Skip to main content

Robots

 Robots
Robots are studied under a branch of science known as robotics. This branch of technology deals with the design, construction, operation, and application of robots,[1] as well as computer systems for their control, sensory feedback, and information processing. These technologies deal with automated machines that can take the place of humans in dangerous environments or manufacturing processes, or resemble humans in appearance, behavior, and/or cognition. Many of today's robots are inspired by nature contributing to the field of bio-inspired robotics.
The concept of creating machines that can operate autonomously dates back to classical times, but research into the functionality and potential uses of robots did not grow substantially until the 20th century.[2] Throughout history, robotics has been often seen to mimic human behavior, and often manage tasks in a similar fashion. Today, robotics is a rapidly growing field, as technological advances continue, research, design, and building new robots serve various practical purposes, whether domestically, commercially, or militarily. Many robots do jobs that are hazardous to people such as defusing bombs, exploring shipwrecks, and mines.

The word robotics was derived from the word robot, which was introduced to the public by Czech writer Karel Čapek in his play R.U.R. (Rossum's Universal Robots), which was published in 1920.[3] The word robot comes from the Slavic word robota, which means labor. The play begins in a factory that makes artificial people called robots, creatures who can be mistaken for humans – similar to the modern ideas of androids. Karel Čapek himself did not coin the word. He wrote a short letter in reference to an etymology in the Oxford English Dictionary in which he named his brother Josef Čapek as its actual originator.[3]

Power source

At present mostly (lead-acid) batteries are used as a power source. Many different types of batteries can be used as a power source for robots. They range from lead acid batteries which are safe and have relatively long shelf lives but are rather heavy to silver cadmium batteries that are much smaller in volume and are currently much more expensive. Designing a battery powered robot needs to take into account factors such as safety, cycle lifetime and weight. Generators, often some type of internal combustion engine, can also be used. However, such designs are often mechanically complex and need fuel, require heat dissipation and are relatively heavy. A tether connecting the robot to a power supply would remove the power supply from the robot entirely. This has the advantage of saving weight and space by moving all power generation and storage components elsewhere. However, this design does come with the drawback of constantly having a cable connected to the robot, which can be difficult to manage.[15] Potential power sources could be:
faeces (human, animal); may be interesting in a military context as faeces of small combat groups may be reused for the energy requirements of the robot assistant (see DEKA's project Slingshot Stirling engine on how the system would operate)

Comments

Popular posts from this blog

CCNA3 v4.0 Final Exam Answers Updated 2013 100%

1. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect? AS1 and AS2 DS1 and DS2 DS1, DS2, and CS1 AS1, AS2, DS1, and DS2 2. Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting? user EXEC mode privileged EXEC mode global configuration mode interface configuration mode 3. Refer to the exhibit. Which Spanning Tree Protocol version is in effect? Per VLAN Spanning Tree (PVST) Per VLAN Spanning Tree + (PVST+) Common Spanning Tree (CST) Rapid Spanning Tree Protocol (RSTP) Multiple Spanning Tree Protocol (MSTP) 4. Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this pr...

CCNA 2 EROUTING version 4 2013 FINAL EXAM ANSWERS 100%

CCNA 2 Final Exam 2013 v 4   1. Refer to the exhibit. A network engineer removes a new router from the shipping container and powers on the router to ensure it passes POST. Which port would the engineer use to perform the initial configuration? AUX console FE0/0 FE0/1 2. What is the purpose of the TTL field within an IP packet header? clears an unreachable route from the routing table after the invalid timer expires prevents regular update messages from inappropriately reinstating a route that may have gone bad removes an unreachable route from the routing table after the flush timer expires limits the period of time or number of hops a packet can traverse through the network before it should be discarded used to mark the route as unreachable in a routing update that is sent to other routers 3. When would the network administrator use the ip bandwidth-percent eigrp as-number percent command? when there is a low bandwidth connection when the co...

CCNA 1 Final Examv3 Answers 2013

    1. Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.) The cable is suitable for connecting a switch to a router Ethernet port. The cable is suitable for connecting dissimilar types of devices. The cable is unusable and must be rewired. The cable is terminated in a way that the transmit pin is wired to the receive pin. The cable simulates a point-to-point WAN link. 2. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.) Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login The entries specify three Telnet lines for remote access. The entries specify four Telnet lines for remote access. The entries set the console and Telnet password to “c13c0″. Telnet access will be denied because the Telnet ...