Free Essay

Unit 2 Assignment 2

In: Computers and Technology

Submitted By Teardrop578
Words 598
Pages 3
Asimo
Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people.
Linda Vaughn |

Asimo
Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people.
Linda Vaughn |

Linda Vaughn
GS1145T
10/3/2015
Why Create ASIMO?
ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science.

In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs.

ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves along the map. ASIMO is able to open and serve beverages, it also knows English and Japanese sign language .It can avoid bumping into people in hallways.

Honda demonstrates ASIMO around the world to encourage and inspire young students to study the sciences ASIMO may also someday help with important tasks like helping the elderly or a person confined to bed or wheelchair and perform tasks that re dangerous to humans like fires and toxic spills.

ABNT
(Brazilian National Standards)
References
AAMOTH, D; PROTIN, C. Smooth Moves: The History and Evolution of Honda's ASIMO Robot. Time.com. 1, Apr. 22, 2014.
AMA
(American Medical Assoc.)
Reference List
Aamoth D, Protin C. Smooth Moves: The History and Evolution of Honda's ASIMO Robot. Time.Com [serial online]. April 22, 2014;:1. Available from: Academic Search Elite, Ipswich, MA. Accessed October 3, 2015.
APA
(American Psychological Assoc.)
References
Aamoth, D., & Protin, C. (2014). Smooth Moves: The History and Evolution of Honda's ASIMO Robot. Time.Com, 1.
Chicago/Turabian: Author-Date
Reference List
Aamoth, Doug, and Corey Protin. 2014. "Smooth Moves: The History and Evolution of Honda's ASIMO Robot." Time.Com 1. Academic Search Elite, EBSCOhost (accessed October 3, 2015).
Chicago/Turabian: Humanities
Bibliography
Aamoth, Doug, and Corey Protin. "Smooth Moves: The History and Evolution of Honda's ASIMO Robot." Time.Com (April 22, 2014): 1. Academic Search Elite, EBSCOhost (accessed October 3, 2015).
Harvard
References
Aamoth, D, & Protin, C 2014, 'Smooth Moves: The History and Evolution of Honda's ASIMO Robot', Time.Com, p. 1, Academic Search Elite, EBSCOhost, viewed 3 October 2015.
Harvard: Australian
References
Aamoth, D, & Protin, C 2014, 'Smooth Moves: The History and Evolution of Honda's ASIMO Robot', Time.com, p. 1.
MLA
(Modern Language Assoc.)
Works Cited
Aamoth, Doug, and Corey Protin. "Smooth Moves: The History And Evolution Of Honda's ASIMO Robot." Time.Com (2014): 1. Academic Search Elite. Web. 3 Oct. 2015.
Vancouver/ICMJE
References
Aamoth D, Protin C. Smooth Moves: The History and Evolution of Honda's ASIMO Robot. Time.Com [serial on the Internet]. (2014, Apr 22), [cited October 3, 2015]; 1. Available from: Academic Search Elite.

http://asimo.honda.com/asimo-specs/

Similar Documents

Free Essay

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active......

Words: 257 - Pages: 2

Premium Essay

Unit 2 Assignment 2

...Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced labour -Right to a fair trial -No punishment without law -Respect for your private and family life, home and correspondence -Freedom of thought, belief and religion -Freedom of expression -Freedom of assembly and association -Right to marry and start a family -Protection from discrimination in respect of these rights and freedoms -Right to peaceful enjoyment of your property -Right to education -Right to participate in free elections This act promotes anti discriminatory practice in a way that it gives everyone the rights they deserve which can’t be taken away from anyone, therefore everyone is equal in what they can do. Data protection act- The data protection act defines UK laws on processing data on identifiable living people. It covers any data which can identify a person such as address, name, Humber, email, information is to be used fairly and lawfully. It is only used for limited specific purposes and in a way that is relevant, adequate and excessive. This promotes anti discriminatory practice as it helps protect......

