A Robotic System for Reunification of Abducted Children Project Plan

Chen Changping (ICT)
1
A Robotic System for Reunification of
Abducted Children Project Plan
Background
Along with the modernization of Mainland China, human trafficking has become a serious and yet
intractable issue. While it’s officially reported that fewer than 10,000 children are kidnapped each
year, U.S. State Department estimates that the number reaches up to 20,000. Some estimates even put
the number as high as 70,000, suggesting that over 190 children are abducted daily. Most of these
abducted children are kidnapped not for ransom but rather for sale, coerced into slave labor,
prostitution, and most of all, begging on streets.i
Goal
This project is by a successful Internet campaign a year ago. The idea was simple – the public was
called and encouraged to take photos of child beggars on street and post the pictures on micro
blogging sites, and volunteers centralizing these information would then notify media and the
policeii. This project intends to further investigate how we can use Information Communication
Technology (ICT) and build an intelligent platform to assist the reunification of abducted children.
Ideas and Implementation
In this project, we would like to assess the following adoptions of ICTs and attempt to implement a
model, which demonstrates its potential in resolving cases of missing children.
Building a Database of Street Children and Missing Children
ICT can be utilized to build databases of street children and missing children. A specialized web
application can maintain these two large databases and provide multiple interfaces for both human
and robots, including webpage, software, and Application Programming Interfaces (API), that allow
us to build a unified record on each child, which could contain one’s name, photo, origin, blood type,
DNA data, and any type of information that helps us to identify the child.
Social workers can keep track of each child and update profiles frequently. Reports of missing
children can be imported and migrated from existing databases online. A routine cross-reference that
compares profiles and runs facial identification can match street children and missing children with a
certain degree of accuracy (or possibility in algorithm)iii and government can assess the result and
take actions. These profiles can also be used in law enforcement, e.g. mass street children relocating
to same place at the same time is abnormal and entails investigation.
However, for such a system to work, the implementation should focus on scalability and reliability. It
needs to scale to both horizontally (more child profiles) and vertically (sophisticated profile). It
should also allow simultaneous access. The database should be document-oriented rather than
relational, to support a dynamic structure of profiles.
Aggregating Database with Social Media (Data Mining)
Not all missing children would wander on streets. Some are put into more hazardous environments.
However, given that one most certainly carries a cell phone with both camera and access to the
Internet, many photos of abused children are taken and posted on corners of the Internet. Hence, by
combining these scattered pieces of information, we can construct a broader database. An
Chen Changping (ICT)
2
implementation of below can be deployed on centralized cloud platforms, e.g. Amazon Elastic
Compute Cloud (EC2) to reduce cost.
Streamed Information Processing
By cooperating with user-generated contents websites, we programmatically access each piece of
data and search for anything useful. For instance, a tweet, containing message “OMG, that’s so brutal
and mean!!!” and a freshly captured photo of child transporting freight, is added to a database of
potential victims, which is later checked automatically with facial recognitioniv and identity matching
software in reference to the missing children database. Hence, an algorithm of pattern matching,
preferably aided by machine learning trained with real world samples, needs to be developed and
constantly improved. Also notice that since surveillance cameras are ubiquitous, camera feeds can
also be used to run facial recognition software against a missing children database.
Active Scavenging
Taking a step further, we can actively look for useful information, not supplied by partners, and
process it as above. Data sources could be RSS feeds of forums, a custom web indexer/crawler, etc.
Exporting Data to Media, Government and the Public
Exporting info to media is necessary in some case, e.g. a missing child is identified in a random
snapshot in Shanghai and media need to release his or her profile so that residents can identify said
child. Easy exporting to digital or printable format allows various forms of distribution of
information. Ideally, a website should be constructed to release and update on each case of missing
child to the public.v
However, profiles of missing children should never be on crumpled posters stamped on utility poles.
Instead, APIs for data exporting could be used. Advertising companies can access profiles from
databases directly via APIs. Imagine a bus station with a digital screen originally used to play
advertisements can also be used to run notice of missing child, with fresh data fed in on the fly.
Governments and media can access real-time auto-generated statistical data, either in numbers or in
graphs, via APIs or human interfaces, for their own purposes.
Project Execution Procedures
•
•
•
•
Interviews with social workers, government officials and media (up to 20) to discuss their
needs and difficulties. This process should take up to three months.
A series of interviews will then be conducted with Information Technology experts to discuss
the system’s structure and flaws.
A team of programmers will work closely with social workers and police department
(responsible for rescue of children) to develop alpha-version model.
Alpha model will then be tested for real world viability regionally.
Expected Difficulties
•
•
Data recorded by social workers are local while data through data mining online and children
trafficking are national; therefore, the model may not precisely function.
Government noncooperation and objection may take places in forms of censorship.vi
Estimated Results
Considering technical difficulties in its implementation and involvement of multiple parties, it’s
certainly possible that this system model cannot be made or would not work. Nonetheless, even if it
fails, it serves as an example from which subsequent designs learn.
