Teddy bear writing paper
Essay Topics British Council
Friday, August 28, 2020
Daoism, Confucianism, and Shinto Essay Example | Topics and Well Written Essays - 500 words
Daoism, Confucianism, and Shinto - Essay Example A lot of something is toxic. For instance, indulging brings about physiological mischief; accordingly, it is significant to focus on the bodyââ¬â¢s automatic components. The entry likewise alerts against dependence on material things as a definitive wellspring of satisfaction by gathering that individuals just need what is sufficient to lead a prosperous cheerful life. For instance, social connections that support and give friendship are critical to continuing joy. As I would see it, this section weights on the significance of understanding oneself before endeavoring to get others. In doing as such, one will have the option to carry on in a way that reflects their standards while simultaneously regarding the assessments of everyone around them. For instance, when one comprehends that untruthfulness shocks them, they will act in a reliable way, which thusly conveys a sign to others to do likewise while associating with the person. Daoist educators refuted standards progressed by disciples of Confucianism. They concentrated on appreciating the idea of the real world, requesting life ethically, rehearsing rulership, expanding life span, and directing their eating regimen and cognizance (Molloy, 2010). At the center of their belief systems lay instinctive nature (ziran), easy activity (Wu wei), and lessons about how to turn into an acknowledged individual (zhenren) or sage (shengren) (Molloy, 2010). What's more, they trusted it was pointless to attempt to restrict the nature by interceding, as they accept nature had its own particular manner of mediating to end irregularity in the general public. For instance, Daoist instructors beseeched rulers to avoid utilizing weapons as a methods for closure social issues, as they accepted nature would relieve the issue. Daoist lessons completely reflect its adherentsââ¬â¢ faith in change, which they derived characterized lifeââ¬â¢s reality. They additionally accepted that the ââ¬Å"Daoâ⬠was mystifying, as it outperformed every single possible marvel. In any case, it was feasible through easy
Saturday, August 22, 2020
Beowulf and Grendel Book and Film Essay Example For Students
Beowulf and Grendel Book and Film Essay Beowulf is a celebrated sonnet about an epic saint who execute evil spirit and mythical beast to ensure the life of his kin. The film with a similar name was discharged in 2007, which cause the legend to turn out to be genuine before crowd. It depends on the first sonnet yet has some significant changes to spic and span the legend just as make another perspective about this well known legend. The film despite everything have the comparative plot and characters with the sonnet. The headliners, for example, the taxing night feast in Heorot and the passing of Beowulf, Grendels assault, Dragon assault and Beowulf fights with Grendel Dragon despite everything occur in the film. The image of a solid saint, who should be the most grounded human is represented well in both film and sonnet. Conversely, the film rendition changes a piece in the plot of this courageous story and its characters. About the plot, Grendel shows up himself to the Danes in their banquet by inclining the entryway and an assault in wildness while he just shows up himself quietly after the dining experience and everybody are dozing, in the film. At that point, the film removes a strong sovereign grieving of Hrothgar and replaces it by a groundwork for a vengeance and Hrothgar not just feels dread and distress as much as in the sonnet yet additionally he remains quiet and looks for a warrior who can slaughter Grendel. Grendel goes to the Heorot twice in film yet his coming is up to multiple times in the sonnet. The most significant change is that Beowulf doesn't murder Grendels mother as he does in the sonnet. This occasion joins with the last occasion of both film and sonnet, Beowulf and the mythical serpent. In the film, the mythical beast is Beowulfs child and it draws up a terrible occasion of a dad slaughter his child to stop a lascivious activity. The mythical beast is executed by a profound strike of blade in sonnet however it is murdered by Beowulfs uncovered deliver the film. About characters, Hrothgar should be a conscious ruler with his acclaimed accomplishment in his excursion to turn into the lord of the Danes yet in the film, his appearance is an exposed body with a long bit of silk and a crown in the head. Be that as it may, he is a social ruler and this thing causes the dining experience toward the start of film to turn into an upbeat scene with joke, singing, drink, and so forth Grendel, an obscene evil presence, causes an exceptionally fierce and bleeding assaults in the Herot yet Grendel shows up as a poor devil in the film. He has delicate ear that causes his obscene activity and it is his shortcoming in the fight with Beowulf. His appearance is alarming yet resembles a zombie than an evil presence. Grendels mother should be revolting as her child however the film makes her become a wonder who draw in our saint with hot and sweet voice. She is additionally a poor mother and she turns into a risky mother after her children passing. In both film and sonnet, she attempts to vindicate for her children demise however she is murdered by Beowulf in the sonnet. In the film, she utilize her hot body to draw in Beowulf. Our saint isn't a divine being all things considered, he is a man and this thing is demonstrated all through the film. The film with a switched story raises new preference for crowd about a legend. It additionally demonstrates that everything wicked is consistently causes by human and no one but human can understand their wrongdoing. In some cases, human must compensation blood and satisfaction for the transgression that they causes. .u1f4155ab03abfd23d7fc3de357ad24c0 , .u1f4155ab03abfd23d7fc3de357ad24c0 .postImageUrl , .u1f4155ab03abfd23d7fc3de357ad24c0 .focused content region { min-stature: 80px; position: relative; } .u1f4155ab03abfd23d7fc3de357ad24c0 , .u1f4155ab03abfd23d7fc3de357ad24c0:hover , .u1f4155ab03abfd23d7fc3de357ad24c0:visited , .u1f4155ab03abfd23d7fc3de357ad24c0:active { border:0!important; } .u1f4155ab03abfd23d7fc3de357ad24c0 .clearfix:after { content: ; show: table; clear: both; } .u1f4155ab03abfd23d7fc3de357ad24c0 { show: square; progress: foundation shading 250ms; webkit-change: foundation shading 250ms; width: 100%; murkiness: 1; progress: mistiness 250ms; webkit-progress: darkness 250ms; foundation shading: #95A5A6; } .u1f4155ab03abfd23d7fc3de357ad24c0:active , .u1f4155ab03abfd23d7fc3de357ad24c0:hover { haziness: 1; progress: obscurity 250ms; webkit-progress: mistiness 250ms; foundation shading: #2C3E50; } .u1f4155ab03abfd23d7fc3de357ad24c0 .focused content territory { width: 100%; position: relative; } .u1f4155ab03abfd23d7fc3de357ad24c0 .ctaText { fringe base: 0 strong #fff; shading: #2980B9; text dimension: 16px; textual style weight: intense; edge: 0; cushioning: 0; content embellishment: underline; } .u1f4155ab03abfd23d7fc3de357ad24c0 .postTitle { shading: #FFFFFF; text dimension: 16px; textual style weight: 600; edge: 0; cushioning: 0; width: 100%; } .u1f4155ab03abfd23d7fc3de357ad24c0 .ctaButton { foundation shading: #7F8C8D!important; shading: #2980B9; outskirt: none; fringe range: 3px; box-shadow: none; text dimension: 14px; textual style weight: striking; line-tallness: 26px; moz-fringe span: 3px; content adjust: focus; content beautification: none; content shadow: none; width: 80px; min-tallness: 80px; foundation: url(https://artscolumbia.org/wp-content/modules/intelly-related-posts/resources/pictures/basic arrow.png)no-rehash; position: supreme; right: 0; top: 0; } .u1f4155ab03abfd23d7fc3de357ad24c0:hover .ctaButton { foundation shading: #34495E!important; } . u1f4155ab03abfd23d7fc3de357ad24c0 .focused content { show: table; tallness: 80px; cushioning left: 18px; top: 0; } .u1f4155ab03abfd23d7fc3de357ad24c0-content { show: table-cell; edge: 0; cushioning: 0; cushioning right: 108px; position: relative; vertical-adjust: center; width: 100%; } .u1f4155ab03abfd23d7fc3de357ad24c0:after { content: ; show: square; clear: both; } READ: Film Review - A Raisin in the Sun EssayBibliography: http://portafoliodediacronia.wikispaces.com/B.+Differences+between+the+poem+of+Beowulf+and+the+movie+Beowulf
Friday, August 21, 2020
E Marketing Essay
