scispace - formally typeset
Search or ask a question
JournalISSN: 1812-5638

Information Technology Journal 

Asian Network for Scientific Information
About: Information Technology Journal is an academic journal published by Asian Network for Scientific Information. The journal publishes majorly in the area(s): Wireless sensor network & Key distribution in wireless sensor networks. It has an ISSN identifier of 1812-5638. Over the lifetime, 2839 publications have been published receiving 16156 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Modeling, measuremet, identification and compensation issues in robot calibration are discussed and the utility of calibration in areas such as the production, implementation and operation of robots is pointed out.
Abstract: Calibration plays an increasingly important role in enhancing robots positing accuracy. The research gives an overview of the existing work on robot calibration and points out the utility of calibration in areas such as the production, implementation and operation of robots. Modeling, measuremet, identification and compensation issues in robot calibration are discussed.

196 citations

Journal ArticleDOI
TL;DR: The advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography are explained.
Abstract: Given the shear volume of data stored and transmitted electronically in the world today, it is no surprise that countless methods of protecting such data have evolved. One lesser-known but rapidly growing method is steganography, the art and science of hiding information so that it does not even appear to exist. Moreover, in an ideal world we would all be able to openly send encrypted email or files to each other with no fear of reprisals. However, there are often cases when this is not possible, either because you are working for a company that does not allow encrypted emails or perhaps the local government does not approve of encrypted communication. This is one of the cases where Steganography can help hide the encrypted messages, images, keys, secret data, etc. This paper discusses the purpose of steganography. Explains how steganography is related to cryptography as well as what it can and cannot be used for. It also discusses a brief history of steganography. In addition, some of the tools and software used in steganography are demonstrated and including some discussion of the most popular algorithms involved in these tools. This paper further explains the advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography.

166 citations

Journal ArticleDOI
TL;DR: The paper discuses a broad range of research issues such as Routing, Medium Access, Multicasting, Quality of service, TCP performance, Energy, Security and Bluetooth, outlining the major challenges which have to be solved before widespread deployment of the technology is possible.
Abstract: This paper presents a coherent survey on ad hoc wireless networks, with the intent of serving as a quick reference to the current research issues in ad hoc networking. It starts with a background on the origin and development stages of ad hoc network, then summaries the characteristics, capabilities, applications and design constraints of ad hoc network fully distinguishing it from traditional networks. The paper discuses a broad range of research issues such as Routing, Medium Access, Multicasting, Quality of service, TCP performance, Energy, Security and Bluetooth, outlining the major challenges which have to be solved before widespread deployment of the technology is possible. Through this survey it would be seen that Ad ho c Networking presence an interesting research area inheriting the problems of wireless and mobile communications in their most difficult form.

146 citations

Journal ArticleDOI
TL;DR: Shapiro-Wilks, Lilliefors and Kolmogorov-Smirnov test results were the weakest among all three tests, but all three test were most powerful when ran on data with exponential distribution.
Abstract: In this study, Shapiro-Wilks, Lilliefors and Kolmogorov-Smirnov tests were compared for Type I error and for power of the tests. The simulation was run 100, 000 times for different situations and for different types of departures from normality. For all different sample sizes and distributions, Shapiro-Wilks gave the most powerful results, followed by the Lilliefors test. Kolmogorov-Smirnov test results were the weakest among all three tests. All three test were most powerful when ran on data with exponential distribution.

145 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20222
20202
20191
20181
201711
201626