Saturday, August 18, 2007

Robotics is the science and technology of robots, their design, manufacture, and application.[1] Robotics requires a working knowledge of electronics, mechanics, and software. A person working in the field is a roboticist. The word robotics was first used in print by Isaac Asimov, in his science fiction short story "Runaround" (1941).

Structure
Although the appearance and capabilities of robots vary vastly, all robots share the features of a mechanical, movable structure under some form of autonomous control. The structure of a robot is usually mostly mechanical and can be called a kinematic chain (its functionality being akin to the skeleton of the human body). The chain is formed of links (its bones), actuators (its muscles) and joints which can allow one or more degrees of freedom. Most contemporary robots use open serial chains in which each link connects the one before to the one after it. These robots are called serial robots and often resemble the human arm. Some robots, such as the Stewart platform, use closed parallel kinematic chains. Other structures, such as those that mimic the mechanical structure of humans, various animals and insects, are comparatively rare. However, the development and use of such structures in robots is an active area of research (e.g. biomechanics). Robots used as manipulators have an end effector mounted on the last link. This end effector can be anything from a welding device to a mechanical hand used to manipulate the environment.



[edit] Control
The mechanical structure of a robot must be controlled to perform tasks. The control of a robot involves three distinct phases - perception, processing and action (robotic paradigms). Sensors give information about the environment or the robot itself (e.g. the position of its joints or its end effector). Using strategies from the field of control theory, this information is processed to calculate the appropriate signals to the actuators (motors) which move the mechanical structure. The control of a robot involves various aspects such as path planning, pattern recognition, obstacle avoidance, etc. More complex and adaptable control strategies can be referred to as artificial intelligence.

[edit] Dynamics & Kinematics
The study of motion can be divided into kinematics and dynamics. Direct kinematics refers to the calculation of end effector position, orientation, velocity and acceleration when the corresponding joint values are known. Inverse kinematics refers to the opposite case in which required joint values are calculated for given end effector values, as done in path planning. Some special aspects of kinematics include handling of redundancy (different possibilities of performing the same movement), collision avoidance and singularity avoidance. Once all relevant positions, velocities and accelerations have been calculated using kinematics, methods from the field of dynamics are used to study the effect of forces upon these movements. Direct dynamics refers to the calculation of accelerations in the robot once the applied forces are known. Direct dynamics is used in computer simulations of the robot. Inverse dynamics refers to the calculation of the actuator forces necessary to create a prescribed end effector acceleration. This information can be used to improve the control algorithms of a robot.
In each area mentioned above, researchers strive to develop new concepts and strategies, improve existing ones and improve the interaction between these areas. To do this, criteria for "optimal" performance and ways to optimize design, structure and control of robots must be developed and implemented.

what is WI-FI

[edit] Origin and meaning of the term "Wi-Fi"
Despite the similarity between the terms "Wi-Fi" and "Hi-Fi", statements reportedly made by Phil Belanger of the Wi-Fi Alliance contradict the popular conclusion that "Wi-Fi" stands for "Wireless Fidelity".[12] According to Mr Belanger, the Interbrand Corporation developed the brand "Wi-Fi" for the Wi-Fi Alliance to use to describe WLAN products that are based on the IEEE 802.11 standards. In Mr Belanger's words, "Wi-Fi and the yin yang style logo were invented by Interbrand. We [the founding members of the Wireless Ethernet Compatibility Alliance, now called the Wi-Fi Alliance] hired Interbrand to come up with the name and logo that we could use for our interoperability seal and marketing efforts. We needed something that was a little catchier than 'IEEE 802.11b Direct Sequence'."
The Wi-Fi Alliance themselves invoked the term "Wireless Fidelity" with the marketing of a tag line, "The Standard for Wireless Fidelity", but later removed the tag from their marketing. The Wi-Fi Alliance now seems to discourage the propagation of the notion that "Wi-Fi" stands for "Wireless Fidelity", but it has been referred to as such by the Wi-Fi Alliance in White Papers currently held in their knowledge base: "... a promising market for wireless fidelity (Wi-Fi) network equipment." [13] and "A Short History of WLANs... The association created the Wi-Fi (Wireless Fidelity) logo to indicate that a product had been certified for interoperability."

