Abstract:
Embodiments described herein may help to automatically create flight plans that incorporate information regarding a number of different societal considerations. An illustrative computer-implemented method may involve receiving societal-consideration data for a plurality of geographic areas over which unmanned aerial vehicles (UAVs) are deployable. For a given geographic area from the plurality of geographic areas, the societal-consideration data may include one or more land-use indications for the geographic area that are indicative of a type of land use in the geographic area. The method may also involve, for each of one or more of the plurality of geographic areas: applying a cost function to the one or more land-use indications for the geographic area to determine a societal-consideration cost of UAV flight over the geographic area; and sending an indication of the determined societal-consideration cost to a computer-based flight planner.
Abstract:
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.
Abstract:
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.
Abstract:
An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground using an assembly that secures the payload during descent and releases the payload upon reaching the ground. The assembly can also include a bystander communication module for generating cues for bystander perception. While the assembly securing the payload is being lowered from the UAV, the bystander communication module can generate an avoidance cue indicating that bystanders should avoid interference with the assembly. The assembly also includes sensors that generate data used, at least in part, to determine when the descending assembly is at or near the ground, at which point the assembly releases the payload. The bystander communication module can then cease the avoidance cue and the UAV can retract the assembly.
Abstract:
An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground using an assembly that secures the payload during descent and releases the payload upon reaching the ground. The assembly can also include a bystander communication module for generating cues for bystander perception. While the assembly securing the payload is being lowered from the UAV, the bystander communication module can generate an avoidance cue indicating that bystanders should avoid interference with the assembly. The assembly also includes sensors that generate data used, at least in part, to determine when the descending assembly is at or near the ground, at which point the assembly releases the payload. The bystander communication module can then cease the avoidance cue and the UAV can retract the assembly.
Abstract:
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.
Abstract:
An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground using an assembly that secures the payload during descent and releases the payload upon reaching the ground. The assembly can also include a bystander communication module for generating cues for bystander perception. While the assembly securing the payload is being lowered from the UAV, the bystander communication module can generate an avoidance cue indicating that bystanders should avoid interference with the assembly. The assembly also includes sensors that generate data used, at least in part, to determine when the descending assembly is at or near the ground, at which point the assembly releases the payload. The bystander communication module can then cease the avoidance cue and the UAV can retract the assembly.