scispace - formally typeset
Search or ask a question

Showing papers in "Information Technology Journal in 2004"


Journal Article•DOI•
TL;DR: Modeling, measuremet, identification and compensation issues in robot calibration are discussed and the utility of calibration in areas such as the production, implementation and operation of robots is pointed out.
Abstract: Calibration plays an increasingly important role in enhancing robots positing accuracy. The research gives an overview of the existing work on robot calibration and points out the utility of calibration in areas such as the production, implementation and operation of robots. Modeling, measuremet, identification and compensation issues in robot calibration are discussed.

196 citations


Journal Article•DOI•
TL;DR: The advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography are explained.
Abstract: Given the shear volume of data stored and transmitted electronically in the world today, it is no surprise that countless methods of protecting such data have evolved. One lesser-known but rapidly growing method is steganography, the art and science of hiding information so that it does not even appear to exist. Moreover, in an ideal world we would all be able to openly send encrypted email or files to each other with no fear of reprisals. However, there are often cases when this is not possible, either because you are working for a company that does not allow encrypted emails or perhaps the local government does not approve of encrypted communication. This is one of the cases where Steganography can help hide the encrypted messages, images, keys, secret data, etc. This paper discusses the purpose of steganography. Explains how steganography is related to cryptography as well as what it can and cannot be used for. It also discusses a brief history of steganography. In addition, some of the tools and software used in steganography are demonstrated and including some discussion of the most popular algorithms involved in these tools. This paper further explains the advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography.

166 citations


Journal Article•DOI•
TL;DR: The paper discuses a broad range of research issues such as Routing, Medium Access, Multicasting, Quality of service, TCP performance, Energy, Security and Bluetooth, outlining the major challenges which have to be solved before widespread deployment of the technology is possible.
Abstract: This paper presents a coherent survey on ad hoc wireless networks, with the intent of serving as a quick reference to the current research issues in ad hoc networking. It starts with a background on the origin and development stages of ad hoc network, then summaries the characteristics, capabilities, applications and design constraints of ad hoc network fully distinguishing it from traditional networks. The paper discuses a broad range of research issues such as Routing, Medium Access, Multicasting, Quality of service, TCP performance, Energy, Security and Bluetooth, outlining the major challenges which have to be solved before widespread deployment of the technology is possible. Through this survey it would be seen that Ad ho c Networking presence an interesting research area inheriting the problems of wireless and mobile communications in their most difficult form.

146 citations


Journal Article•DOI•
TL;DR: This study subjected the protocols to identical loads and environmental conditions and evaluated their relative performance with respect to end-to-end throughput and delay, control packet overhead and route acquisition time to help determine an optimal routing protocol.
Abstract: Mobile Ad hoc-networking (MANET) is becoming increasingly important in today's world and a number of protocols have been developed for them. However a comparison between them is lacking to help determine an optimal one. This study addresses this issue by comparing the relative performance of four key Ad hoc routing protocols; Destination-sequenced distance vector (DSDV), Temporally ordered routing algorithm (TORA), Dynamic source routing (DSR) and Ad hoc on-demand distance vector (AODV). This study subjected the protocols to identical loads and environmental conditions and evaluate their relative performance with respect to end-to-end throughput and delay, control packet overhead and route acquisition time. From the detailed simulation results and analysis of presented, an appropriate choice of routing protocol can be made for given network context and goal.

63 citations








Journal Article•DOI•
TL;DR: Web Intelligence is a fascinating area in the very early stages of research and development as discussed by the authors, and it combines the interaction of the human mind and artificial intelligence with networks and technology, and it is a very interesting area to study.
Abstract: Web Intelligence is a fascinating area in the very early stages of research and development. It combines the interaction of the human mind and artificial intelligence with networks and technology. How will the next generation Web mature? With the imminent growth of Web intelligence what expectations do users have? Users will expect more from the Web than for it to merely pass raw data between people via search engines. We attempt to define and summarise the concept of Web Intelligence, highlight the key elements of Web Intelligence, and explore the topic of Web information retrieval with particular focus on multimedia/information retrieval and intelligent agents.



Journal Article•DOI•
TL;DR: This article aims to develop an empirically grounded understanding of how newcomers learn to do their work and the role information systems play in this learning.
Abstract: This article aims to develop an empirically grounded understanding of how newcomers learn to do their work and the role information systems play in this learning. Actor network theory views technol ...