-23
|
DOI:
10.5923/j.computer.20130302.01 5681 Views 1909 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Internet Penetration in Africa Compared to the Rest of the World
|
Percy Okae, Kojo Gyasi
|
pp.
24-28
|
DOI:
10.5923/j.computer.20130302.02 4084 Views 1860 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Cipher: A Crypto Model for Improving Confidentiality and Non-Tampering of Data
|
Adetokunbo A. A. Adenowo, Basirat A. Adenowo, Afeez A. Ajasa
|
pp.
29-34
|
DOI:
10.5923/j.computer.20130302.03 3307 Views 1287 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Method of Converting a Microprocessor Software Performance Model to FPGA-based Hardware Simulator
|
Yuri Baida, Andrey Efimov, Alexander Butuzov
|
pp.
35-41
|
DOI:
10.5923/j.computer.20130302.04 3585 Views 1631 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Dynamic Network Reconfiguration Algorithm
|
Khalid Kh. Sharaf, AbuBaker ElHussein
|
pp.
42-49
|
DOI:
10.5923/j.computer.20130302.05 5679 Views 2516 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|