Introduction
You have been asked to work on a design project for your employer. Your tasks involve the
generation and evaluation of design ideas. Your particular design project has been assigned on
the basis of your last name:
Last Name Starts With… Design Project Theme
A – F Dust Buster
G – O Ping Pong Table
P – Z Shop Utility Cart
Task 1 (10 Marks)
Generate a list of five constraints that apply to your project theme. The constraints must be
realistic, and they must serve a purpose. Identify the constraints, and indicate why they have
been adopted.
Task 2 (10 Marks)
Identify all of the relevant functions of your design project. This includes the basic and
secondary functions. When listing the secondary functions, specify whether they are required or
unwanted and explain your answer.
Task 3 (30 Marks)
Construct each of the following and explain the results:
• A Pairwise Comparison Chart to rank the goals of your design project.
• A Morphological Chart to illustrate the design space for your design project.
• A Numerical Evaluation Matrix to evaluate the various design options for your design project.
i. FaceIt
In the department of law enforcement, there is FaceIt, a face recognition system that can search through a whole crowd for a face and match this face with the mugshot history of this specific person. FaceIt is considered to be the most accurate facial recognition software as of today [11]. This face recognition system is mostly used by law enforcement agencies. Next to being used for law enforcement and security surveillance, which is the primary use of it, the system can also be used for computer security and eliminating fraud. Eliminating fraud is very useful in a situation as voting in a presidential election. By using this technology, voting multiple times can be evaded and people can’t get away with it anymore. People’s faces will be stored in a database and if a face appears again, then that vote won’t count [2].
ii. Matching faces from live security images
The law enforcement is always on the hunt for terrorists or big criminals. Most already have good mug-shot which can help to find a face in a crowded place such as an airport [16]. And when agents are trying to hunt some criminals down, then they will probably try to flee the country. At the airport, face recognition can be of big help. The faces of these criminals are collected and stored in a database with faces of people who are not allowed to board a plane. The faces of travelers are being scanned and are being compared with the database at the security check. If the program founds a match, the guards of the airport will go to them and cameras will be turned to the person for live images. After picking the person up, the guards will try to decide whether to keep the person from going to an airplane or they decide that it is not the face that they are searching for [27].