text stringlengths 31 999 | source stringclasses 5 values |
|---|---|
IPOP (IP-Over-P2P) is an open-source user-centric software virtual network allowing end users to define and create their own virtual private networks (VPNs). IPOP virtual networks provide end-to-end tunneling of IP or Ethernet over “TinCan” links setup and managed through a control API to create various software-defined VPN overlays.
History
IPOP started as a research project at the University of Florida in 2006 | https://huggingface.co/datasets/fmars/wiki_stem |
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
IPsec includes protocols for establishing mutual authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session | https://huggingface.co/datasets/fmars/wiki_stem |
Layer 2 Tunnelling Protocol version 3 is an IETF standard related to L2TP that can be used as an alternative protocol to Multiprotocol Label Switching (MPLS) for encapsulation of multiprotocol Layer 2 communications traffic over IP networks. Like L2TP, L2TPv3 provides a pseudo-wire service, but scaled to fit carrier requirements.
L2TPv3 can be regarded as being to MPLS what IP is to ATM: a simplified version of the same concept, with much of the same benefit achieved at a fraction of the effort, at the cost of losing some technical features considered less important in the market | https://huggingface.co/datasets/fmars/wiki_stem |
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It uses encryption ('hiding') only for its own control messages (using an optional pre-shared secret), and does not provide any encryption or confidentiality of content by itself. Rather, it provides a tunnel for Layer 2 (which may be encrypted), and the tunnel itself may be passed over a Layer 3 encryption protocol such as IPsec | https://huggingface.co/datasets/fmars/wiki_stem |
In telecommunications, Multiprotocol Label Switching - Transport Profile (MPLS-TP) is a variant of the MPLS protocol that is used in packet switched data networks. MPLS-TP is the product of a joint Internet Engineering Task Force (IETF) / International Telecommunication Union Telecommunication Standardization Sector (ITU-T) effort to include an MPLS Transport Profile within the IETF MPLS and PWE3 architectures to support the capabilities and functionalities of a packet transport network.
Description
MPLS-TP is designed for use as a network layer technology in transport networks | https://huggingface.co/datasets/fmars/wiki_stem |
Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses. Whereas network addresses identify endpoints the labels identify established paths between endpoints. MPLS can encapsulate packets of various network protocols, hence the multiprotocol component of the name | https://huggingface.co/datasets/fmars/wiki_stem |
OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server applications.
OpenVPN allows peers to authenticate each other using pre-shared secret keys, certificates or username/password | https://huggingface.co/datasets/fmars/wiki_stem |
In computer networking, the Point-to-Point Protocol over ATM (PPPoA) is a layer 2 data-link protocol typically used to connect domestic broadband modems to ISPs via phone lines. It is used mainly with DOCSIS and DSL carriers, by encapsulating PPP frames in ATM AAL5. Point-to-Point Protocol over Asynchronous Transfer Mode (PPPoA) is specified by The Internet Engineering Task Force (IETF) in RFC 2364 | https://huggingface.co/datasets/fmars/wiki_stem |
The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames. It appeared in 1999, in the context of the boom of DSL as the solution for tunneling packets over the DSL connection to the ISP's IP network, and from there to the rest of the Internet. A 2005 networking book noted that "Most DSL providers use PPPoE, which provides authentication, encryption, and compression | https://huggingface.co/datasets/fmars/wiki_stem |
The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks. PPTP has many well known security issues.
PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets | https://huggingface.co/datasets/fmars/wiki_stem |
In computer networking and telecommunications, a pseudowire (or pseudo-wire) is an emulation of a point-to-point connection over a packet-switched network (PSN).
The pseudowire emulates the operation of a "transparent wire" carrying the service, but it is realized that this emulation will rarely be perfect. The service being carried over the "wire" may be Asynchronous Transfer Mode (ATM), Frame Relay, Ethernet or time-division multiplexing (TDM) while the packet network may be Multiprotocol Label Switching (MPLS), Internet Protocol (IPv4 or IPv6), or Layer 2 Tunneling Protocol Version 3 (L2TPv3) | https://huggingface.co/datasets/fmars/wiki_stem |
In MPLS, a label with the value of 1 represents the router alert label. This label value is legal anywhere in the label stack except at the bottom. When a received packet contains this label value at the top of the label stack, it is delivered to a local software module for processing | https://huggingface.co/datasets/fmars/wiki_stem |
Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel. SSL/TLS provides transport-level security with key negotiation, encryption and traffic integrity checking. The use of SSL/TLS over TCP port 443 (by default, port can be changed) allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies | https://huggingface.co/datasets/fmars/wiki_stem |
Stunnel is an open-source multi-platform application used to provide a universal TLS/SSL tunneling service.
