StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Design Methods and Technology - Essay Example

Cite this document
Summary
This essay "Design Methods and Technology" is about the use of robots in security. Many lives have been lost in the maintenance of security, and the use of technology can reduce the toll to a significant minimum…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Design Methods and Technology
Read Text Preview

Extract of sample "Design Methods and Technology"

Financial Report On Robotic Project Presented by Foundation Department Introduction The use of robots in security is gaining wide acclaim throughout the world. Many lives have been lost in the maintenance of security, and the use of technology can reduce the toll to a significant minimum. The replacement of human labor by robots takes into account various financial resources usually paid to the people involved in those jobs. Security is managed by people and therefore embracing robots is a welcome venture that will reduce the cost of employing more people on the ground. Robots efficiently monitor establishments throughout the period they are used. Security nowadays has become complicated due to the increase in criminal activities that have prompted the use of technology in countering them (Angelo 2007). The robots use only the battery and there are obedient to their programming and instructions given to them by the specialized technicians. The robots therefore enable the employment of specialized individuals to control and monitor the robot for security purposes. More resources have been wasted due to investment in inefficiency security systems that are not effective. The public, as a result, suffers from the inefficiencies in the security systems and may decide to invest in other options to maximize protection on their premises. Security at present is thus an important venture that should be managed effectively to ensure that those answerable for crimes are brought to book. Robots are efficient systems that can be put into proper use if employed effectively (Angelo 2007). The robots can improve security significantly and can deal with dangers perpetrated by various people by putting in place strategic measures. The robots are mobile objects using advanced technology to monitor activities around a particular place. The robots are well suited for buildings since they can move smoothly throughout the building. Various robotic systems are used by the military to perform surveillance. One such technology is a drone. It passes over land, and its unmanned reduced the risk of casualties especially where it is monitoring an unauthorized area. There are various financial needs for the efficient running of the project that the report is going to bring forth. The use of robots is quite efficient since the robot is monitored from a distance, and one does not have to be their all the time in the case of humans guarding a particular premise. The robots do not get tired and, therefore, improve the security of an establishment. The robots need finances and the proper components for security robots are essential. The study, therefore, aims to obtain the various components that are part of the design of the project. Software design for the robot will also be made (Angelo 2007). Computerized systems involving computers and surveillance technology like CCTV cameras have come in handy to combat crime. The use of technology in fighting crime has successfully dealt with many crimes. The robotic technology can distinguish various criminal acts and alert the relevant authorities in place. The robots will aid the police and security forces in dealing with insecurity. The use of the technology needs many resources that are sometimes costly but in the end prove expedient in the maintenance of security. Security firms and private owners who want to increase security in their establishments will use the security. The computer software and hardware will be acquired to meet the objectives of the projects. There are various locations to buy the software and hardware (Angelo 2007). According to the security nature of the robot, it will require to have surveillance hardware and software for connecting the information collected to an individual command center. Security of the robot is another important feature for efficient security monitoring and functioning of the robot (Siciliano 2009). The robot uses software that couples with official intelligence to help monitor the activities and functions of the robot. Hacking of such a robot may produce a leak in information where unscrupulous individuals use the information for their malicious gains. The robots should, therefore, have system security software that monitors any malicious software that includes worms, virus and Trojans that can cause the robot to malfunction. Therefore, the acquisition of the security software will, therefore, remove the security threats when they are detected. The important function of the security system software is to prevent the misuse of the robot and thus compromise security. The use of robots in maintaining security is a welcome advancement that needs to be embraced by security forces. There are instances that if left to humans there would be many causalities but if it is robots, the causalities will be reduced to a minimum. The robotic technology is an expensive but effective venture that can significantly increase safety among a particular population. Human life is thus preserved in terms of the dangers can lead to death. The structure of the robot will consist of a motor, sensor, wheels