PRE2016 3 Groep12

From Control Systems Technology Group
Revision as of 11:32, 20 February 2017 by S143243 (talk | contribs) (→‎Approach)
Jump to navigation Jump to search

Group members

  • Bibi Huijgen - 0906203
  • Jamiro Leander
  • Jari de Kroon - 0888168
  • Juan van der Heijden - 0898805
  • Plamen Pasliev - 0890518
  • Stan Roelofs - 0892914

Introduction

In the year 2015 over 500000 cases of burglary and theft were recorded in the Netherlands [1]. It is by far the most common type of crime, around 57% of all crimes recorded in 2015 were related to burglaries. A recent trend is to setup neighbourhood prevention systems through mobile applications, however the effectiveness of this is limited due to the fact that most people will sleep at night when most burglary cases occur. Our aim is to reduce the big number of burglaries through the application of surveillance / security drones in areas where criminal rates are high. The drones should detect inappropriate behavior using an anomaly detection system.

Several issues arise in the application of drones:

  • Legal issues regarding no fly zones and privacy.
  • Technical issues related to the safety of the drone, since it will be flying near people.
  • Using drones might be costly.

Besides the decreased rate of crimes, the introduction of this technology will allow for faster response times to other related crimes and hazards. The goal is to give the citizens an increased sense of security and safety.

Objectives

  • Research what the effects on society will be when security drones are deployed.
  • Research what the costs would be to deploy surveillance drones.
  • Research the legal issues regarding surveillance drones.
  • Find out what people think about surveillance drones.

Approach

  • Research state of the art technologies using books and articles.
  • Make an analysis of the current legislation regarding relevant topics such as filming humans and flying drones. Find out how privacy can be preserved and finally investigate if the current laws can be changed and how.
  • Find out what people think of drones surveilling their neighbourhoods by making a survey and interviewing people.
  • Make a financial model in Java where the input is an area and level of security and the output is the number of drones, cameras, or people that are needed to watch the area. To make the model we first have to use a drone to find out how high a drone can fly while still detecting humans without issues. We also need to know the costs of drones, security cameras, and people, and how long drones can fly before they have to be charged.

USE aspects

Users: Since these robots will most likely be used by our local police department, the primary users are police employees responsible for operating these machines. Currently, surveillance is mostly done using cameras or human security guards and it is very limited. Covering a large area is a challenge using those methods, so if a crime or a disaster happens, the response and reaction time of the police will not be optimal. This robot will deal with detecting and alocating the problem in a swift manner, which otherwise would cause a lot of problems to the responsible authorities. Furthermore, if more of these drones are deployed, we are going to have less human surveillance guards. Having less humans in a potentially dangerous area is an important factor.


Society: Surveillance drones are not stationary like a camera and mobilitywise they are much better than a human walking around. That means a single device can cover a much larger area rather than its rivals. Hence, if a crime or a disaster happens, the reaction time of the police department would be much faster and more crimes will be prevented in the long run. Society will benefit greatly in an environment with less criminal activity and more prevented disasters like fires or leaking of gas. People would also feel more secure and experience less stress in their everyday life.

Enterprise: Manufactoring, developing and maintaining such drones can initiate the begining of many businesses.

Conclusion

Discussion

Weekly logbook

Week 1 Starting here, the project was introduced and we formed groups. To generate an innovative and feasible idea, we held several brainstorm sessions. Coming up with a realistic approach to cure a relevant problem using technology, we shifted from several perspectives. In the end, we formulated a topic of research that entailed both security issues and privacy legislation. The basic ideas were covered in a presentation, to be given in week 2. We tried to create slides that were concise and complete, without too much text and with use of visuals.

Week 2 The presentation was completed and we started on the Wiki page. We figured that the regular update of the Wiki will contribute strongly to our progress. Besides, this logbook gives a good overview of our objectives and the aspects of the project that were already covered.

On Thursday, the presentation of the chosen project challenge will be given. Feedback from the other students and the expert panel can be implemented.

Week 3 Presentation of plan of execution for the chosen project challenge, including definition of tasks, deliverables, milestones, Gantt chart and resource allocation.

Week 4 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).

Week 5 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).

Week 6 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).

Week 7 Weekly feedback session between individual groups and expert panel. Feedback is on both learning goals (technical content and process).

Week 8 Final presentation and demonstration

References

  1. [1], Registered criminality statistics CBS