Stunnel is used to provide secure encrypted connections for clients or servers that do not speak TLS or SSL natively. It runs on a variety of operating systems, including most Unix-like operating systems and Windows | https://huggingface.co/datasets/fmars/wiki_stem |
T-MPLS or Transport MPLS is a transport network layer technology that uses extensions to a subset of the existing MPLS standards and is designed specifically for application in transport networks. Work to define T-MPLS was started by the ITU-T in February 2006. It was intended specifically as a connection-oriented packet-switched (co-ps) application offering a simpler implementation by removing MPLS features that are not relevant to co-ps applications and adding mechanisms that provide support of critical transport functionality | https://huggingface.co/datasets/fmars/wiki_stem |
In computer networking, Teredo is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts that are on the IPv4 Internet but have no native connection to an IPv6 network. Unlike similar protocols such as 6to4, it can perform its function even from behind network address translation (NAT) devices such as home routers.
Teredo operates using a platform independent tunneling protocol that provides IPv6 (Internet Protocol version 6) connectivity by encapsulating IPv6 datagram packets within IPv4 User Datagram Protocol (UDP) packets | https://huggingface.co/datasets/fmars/wiki_stem |
University of Tsukuba Virtual Private Network, UT-VPN is a free and open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses SSL/TLS security for encryption and is capable of traversing network address translators (NATs) and firewalls. It was written by Daiyuu Nobori and SoftEther Corporation, and is published under the GNU General Public License (GPL) by University of Tsukuba | https://huggingface.co/datasets/fmars/wiki_stem |
Virtual Extensible LAN (VXLAN) is a network virtualization technology that attempts to address the scalability problems associated with large cloud computing deployments. It uses a VLAN-like encapsulation technique to encapsulate OSI layer 2 Ethernet frames within layer 4 UDP datagrams, using 4789 as the default IANA-assigned destination UDP port number. VXLAN endpoints, which terminate VXLAN tunnels and may be either virtual or physical switch ports, are known as VXLAN tunnel endpoints (VTEPs) | https://huggingface.co/datasets/fmars/wiki_stem |
WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs), and was designed with the goals of ease of use, high speed performance, and low attack surface. It aims for better performance and more power than IPsec and OpenVPN, two common tunneling protocols. The WireGuard protocol passes traffic over UDP | https://huggingface.co/datasets/fmars/wiki_stem |
Application virtualization is a software technology that encapsulates computer programs from the underlying operating system on which they are executed. A fully virtualized application is not installed in the traditional sense, although it is still executed as if it were. The application behaves at runtime like it is directly interfacing with the original operating system and all the resources managed by it, but can be isolated or sandboxed to varying degrees | https://huggingface.co/datasets/fmars/wiki_stem |
Bytecode (also called portable code or p-code) is a form of instruction set designed for efficient execution by a software interpreter. Unlike human-readable source code, bytecodes are compact numeric codes, constants, and references (normally numeric addresses) that encode the result of compiler parsing and performing semantic analysis of things like type, scope, and nesting depths of program objects.
The name bytecode stems from instruction sets that have one-byte opcodes followed by optional parameters | https://huggingface.co/datasets/fmars/wiki_stem |
In computer science, dynamic recompilation is a feature of some emulators and virtual machines, where the system may recompile some part of a program during execution. By compiling during execution, the system can tailor the generated code to reflect the program's run-time environment, and potentially produce more efficient code by exploiting information that is not available to a traditional static compiler.
Uses
Most dynamic recompilers are used to convert machine code between architectures at runtime | https://huggingface.co/datasets/fmars/wiki_stem |
An embedded hypervisor is a hypervisor that supports the requirements of embedded systems.
The requirements for an embedded hypervisor are distinct from hypervisors targeting server and desktop applications.
An embedded hypervisor is designed into the embedded device from the outset, rather than loaded subsequent to device deployment | https://huggingface.co/datasets/fmars/wiki_stem |
In computing, just-in-time (JIT) compilation (also dynamic translation or run-time compilations) is compilation (of computer code) during execution of a program (at run time) rather than before execution. This may consist of source code translation but is more commonly bytecode translation to machine code, which is then executed directly. A system implementing a JIT compiler typically continuously analyses the code being executed and identifies parts of the code where the speedup gained from compilation or recompilation would outweigh the overhead of compiling that code | https://huggingface.co/datasets/fmars/wiki_stem |
Live migration refers to the process of moving a running virtual machine (VM) or application between different physical machines without disconnecting the client or application. Memory, storage, and network connectivity of the virtual machine are transferred from the original guest machine to the destination. The time between stopping the VM or application on the source and resuming it on destination is called 'downtime' | https://huggingface.co/datasets/fmars/wiki_stem |
Mobile virtualization is hardware virtualization on a mobile phone or connected wireless device. It enables multiple operating systems or virtual machines to run simultaneously on a mobile phone or connected wireless device. It uses a hypervisor to create secure separation between the underlying hardware and the software that runs on top of it; this can be considered a form of an embedded hypervisor, or a close analogue | https://huggingface.co/datasets/fmars/wiki_stem |
In computing, network virtualization is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization.