Foundation of the Study Marketing assumes a fundamental job in monetary development in the present worldwide world. It guarantees the arranged financial development in the creating economy where the shortage of merchandise, administrations, thoughts and unreasonable joblessness, in this way promoting endeavors are required for assembly of monetary assets for extra creation of thoughts, products and ventures bringing about more prominent business. Advertising invigorates the total interest in this way grows the size of market. Promoting in fundamental businesses, farming, mining and manor ventures helps in circulation of yield without which there is no chance of preparation of merchandise and enterprises which is the key point for financial development. These ventures are the foundation of monetary development. It additionally quickens the way toward adapting the economy which thusly encourages the exchange of investible assets. It helps in disclosure of pioneering ability. Moderate mechanical merchandise and Semi-modern items and so forth ssentially showcased for mechanical reason so as to build up the modern part with a view to financial development. Today the pattern of ICT advancement is increasing bigger impact over countriesââ¬â¢ improvement and development. It would not be astounding to see the components that advanced from the improvements of ICT, (for example, web based business, e-promoting, e-business, and e-learning) have progressively offered help toward upgrading countriesââ¬â¢ developm ent and improvement, particularly in profoundly modern conceptual. As the pattern of ICT advancement is increasing bigger impact over countriesââ¬â¢ improvement and development, online business assumes a significant job in upgrading the development of a few created and creating economies over the 21st century. This part plans to construct the explanatory base to help the significance of the improvement of online business by researching the job and commitment of internet business to financial development and advancement. The part initially explores past commitments of web based business to financial development in created nations. Second, past research discoveries and structures are used to examine the commitment of online business toward monetary development, concentrating looking into the issue of internet business in Tanzania. The investigation found that internet business assumes a significant job in improving the monetary development of Tanzania. Two significant discoveries upheld the development of internet business. First is the expansion in quite a while produced by the utilization of web based business. Second, web based business actuates the profitability improvement of firms through higher rivalry and development. Online business Contribution to Economic Growth: The Case of Tanzania ventures. The presentation of internet business and e-business appears to make a colossal commitment to the development of many created countries and is proceeding with its expanding sway on the improvements of many creating economies over the 21st century. Some ongoing writing brought up the expanding commitment of internet business toward monetary advancement in a few created nations, for example, the United States, Canada, Australia, and the United Kingdom (Adam, Mulye,Deans &Palihawadana,2002).
Tuesday, May 26, 2020
Facts About Dissertation Writing Services
Facts About Dissertation Writing ServicesOne of the best options for professionals is to look for dissertation writing services. This will not only be very beneficial to you but also the applicant as well. In fact, a lot of organizations are now offering these kinds of services for their applicants. What makes it so?Well, let's face it, we all would rather spend some time in writing a dissertation instead of just waiting around for our college or university to approve us. However, it is very hard to do this without a professional writer. You need someone who knows how to write and you would definitely not want to hire someone who does not have a good reputation. How do you find such a person? Easy, you go online!Finding a good writer is actually very easy; first of all, you would simply visit the website of your potential dissertation writing service and check if they have anything that you can use or have any recommendations from people who are already doing this kind of service. Al so, look at the reviews given by previous customers as these would give you a clear idea of what to expect.Once you find the right dissertation writing service that fits your requirements, try and find out the approximate fee that the service is charging. You can either do this by yourself or with the help of a friend.If you are just starting, it may take some time to see if you like the service and the person before you final decision. But once you have decided, don't hesitate to contact them directly. This is important because you can find out their background and professionalism if you have to. In fact, if you know that a company has a great reputation in the field, it is a plus for you!Dissertation writing services are great for professionals, as it gives them an opportunity to focus on their studies instead of worrying about how to get a proper job after graduation. There are a lot of people who do not even realize that they need to settle down after their graduation because th ey are still working and are not sure what career they want to pursue. There are also a lot of other benefits for students because of the variety of jobs available today.The most common disadvantage of using these services is that it will take you a lot of time to finish your dissertation. However, this can be prevented by preparing your own outline beforehand. Another drawback is that you cannot continue the research methods that you have already completed. This is another reason why you need a good dissertation writing service!
Saturday, May 16, 2020
Traditionally surveillance was done manually - Free Essay Example
Sample details Pages: 33 Words: 10033 Downloads: 8 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Abstract Surveillance is proving to be very effective technique to ensure the feeling of safety and security among the people of a state. Traditionally surveillance was done manually using human patrolling by police and law maintaining bodies in the city. Then with the advent of CCTVs we started using video surveillance. Donââ¬â¢t waste time! Our writers will create an original "Traditionally surveillance was done manually" essay for you Create order Though there are many technologies to choose from but by making use of biometric technique, surveillance can become even more effective, as biometrics rely on ones physical characteristics which are dont change overnight and thus harder to deceive the system . In this report we have analyzed the various issues and challenges that come with the use this biometrics for surveillance. Then we have tried to find potential solutions to these issues and challenges. We have also described how biometrics can be used for the purpose of surveillance. So the main goal of this paper is to look into the deeper issues related to the use of this technology and provides a solution to it. Chapter 1 Introduction 1.1 Background Dawn of the 21st century brought with it certain happenings that forced everyone to realize that safety and security are prime needs of every individual, organization, state and country. And it isnt surprising that biggest threat to ones security is the human element. A large sum of money is invested every year just for security by individuals, organization and nations. Individual wants to protect and guard their home; organizations have to guard their data and infrastructure. But when it comes to guarding a nation we need more powerful technologies. Security of a nation has becomes increasingly important especially since the aftermath of various large scale terror attacks we have seen in recent past. Surveillance has emerged as an effective technique to increase the security and guard the citizenry of a nation. Before we start introducing how Biometrics can help in the process of surveillance it will be really helpful if we understand the meaning of these two terms biometrics and surveillance. In the past Biometrics has been increasingly used for the authentication purpose to enhance security of various systems. Biometrics makes use of our physical characteristic which is unique for every individual, this helps in unique identification. [1] Surveillance which means observing or monitoring people from over a distance without physically bothering the subject, has became a common tool to enhance security now a days so much so that you will find CCTV (Closed Circuit Television) cameras installed virtually everywhere. The word surveillance owes its origin to the French word for watching over. [2] Biometrics has mostly been used as a tool for solving the problems of reliably identifying a person. It has been widely used in identity management systems, where a person is granted access to various applications like entry into a room, access to a computer system, to execute a transaction or trigger a nuclear weapon, only once he has proved his identity i.e. the one he claims to be. [3] 1.2 Description of Research Area In this report have described how the possible use of biometric techniques would enhance the existing surveillance systems and how it may possibly be used as a tool improves the level of security in the existing society. Since the aftermath of September 11 attacks surveillance has increased a lot. This has once again shifted the focus back to biometrics and the US government is making its use to guard their borders and airports from various possible attackers. [23] Every year huge amount of money is invested by the government in various technologies to improve the level of security to make the citizenry feel more secure and safe. Thus people have realized the importance of surveillance so a lot of work is going on in the field of remote biometrics. For instance research is being done on how to make use of face and gait biometrics for surveillance and few applications are already available for use and we can see few more new ones in near future. We have also investigated how we can make use of biometrics to recognize the persons using their face or their gait even if they are a part of a huge crowd. This would be very useful to protect the society from well known criminals who are roaming around the city. Face and gait recognition wont be possible if we are not able to process the video