PRE2016 3 Groep12: Difference between revisions
Line 12: | Line 12: | ||
<ul> | <ul> | ||
<li>Legal issues regarding no fly zones and privacy</li> | <li>Legal issues regarding no fly zones and privacy</li> | ||
<li>Technical issues related to the safety of the drone, since it will be flying near people.<li> | <li>Technical issues related to the safety of the drone, since it will be flying near people.</li> | ||
</ul> | </ul> | ||
</p> | </p> |
Revision as of 10:54, 13 February 2017
Group members
- Bibi Huijgen - 0906203
- Jamiro Leander
- Jari de Kroon - 0888168
- Juan van der Heijden - 0898805
- Plamen Pasliev - 0890518
- Stan Roelofs - 0892914
Introduction
In the year 2015 over 500000 cases of burglary and theft were recorded in the Netherlands [1]. A recent trend is to setup neighbourhood watch systems through mobile applications, however the effectiveness of this is limited due to the fact that most people will sleep at night when most burglary cases occur. Our aim is to reduce the big number of burglaries through the application of surveillance / security drones in areas where criminal rates are high.
Several issues arise in the application of drones:
- Legal issues regarding no fly zones and privacy
- Technical issues related to the safety of the drone, since it will be flying near people.
Objectives
- Research what the effects on society will be when security drones are deployed
- Research how safety hazards can be detected and which safety hazards can be detected
- Research the best way of reacting to a safety hazard
Approach
- Research state of the art using books and articles
- Look into existing technologies and find out how we can use them for our purpose
- Interview citizens about their opinions of drones surveilling their neighbourhoods
- Make an interactive simulation
USE aspects
Conclusion
Discussion
Weekly logbook
Week 1 Starting here, the project was introduced and we formed groups. To generate an innovative and feasible idea, we held several brainstorm sessions. Coming up with a realistic approach to cure a relevant problem using technology, we shifted from several perspectives. In the end, we formulated a topic of research that entailed both security issues and privacy legislation. The basic ideas were covered in a presentation, to be given in week 2. We tried to create slides that were concise and complete, without too much text and with use of visuals.
Week 2 The presentation was completed and we started on the Wiki page too. We figured that the regular update of the Wiki will contribute strongly to our progress. Besides, this logbook gives a good overview of our objectives and the aspects of the project that were already covered.
On Thursday, the presentation of the chosen project challenge will be given. Feedback from the other students and the expert panel can be implemented.
Week 3 Presentation of plan of execution for the chosen project challenge, including definition of tasks, deliverables, milestones, Gantt chart and resource allocation.
Week 4 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).
Week 5 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).
Week 6 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).
Week 7 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).
Week 8 Final presentation and demonstration