PRE2015 3 Groep1: Difference between revisions

From Control Systems Technology Group
Jump to navigation Jump to search
No edit summary
No edit summary
Line 15: Line 15:
*Make a first presentation
*Make a first presentation


Week 2: (final idea)
'''Week 2: (final idea)'''
*Literature research
*Literature research
*Process feedback
*Process feedback
*Make a final idea presentation
*Make a final idea presentation


Week 3: (research)
'''Week 3: (research)'''
*Make a proper planning
*Make a proper planning
*Research the [http://cstwiki.wtb.tue.nl/index.php?title=PRE2015_3_Groep1_considerations considerations]
*Research the [http://cstwiki.wtb.tue.nl/index.php?title=PRE2015_3_Groep1_considerations considerations]
Line 31: Line 31:
*Start with building the simulation engine (René)
*Start with building the simulation engine (René)


Week 4: (start designing)
'''Week 4: (start designing)'''
*Finish the simulation engine
*Finish the simulation engine
*Code the navigation and detection
*Code the navigation and detection
*Implement the requirements
*Implement the requirements


Week 5: (finish design)
'''Week 5: (finish design)'''
*Complete the codes
*Complete the codes
*Check for bugs in the system
*Check for bugs in the system
*Make a financial analyses
*Make a financial analyses


Week 6: (testing)
'''Week 6: (testing)'''
*Run simulations with different settings
*Run simulations with different settings
*Rate the aspects of the simulation
*Rate the aspects of the simulation
*Conclude  
*Conclude  


Week 7 (improving)
'''Week 7 (improving)'''
*Improve the design
*Improve the design
*Document the process
*Document the process
*Finish the report
*Finish the report


Week 8: (final presentation)
'''Week 8: (final presentation)'''
*Peer review
*Peer review
*Make the final presentation
*Make the final presentation

Revision as of 16:52, 28 February 2016

Group members

  • Indy Hoeks - 0911750
  • Aaron Steinbusch - 0903892
  • Valery Visser - 0847109
  • Goos Wetzer - 0902160
  • Viktor van Wijk - 0905890
  • René Zaal - 0810911

Planning

Week 1: (brianstorm)

  • Introduction to the course
  • Come up with ideas for the project
  • Choose the best idea
  • Make a first presentation

Week 2: (final idea)

  • Literature research
  • Process feedback
  • Make a final idea presentation

Week 3: (research)

  • Make a proper planning
  • Research the considerations
    • Safety (Valery)
    • Privacy (Aaron)
    • Decision making (Indy)
    • Violence (Valery)
    • Applicability indoors (Viktor)
  • Derive requirements for the design
  • Start with building the simulation engine (René)

Week 4: (start designing)

  • Finish the simulation engine
  • Code the navigation and detection
  • Implement the requirements

Week 5: (finish design)

  • Complete the codes
  • Check for bugs in the system
  • Make a financial analyses

Week 6: (testing)

  • Run simulations with different settings
  • Rate the aspects of the simulation
  • Conclude

Week 7 (improving)

  • Improve the design
  • Document the process
  • Finish the report

Week 8: (final presentation)

  • Peer review
  • Make the final presentation

Introduction

A drone assisting security. This sounds like a well known subject. But what about a drone that flies through a building and detects changes in time? In this way, it is able to detect suspicious activities in corners or difficult spots. These spots would be blind spots for regular surveillance cameras. The prejudice of our flying security drones is that they can cover large buildings, with less cameras. The drone can notice suspicious movements and if it does, the drone can warn security, which then can check whether there is actually something wrong. This can be done by looking at the footage the drone sends. In the meantime, the drone will follow the person or object that triggered the alarm, and record what it sees to help recognize the perpetrator, should he/she escape. If a drone gets taken down, the alarm will go off automatically. If drones are used as surveillance cameras or guards, less actual security guards will have to be hired. Therefore, the costs for the security will go down. Another prejudice is the fact the drone can be used if stationairy cameras are not an option. For example on building sites where a lot of stuff is stolen or on open areas where it is simply impossible to mount a fixed camera. The drone could also be used for secondary uses during the day: The company could use it to make pictures or videos. However, this will not be the aim of this project. A drone’s movement could also become predictable after a while. Therefore, the route the drone will take have to be completely random, but it should not be completely random because this could lead to situations where there are a lot of drones in one area and none in another area, which makes other areas vulnerable. Using a path that looks random will prevent thieves from predicting how long the drone is away or where it will be at a given moment. The user can select points where the drone should check. Those points will correspondent with rooms, hallways, or important objects.

General information (voeg references toe)

A drone is a type of Unmanned Aerial Vehicle (UAV). As the name implies, it is a vehicle that can operate in the air, without any person operating it in the vehicle itself. There are two types of UAVs: Remotely Piloted Vehicles (RPVs): these are UAVs that are remotely controlled by its operator from a distance. Because of this, the person who controls the airplane makes the decision how the vehicle behaves. On the other hand, we have a drone. It is an unmanned vehicle that operates almost completely autonomous; The drone gets a target from a controller, and then performs the actions completely autonomously.