or image data captured by the cameras and makes use of it for the recognition process. So this process requires use of image pattern recognition and processing. (Refer to Appendix 2 for details) There are different kinds of surveillance techniques being used. However video surveillance is the most popular one. With the advent of CCTV (close circuit television) cameras we have seen a huge rise in them being employed for the surveillance purpose. Mostly they are employed by banks, organization holding sensitive information, airports, supermarket and shopping malls to keep an eye over people trying to breach security or trying to steal something. They can monitor every activity of an individual even at places like restaurant and your own home. We have seen this concept of being shown in movies like The Truman Show and TV series like Survivor and Big Brother. [14] Majority of these systems requires experienced staff that has to continuously looking at the live video feed on monitor to look for suspects. A normal system would have lot of cameras installed at various places and there would be one room where few people monitoring it all in the room. The video feed is often recorded on tapes in high security organizations and kept in case they need to monitor them again for some clues. So in way it will require full manual attention. We have also tried to analyze all the major issues related to use of biometric technology for surveillance. Delving into the legal, ethical and privacy aspects and viewing them from the constitution point of view and also the point of view of a citizen. Then we have tried to provide possible solutions to those issues based on the research and study we did. 1.3 Purpose of Research The purpose of research is to find out the views of the people regarding use of biometric technology for surveillance purpose. How they view the use of technology is affecting their life, and what more do they expect from the technology should have in future. Our findings would help us address the various issues related to use of biometric technology for surveillance in a better manner and help us suggest some possible solutions to solve those issues. 1.4 Goals and Target Audience This report is targeted towards all those who use technology in day to day life and want to know in what ways its affecting our life in both positive or negative ways, and what effects it is having on our privacy.. So basically it will make people more aware in what ways such a technology can affect our life and what needs to be done to avoid the technology taking complete control of our life like a big brother. So our audience can be both IT and non IT student and general people, as no one is untouched by surveillance in this era. 1.5 Limitations Though there are many biometric techniques available but in our report rather in this report so we restricting our focus to only Face and Gait recognition. Reason being that these two technologies are really helpful for the purpose of surveillance and can be truly called as remote biometrics. Neither face nor gait biometrics require any contact with the person under observation. One can keep a watch over them from a distance. Given the limited time span we got for this research work our survey was restricted to limited number of people, not whole of the society. There wasnt much statistics available on use of surveillance globally, and any official poll or survey of a larger scale regarding how to people feel about it. Our respondents were limited to University students studying in Stockholm, so our results and findings would be based upon that. So it wont give a wholesome picture of everyone on this issue. The results might vary from what people across the globe think of the issue, we have tried to give reasoning for every such surprising results that we got. Chapter 2 Research Methodology 2.1 Choice of Research Topic Since every research begins with an idea or question. So we also began our research searching for a possible question related to the field of security. We went through various journals to search for a possible question for our research. We also made use of internet research for various possible areas of research in the field of security. We went through the book Security Engineering, A Guide to Building dependable distributed systems, by Ross Anderson to look for some good research topics. Also In our previous study period we had studied the book Computer Security: Art and Science by Matt Bishop. This book made us aware the biometrics field and its application related to security. We felt that it is a very powerful technology and its use can be extended in other areas as well. Since in this era safety and security has become one prime need of everyone we thought that use of biometric technology for the purpose of surveillance would make an interesting topic for our research. We also went through presentation on Biometrics for Surveillance by S. Kevin Zhou and Rama Chellappa , though we didnt use it in our report as it was highly loaded with technical things, but it helped us in choosing this research topic. We believe by the time we finish our research we would be able to address the existing major issues and challenges and try to give potential solution for those problems. 2.2 Research Questions In this report we would address the following problems/research questions. Legal, ethical and privacy issues related to use of biometrics for surveillance. Views of university students on various issues related to biometrics and surveillance and those of people across the world. Possible solutions to solve these Issues and future scope and use of the technology. 2.3 Review of Literature 2.3.1 Primary Literature Handbook of Remote Biometrics for Surveillance and Security This book contains collection of various research papers related to the field of Remote Biometrics for identification of a person. Since our area remote biometrics, we selected this book; we found very good informative articles related to various issues and challenges we face in remote biometrics. The book had good collection of research in the field of face recognition. This proved really helpful for us for gaining an insight into the topic and understands the other deeper issues we face while implementing remote biometrics. Though there were some very good articles in this book but we made use of these two: Stan Z. Li, Ben Schouten, and Massimo Tistarelli, Biometrics at a Distance: Issues, Challenges, and Prospects by Meng Ao, Dong Yi, Zhen Lei, and Stan Z. Li , Face Recognition at a Distance: System Issues. Reason being that they helped us understand the various factors that act as stumbling blocks and prevent the use of biometric technology for surveillance in a very subtle manner. However we feel that they should have also had few papers related to gait biometrics as well in the book as this technology is also very effective when we mention remote biometrics. Biometrics: Identity Assurance in the Information Age We found this book in KTH library and why we choose this was because of the fact that it covered the legal and privacy and ethical issues related to use of biometric technology very thoroughly and precisely. Also various real life examples and case studies presented in the book made interesting reading. The book was organized in various chapters with several authors having written a chapter. We used 3 papers from the book by John D. Woodward, Jr,, Legal considerations of government use of biometrics, Biometrics and Privacy and Case Study : Super Bowl Surveillance. This book was really very helpful for us to understand the deeper problems and consequences one may have to face if a technology isnt used in a proper manner. The legal consideration chapter dealt with the legal issues surrounding the use of biometric information of an individual. The chapter Biometrics and privacy was core part of our report. It helped us understand the how technology is invading our privacy in our day to day life and what rights and duties do we have to safeguard our self and to what extent we should allow technology to invade our life. In the next chapter Case Study: Super Bowl Surveillance, he has discussed about super-bowl event and how the biometric technology was used for surveillance and still the system failed to achieve its goal. Upon reading this chapter we were able to arrive at various possible recommendation and suggestions that needs to be incorporated. The Craft of Research by Wayne Booth, Gregory Colomb, and Joseph Williams This book was really helpful for us in trying to understand what actually research is and how and in what manner it should be done. Throughout our research work and report writing, this book proved to be a constant help. This book was recommended to us by our course instructor Mr. Harko Verhagen for Scientific Writing and Research Methodology course that we studied under him, his valuable teachings also helped a lot. 2.3.1 Secondary Literature Ethical Issues in the Use of Biometric Technology by Dr Aziz Shaikh, This was a short but really good paper which talks about the various ethical issues involved in using biometric technology. Thing that really strike us about this paper was that was it very precise and to the point. Biometric Technologies: Security, Legal, and Policy Implications by Paul Rosenzweig, Alane Kochems, and Ari Schwartz, We came across this very interesting article through regular Google search. It talks about the legal and political implications related to use of different biometrics techniques and