Network virtualization is categorized as either external virtualization, combining many networks or parts of networks into a virtual unit, or internal virtualization, providing network-like functionality to software containers on a single network server | https://huggingface.co/datasets/fmars/wiki_stem |
The Open Virtualization Alliance (OVA) was a Linux Foundation Collaborative Project committed to foster the adoption of free and open-source software virtualization solutions including KVM, but also software to manage such, e. g. oVirt | https://huggingface.co/datasets/fmars/wiki_stem |
Open Virtualization Format (OVF) is an open standard for packaging and distributing virtual appliances or, more generally, software to be run in virtual machines.
The standard describes an "open, secure, portable, efficient and extensible format for the packaging and distribution of software to be run in virtual machines". The OVF standard is not tied to any particular hypervisor or instruction set architecture | https://huggingface.co/datasets/fmars/wiki_stem |
OS-level virtualization is an operating system (OS) paradigm in which the kernel allows the existence of multiple isolated user space instances, called containers (LXC, Solaris containers, Docker, Podman), zones (Solaris containers), virtual private servers (OpenVZ), partitions, virtual environments (VEs), virtual kernels (DragonFly BSD), or jails (FreeBSD jail or chroot jail). Such instances may look like real computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders, network shares, CPU power, quantifiable hardware capabilities) of that computer | https://huggingface.co/datasets/fmars/wiki_stem |
In computing, paravirtualization or para-virtualization is a virtualization technique that presents a software interface to the virtual machines which is similar, yet not identical, to the underlying hardware–software interface.
The intent of the modified interface is to reduce the portion of the guest's execution time spent performing operations which are substantially more difficult to run in a virtual environment compared to a non-virtualized environment. The paravirtualization provides specially defined 'hooks' to allow the guest(s) and host to request and acknowledge these tasks, which would otherwise be executed in the virtual domain (where execution performance is worse) | https://huggingface.co/datasets/fmars/wiki_stem |
Red Hat Virtualization (RHV) formerly known as Red Hat Enterprise Virtualization, is an x86 virtualization product developed by Red Hat, and is based on the KVM hypervisor. Red Hat Virtualization uses the SPICE protocol and VDSM (Virtual Desktop Server Manager) with a RHEL-based centralized management server. The platform can access user and group information from either an Active Directory or FreeIPA domain which enables it to allocate resources effectively based on permissions | https://huggingface.co/datasets/fmars/wiki_stem |
The following is a timeline of virtualization development. In computing, virtualization is the use of a computer to simulate another computer. Through virtualization, a host simulates a guest by exposing virtual hardware devices, which may be done through software or by allowing access to a physical device connected to the machine | https://huggingface.co/datasets/fmars/wiki_stem |
In the 80386 microprocessor and later, virtual 8086 mode (also called virtual real mode, V86-mode, or VM86) allows the execution of real mode applications that are incapable of running directly in protected mode while the processor is running a protected mode operating system. It is a hardware virtualization technique that allowed multiple 8086 processors to be emulated by the 386 chip. It emerged from the painful experiences with the 80286 protected mode, which by itself was not suitable to run concurrent real-mode applications well | https://huggingface.co/datasets/fmars/wiki_stem |
A virtual application is an application that has been optimized to run on virtual infrastructure. The application software along with just enough operating system (JeOS or "juice") is combined inside a virtual machine container in a manner that maximizes the performance of the application. By minimizing the system software to the smallest set of packages required to support the application, the maintenance and administration burden of the virtual application is greatly reduced | https://huggingface.co/datasets/fmars/wiki_stem |
Virtual DOS machines (VDM) refer to a technology that allows running 16-bit/32-bit DOS and 16-bit Windows programs when there is already another operating system running and controlling the hardware.
Overview
Virtual DOS machines can operate either exclusively through typical software emulation methods (e. g | https://huggingface.co/datasets/fmars/wiki_stem |
A virtual file system (VFS) or virtual filesystem switch is an abstract layer on top of a more concrete file system. The purpose of a VFS is to allow client applications to access different types of concrete file systems in a uniform way. A VFS can, for example, be used to access local and network storage devices transparently without the client application noticing the difference | https://huggingface.co/datasets/fmars/wiki_stem |
A virtual firewall (VF) is a network firewall service or appliance running entirely within a virtualized environment and which provides the usual packet filtering and monitoring provided via a physical network firewall. The VF can be realized as a traditional software firewall on a guest virtual machine already running, a purpose-built virtual security appliance designed with virtual network security in mind, a virtual switch with additional security capabilities, or a managed kernel process running within the host hypervisor.
