Browse Definitions :
Definition

teach box

A teach box is a device that registers and memorizes mechanical motions or processes for later recall and execution by an electronic or computer system. The term especially applies to programmable robots.

Robot programming can be divided into levels, starting with the least complex and progressing to the equivalent of human intelligence. The table shows a four-level scheme.

 

Programming Level Description
4 Human intelligence
3 Complete tasks
2 Sequences of motions or operations
1 Single motions or operations

An example of a level-1 teach box is a remote-control for the doors of a car. When the wireless receiver gets the signal from the remote unit, it locks or unlocks the doors. Another example of a level-1 teach box is the remote box that controls a hi-fi sound system or videocassette recorder (VCR).

An example of a level-2 teach box is the microcomputer that controls a telephone answering machine. When a call comes in, the sequence of operations is recalled from memory. The machine answers the phone, makes an announcement, takes the message, and resets for the next incoming call.

Level-3 teach boxes are used in aerospace, miliatary, and industrial applications.  Level 3, just below human-equivalent artificial intelligence ( AI ), is called task-level programming. Programs at level 3 can instruct a robot to execute complete operations, such as shoveling the snow from a driveway or flying an aircraft on a reconnaissance mission.

The intended movements of a robot are entered into memory by pressing buttons or guiding a joystick or other three-dimensional control device. The robot's path, variations in speed, rotations, and gripping/grasping movements are all programmed. Then, when the memory is recalled, the robot reproduces these movements in the exact sequence, and to the exact extent and speed in all dimensions.

Also see artificial intelligence and robotics .

This was last updated in May 2011
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close