Glossary Items

R

  1. Radio frequency (RF) is any of the electromagnetic wave frequencies that lie in the range extending from around 3 kHz to 300 GHz, which include those frequencies used for communications or radar signals.
    RF is any frequency within the electromagnetic spectrum associated with radio wave propagation. When an RF current is supplied to an antenna, an electromagnetic field is created that then is able to propagate through space. Many wireless technologies are based on RF field propagation.
  2. Radio Frequency Identification (FRID) is the wireless use of electromagnetic fields to identify and track tags attached to objects. Generally speaking, this is the use of strong radio waves to “excite” enough current in a small tag to send a radio transmission back.
    Generally speaking, this is the use of strong radio waves to “excite” enough current in a small tag to send a radio transmission back. It works over short range and only for small amounts of data. The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information.
  3. The Raspberry Pi is a series of credit card-sized single-board computers developed in England, the United Kingdom by the Raspberry Pi Foundation with the intent to promote the teaching of basic computer science in schools and developing countries.
    The Raspberry Pi is a series of credit card-sized single-board computers developed in England, United Kingdom by the Raspberry Pi Foundation with the intent to promote the teaching of basic computer science in schools and developing countries. The original Raspberry Pi and Raspberry Pi 2 are manufactured in several board configurations through licensed manufacturing agreements with Newark element14 (Premier Farnell), RS Components and Egoman. The hardware is the same across all manufacturers. All Raspberry Pis include the same VideoCore IV graphics processing unit (GPU), and either a single-core ARMv6-compatible CPU or a newer ARMv7-compatible quad-core one (in Pi 2) and 1 GB of RAM (in Pi 2), 512 MB (in Pi 1 models B and B+), or 256 MB (in models A and A+, and in the older model B). They have a Secure Digital (SDHC) slot (models A and B) or a MicroSDHC one (models A+, B+, and Pi 2) for boot media and persistent storage. In 2014, the Raspberry Pi Foundation launched the Compute Module, for use as a part of embedded systems for the same compute power as the original Pi. In early February 2015, the next-generation Raspberry Pi, Raspberry Pi 2, was released. That new computer board is initially available only in one configuration (model B) and has a quad-core ARM Cortex-A7 CPU and 1 GB of RAM with remaining specifications being similar to those of the prior generation model B+. The Raspberry Pi 2 retains the same US$35 price of the model B, with the US$20 model A+ remaining on sale. In November 2015, the Foundation launched the Raspberry Pi Zero, a smaller product priced at US$5.
  4. Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object and thus in contrast to on-site observation. Remote sensing is a sub-field of geography.
    Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object and thus in contrast to on site observation. Remote sensing is a sub-field of geography. In modern usage, the term generally refers to the use of aerial sensor technologies to detect and classify objects on Earth (both on the surface, and in the atmosphere and oceans) by means of propagated signals (e.g. electromagnetic radiation). It may be split into active remote sensing (when a signal is first emitted from aircraft or satellites) or passive (e.g. sunlight) when information is merely recorded.
  5. The process of detecting an IoT resource (such as a sensor, service or database). The mechanism used by a node to search for resources among other nodes of the network.
    1. The mechanism used by a node to search for resources among other nodes of the network. A user at a node provides a search query containing a set of keywords corresponding to the resource being searched for. A resource discovery protocol is then used to forward the search query to other nodes and search for the resource on those nodes. When a resource is located at a node, a success message is sent to the node that originated the search query. 2. The operation of tracking, accessing, matching, selecting and eventually requesting the right or the most accurately suitable resource for the successful accomplishment of the desired job.
  6. Robotic governance is a concept which, among other things, considers the ethical/moral, socio-cultural, socio-political and socio-economic effects of robotics on society and provides a framework for solving problems resulting from these changes.
    The governance principles include accountability, responsibility, transparency of structures and fairness. In this way, robotic governance helps to create a sustainable and responsible future world for the upcoming generation R.
  7. In computer science, robustness is the ability of a computer system to cope with errors during execution. Robustness can also be defined as the ability of an algorithm to continue operating despite abnormalities in input, calculations, etc.
    In computer science, robustness is the ability of a computer system to cope with errors during execution. Robustness can also be defined as the ability of an algorithm to continue operating despite abnormalities in input, calculations, etc. Robustness can encompass many areas of computer science, such as robust programming, robust machine learning, and Robust Security Network. Formal techniques, such as fuzz testing, are essential to showing robustness since this type of testing involves invalid or unexpected inputs. Alternatively, fault injection can be used to test robustness. Various commercial products perform robustness testing of software systems, and is a process of failure assessment analysis. In general, building robust systems that encompass every point of possible failure is difficult because of the vast amount of possible inputs and input combinations. Since all inputs and input combinations would require too much time to test, developers cannot run through all cases exhaustively. Instead, the developer will try to generalize such cases. For example, imagine inputting in some integer values. Some selected inputs might consist of a negative number, zero, and a positive number. When using these numbers to test software in this way, the developer generalizes the set of all reals into three numbers. This is a more efficient and manageable method, but more prone to failure. Generalizing test cases is an example of just one technique to deal with failure - specifically, failure due to invalid user input. Systems generally may also fail due to other reasons as well, such as disconnecting from a network.
  8. A MEMS concept referring to the measurement of how quickly an object turns. A sensor that measures the turning movement of a wheel for purposes of calculating distance travelled.
    There are two slightly different meanings of safety. For example, home safety may indicate a building's ability to protect against external harm events (such as weather, home invasion, etc.), or may indicate that its internal installations (such as appliances, stairs, etc.) are safe (not dangerous or harmful) for its inhabitants. Discussions of safety often include mention of related terms. Security is such a term. With time the definitions between these two have often become interchanged, equated, and frequently appear juxtaposed in the same sentence. Readers unfortunately are left to conclude whether they comprise a redundancy. This confuses the uniqueness that should be reserved for each by itself. When seen as unique, as we intend here, each term will assume its rightful place in influencing and being influenced by the other. Safety is the condition of a “steady state” of an organization or place doing what it is supposed to do. “What it is supposed to do” is defined in terms of public codes and standards, associated architectural and engineering designs, corporate vision and mission statements, and operational plans and personnel policies. For any organization, place, or function, large or small, safety is a normative concept. It complies with situation-specific definitions of what is expected and acceptable.
  9. A business rules engine is a software system that executes one or more business rules in a runtime production environment. The rules are applied through the framework of the application in order to control the process.
    A Rule Engine is a framework that uses functions to automate and manage business rules. The rules are applied through the framework of the application in order to control the process.
test test