also about various factors we must have in mind while assessing a technology whether it is suitable for being adopted or not . Surveillance by Jerome Chou, Even though this was an old article but it described the effects of using surveillance cameras in New York City by the police department and highlighted the various issues raised by the residents. This was a base for the case study we did. Biometrics Receives Public Acceptance, This contains study results about public acceptability of biometric techniques in USA, conducted by Jamison Consulting and BrandMarketing Services. It was helpful to compare the results of our survey findings and see how close our results are to the real world. How Face Recognition Surveillance Cameras Will Help Stop Future Campus Killers We used this article because it contained real life application of remote biometric techniques to control crimes in the schools and colleges. Biometrics-A look at Facial Recognition by John D. Woodward, Jr., Christopher Horn, Julius Gatune, and Aryn, This article describes the process of face recognition and various technical difficulties we face while using it. Gait Recognition Software Proposed for Surveillance at a Distance, This article provides knowledge by means of various experiments conducted on number of people to understand working of gait recognition system. It also reveals about main application areas of remote surveillance system. Human Identification Based On Gait by Mark S. Nixon, Rama Chellappa, Tieniu Tan This book contain in depth about gait recognition system. We choose this book because of the fact that it covered all basics of gait recognition system and future gait developments. This book contains good study of human motion analysis and gait cycles and clearly establishes how human gait is a biometric in nature. 2.4 Initial Observation and Hypothesis After going through the various literatures we found that people are nowadays under surveillance most of the time, and at times they dont even know whether they are under surveillance or not, such is the nature of the technology that it catches us unawares at times. Biometrics has increasingly been used for the purpose of surveillance, mostly because of the need of safety and security especially after various acts of terrorism in recent past. In Chandigarh city India they are already planning to make use of Biometric Surveillance System around airport, railway stations and marketplaces to spot out suspicious people from the crowd. This system will use Gait recognition. [22] According to a study conducted in UK, for every 14 people theres one CCTV camera available and around 4.2 million such cameras are present in UK. [3] (For details regarding how Face and Gait biometrics are used for surveillance please refer to Appendix 2, at the end of the report). Many people are willing to let go their basic rights for the feeling of safety and security. However what people are forgetting is that they are losing their basic identity and personal liberty and freedom and privacy when the law enforcing body is making use of this technology to enhance the security. However there is a certain section of society that still advocates the need for privacy and is against the technology invading our private life. Though a lot of research is being done in the field of biometrics for extending its uses in other field like identification and authentication, research is also going on about how to use it for surveillance. But very few have looked down it from an individual point of view, how a normal individual views technology and its use. How it affects an individuals life and what one expects from the technology and how and in which manner one wants it to be used. From all this study and reading we hypothesized from all that was that there was a need to keep a healthy balance between the use of technology and traditional methods and more laws need to be formulated and modification should to be done in the existing ones. We have seen point of view of both the individuals and the existing laws and policies we have in place and tried to find a possible solution to keep this healthy balance between so that the technology doesnt cross its line and step deep into our private life. So the survey we conduced was designed with these issues and questions in mind, so that it helps us in trying to find possible answers and solutions to the above problems. 2.5 Working Methodology Based on the study and our initial findings we designed a survey on the website www.kwiksurveys.com , this site enables users to create surveys with a possible end date and provides you the feature to make the survey accessible only to those whom you invite. Our respondents were sent the link and given briefing about the topic through a group email, with constant reminders so that we get enough responses to make our survey results are more fruitful. They were made acquainted of the topic by an introduction text we had in our email and what kind of answers we exactly are looking from this survey. Response to the survey was really good with 115 responses and lot of useful suggestions and comments. The survey maintained anonymity of the respondent, which was a good thing in a way as we ourselves were dealing with questions and issues related to individuals privacy and security. So it was good to have anonymity for our respondents so that they can voice their ideas and suggestions and op inions with full freedom and without any concerns, because at times anonymity is really good. Also off late there has been a big hue and cry about the right to remain anonymous from many groups and many scholars and academicians have advocated this idea as well. A copy of the questionnaire is attached can be found in Appendix 1 at the end of report, where one can have a look at it, along with the respondents comments and suggestions. The data that we got was purely empirical in nature i.e. based on real live experiments and our further study, research and findings is based upon that. It was a type of Cluster Analysis where we selected a particular group from the whole population. 2.6 Background Information 2.6.1 Respondents Our respondents were IT Students in KISTA Campus (KTH and SU). They were intimated about the survey by sending links of our survey via an email. Majority of our respondents (94%) belonged to the age group of 20-30. It wasnt surprising as most of the masters students here are quite young in their 20s. Half of the total respondents knew about biometrics really well and 41% had heard of biometrics. 2.6.2 Questionnaire The questionnaire began in a manner, by first throwing simple questions trying to know the background of the person and how much does the person know about this technology and then at the same time force them to think and make them acquainted with the topic so that they can answer the deeper and more important questions in a better manner. We also provided some introduction text to make people aware about what kind of survey they are about to take and some background information related to biometrics and surveillance. Later on deeper and more important questions related to the various issues and challenges that we face while using biometrics for surveillance were asked. Most of these questions were related to privacy and invasive aspect of the technology in our life. The respondent had to choose from one among the given option which were designed in a manner so as to cover all possible opinions and answers one can expect when thrown with such a question. Beside that for getting suggestions and comments we had comments field in our survey, where one can put ones thoughts, suggestions and honest opinions. Chapter 3 Issues and Challenges 3.1 Technical Issues 3.1.1 Factors Affecting Systems Performance Performance of a biometrics system is really affected by the following factor; they pose a major challenge for the system to perform well. They can be classified into following into categories. Technological Aspect: It deals with image quality and issues like image being captured from different sources. Environmental factors: if there is proper lighting or not and whether thing under surveillance is indoor or outdoor. Users of the System : their facial expression , effect of ageing , hair growth User-System Position: Alignments of the cameras and direction in which it is facing, and height of the user. [16] Dr. James. L.Wayman, a biometric expert has explained the technical difficulties faced in a facial recognition surveillance system; he reckoned that it cannot be considered fully mature yet. Later the Facial recognition vendor Test 2000 proved that this system has not been perfected yet. [15] There are some technical difficulties as well in the facial recognition surveillance system. In uncontrolled environment identifying faces is very difficult because of lighting (that means shadows, glare) and also with camera angle. And if subject is not looking at camera or if the person wearing hat, sunglasses etc then also the surveillance system cannot capture proper image of the subjects face. Also sometimes the subjects are non cooperative. If we can control the environment and subjects pose, camera angle and lighting condition then we can yield very good results. [15] 3.1.2 Other Factors Variable Lighting Problem: Mostly the methods employed for face recognition makes use of CCD or CMOS cameras to capture images of ones face. A big issue for such system is coping up with the varying lighting condition. As a faces details wont be captured well if lights keep