Print Сite this

F-16 Unmanned Drone and Data Search

The initiative regarding the production of an unmanned drone for collecting data seems to be a profitable endeavor. However, there are specific issues that should be considered in this direction in order to ensure the correspondence of the project to the international regulations regarding information processing and storage (Lin et al., 2018). They are primarily connected to the crimes, which would influence the data stored within the drone, the methods of their extracting, and the digital tools that should be used for the search. The assessment of these aspects of the new product development will be accompanied by the evaluation of a possible threat to national security resulting from the potential illegal use of the received information.

We will write a
custom essay
specifically for you

for only $16.05 $11/page
308 certified writers online
Learn More

The Crimes Affecting Data Stored in the Drone

The first aspect of the upcoming project is the intended coverage of crimes’ data with the help of the drones, and it presents one of the principal considerations while designing them. According to the studies focused on the target implementation of these devices with similar objectives, they mostly aim to address the problem of street criminals (Karim et al., 2017). In this case, real-time image processing intended to trace the offenses of this nature should be complemented by the initiatives regarding the control of operations for eliminating these issues (Karim et al., 2017). Hence, the principal crimes, which will affect the collected data, will be the occasions happening outside.

However, this is only a general definition of possible events, which are supposed to be reflected in the drones’ memory. They can be divided into two categories, which are drug smuggling and privacy invasion (Jain et al., 2017). These two illegal activities are most likely to happen in the street and, therefore, the devices installed in the drones should have specific technical characteristics deriving from this circumstance (Jain et al., 2017). In order to address the task adequately, the product’s components should be manufactured with the orientation on the need to ensure high quality of images as well as details (Jain et al., 2017). In this way, crime investigation will become their principal application maintaining stable demand among the corresponding organizations.

The Way to Extract Data as an Evidence of the Crimes

The second consideration regarding the production of drones is the suggested method of extracting data, which should also be a part of the design process. The importance of this stage is defined by the need to receive the gathered information, and this aspect will have a significant impact on the product’s popularity. Since the majority of tasks will be controlled by operators, the system of extraction should be automatic in order to allow them to take timely actions regarding crime elimination (Karim et al., 2017). Hence, the most advantageous way to address this aspect of drones’ work is to create a system, which can analyze the data within the device and send the results directly to employees.

From this perspective, the process of image extracting will have several stages. First, the pictures they receive should be processed by the program installed in the drone and classified with the use of template matching and object recognition features (Karim et al., 2017). This categorization will help prepare such data as a type of weapon or the number of people involved in the crime. Second, the scene should be analyzed by the words captured by drones and processed through a database of visual vocabulary (Karim et al., 2017). Hence, the analysis of information by the device and its automatic transmission to operators is the most advantageous way of extracting information regarding crime scenes.

Digital Tools to Search for the Data

The third component of drone production is the selection of the most appropriate digital tools, which should be efficient for searching for the data. This decision is extremely important for capturing information and implies the need to install a variety of features ensuring its extensiveness for the benefit of target users. The principal components, in this case, will be Wi-Fi and Bluetooth, which would allow remotely controlling the drones’ movement and establishing communication with operators for all of the performed tasks (Jain et al., 2017). In this way, they will enable the smooth functioning of the devices and a good network connection for all participants in the process who need timely access to the data.

The installation of Wi-Fi and Bluetooth should be accompanied by embedding other technological solutions facilitating operators’ work. They primarily include memory cards sufficient for the storage of large amounts of information (Jain et al., 2017). Their importance is explained by the need to increase the scope of data stored by the drones. This task can be addressed by the provision such options as Secure Digital or micro-SD (Jain et al., 2017). Another possible tool, which would be useful for crime investigation, is a feature analyzing fingerprints found on the images (Jain et al., 2017). When combined with Wi-Fi, Bluetooth and memory cards, it will allow increasing the efficiency of crime investigators’ work.

Get your
100% original paper
on any topic

done in as little as
3 hours
Learn More

Illegally Obtained Data and National Security

The fourth consideration is the assessment of the illegally obtained data’s impact on national security. The inappropriate use of information can pose a threat to it, and the possibility of such an outcome leads to the necessity to evaluate the areas of its influence. The first way in which the images gathered with the help of the drones can affect the security of the government is the use of external services for data storage and processing. Thus, for example, the optimal solution for these devices in the case of memory shortages and computational limitations is the cooperation with cloud platforms (Lin et al., 2018). However, the latter does not incorporate any safety regulations regarding the stored information (Lin et al., 2018). Hence, the sensitive data can be occasionally transmitted to unauthorized persons of the third party.

Another challenge contributing to the use of illegally obtained images created by the drone affecting national security is privacy leakage. It implies receiving geographical coordinates or personally identifiable materials by private persons (Lin et al., 2018). As a result, they might plan a physical attack on any facility of critical importance and, therefore, pose a threat to national security (Lin et al., 2018). It allows concluding on the need to refuse to use cloud platforms for the drones and elaborate a mechanism of data leakage prevention.

Conclusion

To summarize, the production of drones for crime investigations is a project, which should incorporate a variety of considerations. The first issue to be resolved is the need to focus on the target use of these devices for monitoring the streets. The second aspect is the method to extract data presented by an automatic system of image processing and transmitting to operators. The third need is installing Wi-Fi, Bluetooth, memory cards, and additional storage devices to ensure the proper work of drones. The fourth initiative is the creation of mechanisms to prevent data leakage and thereby promote national security. Thus, the combination of these considerations would contribute to the success of the proposed project.

References

Jain, U., Rogers, M., & Matson, E. T. (2017). Drone forensic framework: Sensor and data identification and verification. In 2017 IEEE Sensors Applications Symposium (SAS) (pp. 1-6). IEEE. Web.

Karim, S., Zhang, Y., Laghari, A. A., & Asif, M. R. (2017). Image processing based proposed drone for detecting and controlling street crimes. In 2017 IEEE 17th International Conference on Communication Technology (ICCT) (pp. 1725-1730). IEEE. Web.

Lin, C., He, D., Kumar, N., Choo, K. K. R., Vinel, A., & Huang, X. (2018). Security and privacy for the internet of drones: Challenges and solutions. IEEE Communications Magazine, 56(1), 64-69. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, March 22). F-16 Unmanned Drone and Data Search. Retrieved from https://studycorgi.com/f-16-unmanned-drone-and-data-search/

Reference

StudyCorgi. (2022, March 22). F-16 Unmanned Drone and Data Search. https://studycorgi.com/f-16-unmanned-drone-and-data-search/

Work Cited

"F-16 Unmanned Drone and Data Search." StudyCorgi, 22 Mar. 2022, studycorgi.com/f-16-unmanned-drone-and-data-search/.

* Hyperlink the URL after pasting it to your document

1. StudyCorgi. "F-16 Unmanned Drone and Data Search." March 22, 2022. https://studycorgi.com/f-16-unmanned-drone-and-data-search/.


Bibliography


StudyCorgi. "F-16 Unmanned Drone and Data Search." March 22, 2022. https://studycorgi.com/f-16-unmanned-drone-and-data-search/.

References

StudyCorgi. 2022. "F-16 Unmanned Drone and Data Search." March 22, 2022. https://studycorgi.com/f-16-unmanned-drone-and-data-search/.

References

StudyCorgi. (2022) 'F-16 Unmanned Drone and Data Search'. 22 March.

This paper was written and submitted to our database by a student to assist your with your own studies. You are free to use it to write your own assignment, however you must reference it properly.

If you are the original creator of this paper and no longer wish to have it published on StudyCorgi, request the removal.