Background
So long as a computer network runs entirely over physical hardware and cabling, it is a physical network | https://huggingface.co/datasets/fmars/wiki_stem |
In computer security, virtual machine escape is the process of a program breaking out of the virtual machine on which it is running and interacting with the host operating system. A virtual machine is a "completely isolated guest operating system installation within a normal host operating system". In 2008, a vulnerability (CVE-2008-0923) in VMware discovered by Core Security Technologies made VM escape possible on VMware Workstation 6 | https://huggingface.co/datasets/fmars/wiki_stem |
Virtual machining is the practice of using computers to simulate and model the use of machine tools for part manufacturing. Such activity replicates the behavior and errors of a real environment in virtual reality systems. This can provide useful ways to manufacture products without physical testing on the shop floor | https://huggingface.co/datasets/fmars/wiki_stem |
Virtual Processor (VP) was a virtual machine from Tao Group.
History
The first version, VP1, was the basis of its parallel processing multimedia OS and platform, TAOS. VP1 supported a RISC-like instruction set with 16 32-bit registers, and had data types of 32- and 64-bit integers and 32- and 64-bit IEEE floating point numbers in registers, and also supported 8- and 16-bit integers in memory | https://huggingface.co/datasets/fmars/wiki_stem |
Virtual resource partitioning (VRP) is an operating system-level virtualization technology that allocates computing resources (such as CPU & I/O) to transactions. Conventional virtualization technologies allocate resources on an operating system (Windows, Linux. | https://huggingface.co/datasets/fmars/wiki_stem |
Administrative shares are hidden network shares created by the Windows NT family of operating systems that allow system administrators to have remote access to every disk volume on a network-connected system. These shares may not be permanently deleted but may be disabled. Administrative shares cannot be accessed by users without administrative privileges | https://huggingface.co/datasets/fmars/wiki_stem |
Developmental robotics (DevRob), sometimes called epigenetic robotics, is a scientific field which aims at studying the developmental mechanisms, architectures and constraints that allow lifelong and open-ended learning of new skills and new knowledge in embodied machines. As in human children, learning is expected to be cumulative and of progressively increasing complexity, and to result from self-exploration of the world in combination with social interaction. The typical methodological approach consists in starting from theories of human and animal development elaborated in fields such as developmental psychology, neuroscience, developmental and evolutionary biology, and linguistics, then to formalize and implement them in robots, sometimes exploring extensions or variants of them | https://huggingface.co/datasets/fmars/wiki_stem |
Dex-net is a robotic manipulator. It uses a Grasp Quality Convolutional Neural Network to learn how to grasp unusually shaped objects.
History
Dex-net was developed by University of California, Berkeley professor Ken Goldberg and graduate student Jeff Mahler | https://huggingface.co/datasets/fmars/wiki_stem |
Educational robotics teaches the design, analysis, application and operation of robots. Robots include articulated robots, mobile robots or autonomous vehicles. Educational robotics can be taught from elementary school to graduate programs | https://huggingface.co/datasets/fmars/wiki_stem |
Electroadhesion is the electrostatic effect of astriction between two surfaces subjected to an electrical field. Applications include the retention of paper on plotter surfaces, astrictive robotic prehension (electrostatic grippers) etc. Clamping pressures in the range of 0 | https://huggingface.co/datasets/fmars/wiki_stem |
Embodied cognitive science is an interdisciplinary field of research, the aim of which is to explain the mechanisms underlying intelligent behavior. It comprises three main methodologies: the modeling of psychological and biological systems in a holistic manner that considers the mind and body as a single entity; the formation of a common set of general principles of intelligent behavior; and the experimental use of robotic agents in controlled environments.
Contributors
Embodied cognitive science borrows heavily from embodied philosophy and the related research fields of cognitive science, psychology, neuroscience and artificial intelligence | https://huggingface.co/datasets/fmars/wiki_stem |
Empowerment in the field of artificial intelligence formalises and quantifies (via information theory) the potential an agent perceives that it has to influence its environment. An agent which follows an empowerment maximising policy, acts to maximise future options (typically up to some limited horizon). Empowerment can be used as a (pseudo) utility function that depends only on information gathered from the local environment to guide action, rather than seeking an externally imposed goal, thus is a form of intrinsic motivation | https://huggingface.co/datasets/fmars/wiki_stem |
Evolutionary robotics is an embodied approach to Artificial Intelligence (AI) in which robots are automatically designed using Darwinian principles of natural selection. The design of a robot, or a subsystem of a robot such as a neural controller, is optimized against a behavioral goal (e. g | https://huggingface.co/datasets/fmars/wiki_stem |
The FIRST Global Challenge is a yearly Olympics-style robotics competition organized by the International First Committee Association. It promotes STEM education and careers for youth and was created by Dean Kamen in 2016 as an expansion of FIRST, an organization with similar objectives.