Words: 4206 - Pages: 17

Free Essay

Unit 2 Assignment 2

...Unit 1 Research Paper 1 Injectable Tissue Engineering Brand Zae GS1140 Injectable Tissue Engineering Introduction Every year more than700,000 Americans undergo a form of joint replacement surgery. The procedure-in which a knee or a hip is replaced with an artificial implant-is highly invasive, and many patients delay said surgery for as long as they can. A doctor by the name of Jennifer Elisseeff , a biomedical engineer at Johns Hopkins University, hopes to change that with a simple and quick procedure that does away with surgery entirely. Dr. Elisseeff and her colleagues have developed a way to inject joints with specially designed mixtures of polymers, cells, and growth stimulators that solidify and form healthy tissue. This form of technology can eliminate the need for many expensive and dangerous surgeries. Surgeries involving muscle development, the cardio vascular system, and even limb repair after a traumatic incident. This form of technology can improve our health care system dramatically and open new windows of opportunity for new forms of medicine. Even the possibility for new cures for diseases that we currently fight every day such as cancer and possibly even HIV, eliminating the need for long and expensive treatments. As well as repairing worn or damaged tissue, this form of engineering can also be used in the future for growing new organs or limbs to replace old damaged or missing ones. If a patient is in need of a new......

Words: 427 - Pages: 2

Free Essay

Unit 2 Assignment 2

...| Retinal implants/The Boston Retinal implant project | Unit2 assignment2 Gs1145 | | | 1/17/2014 | Retinal Implants The article talks about the Boston Retinal Implant Project. It had thirty academically based biologists and engineers. It included several researches from Harvard, Cornell and Massachusetts institute of technology. Professor W. Kizzy Jones from Florida International University college of engineering and computing was one of the thirty researchers. The project focuses on people who loss vision though injury, vision loss caused by eye disorder or age related macular degeneration. Jones’s work on the feed though component that transfer the signals from the implanted microchip to the electrodes was the most technological development device. The improvements on this device will greatly improve the quality of the image the person can see. The device has more than two hundred fifty six electrodes that helps see images with larger number of pixels. It is a device with sixty electrodes that help people who are blind to read words on a screen. Hopefully in the next ten years macular degeneration and retinitis pigmentosa will be a thing of the past. Macular degeneration affects older adults that loss vision in the center of the visual field because of damaged retina. Retinitis pigmentosa is a inherited eye disorder that severe vision impairment. The Boston Ritnal implants project was founded in 1980 and was working with Bionic Eye Technologies inc......

Words: 251 - Pages: 2

Premium Essay

Unit 2 Assignment

...Diana Firebaugh Kaplan University CS204-13: Professional Presence Unit 2 Assignment I chose the professional law firm slide. I believe this person was professional. The things that make this person professional are the way he presents himself with assertiveness, being a tactful presenter with a professional vocabulary and clear communication skills. He also has good posture and is aware of personal space. I don’t believe there was anything about him that was not professional. If it had said he uses slang and profanity or slouched a lot or came to work in street clothes, then there would definitely be a need for improvement. He showed proper professionalism. The appropriate attire for an individual in tax accountancy is professional attire, meaning suits and skirts. Some offices may have a “dress-down” policy for office casual like, semi-smart trousers and skirts, and a button down shirt or blouse for a more relaxed work environment. This depends on an office by office basis. Julie Becht says “It’s important for clothing to not be suggestive or provocative in any way so as not to distract from one’s talent and abilities.” (2012, August 31). This means that skirts should be appropriate length, clothes should not be too loose or too tight, and should not show too much. The things that make someone a professional in my field are a professional demeanor, proper etiquette, and a strong set of communication skills. A person needs to go by a professional dress code and......