Chen Changping (ICT)
3
End Notes
Adapted from China’s Missing Children by Charles Custer on Foreign Policy <http://www.foreignpolicy.com/articles/2011/10/06/china_missing_children>. The
alarming situation also thoroughly illustrated in video at
<http://www.youtube.com/watch?v=HPSEdErE-kE>.
i
Description of this campaign can be found at
<http://www.majinxin.com/2011/02/08/how-microblog-is-helping-abducted-children-inchina/>
ii
In a research funded by U.S. Department of Justice by ANSWER Analytic Services Inc.
<https://www.ncjrs.gov/pdffiles1/nij/grants/186277.pdf>, despite that this research is
conducted in 2001, facial recognitions is experimented to identify children’s faces (in Section
4 in final report). Several techniques are discussed and can be incorporated into our design.
iii
Automatic facial identification, despite of the improvement of algorithm and use of
machine learning that makes it possible to improve itself in progression, can certainly fail to
recognize the children, primarily because either photo is vague or the child has grown up.
Having said that, the photo below, adapted from micro-blogging site
<http://weibo.com/1858390562/y2Ju1veXI>, is clear enough for facial recognition.
iv
There’s already existing website dedicated to posting and finding missing children, e.g.
“Baby Come Home”<http://www.baobeihuijia.com/> ran by volunteers. Yet they use
forum software, spammed by advertisement robots, to record missing child, e.g.
<http://bbs.baobeihuijia.com/thread-54620-1-1.html>, failing to structuralize child’s
information, thus making searches and matches hard.
v
vi
Exemplified in video at <http://www.youtube.com/watch?v=HxZVUx1BVOQ>.
Chen Changping (ICT)
4
Appendix #1 - Why This Project Matters?
Since I was thirteen, I’ve been making programs for various reasons, for fun, profit, friends, etc. I’ve
built several applications, some open source and some for profit. I’m also experienced with database
and web apps. Nonetheless, to my disappointment, I’ve never ever made ANY contribution to
solving real-world problems, despite that I’ve always wanted to. Often tangled by poor kids begging
me to buy flowers everyday on my way home, I’m determined that this project matters to me.
Besides, I’ve always believed that technologies are developed to solve problems. Facebook is great
because it allows us to socialize online. Automatic ticket machines are great because they save us
time and money. Yet the fact is, technologies are just a fancy term in China, perhaps also in lessdeveloped countries, often misunderstood by governors, both carelessly and deliberately.
Nowadays, use of technologies is prevalent even though China has not had technologies thirty years
ago; however, they were not used with the ultimate purpose of solving real issues in mind, but often
for a simple-minded and naïve belief that technology is just good.
Misuse of technologies is common in China. For example, expensive television sets are deployed in
place of cheap ordinary LED screens in subways stations in Shenzhen for displaying train schedules.
Yet the letters on TVs are so small that only people within meters can clearly see, not to mention
almost all children in school today are myopic. In comparison, subway stations in Hong Kong, just
across a river, utilize unexceptional LED screens that only concisely show necessary information. The
original purpose of these screens is to display information. Yet using more advanced technology
without understanding its nature and purpose does not always yield expected results.
For the same reason, to solve abduction of children, we must not rely on the belief that use of
technology is helpful to resolving this issue. We must look into deeper causes and difficulties of
current situation, and devise a plan that specifically targets to remedy the difficulties we encounter.
The primary motivation in me designing this project is that computational resources are cheap.
Cloud computing is in fact, affordable and easy to manage; and it’s only becoming cheaper as time
passes while human resources are becoming more costly.
Also that a infrastructural system is the foundation of upper-level applications, e.g. a centralized
database providing only read and write access to children’s profiles is fundamental dependency to
any other application that intends to make use of these profiles. Centralization as a character in
infrastructure also matters in that it reduces redundant duplications and makes information available
all in one place in single access.
However, I acknowledge that building a robust system that suits our needs is not easy. Government
can be the most reluctant in adopting such model. Yet, since such infrastructural database contains
large volume of private information, government is the only party that can build and maintain it.
Perhaps this is why in spite of efforts made; no such official database ever existed.
Hence, in designing this system delineated in project plan I intended it not to become totally
dependent on governmental support. In fact, the system would work just fine with volunteers and
without government involved in it. I suppose the most important aspect of this system is its active
hunting for information on the Internet. Instead of passively retrieving information input by human,
it actively looks for information. This process is automatic and most importantly, is comprehensive.
By using web indexers, we can actively target for information related to abused children. It takes
probably only an hour and cost of one-hour labor to peruse web pages of abused children by hungry
machines in racks that would take an entire day for one human being. Such massive access to
information could hopefully, dramatically increase the rate of finding a missing child.
Chen Changping (ICT)
This document is also available at URL below in case anything in
this PDF formatted document does not work.
http://gs.ccp.li/children_reunification.html
5