varying and an image of same face taken in different lighting condition can result in the face looking slightly different. In order to counter it algorithms that are stable under even varying lighting conditions are being developed. Also making use of 3D (three dimension) vision is being considered, but it suffers from factors like increased cost and it may not necessarily result in better performance compared to a 2D one. [16] Another commonly adopted technique is making use of near infrared NIR imaging; infrared is invisible light so its performance is not affected by variable lighting conditions. On the other hand a visible lights performance deteriorates under variable light. So having a non varying stable lighting condition solves the problem to a large extent. This technology has been used successfully by various banks, enterprises and law enforcing bodies and immigration control authorities. [16] Issue of face recognition through a video: When we are trying to perform facial recognition making using of video captured by a surveillance camera there can be few problems we might encounter. The resolution of the facial image taken by the camera is very low than it will degrade the performance of the recognition process. Also if ones face is out of focus of the camera lens, it results in blurred images and so many details would be missed affecting the process of recognition. Another issue is when the person under surveillance is under constant fast motion or the camera is shaking that results in so called motion blur. [16] 3.2 Non Technical Issues 3.2.1 Legal Issues Most of the biometric systems currently under practice are under the control of government, who are making use of them in order to ease and aid them in enforcing law. But there are few questions that need to be answered before we can adopt the biometric techniques as a tool for enforcing the law. Like what would happen when an individual provides his characteristics to avail some benefits from the government? What rights and responsibilities does that individual have? Are we entitled to deny the government our biometric characteristics, and if so under what circumstances? What kind of information is being saved about us and in which form? Who will oversee this information? Who has the rights to have the access to this information? [21] To answer these questions we should view them in the light of the law and constitution of the particular country under question. As no two countries will have exactly the same laws. So an individual can drag the government to court if the constitution and law entitles him to do so. According to the US Supreme Court There is a realm of personal liberty which the government may not enter. This realm which we can consider as our zone of privacy contains the rights that every individual is entitled to have (fundamental rights). [17] 3.2.2 Ethical Issues: The ethical issues are very closely related to the privacy issues. They have more to do with determining what is right or what is wrong answer to which is very personal. What is right for someone might be wrong for some other person. So it depends a lot on the culture, beliefs, religion, values and education of an individual. Like making use of surveillance cameras for monitoring our employees, a neighbor etc is completely unethical. Unless there is a real need to justify the use of it we should not use it. Making use of it just for fun and offending the fellow people is completely unethical even if the law permits to do so. Also in many religions and cultures even taking image of ones is considered offending. Every culture has got their own set of practices, view and beliefs which they follow. So we should respect and honor them while using the technology. Anyones privacy should not be disrupted by using this system along with his beliefs and values. [18] 3.2.3 Privacy Issues: When an individual is under surveillance he is exposing lot of personal details of his. The information taken from him can be used by a secondary source and that may cause unnecessary annoyance to the person. An example of this is that you visit a supermarket and the CCTVs there have monitored your buying habits , and when you have paid your bills after few days you start getting letters about various offers related to your interest that the sales team guessed by looking at your buying habits. They managed to get your address through the credit card company and by searching your name. Also if you go to a medical clinic for some treatment and the computer over there keeps all the information. If someone manages to get hands on that data, and then start sending you offer about various medicines and healthcare products, its sheer breach of your privacy. [19] If a person is going through a tough time facing lot of problem in life and through surveillance his problems become public. Would that be considered right? Off course no. [14] Sometimes when we use a biometric technology it might capture more than necessary details needed, that hurts the privacy a lot. Also use of this technology leads to loss of anonymity and this is one of the biggest complaints against the use of biometrics technology. [19] In words of Roger Clarke a noted Australian scholar who has done work in the field of human identification and privacy the need to identify oneself may be intrinsically distasteful to some people. As there are many people who always prefer to remain anonymous even if they are doing some good work that would bring them fame. [19] Types of Privacy According to US constitution the privacy has been categorized into following 3 types. Physical Privacy: it means that a person has the freedom to be free from any devices monitoring him. The law protects him from unwarranted home capturing or searching and allows him to secure his own home, family and property. [17] Decisional privacy: an individual should be free to make his own choices about his intimate and personal matters and the government has no right to interfere in it. So decision like when will I marry, and with whom, how I am growing my kids should be left alone to me to decide. One very famous example of decisional privacy is womens right to have an abortion. As its a personal and very intimate decision and government shouldnt interfere in it. [17] Informational Privacy: According to scholar Alan Weston famous for his studies in field of Privacy and Freedom it is the claim of the individual to determine for themselves when, how and to what extent information about them is communicated to others. [17] 3.3 Case Studies 3.3.1 Super Bowl Surveillance When we are having a large event like super bowl where the crowd is huge and at times things can become hard to manage. These sort of event attract lot of attention from terrorists and criminals, if they are successful it may result in huge loss of life and property. In the event held at Tampa, Florida in 2001, the authority enforcing the law was making use of a facial recognition technology. About 20 surveillance cameras were employed to capture actions of people entering the stadium. The images of people captured were captured and matched against a template of known terrorists and criminals. If a match was found the system would alert the police on duty who can then go to the spot and nab the suspect. [20] Finally at the end of the event computer matches found were 19 but there were no arrests made, so it wasnt possible to judge the true matches and all of them were assumed to be false matches. Unless the police officer on duty personally goes and verifies the suspects identity only then it would be considered a true match. Thus we saw that a powerful technology failed miserably at such an event of high security requirement. So we cant always rely and trust the technology so much. The reasons for its failure might be that the intruder when he felt that he was caught by camera managed to flee or deceive the police officers on duty. [20] This incident made people really question the effectiveness of this technology. It also led to comments like Yes big Brother is watching your face. Viewing this from the law point of view, the court reckoned that at a public event like this people should expect less privacy as their physical characteristics like face is constantly exposed. So lawfully its okay to have such a system in place, even though ethically it may be wrong to have it. [20] 3.3.2 Use of Surveillance in New York In this section we are analyzing the effects of the use of surveillance cameras at various residential colonies in New York City by the New York Police Department (NYPD) in a bid to bring down the crime rate and make the residents feel more secure. The results are based on the study conducted in year 2000. According to an old lady living in Harlem, Coleman in New York, she hasnt heard of any acts of vandalism ever since the NYPD installed surveillance cameras in 97. Some residents in the same area are concerned as they feel that even though it is aiding the cops, but its harassing sincere residents who are abiding by the law. In words of one resident It is safer around here, but its wrong the way they do it. Though people have differences of opinions on use of surveillance but one thing they cant deny is that it exists and it will exist. These tactics of police were compared with the tactics of stop-and-frisk they usually employ in places where crime rate is high. [14] Looking at the statistics there were 2397 surveillance cameras in Manhattan of which 2000 belonged to private organizations. Over a quarter million New