for locomotion and a wireless sensor. The robot will have a command center that will process the movements and actions of the robot. The computer will connect to the control center through its wireless interface, and any information it collects through its cameras will be relayed through the internet to the main servers (Siciliano 2009). The information will then be downloaded and processed by the computer to analyze the situation on the ground. The camera to be used has a focus of up to 500 meters. The weapon component of the robot will be harnessed for harsh security operations. The weapon’s use will be to destabilize the person and prevent any danger to the premises. The robot will relay the intrusion to the security command center. It will be a defense and target measure that will help in ensuring that the robot is out of danger. The camera on the robot will monitor images through a database stored in the computer and detect any strange activity. The robot will use locomotion sensors to avoid hitting objects some of which can damage it. It will connect to the internet through the wireless interface, and one will know which locality it is in using the Google map software. Batteries for the robot are rechargeable, and one can recharge them after they are out of use. The security robots are used at night and will need infrared technology to monitor any mobile objects in the dark and the various monitoring software will help it process information on strange or unwanted objects or humans in the building (Angelo 2007). The security robot will have a scanner for detecting unauthorized weapon in the establishment. The detection software will alert of any anomalies arising. Since the robot uses batteries, the command will monitor the charge to prevent undue stalling of the robot when carrying out its duties. People will, thus, be in place to ensure that the robot is functioning correcting. The various components of the robots will be found in technological shops. The coding of the software will take place in the labs where the designers will look at the processing and functioning of the robot to ensure its proper functioning. The various components will be purchased from the market and put in place to set up a cost-effective component. The robots will entail the use of command center and surveillance systems to help them monitor various activities in the respective establishments. The control centers will consist of information gathering software and mapping software that detects the movements of the robots (Siciliano 2009). The people in the neighborhood will need education on how the robots work and the various rules the people are to follow to ensure that they are not caught in harm’s way. The people in the establishment will, therefore, have more information on the functioning of the robot. In case of any incident, the people involved will be in a better position to react swiftly. Some of the components to be bought are included below. Item No. Components Price in dollars($) 1. Servo meter 10 2. Lynx motion 45 3. Roboshop rover V2 90 4. Twin motor gear box 10 5. Ledar Platform evaluation kit 300 6. Infra-red range sensor 10 7. Premium Jumper Wires 4 8. Wheel and track set 7 9. Gauge red hook up wire 3 10. Micro controller rev 3 48 11. Preformed jumper wire kit 5 12. CCTV The above components will ensure that an efficient robot is built to monitor premises and ensure that safety of the people in the buildings. The robot will be used in conjunction with various technological software as stated above. The robot will connect to the different cut cameras in the locality to increase surveillance and pinpoint to a greater accuracy any breach in security. The robots can be used in homes and estates where they operate during the night. The security robots monitor any suspicious activities, which in turn are transferred to command centers for further action. The command center then control the actions of the robot to ensure maximum safety. Cloud storage will store that data on the computers. The robot will use the cloud storage from Hewlett Packard to store the information collected. To have efficient security systems, it is important that robots gain usage in security. Though the project may prove expensive, it should be given priority since security is a matter of life and death. Any solution to reducing insecurity is thus critical to ensure that people are secure. Security is thus an important function of any place since more crimes are arising that need the involvement of more advanced units in security maintenance. Robots are indispensable since due to their flexibility. The use of robotic technology is thus, important in preventing causalities, and improving on security in various establishments (Siciliano 2009). References ANGELO, J. A. 2007. Robotics: A reference guide to the new technology. Westport, Conn: Greenwood Press. SICILIANO, B. 2009. Robotics: Modelling, planning and control. London: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Report on Design Methods and Technology Project Essay”, n.d.)
Retrieved de https://studentshare.org/information-technology/1690635-report-on-design-methods-and-technology-project
(Report on Design Methods and Technology Project Essay)
https://studentshare.org/information-technology/1690635-report-on-design-methods-and-technology-project.
“Report on Design Methods and Technology Project Essay”, n.d. https://studentshare.org/information-technology/1690635-report-on-design-methods-and-technology-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF Design Methods and Technology