History
FIRST Global is a trade name for the International First Committee Association, a nonprofit corporation based in Manchester, New Hampshire, with a 501(c)3 designation from the IRS | https://huggingface.co/datasets/fmars/wiki_stem |
In kinematics, a five-bar linkage is a mechanism with two degrees of freedom that is constructed from five links that are connected together in a closed chain. All links are connected to each other by five joints in series forming a loop. One of the links is the ground or base | https://huggingface.co/datasets/fmars/wiki_stem |
In Isaac Asimov's robot novels, Frankenstein complex is a term he coined for the fear of mechanical men.
History
Some of Asimov's science fiction short stories and novels predict that this suspicion will become strongest and most widespread in respect of "mechanical men" that most-closely resemble human beings (see android), but it is also present on a lower level against robots that are plainly electromechanical automatons. The "Frankenstein complex" is similar in many respects to Masahiro Mori's uncanny valley hypothesis | https://huggingface.co/datasets/fmars/wiki_stem |
Human-Robot Collaboration is the study of collaborative processes in human and robot agents work together to achieve shared goals. Many new applications for robots require them to work alongside people as capable members of human-robot teams. These include robots for homes, hospitals, and offices, space exploration and manufacturing | https://huggingface.co/datasets/fmars/wiki_stem |
Human–robot interaction (HRI) is the study of interactions between humans and robots. Human–robot interaction is a multidisciplinary field with contributions from human–computer interaction, artificial intelligence, robotics, natural language processing, design, and psychology. A subfield known as physical human–robot interaction (pHRI) has tended to focus on device design to enable people to safely interact with robotic systems | https://huggingface.co/datasets/fmars/wiki_stem |
Intrinsic motivation in the study of artificial intelligence and robotics is a mechanism for enabling artificial agents (including robots) to exhibit inherently rewarding behaviours such as exploration and curiosity, grouped under the same term in the study of psychology. Psychologists consider intrinsic motivation in humans to be the drive to perform an activity for inherent satisfaction – just for the fun or challenge of it.
Definition
An intelligent agent is intrinsically motivated to act if the information content alone, or the experience resulting from the action, is the motivating factor | https://huggingface.co/datasets/fmars/wiki_stem |
IOIO (pronounced yo-yo) is a series of open source PIC microcontroller-based boards that allow Android mobile applications to interact with external electronics. The device was invented by Ytai Ben-Tsvi in 2011, and was first manufactured by SparkFun Electronics. The name "IOIO" is inspired by the function of the device, which enables applications to receive external input ("I") and produce external output ("O") | https://huggingface.co/datasets/fmars/wiki_stem |
A Killough platform is a three-wheel drive system that uses traditional wheels to achieve omni-directional movement without the use of omni-directional wheels (such as omni wheels/Mecanum wheels). Designed by Stephen Killough, after which the platform is named, with help from Francois Pin, wanted to achieve omni-directional movement without using the complicated six motor arrangement required to achieve a controllable three caster wheel system (one motor to control wheel rotation and one motor to control pivoting of the wheel). He first looked into solutions by other inventors that used rollers on the rims larger wheels but considered them flawed in some critical way | https://huggingface.co/datasets/fmars/wiki_stem |
Laboratory automation is a multi-disciplinary strategy to research, develop, optimize and capitalize on technologies in the laboratory that enable new and improved processes. Laboratory automation professionals are academic, commercial and government researchers, scientists and engineers who conduct research and develop new technologies to increase productivity, elevate experimental data quality, reduce lab process cycle times, or enable experimentation that otherwise would be impossible.
The most widely known application of laboratory automation technology is laboratory robotics | https://huggingface.co/datasets/fmars/wiki_stem |
Laboratory robotics is the act of using robots in biology, chemistry or engineering labs. For example, pharmaceutical companies employ robots to move biological or chemical samples around to synthesize novel chemical entities or to test pharmaceutical value of existing chemical matter. Advanced laboratory robotics can be used to completely automate the process of science, as in the Robot Scientist project | https://huggingface.co/datasets/fmars/wiki_stem |
Laws of robotics are any set of laws, rules, or principles, which are intended as a fundamental framework to underpin the behavior of robots designed to have a degree of autonomy. Robots of this degree of complexity do not yet exist, but they have been widely anticipated in science fiction, films and are a topic of active research and development in the fields of robotics and artificial intelligence.
