 |
|
Application of the Structural Analysis on a Three Axis Manipulator Robot
|
|
Yasmine Derdour, Hafid Haffaf, Kheireddine Bouazza
|
|
pp.
15-23
|
|
DOI:
10.5923/j.computer.20130302.01 5780 Views 1964 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Internet Penetration in Africa Compared to the Rest of the World
|
|
Percy Okae, Kojo Gyasi
|
|
pp.
24-28
|
|
DOI:
10.5923/j.computer.20130302.02 4255 Views 1937 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Cipher: A Crypto Model for Improving Confidentiality and Non-Tampering of Data
|
|
Adetokunbo A. A. Adenowo, Basirat A. Adenowo, Afeez A. Ajasa
|
|
pp.
29-34
|
|
DOI:
10.5923/j.computer.20130302.03 3380 Views 1320 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Method of Converting a Microprocessor Software Performance Model to FPGA-based Hardware Simulator
|
|
Yuri Baida, Andrey Efimov, Alexander Butuzov
|
|
pp.
35-41
|
|
DOI:
10.5923/j.computer.20130302.04 3681 Views 1713 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Dynamic Network Reconfiguration Algorithm
|
|
Khalid Kh. Sharaf, AbuBaker ElHussein
|
|
pp.
42-49
|
|
DOI:
10.5923/j.computer.20130302.05 5769 Views 2586 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|