Words: 523 - Pages: 3

Free Essay

Unit 2 Assignment

...Unit 2 Assignment Page 2 My biggest problems that I suffer with in my writing career is tone, format, and eve though I'm not really sure this can really considered is time management. I have a very bad habit of writing in a tone in which people tend to think can be very hateful. I have to work on this if I ever expect to have a successful professional writing career as legal secretary as I do not want my employer to think I am being hateful. Some of the ways I can work on this to use better wording and better sentence structure and most importantly better punctuation. I have actually found some online exercises in which can help me accomplish this. As far as format, I sometimes have a hard time finding the right format for certain documents and then when I do find the write format I have a hard time putting the format together. I have found that finding templates can be of great help with this. If your word processing program doesn't come with the template you need a lot of the time you can find online templates to download which is what I have done in the past and it has greatly helped. Time management is my biggest problem. I am a single mom of three kids and I also help to take care of my 89 year old grandfather and I do not allow myself proper time to get things done before a deadline. One of the ways I plan to work on this is to do a chart system. Perhaps set a time for all the kids to take a nap and work during that time and take some time after the kids......

Words: 521 - Pages: 3

Premium Essay

Nt1210 Unit 2 Assignment 2

...Joseph V. Stewart NT1210 Unit 2 Assignment 2 Computer Basics Review 1. C. Datacom 2. B. Bob’s incoming email server 3. B. The call uses only digital electrical signals, D. The call represents short sounds as a unique set of bits 4. C. The call uses both analog and digital electrical signals, E. The call represents each spoken word as a unique set of bits. 5. D. A choice for the number of frames per second 6. B. Use an incoming video server 7. D. None of the answers is correct 8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser. 9. A. A website typically contains many web objects, C. A web page typically contains many web objects, D. A website typically contains many web pages. 10. C. The operating system on the PC, D. The PC’s NIC 11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages 12. A. Web browsers 13. A. http 14. C. Node 15. B. Cable, D. Switch 16. D. SMB Network 17. A. Router 18. D. The Internet 19. A. Internet service provider 20. B. Any ISP’s network Key Terms Computer Networking-the stuff that works together Computer network-the process of the stuff working together Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device Email-electronic......

Words: 483 - Pages: 2

Premium Essay

Unit 2 Assignment

...Employee's Tasks and Responsibilities Kenneth Wilson Kaplan University AB299: Associates Capstone in Management Prof:  Vickie Palzewicz 5/29/12 The question “What is a mangers responsibility?” is a extremely hard question to answer in general. There are so many different responsibilities a manger has to handle. Recruiting employees for the store is the manager’s prime responsibility. He not only has to hire the right candidates for the store but also train and guide them for their overall progression. He also must ensure that all the employees contribute to their level best for the efficient operation of the store. He must act as a strong leader and stand by his team at the hour of any crisis. It is his duty to explain to his team members with any other newly launched store software. It is his responsibility to delegate other responsibilities to his subordinates according to their specializations and bring the best out of them. Tim’s Responsibilities must align with every manager general responsibilities Tim must motivate his team members often. He has to make sure the store is meeting the targets and earning profits. He is responsible for the smooth and effective functioning of the operation. He is responsible for maintaining the overall image of the store as well. He must ensure that his operation meets the expectations of the customers and lives up to its predefined brand image. He must ensure: The store is kept clean, properly stocked and products do not fall off...