The best known set of laws are those written by Isaac Asimov in the 1940s, or based upon them, but other sets of laws have been proposed by researchers in the decades since then | https://huggingface.co/datasets/fmars/wiki_stem |
Leachim was an early example of Diphone synthetic speech and demonstrated how voice branching could be done quickly via computer discs to create understandable speech (i. e. verbal output) | https://huggingface.co/datasets/fmars/wiki_stem |
Maillardet's automaton (or Draughtsman-Writer, sometime also known as Maelzel's Juvenile Artist or Juvenile Artist) is an automaton built in London c. 1800 by a Swiss mechanician, Henri Maillardet. It is currently part of the collections at The Franklin Institute in Philadelphia | https://huggingface.co/datasets/fmars/wiki_stem |
March of the Machines: Why the New Race of Robots Will Rule the World (1997, hardcover), published in paperback as March of the Machines: The Breakthrough in Artificial Intelligence (2004), is a book by Kevin Warwick. It presents an overview of robotics and artificial intelligence (AI), often focusing on anecdotes of Warwick's own work, and then imagines future scenarios. In particular, Warwick finds it likely that such AIs will become smart enough to replace humans, and humans may be unable to stop them | https://huggingface.co/datasets/fmars/wiki_stem |
MAVLink or Micro Air Vehicle Link is a protocol for communicating with small unmanned vehicle. It is designed as a header-only message marshaling library. MAVLink was first released early 2009 by Lorenz Meier under the LGPL license | https://huggingface.co/datasets/fmars/wiki_stem |
Microbotics (or microrobotics) is the field of miniature robotics, in particular mobile robots with characteristic dimensions less than 1 mm. The term can also be used for robots capable of handling micrometer size components.
History
Microbots were born thanks to the appearance of the microcontroller in the last decade of the 20th century, and the appearance of microelectromechanical systems (MEMS) on silicon, although many microbots do not use silicon for mechanical components other than sensors | https://huggingface.co/datasets/fmars/wiki_stem |
A mind-controlled wheelchair is a mind-machine interfacing device that uses thought (neural impulses) to command the motorised wheelchair's motion. The first such device to reach production was designed by Diwakar Vaish, Head of Robotics and Research at A-SET Training & Research Institutes. The wheelchair is of great importance to patients with locked-in syndrome (LIS), in which a patient is aware but cannot move or communicate verbally due to complete paralysis of nearly all voluntary muscles in the body except the eyes | https://huggingface.co/datasets/fmars/wiki_stem |
Molecular nanotechnology (MNT) is a technology based on the ability to build structures to complex, atomic specifications by means of mechanosynthesis. This is distinct from nanoscale materials. Based on Richard Feynman's vision of miniature factories using nanomachines to build complex products (including additional nanomachines), this advanced form of nanotechnology (or molecular manufacturing) would make use of positionally-controlled mechanosynthesis guided by molecular machine systems | https://huggingface.co/datasets/fmars/wiki_stem |
Morphogenetic robotics generally refers to the methodologies that address challenges in robotics inspired by biological morphogenesis.
Background
Differences to epigenetic
Morphogenetic robotics is related to, but differs from, epigenetic robotics. The main difference between morphogenetic robotics and epigenetic robotics is that the former focuses on self-organization, self-reconfiguration, self-assembly and self-adaptive control of robots using genetic and cellular mechanisms inspired from biological early morphogenesis (activity-independent development), during which the body and controller of the organisms are developed simultaneously, whereas the latter emphasizes the development of robots' cognitive capabilities, such as language, emotion and social skills, through experience during the lifetime (activity-dependent development) | https://huggingface.co/datasets/fmars/wiki_stem |
Nanoid robotics, or for short, nanorobotics or nanobotics, is an emerging technology field creating machines or robots whose components are at or near the scale of a nanometer (10−9 meters). More specifically, nanorobotics (as opposed to microrobotics) refers to the nanotechnology engineering discipline of designing and building nanorobots with devices ranging in size from 0. 1 to 10 micrometres and constructed of nanoscale or molecular components | https://huggingface.co/datasets/fmars/wiki_stem |
Neuromorphic computing is an approach to computing that is inspired by the structure and function of the human brain. A neuromorphic computer/chip is any device that uses physical artificial neurons to do computations. In recent times, the term neuromorphic has been used to describe analog, digital, mixed-mode analog/digital VLSI, and software systems that implement models of neural systems (for perception, motor control, or multisensory integration) | https://huggingface.co/datasets/fmars/wiki_stem |
Neurorobotics is the combined study of neuroscience, robotics, and artificial intelligence. It is the science and technology of embodied autonomous neural systems. Neural systems include brain-inspired algorithms (e | https://huggingface.co/datasets/fmars/wiki_stem |
Open-source robotics (OSR) is where the physical artifacts of the subject are offered by the open design movement. This branch of robotics makes use of open-source hardware and free and open-source software providing blueprints, schematics, and source code. The term usually means that information about the hardware is easily discerned so that others can make it from standard commodity components and tools—coupling it closely to the maker movement and open science | https://huggingface.co/datasets/fmars/wiki_stem |
Operational design domain (ODD) is a term for a set of operating conditions for an automated system, often used in the field of autonomous vehicles. These operating conditions include environmental, geographical and time of day constraints, traffic and roadway characteristics. The ODD is used by manufacturers to indicate where their product will operate safely | https://huggingface.co/datasets/fmars/wiki_stem |
Perceptual control theory (PCT) is a model of behavior based on the properties of negative feedback control loops. A control loop maintains a sensed variable at or near a reference value by means of the effects of its outputs upon that variable, as mediated by physical properties of the environment. In engineering control theory, reference values are set by a user outside the system | https://huggingface.co/datasets/fmars/wiki_stem |
Pipeline video inspection is a form of telepresence used to visually inspect the interiors of pipelines, plumbing systems, and storm drains. A common application is for a plumber to determine the condition of small diameter sewer lines and household connection drain pipes.