TECHNOLOGY INNOVATION

#1 Judging by the Honda case, it may seem that hybrid electric vehicles are an incremental innovation, because they build on existing engine technology.... These vehicles not require big changes in the fueling infrastructure, as long as electrical outlets for the cars can function… For most of the major stakeholders, including customers, automakers, and petroleum companies, the electric or hybrid automotive technology will For example, in the case of an automobile manufacturer that is unwilling to develop a hybrid electric vehicle, competence will actually be lost rather than gained....
4 Pages (1000 words) Essay

Collaborative Media Technologies

The emergence of new technology for the development, designing and planning has offered a huge number of advantages to developers.... The purpose of this paper is to analyze the new and more effective aspects of the collaboration technology and it's utilization for the better project development and implementation.... While the vious limitations in accessing media and sharing methods are now resolved through the implementation of the contemporary collaborative media and associated sharing and recommendation methods, because, the contemporary collaborative media methods utilize agents on media players/devices to enlarge the extent of media sharing situations (Lamoureux & Rehak, 2007)....
5 Pages (1250 words) Essay

Differences Between Old Design Techniques and New Technological Ones

Although new technology such as CAD can deliver highly precise designs and measurements, older design methods and practices which could not depend on computer technology had some meaningful value worth preserving.... This paper will aim at trying to answer the question concerning the quality of the old methods in design as compared to the current design methods, which have a computer-precise technological aspect.... This method can be said of great quality as compared to the new technological design methods because the knowledge obtained in such methods of design were practical and provided contextual knowledge which is hard to get in a classroom....
10 Pages (2500 words) Essay

Quantitative research methods in public policy

The users of the library should be comfortable to employ technology in accessing the required resources.... Mixed Method ApproachNumerous methods exist in which it may be used to collected appropriate data.... The design should incorporate numerous changes within the building design and… For example, the students may require certain services that are not required by other stakeholders.... Therefore, the design should integrate these numerous and divergent factors in formulation and Central Library Expansion Research design Analysis Designs and requirements of a building frequentlychange a lot....
2 Pages (500 words) Essay

Technology Management

Companies such as Phonak Hearing Systems and Siemens Hearing Instruments have been using the laser technology to manufacture and have made a record number of 75-100 pieces being produced in about six to eight hours (Wohlers, 2006).... The laser technologies normally have smaller build areas as compared to the other methods used in rapid manufacturing but they exhibit a big advantage in terms of speed as compared to the other technologies (Speedpart technology: Online)....
5 Pages (1250 words) Assignment

Is the Quality Old Design Methods Better Than Todays

As technology was adopted, these methods slowly faded away and as time went by, every practitioner became conversant with the new methods and from there henceforth, the new technological methods started dominating over the old methods (Brand, 2005).... The paper "Is the Quality Old design methods Better Than Today's" discusses that despite the many proofs that the old methods are of superior quality than the new technological design methods, there are those individuals who are still convinced that the new methods are of good quality than the old....
9 Pages (2250 words) Essay

Technology and Design of the Pheasantry Building in London

In this regard, the renovation design and technology should also include sustainability initiatives to help reduce the environmental impacts and operation costs as well as improves the resiliency of the building.... This research report “technology and Design of the Pheasantry Building in London” provides a critical appraisal of the proposal for construction package that is intended to be used for the modernization and renovation of Pheasantry building in London....
9 Pages (2250 words) Essay

Examining Innovation and Technology: 3D Printing in Aircraft Manufacturing

From the paper "Examining Innovation and technology: 3D Printing in Aircraft Manufacturing" it is clear that credit cards, car keys, ID's and other crafted materials can be scanned and duplicated using 3D printing.... Many of these parts and tools could potentially be built cheaper in a house with new disruptive technology such as 3D printing.... Recently, there has been the introduction of the 3 – D printing technology in the manufacturing industries....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us