Facebook Pixel Code
x
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Report on Design Methods and Technology Project

This is a preview of the 6-page document
Read full text

There are various financial needs for the efficient running of the project that the report is going to bring forth. Te use of robots is quite efficient since the robot is monitored from a distance, ad one does not have to be their all the time in the case of humans guarding a particular premise. Te robots do not get tired and, terefore, iprove the security of an establishment. Te robots need finances and the proper components for security robots are essential. Te study, terefore, ams to obtain the components that are part of the design of the project.

Sftware design for the robot will also be made (Angelo 2007). Cmputerized systems involving computers and surveillance technology like CCTV cameras have come in handy to combat crime. Te use of technology in fighting crime has successfully dealt with many crimes. Te robotic technology can distinguish various criminal acts and alert the relevant authorities in place. Te robots will aid the police and security forces in dealing with insecurity. Te use of the technology needs many resources that are costly but in the end prove expedient in the maintenance of security.

Scurity firms and private owners who want to increase security in their establishments will use the security. Te computer software and hardware will be acquired to meet the objectives of the projects. Tere are various locations to buy the software and hardware (Angelo 2007). Acording to the security nature of the robot, i will require to have surveillance hardware and software for connecting the information collected to an individual command center. Scurity of the robot is another feature for efficient security monitoring and functioning of the robot (Siciliano 2009).

Te robot uses software that couples with official intelligence to help monitor the activities and functions of the robot. Hcking of such a robot may produce a leak in information where unscrupulous individuals use the information for their malicious gains. Te robots should, terefore, hve system security software that monitors any malicious software that includes worms, vrus and Trojans that can cause the robot to malfunction. Terefore, te acquisition of the security software will, terefore, rmove the threats when they are detected.

Te important function of the security system software is to prevent the misuse of the robot...

This is a preview of the 6-page document
Open full text

Related Topics

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Engineering and Construction, Agriculture
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Technology, Military
Hire a Writer
preview essay on Report on Design Methods and Technology Project
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us