Older sewer lines of small diameter, typically 6-inch (150 mm), are made by the union of a number of short 3 feet (0 | https://huggingface.co/datasets/fmars/wiki_stem |
In computer vision, pattern recognition, and robotics, point-set registration, also known as point-cloud registration or scan matching, is the process of finding a spatial transformation (e. g. , scaling, rotation and translation) that aligns two point clouds | https://huggingface.co/datasets/fmars/wiki_stem |
The product of exponentials (POE) method is a robotics convention for mapping the links of a spatial kinematic chain. It is an alternative to Denavit–Hartenberg parameterization. While the latter method uses the minimal number of parameters to represent joint motions, the former method has a number of advantages: uniform treatment of prismatic and revolute joints, definition of only two reference frames, and an easy geometric interpretation from the use of screw axes for each joint | https://huggingface.co/datasets/fmars/wiki_stem |
Robopsychology is the study of the personalities and behavior of intelligent machines. The term was coined by Isaac Asimov in the short stories collected in I, Robot, which featured robopsychologist Dr. Susan Calvin, and whose plots largely revolved around the protagonist solving problems connected with intelligent robot behaviour | https://huggingface.co/datasets/fmars/wiki_stem |
Robot as a service or robotics as a service (RaaS) is a cloud computing unit that facilitates the seamless integration of robot and embedded devices into Web and cloud computing environment. In terms of service-oriented architecture (SOA), a RaaS unit includes services for performing functionality, a service directory for discovery and publishing, and service clients for user's direct access. The current RaaS implementation facilitates SOAP and RESTful communications between RaaS units and the other cloud computing units | https://huggingface.co/datasets/fmars/wiki_stem |
Robot economics is the study of the market for robots. Robot markets function through the interaction of robot makers and robot users. As (in part) a factor of production, robots are complements and/or substitutes for other factors, such as labor and (non-robot) capital goods | https://huggingface.co/datasets/fmars/wiki_stem |
The Robot Interaction Language (ROILA) is the first spoken language created specifically for talking to robots. ROILA is being developed by the Department of Industrial Design at Eindhoven University of Technology. The major goals of ROILA are that it should be easily learnable by the user, and optimized for efficient recognition by robots | https://huggingface.co/datasets/fmars/wiki_stem |
A robot leg (or robotic leg) is a mechanical leg that performs the same functions that a human leg can. The robotic leg is typically programmed to execute similar functions as a human leg. A robotic leg is similar to a prosthetic leg | https://huggingface.co/datasets/fmars/wiki_stem |
The word roboteer refers to those with interests or careers in robotics. It dates back to the 1930s and is also used in 'Future Shock' (1970).
The term roboteer was used by Barbara Krasnov for a story on Deb Huglin, owner of the Robotorium, Inc | https://huggingface.co/datasets/fmars/wiki_stem |
Robotic governance provides a regulatory framework to deal with autonomous and intelligent machines. This includes research and development activities as well as handling of these machines. The idea is related to the concepts of corporate governance, technology governance and IT-governance, which provide a framework for the management of organizations or the focus of a global IT infrastructure | https://huggingface.co/datasets/fmars/wiki_stem |
Robotic materials are composite materials that combine sensing, actuation, computation, and communication in a repeatable or amorphous pattern. Robotic materials can be considered computational metamaterials in that they extend the original definition of a metamaterial as "macroscopic composites having a man-made, three-dimensional, periodic cellular architecture designed to produce an optimized combination, not available in nature, of two or more responses to specific excitation" by being fully programmable. That is, unlike in a conventional metamaterial, the relationship between a specific excitation and response is governed by sensing, actuation, and a computer program that implements the desired logic | https://huggingface.co/datasets/fmars/wiki_stem |
Robotic non-destructive testing (NDT) is a method of inspection used to assess the structural integrity of petroleum, natural gas, and water installations. Crawler-based robotic tools are commonly used for in-line inspection (ILI) applications in pipelines that cannot be inspected using traditional intelligent pigging tools (or unpiggable pipelines).
Robotic NDT tools can also be used for mandatory inspections in inhospitable areas (e | https://huggingface.co/datasets/fmars/wiki_stem |
Robotic process automation (RPA) is a form of business process automation that is based on software robots (bots) or artificial intelligence (AI) agents. It is sometimes referred to as software robotics (not to be confused with robot software).