Different types of UAVs

Micro- and mini-UAVs

These UAVs are the smallest type of them all. They can only fly up to a maximum of 300 metres and are about the size of an average adult hand. Because they are so small, they can maneuver in smaller and more complex areas than all the other types of UAVs. These are especially designed for urban environments and housings.

Tactical UAVs

These fly up to a height of between 3 kilometres and 8 kilometres and can communicate and be operated over a distance of 3000 kilometres and can function for a maximum period of 40 hours. These type of UAVs are used by military force, and can even be equipped with missiles.

Strategic UAV

These can fly up to a maximum of 20 kilometers, have a flight period of about 30 hours. These type of drones are also used by military force.

Rules

UAVs can be equipped with many kinds of technologies, such as cameras, sensors, microphones and other communicating devices. And because these vehicles have these abilities, there needs to be rules made about what is appropriate and what not when using a certain type of drone. One of these themes for the rules is privacy. For example: in what type of situations can these drones be deployed in and what not? Depending on the drones capabilities, which ways are appropriate or not appropriate to act on autonomously for the drone and its situation, it should also be clear who should be held responsible for the drones actions, if the drones acts in an inappropriate way.

Another example is from the Electronic Privacy Information Centre (EPIC). This party has called for federal agencies to regulate and control the proliferation of these machines that are used for purposes of surveillance; especially in the area of hacking drones and other UAVs. To protect drones from being hacked, EPIC came up with certain ideas such as to circumvent encryption codes within drone surveillance software and the ability to manipulate hardware to gain access to drone surveillance data.

All these types of rules and approaches should be made before any type of droid is officially released to the public. There should not only be certain rules that should hold for all different types of droids in general (like a droid should not do harm to anybody), but also specific rules for robots that have certain properties. Like for example: when a drone has a camera installed on it, it should not be able to publicly expose the footage it takes, because that would violate the aspect of someone’s privacy.

Sound

A drone for our use must be as silent as possible, otherwise you can hear it approaching. While the technology for drones is rapidly evolving, physics demands certain limits in their use. One of the things that determines the efficiency of a patrolling drone is the sound it produces. After all, if a perpetrator does not hear the drone, the chance that he/she gets caught increases drastically. While the possibilities for indoor drones are limited in type and size, for outdoor applications such as industrial sites and estates the possibilities are unbounded. The general rule is: the bigger the propellers, the lower the tonal distribution. Often the sound pressure produced is similar if not the same, but at lower tones in the sound spectrum, the noise quickly becomes inaudible at a reasonable distance. For inside applications the most quiet applications are balloon based, but those solutions are not quick enough for keeping track of a perpetrator. This means that the largest possible quadro- or octocopter becomes the design for indoors. Since there are no size constraints for outdoors, the easiest solution available is having a large durable drone patrolling high in the sky.

State of the art (voeg references toe)

Needless to say, the different types of UAVs can be implemented using different technologies.

Floaters

The main piece of technology consists of the equipped camera and the rest is just a balloon with some propellers to keep or place it in position. Except for the camera, this type of drone has not advanced much in the past decades. Due to the balloon based concept, these drones are stable, inexpensive, inaudible, energy efficient, durable, can cover huge tracts of land, but must be tethered and sometimes be reeled in when stronger winds occur.

Planes

These are the most used type of drones in governmental and military parties. For example, the MQ-9 Reaper keeps the borders of the UK in check. As far as half a century ago, the military used drones of this kind for reconnaissance. Nowadays the kinds of drones we are looking for when it comes to surveying large areas, are of the plane persuasion. These planes fly at several kilometers high and have special cameras onboard for making sharp, detailed images from a large distance. They are suited for patrolling large areas (they are even deployed for forests and national borders) and can chase targets through open areas. They will however quickly lose a target inside a building since they are not able to turn quickly enough to navigate inside buildings.

Quadcopters and octocopters

There is but a small difference between the two, octocopters are a bit more stable and are more redundant, most octocopters can land safely when one of the propellers breaks. These types of drones have ruled the consumer market lately and are rapidly becoming more affordable. These drones are often incapable of flying very high or fast, but are exceptionally suited for usage inside buildings. Because they are airborne, they can easily navigate stairs and blockages that would stem most other robots in their navigation. Their ability to change direction quickly and make precise movements is helpful in quickly and safely navigating the corridors of a building. These type of drones are obviously the best choice for indoor surveillance.

Users and their needs

Primary

There are a lot of users profiting from this system. This system will, like we already mentioned, be used as addition to the security of a site. The primary user of this system will be the security manager, which is located in a control room and responding to all alarms or messages the drones will send. This control room could either be in the building itself, like musea or military buildings which need extreme surveillance, and where it is essentially to react within seconds on site. Or this control room could be in a strategic place, and be able to manage multiple buildings or sites at the same time. Either way, the security is the primary user of this system, because he interacts directly with it, and is the person responding to it. Those primary users will think the system is useful because it gives warnings at detected movements or displacements. The system will detect more small changes than a person could, and therefore help the security manager to make less mistakes, or overlooked clues.