Yorkers were being captured daily at various places in the city. If we look at its positive effects, the major crimes in housing societies went down by 13.3% and overall a decrease of 25% among all major crimes in the year 1998-99. NYPD had maintained a database of students pictures, which they suspected might resort to crime when they grow up, and they had urged the people in localities to form a group and help the police willingly or unwillingly. Another aspect that came to light was the possibility of voyeurism thrill might tempt people to misuse the technology, this thing was completely ignored. In the end people were forced to accept it and say that as long as they dont peek into our houses we are somewhat okay with the surveillance. [14] So what we saw from this case was that even though use of surveillance will increase security which is going to benefit people and society, but still people are reluctant to accept it at the cost of losing their privacy and anonymity. Chapter 4 Results and Findings 4.1 Survey Results On the basis of the short survey that we conducted on a particular group of people (in this case the IT Students KTH and SU), using internet resources (www.kwiksurveys.com), we found out following things. We had 115 responses to our survey which seemed a pretty good number considering the limited time span we had for conducting the survey. Our survey started on 11th November, 2009 and ended on 1st January, 2010 so that further responses doesnt change the results we had got and affect the one we had at the time of writing our report. However coming to the questions of whether people knew about biometric or not. Only 50% knew about it very well and 41% just heard of it, while 9% had no idea about it. 61% of the respondents had actually used a biometric device or technology at some point or the other while 13% of them may have used it but never realized. Reason for this maybe the fact that sometimes we even when we use a technology and never realize that we used it. For example we were at an airport and went through some biometric scanner but we didnt know what exactly that thing was, or sometimes we are being under observation without any knowledge. However a large percentage of people (26%) had never used it. Reasons for this can be user concerns about losing his privacy, anonymity or identity. So it has to do a lot with the ethical and privacy issues that we discussed in the previous chapter. Most of the people had used either finger print (59%) or facial recognition (12%). Reasons for this can be the fact that fingerprint scanners are very cheap and available in abundance, also now even a decent laptop comes with a fingerprint scanner and a webcam that can help in facial recognition making use of required software. Also fingerprint technology has been very popular always mainly because people are not afraid to present their palm or fingers when asked for. However people are still very scared to use retinal or iris scanner because they feel it might blind or affect their eyes. Fingerprint and voice verification is easily acceptable to people because of the awareness aspect, they see use of technology in films and day to day life. [24] 34% of the respondents admitted that they have been under surveillance at some point or the other and 24% though having been under surveillance never realized it. Maybe because nowadays there are so many hidden CCTV cameras installed everywhere, so we get the feeling no one is watching us, but some big brothers eye is constantly monitoring every step of ours. Roughly about one third of the respondents agreed that they feel restricted or offended while being under surveillance. Majority of the respondents agreed that surveillance is good to increase the security, of which 42% strongly agreed to it. It maybe because of the various terrorists attacks in the last decade; people have started realizing that surveillance is indeed important. There was a kind of mixed response to the question of whether the person has been concerned about issues related to privacy when being under surveillance with 41% of them saying yes and 28% were not sure and 30% of them were not much concerned about it. Again it can attributed to the fact that some people let go their privacy needs and maybe they feel much secure in surveillance environment , where they think they would to protected from any sort of attacks. In a study conducted by Jamison Consulting and BrandMarketing Service in USA, regarding biometrics acceptability, over 80% people thought they would be okay to let some part of their biometric feature to be recorded. Majority of the people believed that government should make use of biometrics to enhance the existing level of security. However 60% people felt that they were concerned about misuse of private information captured about them. [24] So the survey clearly shows that there are some people who want paramount security at the cost of privacy and there are some people who still consider their basic privacy needs are more important. 4.2 Comments and Suggestions from Respondents There were some very useful comments and suggestions that we got from our respondents including few very good comments. One person suggested that fingerprint should replace conventional PIN system and surveillance can be used to prevent credit card thefts. Another one said that using biometrics for surveillance is like adding salt and pepper to food and it would be really beneficial for the society. Another very nice but critical comment was that Biometrics for Surveillance is really good but its expensive also risky considering the fact that people can go to any extent to get access to some place thereby jeopardizing the persons life. One person said that being under surveillance is really good from security point of view and people shouldnt feel restricted and scared rather they should feel that they are under the watchful eyes of god and feel safe and secure. One interesting comment was this Biometric surveillance provides good security to the institutions; it can prevent malpractices and theft in the country. Regarding health aspects it can give a good indicator of diseases and human epidemiology report can be tracked. One critical comment was that I wouldnt want it to fall into hands of terrorists or some overzealous government guys and one person also raised similar concern that overuse of this technology will lead to a feeling personal insecurity. One suggestion was that it can be used to guard and protect the important data and the moderate cost of using the technology will make it commercially more viable. Another critically comment came across was this I think that its necessary to have some specific places like banks, companies etc under surveillance in order to be more secure, but on the other hand why someone should have the right to know the private life of innocent people? A decade ago everything was ok but the last few years governments found the perfect way to intrude in our lives having of course a very good excuse, called terrorism. 4.3 Moving Towards Potential Solutions After conducting this study and research we found that the following could be the potential solutions for solving the various issues and challenges we saw related to use of biometrics for surveillance. We must look towards developing more reliable systems which yields more accurate result. As we see that lot of inventions and innovation in the field of technology are going on worldwide, resulting in the older technology becoming obsolete and being replaced by the newer one. Sometimes it might happen that a new technology has already arrived but the law concerning it is yet to be passed or implemented, or takes too long a time to be passed by the court. This might result in misuse of the technology so we should ensure that laws should be formulated and implemented sooner and faster before the technology becomes common and readily available to everyone. They shouldnt wait till the technology has done enough damage or raised lot of eyebrows and voices, which then acts as an eye opener and authorities realize that something needs to be done in this regard. So the government should have an eye for future and formulate laws for the emerging technologies as soon as they are launched and a lso modify the existing ones to remove the flaws in them. The authority maintaining the database used for the identification purpose should be answerable for questions like what information is authorized to reside in the database. Why is it needed and for how long and under what circumstances it can be shared with others. Biometric data of person stored as a template should be reviewed and updated periodically only then we can keep track of suspected peoples. Also the government should use the technology openly so that public fears about its use vanish, and there should also be more transparency which can be achieved by making public aware about how the technology works. [20] We should also have a body where both the government and the public can be actively involved, where one can voice their views, share their problems and talk about related issues and government can then take the required action. And the government should also consider the voices of the people before formulating any laws. Our efforts should focus more on identifying the specific circumstances where we really need a surveillance system. Sometimes we might be tempted to try such a system in say places like a coffee shop to monitor the visitors or a small company to monitor their employees. But