Question

b) The responsibility for safeguarding a robotic cell falls on the user. One of the standards address is safeguarding devices
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Safety Factors

Robots removes the need for humans to perform certain dangerous and harmful operations

Robots themselves can also create dangerous conditions and threaten human safety

Essential that robot users and manufacturers recognize the potential hazards and implement safeguards to eliminate them.

Robot safety

The earliest statement regarding robotics safety may be credited to the famous science fiction writer Isaac Asimov. He may not have been a recognized authority in the field of robotics safety, but at the age of 21, in 1942, he wrote the three laws of robotics which are still lofty design standards (Asimov and Fredkel, 1985):

1.

(1) A robot must not harm a human being, nor through inaction allow one to come to harm.

2.

(2) A robot must always obey human beings, unless that is in conflict with the first law.

3.

(3) A robot must protect itself from harm, unless that is in conflict with the first or second law.

Historically, one of the fundamental reasons for using robots in industrial applications was to remove human operators from potentially hazardous work environments. The hazards in the workplace included heat, noise, fumes, radiation, toxic atmosphere, physical dangers and other health hazards. Since the passing of Occupational Safety and Health Act (OSHA) (Hamilton and Hancock, 1986) in 1971, worker safety has become a significant factor in promoting the substitution of robots for human labor in dangerous work environments. Although robots may liberate humans from hazardous working conditions, they also bring about safety concerns. The Machine Tool Trade Association (1982) guidelines stated that a working robot can be a potential hazard to personnel under certain circumstances. Nevertheless, robot safety was in the front line of robotics technology during the 1980s. In fact, the bulk of literature had been published (i.e. 287 articles) between 1982‐1988, with a record number of 60 articles in 1985 alone. The probability of serious robot accident occurrence and legal actions has forced manufacturers and users to a quick adoption of safety devices and regulations. The need for system safety was highlighted by a $10‐million lawsuit awarded to the family of a worker killed by an industrial robot in 1983 (Computerworld, 1983). A breakdown of publications on robot safety for various categories is given in Figure 4

For more detail

(https://www.emeraldinsight.com/doi/full/10.1108/13552510210439784?fullSc=1&)

Add a comment
Know the answer?
Add Answer to:
b) The responsibility for safeguarding a robotic cell falls on the user. One of the standards address is safeguardi...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • a) Industrial robots use vision to lighting techniques used in vision applications. locate, orient and inspect part...

    a) Industrial robots use vision to lighting techniques used in vision applications. locate, orient and inspect parts. Describe briefly the two b) The responsibility for safeguarding a robotic cell falls on the user. One of the standards address is safeguarding devices to be used. The workcell is divided into three safety zones. Describe briefly these working zones. c) Figure Q3 shows a gripper function as the end effector of a robot arm. Calculate the minimum force requires the gripper to...

  • Describe how Southern blot analysis can be used to determine B cell developmental stages in B cell lymphoma cell lines. Describe one example of how an innate immune mechanism and an adaptive mechanism...

    Describe how Southern blot analysis can be used to determine B cell developmental stages in B cell lymphoma cell lines. Describe one example of how an innate immune mechanism and an adaptive mechanism work together to remove pathogens from the body.

  • Show all work! 1) Cell Walls. Although these quantities vary from one type of cell to...

    Show all work! 1) Cell Walls. Although these quantities vary from one type of cell to another, a cell can be 2.00 μm in diameter with a cell wall that is 50.0 nm thick. If the density (mass divided by volume) of the wall material is the same as that of pure water (1000 kg/m2), what is the mass (in ng) of the cell wall, assuming the cell to be spherical and the wall to be a very thin spherical...

  • A/ Given the following IP address from the Class B address range using the default subnet...

    A/ Given the following IP address from the Class B address range using the default subnet mask: 100.110.0.0. Your network plan requires no more than 64 hosts on a subnet. When you configure the IP address in Cisco IOS software, which value should you use as the subnet mask? 255.255.0.0 255.255.128.0 255.255.255.128 255.255.255.252                                     B/ Identify how many valid host addresses can you have on 192.168.27.32 network with a subnet mask of 255.255.255.240.   (2^4) - 2 (2^3) – 2 (2^2)...

  • 1. Why was the statement of cash flows created by the Financial Accounting Standards Board (FASB)?...

    1. Why was the statement of cash flows created by the Financial Accounting Standards Board (FASB)? 2. Describe the three classifications of cash flows, and provide examples of activities that would appear in each classification. 3. Which section of the statement of cash flows is widely regarded as the most important? Why? 4. Briefly describe the four steps required to prepare the statement of cash flows using the indirect method. 5. Refer to the Why is the indirect method used...

  • This is due today! Week One Self-Guided Quiz The questions below generally follow the order of...

    This is due today! Week One Self-Guided Quiz The questions below generally follow the order of the topics as presented in the text in Chapters 1 and 2. However, you will need to read all chapters (1, 2, 25, 26) in order to get the complete picture of most of these topics as Chapters 25 and 26 and additional insight to topics found in Chapters 1 and 2 and contain original material addressed in later questions. 4. Audits typically consist...

  • Washington Post Artiele Dec 10, 2018-Walmart's latest hire: Robotic janitors that elean floors and collect data...

    Washington Post Artiele Dec 10, 2018-Walmart's latest hire: Robotic janitors that elean floors and collect data The Auto-C, powered by BrainOS, joins Walmarts technology ecosystem. By Ester HolleyWalmart's latest custodial tool may look like a mini Zamboni, but it's more like a Roomba, the robotic sweeper sliding across floors worldwide.This week, the big-box retailer announced plans to place 360 autonomous robots inside Their job: scrubbing the store's expansive aisles and collecting data in the process.The robot custodians are powered by...

  • The acronym OSHA Stands for: A' Occupational Standards Healthcare Association B.' Occupational Services Health Association. Occupational...

    The acronym OSHA Stands for: A' Occupational Standards Healthcare Association B.' Occupational Services Health Association. Occupational Safety and Health Administration. D. None of these. What agency is responsible for enforcing Occupational Safety and Health Administration regulations? AC OSHA B. C Medicare ICAHO All of the above. D. 3. How many federal agencies make up OSHA as a whole? A three c. four two D. one А с Which federal OSHA agency is responsible for researching best practices in safety? OSHA...

  • Please help to answer these questions HIPAA Assessment 1. When you comply with HIPAA standards, what...

    Please help to answer these questions HIPAA Assessment 1. When you comply with HIPAA standards, what are you ensuring? a. Patients have unlimited access and control over their health information. b. Patients have legal rights regarding who can access and use their PHI. c. Our organization has implemented the proper security controls required by law. d. Our organization has the final say on who can access our patients and/or customers’ PHI. 2. You attempt to log in to an unattended...

  • B) Multiple choices: 60 points: for each statement circle the best answer. 1) The three requirements...

    B) Multiple choices: 60 points: for each statement circle the best answer. 1) The three requirements for becoming a CPA include all but which of the following A) Uniform CPA examination requirement B) Educational requirements C) Character requirements D) Experience requirement 2) The International Standards on Auditing (ISAs) A) are issued by the AICPA B) override a country's regulations governing the audit of a company C) has many of the same standards as the Auditing Standards Board (ASB) D) must...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT