Hate and Education

 

 

 

–Describe what questions the author(s) had when they started the research. What were they wondering
about?
–Describe any theories, hypotheses or specific research questions the author(s) tested (or explored or
examined) in their research.
–Describe the research (what method was used, where was it carried out, what the sample size was, etc).
–Summarize the results of the research. Discuss the limitations of the research. Give your evaluation of the
research and the article. Do you have any criticisms of how the research was carried out? Was there
information missing from the article that you though should have been included? Do you agree with their
interpretation of the results? What further research needs to be done on this topic? Is there a gap in the
research that you can start to fill with your own research proposal?
–Describe how this article relates to your research proposal topic. Are the hypotheses or theories ones you
might want to incorporate? Would you like to use a similar research method? Why or why not? This is a
general outline of the assignment. How much emphasis is given to each question will depend on your
judgement. Other issues not explicitly stated here may also be relevant for your article. It is up to you to decide
this, although you are welcome to consult with your instructor when you have selected and read a specific
article.

 

Sample Solution

i. FaceIt
In the department of law enforcement, there is FaceIt, a face recognition system that can search through a whole crowd for a face and match this face with the mugshot history of this specific person. FaceIt is considered to be the most accurate facial recognition software as of today [11]. This face recognition system is mostly used by law enforcement agencies. Next to being used for law enforcement and security surveillance, which is the primary use of it, the system can also be used for computer security and eliminating fraud. Eliminating fraud is very useful in a situation as voting in a presidential election. By using this technology, voting multiple times can be evaded and people can’t get away with it anymore. People’s faces will be stored in a database and if a face appears again, then that vote won’t count [2].

ii. Matching faces from live security images
The law enforcement is always on the hunt for terrorists or big criminals. Most already have good mug-shot which can help to find a face in a crowded place such as an airport [16]. And when agents are trying to hunt some criminals down, then they will probably try to flee the country. At the airport, face recognition can be of big help. The faces of these criminals are collected and stored in a database with faces of people who are not allowed to board a plane. The faces of travelers are being scanned and are being compared with the database at the security check. If the program founds a match, the guards of the airport will go to them and cameras will be turned to the person for live images. After picking the person up, the guards will try to decide whether to keep the person from going to an airplane or they decide that it is not the face that they are searching for [27].

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.