we need to ask our self do we really need it at the cost of harming and breaching ones privacy. So such systems should be used at places where very high security is needed, like very busy International Airports, departments containing information crucial to security of the nation etc. [20] Since the technology in use currently is not fully reliable. There have been instances when attackers have managed to easily deceive the technology which was considered to be fool proof. We must work towards developing integrating the existing technology with other newer and more reliable ones, so help towards development of more trusted system. And we mustnt solely rely on technology alone to protect us. We shouldnt forget the human element, so we must make use of both the technology and the human element in a healthy proportion so that it solves our need of safety and security and at the same time it ensures that there isnt any compromise of our privacy and other basic fundamental rights. Chapter 5 Conclusion In this report we analyzed the need for biometric techniques for the purpose of surveillance and security, and then we looked into the various issues that we have to deal with if we want to use the system. There were few technical and non technical issues, the non technical issues like legal, ethical and privacy issues are very important as we cant use or implement any technology in a way that if offends the law and is against the ethics and hurts the basic privacy needs of people. And we also gave some recommendations that should be implemented to solve few of these issues. Later on we analyzed the survey that we had conducted and published our findings along with useful user comments and suggestions that we got from the respondents. Looking at most of the comments we got a feeling that so many people would still let go their privacy rights and needs in lieu of a safety and security. Many people still feel that being under the watchful eyes can be considered secure. Its mainly because of the various terrorists attacks in the last decade, people have started realizing that surveillance is indeed important even though at comes at the cost of compromising on our need for privacy. We would like to say that no doubt biometrics is very good for surveillance and even more effective to provide security, but it shouldnt be used in such a way that it offends the basic fundamental rights of an individual. We need to keep a healthy balance between the use of technology and traditional methods and more laws need to be formulated and modification should to be done in the existing ones to fix the various loopholes they have. Also there should be a limit and purpose of how and where to use the technology, it shouldnt be randomly used at ones will , only if its really very essential and required then only we should consider its use. Scope for Future Research In future we need to look for alternative ways and technologies that can aid to the existing ones and helps us solve or minimize the issues and challenges that we discussed in this report. We need to develop more mature and reliable systems as the ones currently in use are not 100% reliable and shall never be when it comes to results. In future we can also see development of advanced security applications in the field of healthcare, multimedia and for controlled environment. [3] As our research was limited to only a certain section of the crowd so we expect that more research should we done involving larger group of people. The people can be from different backgrounds and professions and age group and culture. And how different sections of crowd view the use of biometrics for surveillance and feel about it. Based on these studies and research we can hope to solve some of the major issues that are yet to be solved. Respondents Comments and Suggestions: I think they could be employed in the banking industries and finger print recognition can be used to replace PINs to ensure a more secure system. This will be very useful for surveilling credit card thieves. Biometrics for surveillance purpose is good for the society because its like adding pepper and salt to food, without which a good food is not complete. I want Biotech to attain new levels like introduce Safer Biometric weapons which can be used against infiltrators Though biometrics is helpful in various ways, they dont handle failure well, once when our biometric is stolen, it remains stolen for life, theres no getting back to a secured situation. Its serves a good purpose of protecting the data. Moderate cost of using it and its advanced features makes it even more commercially viable. I feel it is good to some extend but anything that crosses its limit will definitely create problem. I feel over use of this techniques will sometimes lead to personal insecurity. Maybe in the next few decades it will be useful, for security reasons, to prevent terrorism, but on the other hand no one prefers to be surveillance. But it has a very important role in future. I think that its necessary to have some specific places like banks, companies etc under surveillance in order to be more secure, but on the other hand why someone should have the right to know the private life of innocent people? A decade ago everything was ok but the last few years governments found the perfect way to intrude in our lives having of course a very good excuse, called terrorism. Biometric surveillance provides good security to the institutions, it can prevent malpractices and theft in the country, regarding health aspects it can give a good indicator of diseases and human epidemiology report can be tracked. Biometrics should be made a must for surveillance, especially a DNA or retina scan as these are unique for an individual and cannot be duplicated in any way. The same can be used for identification purposes too. Biometrics is really very good I feel it makes a surveillance place a crime free one .. People will feel more comfortable in surveillance area.. They should feel like God watching them instead of feeling restricted. Security is necessary but that should not be maintained at the cost of peoples privacy. Biometrics for Surveillance is really good but its expensive also risky considering the fact that people can go to any extent to get access to some place thereby jeopardizing the persons life. I would say it is a technological boon but still it has its own limitations and drawbacks like what I have experienced Voice Recognition technique fails sometime, similarly, fingerprint method can be duplicated if a person gets to know about his fingerprint pattern, but its somewhat quite safe. Other technologies I dont know much about them. Appendix 2 Using Biometric for Surveillance 2.1 Face Recognition for surveillance Facial recognition is very useful for surveillance, because surveillance main aim is keep an eye on the public. Among all biometric techniques facial recognition is one such technology which can be is contactless technology (along with gait recognition) i.e. we can monitor the subject without any physical contact or bothering him to use the device. So this can be really helpful in identifying known criminals and terrorist who are out in the city planning for their next target. Due to all these benefits the US Department of defence also started using the technology to good effect for surveillance and security. [4] 2.1.1 How it works? Now lets see how the facial recognition system works. The biometric facial recognition system uses the faces of persons to identify and verify persons identity. It is done in the following manner. In the first step an electro optical camera captures the image of the person. It is done by capturing a video of the person, and images can be extracted from that video. In the second step facial recognition software will be deployed in the surveillance system to detect only the faces in the captured image. This task should be performed effectively so the software should take the face patterns correctly along with all the details needed for identification. Based on ones biometric feature we then generate a template which contains only features unique to a person. It doesnt care about your hairstyle and facial hair and other similar features. In fourth step it compares the captured image template with already known images in database. In the final stage it performs the matching process and declares the result. [5] The facial recognition for surveillance is a systematic process. We do it by making use of CCTV cameras to monitor the public places with aid of trained employees. In some cases the criminal or wanted person might escape this systematic process by running away from that place or trying to cover their face. A solution to the problem can be that if a match has been found the system generates an alarm that alerts the officer present at that place. In this verification process well known trained officer are required to perform these actions. Then the officer must forward an alert to the other officers who are at that place where the persons image was captured so that the person can be captured. [4] National Facial Recognition surveillance works are based on this concept only. We can find criminals, suspected terrorists, by sending video streams over that network place. That requires arranging video cameras in all suitable places. [4] 2.1.3 Application of the Technology These facial recognition systems are useful in many sectors like schools, corporate companies, airports, shopping malls as we can find easily dangerous people who are roaming