default search action
African Journal of Information & Communication Technology, Volume 3
Volume 3, Number 1, 2007
- Osama Salah Faragallah, Hossam El-din Hussien Ahmed, Hamdy Mohamed Kalash:
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images.
- Ivaylo Atanasov, Evelina Pencheva:
A Mark-Up Approach to Service Creation. - Deddy Chandra, Richard J. Harris:
A Transport Protocol for Future Wireless Internets.
Volume 3, Number 2, 2007
- Yasser L. Morgan, Thomas Kunz:
The Full ESWAN Destination-Based Approach: Operations And Evaluation.
- Abimbola Fisusi, Thomas Kokumo Yesufu:
Speaker Recognition Systems: A Tutorial. - Million Meshesha, C. V. Jawahar:
Optical Character Recognition of Amharic Documents.
Volume 3, Number 3, 2007
- Kevin Tom:
Power Amplifiers for Next Generation Wireless Platforms. - Saied Mohammed Soliman:
Performance Analysis for QoS Provisioning at Connection-Level in Cellular WCDMA Networks. - Younes Jabrane, Radouane Iqdour, Brahim Ait Es Said, Najib Naja:
A proposed method for determination of weighted despreading sequences for a DS/CDMA system.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.