Words: 924 - Pages: 4

Free Essay

Unit 2 Assignment

...IMC of McDonalds Rachel Walker Kaplan University MT 359-01 Integrated Marketing Communication Strategies Professor Kevin Cojanu May 28, 2013 McDonalds is a well-known world-wide corporation. Richard (Dick) and Maurice (Mac) McDonald started a barbeque car hop in California in 1940. First starting out they offered a menu that consisted of twenty-nine different items that were served by car hops. By 1947, their business started to slow way down and they had discovered that hamburgers were one of the largest sellers within food sales. That was when the transformation began. The grills, once cast iron, were upgraded to stainless steel and the research of candy machines resulted in the finding of the ideal hamburger shaper. Dick and Mac made a comeback in December of 1948 with a completely different approach and opened as a hamburger venue advertising the famous 15 cent hamburger. When the menu first started out they served 9 different items and French fries was not one of them. It wasn’t until 1949 that the French fries came to the menu to replace regular potato chips and they also introduced a triple thick milkshake. In 1955, Ray Kroc opened a restaurant in Illinois. This was when the famous golden arches were designed by an architect by the name of Stanley Meston. Little did they know that those golden arches would soon become their well-known trademark. The very first advertisement done for this restaurant was the amount of hamburgers sold with the first sign...

Words: 899 - Pages: 4

Free Essay

Unit 2 Assignment

...self-fulfilling prophecy, or anything about yourself you would like to alter related to how you think about the person you are. I would like to be a more positive and confident person. I do strive for that; however I feel improvements can be made in this area. I tend to look at life in terms of Murphy’s Law, which states “Whatever can go wrong will go wrong.” So as a result I try to stay safe and protected in case certain negative things may happen. Also I like to say that I expect the best but am prepared for the worst to happen. Which makes sense, but it also tends to lean more towards negativity. I would like to be able to expect good things to happen and therefore I will hopefully make a more positive life a self-fulfilling prophecy. 2. Where did you place your statement so you could see it every day? What statement did you use? Clearly write the change you want to make. Use strong, affirmative language to motivate yourself, such as “I will start speaking up in class,” or “I will share my opinions in meetings.” The statement I decided to use is “Stay positive and walk boldly. Expect the best and make it happen.” I feel this summarizes what I need to do on an ongoing basis. I have placed this statement on a sticky note and have it on my computer at work where I will be able to see it every day. This should help to remind me that I am capable of doing great things and that I can also move forward in a more positive way. 3. Refine your general goal by making......

Words: 818 - Pages: 4

Free Essay

Unit 2 Assignment

...SC300 Big Ideas in Science Unit 2 Project In analyzing attendance of some local middle schools there seems to be a spike in student absences. After careful consideration in examining these absences there may be a link that connects them being a cause for concern. It seems that students involved with school band have a spike in absences due to sickness resulting in the same symptoms. Further investigations would want to look into the following: 1. Where did the bands travel? 2. What did the band members eat? 3. Were meals provided by the band and by whom? 4. Did the bands stop and eat at any same local restaurants? 5. What drinking sources were provided to band members, what were they and where did they come from? 6. Were there any band members sick prior to the events? By interviewing students, parents and school faculty similarities could be drawn to conclude the source of contamination causing such a rise in sickness among the Band students. There is concern and diligence to find out the source of this common sickness among the students so that an epidemic can be ruled out as quickly as possible preventing wide spread panic within the schools and community. Epidemics can take a while to determine if cases are not connected, meanwhile cases start to increase without proper treatment. There are modern epidemics such as parasites and mercury poisoning (Hubpages, 2012)....

Words: 434 - Pages: 2

Premium Essay

Is456 Unit 2 Assignment 2

...Vulnerability of a Cryptosystem The assignment asks that the student portray a newly hired IT person at a University. It is told to you by a supervisor that the University cryptosystem and would like research done on the vulnerability. Once the research is complete, come up with things that the University should do to handle the problem. The University used the Message-Digest algorithm 5 (MD5) in most of the areas at the University. It provides the hashes to check for file integrity of downloaded files by using MD5 based certificates that have been approved by and internal Certificate Authority. The University uses Cisco ASA firewall devices that create and sign digital certificates that authenticate the users and the systems. In addition, the default setting for the Cisco ASA devices in the MD5. It was discovered back in 2008 that the MD5 based systems have a problem; there is the feasibility of collision attacks. This means that attackers could generate extra digital certificates with different content but have the same digital signature as the original certificate. This basically means that if an attacker can get a hold of a digital certificate, they might be able to gain access to information by creating a replica of the certificate but adding different information or contents to it. According to the research, the likeliness of this vulnerability is very little due to the fact that most attackers do not know how to obtain rogue certificates. There......

