Browse Definitions :
Definition

teach box

A teach box is a device that registers and memorizes mechanical motions or processes for later recall and execution by an electronic or computer system. The term especially applies to programmable robots.

Robot programming can be divided into levels, starting with the least complex and progressing to the equivalent of human intelligence. The table shows a four-level scheme.

 

Programming Level Description
4 Human intelligence
3 Complete tasks
2 Sequences of motions or operations
1 Single motions or operations

An example of a level-1 teach box is a remote-control for the doors of a car. When the wireless receiver gets the signal from the remote unit, it locks or unlocks the doors. Another example of a level-1 teach box is the remote box that controls a hi-fi sound system or videocassette recorder (VCR).

An example of a level-2 teach box is the microcomputer that controls a telephone answering machine. When a call comes in, the sequence of operations is recalled from memory. The machine answers the phone, makes an announcement, takes the message, and resets for the next incoming call.

Level-3 teach boxes are used in aerospace, miliatary, and industrial applications.  Level 3, just below human-equivalent artificial intelligence ( AI ), is called task-level programming. Programs at level 3 can instruct a robot to execute complete operations, such as shoveling the snow from a driveway or flying an aircraft on a reconnaissance mission.

The intended movements of a robot are entered into memory by pressing buttons or guiding a joystick or other three-dimensional control device. The robot's path, variations in speed, rotations, and gripping/grasping movements are all programmed. Then, when the memory is recalled, the robot reproduces these movements in the exact sequence, and to the exact extent and speed in all dimensions.

Also see artificial intelligence and robotics .

This was last updated in May 2011

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close