Roman Domos

    You are an archaeologist who is working in Pompeii, and you have made a HUGE discovery, a perfectly preserved Roman domos. Your job is to record your find. Draw the house plan Label each room Design the interior What materials were used in the construction Pick a wall painting style Pick two pieces of art, artifact, or culture that was also found in Pompeii Bread, Wine, Graffiti, etc. What can we tell about the people who lived in this house based on their remains?          
1. Introduction Every day a lot of crimes take place. Criminality is a big problem all over the world. It is a challenge to track down criminals and Artificial Intelligence could help with this. The technologies that exist nowadays make it easier to identify individuals. One of these technologies is facial recognition. These technologies have the ability to identify criminals. Facial recognition algorithms can compare two sets of data. When a match has been found, a person could be identified. This leads to the following question: “How can facial recognition be used to prevent everyday crime?” The research question is limited to everyday crime, since facial recognition is used in a lot of fields. By everyday crime is meant: robbery, violence, drug sales, insults, threats, forgery, driving under influence, growing hemp, theft, rape, (severe) abuse and murder. To answer the main research question a few subjects will be reviewed. The facial recognition technologies which exists and how they work will be discussed. The results of what the technologies have brought so far will be evaluated. But also the downsides, risks and ethical issues of facial recognition technologies will be taken into account in this paper. Furthermore the privacy law will be discussed in this paper, with focus on the European law. Taken all these things into consideration, there can be given an answer to our main research question. 2. Facial recognition technologies i. Which facial recognition technologies exist? A numerous of facial recognition techniques and methods are being used for security and authentication purposes which includes areas in detective agencies and military
Sample Solution

Comply today with Compliantpapers.com, at affordable rates

Order Now