Words: 380 - Pages: 2

Premium Essay

Is3120 Unit 2 Assignment 2

...Data storage center centers will benefit greatly from the continued evolution of Ethernet. We saw in the past and present how Ethernet protocols enabled faster transmissions of data. How Xerox was able to network thousands of computers to a common printer. We even seen the benefit of collision management introduced in 1971. Data centers will improve the security of the cloud making it more cost effective to have virtual/roaming desktops. This will better enable companies to spend less on sky-scrapers by having most employees work from home. The hold back will be the telecom industry commonly referred to as ISP (internet service providers). Most of these companies have hesitated on the implementation of Gigabit connections due to the current high cost. VLAN-enabled Ethernet networks require switches and routers. The switches connect the users in a specific geographical area together and to a common connection to routers, one being for traffic and the other being a dedicated firewall. VLANs enable corporations to “hide in plane site” over the internet while still having the benefit of mobility like VPNs. Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means......

Words: 402 - Pages: 2

Free Essay

Nt1230 Unit 2 Assignment 2

...1. What does RAID stand for? Short for redundant array of independent or (inexpensive) disks. It’s a category of disk drives that employ two or more drives in combination for fault tolerance performance. http://www.webopedia.com/TERM/R/RAID.html 2. When would you use RAID? When trying to survive a drive loss without data loss and in many cases without any downtime. http://steadfast.net/blog/index.php/general/almost-everything-you-need-to-know-about-raid 3. Define the following types of RAID: a. RAID 0- (known as a stripe or striped volume) splits data evenly across two or more disks (striped) without parity information for speed. http://en.wikipedia.org/wiki/Standard_RAID_levels b. RAID 1- an exact copy (or mirror) of a set of data on two disks. http://en.wikipedia.org/wiki/Standard_RAID_levels c. RAID 5- (block-level striping with distributed parity) distributes parity along with the data and requires that all devices but one be present to operate. https://en.wikipedia.org/wiki/RAID#RAID_5 d. RAID 6- (block-level striping with double distributed parity) provides a fault tolerance up to two failed drives. https://en.wikipedia.org/wiki/RAID#RAID_6 4. Why is RAID 0 of any use if it offers no redundancy? It can be used to improve performance through concurrent access and/or create large logical disks out of multiple physical disks. 5. Why do you think that RAID 1 can be the most expensive? Why would people utilize it if it’s so costly? Raid 1 is the most......

Words: 384 - Pages: 2

Free Essay

Unit 2 Assignment 2: Vulnerability of a Cryptosystem

...Unit 2 Assignment 2: Vulnerability of a Cryptosystem 09-27-2014 ITT Technical Institute Unit 2 Assignment 2: Vulnerability of a Cryptosystem This assignment gives us a job at a University as a Security analyst. One of the first things that was placed on our plate as a responsibility was getting the cryptosystem up to date. A high risk vulnerability has been identified and they have asked me to make recommendations on how to remedy the situation. There is a few websites that I have been advised to read as they may assist in my decision making process. After reading further I have been asked a large number of questions. I am planning to read up so I know about the cryptosystem then go into answering the provided questions. When we think about MD5 hashing we have to consider the hash and its long history of collisions on the network. When we were doing the practice labs in class the other night we say a number of student using the MD5 hashing and getting the same hash out of different text documents. This is not a good sign that this is the best type of hashing algorithm to use. I would advised using the latest greatest out with a known history of being secure. Asking if the threat is significant is an easy question to answer. Any organizations documentation at some level needs to be protected so it is not used in the wrong way. Yes, of course the cryptosystem being vulnerable is something that needs to be addresses right away. Modifying the hardware and software......

Words: 1643 - Pages: 7