Monday, August 13, 2007

how to make invisible folder..../

1)Right Click on the desktop.Make a new folder
2)Now rename the folder with a space(U have to hold ALT key and type 0160).
3)Now u have a folder with out a name.4)Right click on the folder>properties>customize. Click on change icon.
5)Scroll a bit, u should find some empty spaces, Click on any one of them.click ok

Section 49-O of the Constitution

Section 49-O of the Constitution
Section 49-O of the Constitution
Did you know that there is a system in our constitution, as per the1969 act, in section "49-O" that a person can go to the pollingbooth,confirm his identity, get his finger marked and convey the presiding election officer that he doesn't want to vote anyone!Yes such a feature is available, but obviously these seeminglynotorious leaders have never disclosed it. This is called "49-O".Why should you go and say "I VOTE NOBODY"... because, in a ward, if a candidate wins, say by 123 votes, and that particular ward has received "49-O" votes more than 123, then that polling will becancelled and will have to be re-polled. Not only that, but thecandidature of the contestants will be removed andthey cannot contest the re-polling, since people had already expressed their decision on them.This would bring fear into parties and hence look for genuine candidates for their parties for election. This would change the way, of our whole political system... it is seemingly surprising why the election commission has not revealed such a feature to the public....Please spread this news to as many as you know... Seems to be awonderful weapon against corrupt parties in India... show your power,expressing your desire not to vote for anybody, is even more powerful than voting... so don't miss your chance.So either vote, or vote not to vote (vote 49-O) and pass this infoon..."Please make ppl of India aware, so that we, thepeople, can really use this power to save our nation"use your voting rights for a better INDIA.what say guys?

Sunday, August 12, 2007

IP hider...

Working ip hiderIP Hider is a privacy protection that mask IP address preventing your surfing habits and your internet activity over the Internet form monitoring by websites or ISPs. IP Hider uses anonymous proxies (gateways to the internet) routing all your Internet traffic through them. You can browse anonymously, check mails, participate in newsgroups using proxies form different countries at your choice, interact with websites anonymously, using proxies that allow you to post messages, game, cast votes, post on forum, use IP - based trials. IP cleans all online traces that may harm or use inadvertently information on your computer, such as Internet history, typed URL, temporary Internet files, Cookies, auto complete forms history, auto complete password history, Internet favorites. IP Hider also protects computer from the action of invasive codes, like ActiveX or Java Script. ActiveX controls add interest to sites through multimedia but the controls can also harbor malicious code such as viruses. Most sites will function properly with ActiveX controls disabled.
http://www.mediafire.com/?5ljwhetdxhm
RS mirror
http://rapidshare.com/files/40890650/iphider.rar.html

Friday, August 10, 2007

How a Virus can infect an MP3 audio File.

How a Virus can infect an MP3 audio File.

NOTE:: THIS ARTICLE I HAVE WRITTEN IS MEANT TO PREVENT VIRUS INFECTION. AND NOT TO PROMOTE IT.

.mp3 audiofiles - mpeg layer 3 compressed audio and mp3pro files are digitalaudio datafiles that cannot be infected by a virus because the virus if it embeds itself in it will not execute in the microprocessor. Thus the mechanics of infecting an mp3 file can be by steganographically encrypting 99% of the virus into the datafile and finding a sector on the disk 512K that will be resident in memory, the mp3 files and all datafiles are linked to this sector. This is like the dir-2 dos 16bit virus.

download speed...

for those guys who r fed uo wit the slow traansfer rate...here is a TIP...

how to increase internet and download speedincrease Internet & Download speedIn order to fix this just follow these easy steps:
1. Click on Start, Run, gpedit.msc, .
2. On the window that will show up, click on Administrative Templates, Network, QoS Packet Scheduler
3. On the right side pane, double click Limit reservable bandwidth, the window shown on Figure 2 will show up. Change this configuration from “not configured” to “Enabled” and the reduce Bandwidth limit (%) from 20% to zero4. Click on Ok and restart your computer.
It seems that Windows XP reserves 20% of the available bandwidth even if this option is not configured and even if you don’t use QoS (Quality of Service) feature (which is disabled by default).
Keep in mind that there are several other reasons for your download speed not reaching the labeled speed of your Internet connection such as:
The labeled speed of your Internet connection is its maximum speed, not meaning that you will be able to always get that download speed. Your broadband operator only guarantees this speed between your home (or office) and their network.High traffic on your service provider network.High traffic on the server you are downloading a file.Speed limit on the server you are downloading a file (e.g. if the server has its download speed limited to 2 Mbps you won’t be able to reach a higher speed than that).Route from your home or office to the server where the file is located.Your Internet connection being shared with other computers at your home or office.Downloading several files at the same time with P2P programs, eating up part of the available bandwidth of your Internet connection.Etcetera.
Restart the Pc