In traditional workflow automation tools, a software developer produces a list of actions to automate a task and interface to the back end system using internal application programming interfaces (APIs) or dedicated scripting language | https://huggingface.co/datasets/fmars/wiki_stem |
Robotic prosthesis control is a method for controlling a prosthesis in such a way that the controlled robotic prosthesis restores a biologically accurate gait to a person with a loss of limb. This is a special branch of control that has an emphasis on the interaction between humans and robotics.
Background
In the 1970s several researchers developed a tethered electrohydraulic transfemoral prosthesis | https://huggingface.co/datasets/fmars/wiki_stem |
Robotic voice effects became a recurring element in popular music starting in the second half of the twentieth century. Several methods of producing variations on this effect have arisen.
Vocoder
The vocoder was originally designed to aid in the transmission of voices over telephony systems | https://huggingface.co/datasets/fmars/wiki_stem |
There are many conventions used in the robotics research field. This article summarises these conventions.
Line representations
Lines are very important in robotics because:
They model joint axes: a revolute joint makes any connected rigid body rotate about the line of its axis; a prismatic joint makes the connected rigid body translate along its axis line | https://huggingface.co/datasets/fmars/wiki_stem |
A scenario in the field of vehicular automation denotes a sequence of snapshots of the environment and the interactions of a vehicle in the process of performing its tasks. Scenarios are created to represent real-world situations and are used for development, testing and validation purposes.
Standards
Relationship to ODD
According to the concept paper of ASAM OpenODD, scenarios are related to operational design domain | https://huggingface.co/datasets/fmars/wiki_stem |
A sensing floor is a floor with embedded sensors.
Depending on their construction, these floors are either monobloc (e. g | https://huggingface.co/datasets/fmars/wiki_stem |
In artificial intelligence and cognitive science, the term situated refers to an agent which is embedded in an environment. In this used, the term is used to refer to robots, but some researchers argue that software agents can also be situated if:
they exist in a dynamic (rapidly changing) environment, which
they can manipulate or change through their actions, and which
they can sense or perceive. Being situated is generally considered to be part of being embodied, but it is useful to take both perspectives | https://huggingface.co/datasets/fmars/wiki_stem |
Sociorobotics is a field of research studying the implications, complexities and subsequent design of artificial social, spatial, cultural and haptic behaviours, protocols and interactions of robots with each other and with humans in equal measure. Intrinsically taking into account the structured and unstructured spaces of habitation, including industrial, commercial, healthcare, eldercare and domestic environments. This emergent perspective to robotic research encompasses and surpasses the conventions of Social robotics and Artificial society/social systems research | https://huggingface.co/datasets/fmars/wiki_stem |
Soft Growing Robotics is a subset of soft robotics concerned with designing and building robots that use robot body expansion to move and interact with the environment.
Soft growing robots are built from compliant materials and attempt to mimic how vines, plant shoots, and other organisms reach new locations through growth. While other forms of robots use locomotion to achieve their objectives, soft growing robots elongate their body through addition of new material, or expansion of material | https://huggingface.co/datasets/fmars/wiki_stem |
Soft robotics is a subfield of robotics that concerns the design, control, and fabrication of robots composed of compliant materials, instead of rigid links.
In contrast to rigid-bodied robots built from metals, ceramics and hard plastics, the compliance of soft robots can improve their safety when working in close contact with humans.
Types and designs
The goal of soft robotics is the design and construction of robots with physically flexible bodies and electronics | https://huggingface.co/datasets/fmars/wiki_stem |
In mathematics, a superellipsoid (or super-ellipsoid) is a solid whose horizontal sections are superellipses (Lamé curves) with the same squareness parameter
ϵ
2
{\displaystyle \epsilon _{2}}
, and whose vertical sections through the center are superellipses with the squareness parameter
ϵ
1
{\displaystyle \epsilon _{1}}
. It is a generalization of an ellipsoid, which is a special case when
ϵ
1
=
ϵ
2
=
1
{\displaystyle \epsilon _{1}=\epsilon _{2}=1}
. Superellipsoids as computer graphics primitives were popularized by Alan H | https://huggingface.co/datasets/fmars/wiki_stem |
In mathematics, the superquadrics or super-quadrics (also superquadratics) are a family of geometric shapes defined by formulas that resemble those of ellipsoids and other quadrics, except that the squaring operations are replaced by arbitrary powers. They can be seen as the three-dimensional relatives of the superellipses. The term may refer to the solid object or to its surface, depending on the context | https://huggingface.co/datasets/fmars/wiki_stem |
Termite-inspired robots or TERMES robots are biomimetic autonomous robots capable of building complex structures without a central controller. A prototype team of termite-inspired robots was demonstrated by Harvard University researchers in 2014, following four years of development. Their engineering was inspired by the complex mounds that termites build, and was accomplished by developing simple rules to allow the robots to navigate and move building blocks in their environment | https://huggingface.co/datasets/fmars/wiki_stem |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.