PRE2016 3 Groep12
Group members
- Bibi Huijgen - 0906203
- Jamiro Leander
- Jari de Kroon - 0888168
- Juan van der Heijden - 0898805
- Plamen Pasliev - 0890518
- Stan Roelofs - 0892914
Introduction
In the year 2015 over 500000 cases of burglary and theft were recorded in the Netherlands [1]. It is by far the most common type of crime, around 57% of all crimes recorded in 2015 were related to burglaries. A recent trend is to setup neighbourhood prevention systems through mobile applications, however the effectiveness of this is limited due to the fact that most people will sleep at night when most burglary cases occur. Our aim is to reduce the big number of burglaries through the application of surveillance / security drones in areas where criminal rates are high. The drones should detect inappropriate behavior using an anomaly detection system.
Several issues arise in the application of drones:
- Legal issues regarding no fly zones and privacy.
- Technical issues related to the safety of the drone, since it will be flying near people.
- Using drones might be costly.
Besides the decreased rate of crimes, the introduction of this technology will allow for faster response times to other related crimes and hazards. The goal is to give the citizens an increased sense of security and safety.
Objectives
- Research what the effects on society will be when security drones are deployed.
- Research what the costs would be to deploy surveillance drones.
- Research the legal issues regarding surveillance drones.
- Find out what people think about surveillance drones.
Approach
- Research state of the art technologies using books and articles.
- Make an analysis of the current legislation regarding relevant topics such as filming humans and flying drones. Find out how privacy can be preserved and finally investigate if the current laws can be changed and how.
- Find out what people think of drones surveilling their neighbourhoods by making a survey and interviewing people.
- Make a financial model in Java where the input is an area and level of security and the output is the number of drones, cameras, or people that are needed to watch the area. To make the model we first have to use a drone to find out how high a drone can fly while still detecting humans without issues. We also need to know the costs of drones, security cameras, and people, and how long drones can fly before they have to be charged.
USE aspects
Users: Since these robots will most likely be used by our local police department, the primary users are police employees responsible for operating these machines. Currently, surveillance is mostly done using cameras or human security guards and it is very limited. Covering a large area is a challenge using those methods, so if a crime or a disaster happens, the response and reaction time of the police will not be optimal. This robot will deal with detecting and allocating the problem in a swift manner, which otherwise would cause a lot of problems to the responsible authorities. Furthermore, if more of these drones are deployed, we are going to have less human surveillance guards. Having less humans in a potentially dangerous area is an important factor.
Society:
Surveillance drones are not stationary like a camera and in terms of mobility they are much better than a human walking around. That means a single device can cover a much larger area than humans or security cameras. Hence, if a crime or a disaster happens, the reaction time of the police department would be much faster. This means that more crimes can be prevented and criminals would be deterred from committing crimes because they are more likely to be caught. Society will benefit greatly in an environment with less criminal activity, and more prevented disasters like fires or leaking of gas. This would cause people to feel more secure and experience less stress in their everyday life.
Enterprise:
Manufactoring, developing and maintaining such drones can initiate the beginning of many businesses.
Financial Model
Law analysis
Current legislation
Filming humans
Flying drones
How can privacy be preserved
Can the law be changed, if so, how?
Survey analysis
Survey
Interview
Analysis of results
Conclusion
Planning
Gantt chart: https://drive.google.com/open?id=1bb1QMkg4TYDTVDhT7nHERBCg_1VZtb98BMwWiS9wT6I
Conclusion
Discussion
Weekly logbook
Week 1 Starting here, the project was introduced and we formed groups. To generate an innovative and feasible idea, we held several brainstorm sessions. Coming up with a realistic approach to cure a relevant problem using technology, we shifted from several perspectives. In the end, we formulated a topic of research that entailed both security issues and privacy legislation. The basic ideas were covered in a presentation, to be given in week 2. We tried to create slides that were concise and complete, without too much text and with use of visuals.
Week 2 The presentation was completed and we started on the Wiki page. We figured that the regular update of the Wiki will contribute strongly to our progress. Besides, this logbook gives a good overview of our objectives and the aspects of the project that were already covered.
On Thursday, the presentation of the chosen project challenge will be given. Feedback from the other students and the expert panel can be implemented.
Week 3 After getting feedback on our first presentation, we had to change important aspects of our research plan. The most important parts that needed attention were stakeholders, privacy and benefit. We devided tasks, related to personal skill. You either work on programming or on the social/public part that considers law.
Presentation of plan of execution for the chosen project challenge, including definition of tasks, deliverables, milestones, Gantt chart and resource allocation.
Week 4 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).
Week 5 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).
Week 6 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).
Week 7 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).
Week 8 Final presentation and demonstration