The security guards need the drone to be easy to use. The drone must be able to give a clear view of the area where movement is detected in order make sure that the security guard with overview can make proper decisions. The guard also needs to be trained in how to work with these machines so they know the skills and limitations. For the specific implementation of the drones, lots of tests needs to be done such as how many drones can be monitored by one guard, and what are the tools the drones can use to stop the burglar without doing harm.

Secondary

The secondary users are the security companies. Because their security managers make less mistakes, they function better and will provide better surveillance. Furthermore the system will be less expensive. Therefore, less manpower is needed this way and there will be less installation costs, because you don’t have to install and implement more complicated systems like hidden camera’s. Another secondary user is the company or owner which hires the services of a security company using those drones. They will profit greatly by better surveillance, because of the previous named reasons. Even if the burglars succeed to break in, the drone will try to take pictures of the suspects, and to lock them in. By these pictures the persons will be tracked down sooner and this will be an amiable aspect of the drone for everyone.

The most obvious benefit for the companies is the decrease in security costs: Once the system is up and running they will need significantly less employees. The second benefit is the quality improvement of the security. Chances that burglars are detected are higher and because of that the amount of stolen goods will decrease. The last and very important benefit is the improving of the safety of the employees. They will not come in contact with the burglars anymore and that is a very important for the image of that company. More musea and contractors will hire drone security companies as a result of that.

Tertiary

A tertiary user will be the society. By helping to induce thefts and insurance costs. Other tertiary users will be the insurance companies. Less break ins and especially less unsolved break-ins will lead to a more optimal situation for the insurance companies. Furthermore any footage of the drones can clear situations which involve fraud by employees or anything. These will all be caught on tape when the drone is working. The last tertiary user will be the police and or the state. Those will profit especially from the pictures the drone takes from burglars. Those will be very helpful for the police in catching the guys and completing the investigation.

The insurance companies will benefit for the decreasing amount of break-ins, and finally the society will have an emerged scene of safety when they are in a private controlled area. Finally, if the companies have reduced costs for the security of their wares, they can decrease the selling price or increase the quality of their product. Once again this will be favorable for the society.

Scenario (indoors)

Friday 14th February 2020

A couple of weeks back, the Rijksmuseum in Amsterdam was the first large institution that implemented drones to guard the building. The decision to invest in flying cameras was made because of the increasing number of burglaries in museums around the capital city. Besides this, the costs of security guards were becoming higher and higher, and a change was needed. The patrolling security guards have been fully replaced by the flying cameras. These drones can photograph and film the environment, and chase a possible suspect. If they encounter something unusual (moving objects or a change in the environment) they send out a signal to the control room. The cause and severity of this unusual situation is then evaluated by a security guard in the control room.

On that particular evening, it is raining like it hasn’t rained in months. The newly installed drones are monitoring the hallways and exposition rooms as usual. After a couple of hours patrolling, one of the drones detects a small object that hasn’t been detected in previous rounds. The head of security is notified and looks at the footage sent from the robot. The object moved very fast and disappeared through a hole in the wall. Unless the Russians are experimenting with spying rodents, it is most likely an innocent rat. If the security guard wasn’t present for the determination of the threat, the drone would have activated the alarm for a rat, which is of course not desired behavior. After a couple more rounds, one of the drones detects a slightly opened door. It notifies the guard in the control room he has to start looking at the footage, while it moves closer to the door. Again, something small appears, but this time it stops moving in the middle of the hallway. Before the guard can determine what the object is, the screen turns black and the drone stops sending out its active-signal. It is at this point the guard knows the drone has been shut down, if not completely destroyed. He immediately sends another drone to the location and sees smoke and human-sized objects moving around it. The alarm is immediately sounded and the police is notified. Because of the smoke, it seems like the intruders haven’t noticed the second drone yet. This is why the guard commands the drone to follow them silently and stay at a distance. At one point, they are busy taking down some of the paintings and the drone finds a good moment to try and take pictures of the intruders’ faces. One of them quickly turns away his head, while the other one didn’t react as fast as his companion. Together with the face recognition system of the Dutch government, a name is quickly linked to this face. The drone then gets hit with an object and bumps into a wall. Because it is well protected against this violence, it is able to correct itself and gain some distance from the intruders. At this point, they know they have been spotted and decide to quickly leave the building. The drone follows them at a safe distance to the emergency exit, but has already locked it. They then smash a window and climb out of it. Normally, the drone will not follow suspects outside the building where it’s installed, but since the police has almost arrived, the guard commands the robot to follow them. As soon as they split up, the drone recognizes the clothes of the intruder it hasn’t photographed properly. It decides to follow him, since the other one is known already. Due to the GPS tracker in the drone, the police is able to follow him.