around in disguise. One real-time example of using facial recognition is the recent great vulnerability in NIU (Northern Illinois University) where one student shot his teacher with a bullet but got captured in video camera. So in order to protect teachers from such dangerous students they employed facial recognition cameras in classrooms and other open areas in the university. Another application of facial recognition system is its use in private companies. The surveillance cameras installed there helped to prevent hourly employees from purchasing timecards on behalf of their friends who are absent thus helping the company save lot of money and minimize losses and frauds in the longer run. [4] Using CCTV cameras networks along with a big distributed network of sensor is very common in Britain. Use of biometrics has enabled us to develop more advanced security applications for keeping a watch on blacklisted shoplifters, detecting unusual behavior of people. [3] 2.2 Gait Recognition for Surveillance Gait recognition is another very useful biometric technique that can be employed for surveillance purpose. In gait recognition an individual is identified by the way they walk or run. This is a very new technology so a lot of research work is going on nowadays in this field. It is very useful for monitoring the public who are just walking unaware of the fact that they are being monitored. Because this is an unobtrusive biometric technique, we can capture someones walking pattern even in a large crowd and low visibility. Gait recognition is motivated by automated recognition system for monitoring and visual surveillance. Gait Recognition is of two types, one is model-based and the other silhouette based approach. In this paper we are explaining gait recognition by considering silhouette based approach. Some researchers in India who had worked on the gait recognition explained that gait of a human is motion characteristic of individual, gait of a person is unique which makes recognitio n easier. [7] 2.2.1 Silhouette Approach In silhouette approach the background of the captured image is removed fully and the subjects image in either fully black or white is against a blank background. The walking style of person is thus converted into silhouette and then statistical analysis is performed using Shannon entropy technique. For good results we capture person image side on so that we can clearly capture his walking style and the way both the feets move. Then image processing techniques are implemented to extract gait of a person for recognition. [8] In a research conducted by an Indian team carried over a group of 20 persons, through a series of tests they recorded different walking styles such as walking in straight, normal speed, back and forth in front of a camera and by placing video camera perpendicular to the path. Then they implemented Shannon entropy with individual persons height. The results revealed that recognition system was sensitive to the changes, when viewing on more than 10 degrees. But the system worked well even when person changed the walking speed. [7] 2.2.2 How Gait Recognition Works First biometric sample of gait of a person has to be obtained under some environmental conditions. These samples are then stored in a database and are used later on to perform comparison at the time of recognition. Human gait can be affected by some environmental contexts, which can be, like the walking surface or if one is carrying objects, temperature and also by clothing, shoes worn and physical injuries etc. [10] We can overcome these problems by recognizing a person by combining different classifiers with the environmental contexts. We can combine two or more gait classifiers which are suitable for different environmental contexts like when same person walks on different surfaces we can calculate the large difference between the detected image (silhouette) and stored image. For example if a person walking on glass surface the silhouette may miss bottom part of feet, and on the concrete surface the silhouette may contain shadows, to avoid these type of affects we have to implement classifiers. [12] 2.2.3 Other Applications To identify well known criminals who are roaming around fearlessly in the city in disguise, from a large crowd. Identifying shoplifters and especially those who are pretending to be pregnant women, as their walking pattern would be different from those who are really pregnant. In sports like golf, cricket the way we hit the ball and how our body moves is very important. A good and correct body position helps us in hitting the ball long and correctly. So we can make use of gait biometrics to observe patterns of established sportsperson and then train the youngster to follow their pattern by seeing their gait. This way the youngsters can improve their game. [13] 2.2.4 Limitations It is possible that some expert criminals can alter their walking style and thus they can deceive the system. Also if the crowd is too large we might find it hard to capture gait of every individual thus few suspects may get away from getting caught. [13] References Hyperlinks and URLs last visited on 8th Feb, 2010 Wikipedia, the Free Encyclopedia, Biometrics. https://en.wikipedia.org/wiki/Biometrics Wikipedia, the Free Encyclopedia, Surveillance https://en.wikipedia.org/wiki/Surveillance Stan Z. Li, Ben Schouten, and Massimo Tistarelli, Biometrics at a Distance: Issues, Challenges, and Prospects, Handbook of Remote Biometrics for Surveillance and Security, Springer, 2009 How Face Recognition Surveillance Cameras Will Help Stop Future Campus Killers https://www.spygearco.com/blog/index.php/how-face-recognition-surveillance-cameras-will-help-stop-future-campus-killers/ John D. Woodward, Jr., Christopher Horn,Julius Gatune, and Aryn Thomas, Biometrics-A look at Facial Recognition, (Prepared for the Virginia State Crime Commission) https://www.rand.org/pubs/documented_briefings/DB396/DB396.pdf https://news.bbc.co.uk/nol/shared/spl/hi/guides/456900/456993/img/noflash/facial_scan_416_dc.gif Gait Recognition Software Proposed for Surveillance at a Distance https://www.redorbit.com/news/technology/1423942/gait_recognition_software_proposed_for_surveillance_at_a_distance/index.html?source=r_technology National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences (CASIA) Xi Chen, Zhihai He, Derek Anderson, James Keller, and Marjorie Skubic, Adaptive Silhouette Extraction and Human Tracking in Dynamic , 2006 https://videonet.ece.missouri.edu/papers/journal/silhouette_CSVT_final.pdf Mark S. Nixon, Rama Chellappa, Tieniu Tan, Human Identification Based On Gait (international Series On Biometrics), Springer, 2005 https://www.cbsr.ia.ac.cn/users/sqyu/icb06-slides.pdf Liang Wang, Tieniu Tan, Senior Member, IEEE, Huazhong Ning, and Weiming Hu, Silhouette Analysis-Based Gait Recognition for Human Identification, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 12, DECEMBER 2003 Biometric Technology https://www.biometricvisions.com/technology/technology.htm [ Surveillance by Jerome Chou https://www.gothamgazette.com/iotw/surveillance/ Face Recognition Technology https://www.facerecognition.it/ Meng Ao, Dong Yi, Zhen Lei, and Stan Z. Li , Face Recognition at a Distance: System Issues , Handbook of Remote Biometrics for Surveillance and Security, Springer, 2009 John D. Woodward, Jr., Legal considerations of government use of biometrics, Biometrics: Identity Assurance in the Information Age, McGraw-Hill Osborne Media, 2003 Dr Aziz Shaikh, Ethical Issues in the Use of Biometric Technology https://www.bcs.org/upload/pdf/ashaikh.pdf John D. Woodward, Jr, , Biometrics and Privacy, Biometrics: Identity Assurance in the Information Age, McGraw-Hill Osborne Media, 2003 John D. Woodward, Jr, , Case Study : Super Bowl Surveillance, Biometrics: Identity Assurance in the Information Age, McGraw-Hill Osborne Media, 2003 Paul Rosenzweig, AlaneKochems, and Ari Schwartz, Biometric Technologies: Security, Legal, and Policy Implications, June 2004 (https://www.heritage.org/Research/HomelandSecurity/lm12.cfm ) https://merachandigarh.in/chandigarh-news/biometric_system_chandigarh_csio.html Biometrics: Whos Watching You? https://www.eff.org/wp/biometrics-whos-watching-you Biometrics Receives Public Acceptance According to Study by Jamison Consulting https://www.speechtechmag.com/Articles/News/News-Feature/Biometrics-Receives-Public-Acceptance-According-to-Study-by-Jamison-Consulting-33620.aspx
Wednesday, May 6, 2020
America And The War On Drugs Essay - 1216 Words
Perhaps Americans take what they have for granted and forget that there are other countries with problems. Why does America care about what is happening in other countries like Columbia, when they have their own problems with drugs? The Untied States of America has a rather large drug trafficking problem but compared to Columbia it is fairly small. To help Columbia solve their problem the U.S. senate has decided to send troops over there and take control. This new involvement will have many consequences in and what can you make for instance the cost of a war, the loss and gain of jobs, and physical side effects. Now war is a very serious subject to study for sociologists, this gives them a chance to study people and how they react toâ⬠¦show more contentâ⬠¦According to Sociologists war is very interesting, it shows many different sides of people that are usually hidden by everyday rituals. In war the loss of money or the gain of it can be cauterized under the Structural-Functional paradigm because in war there are consequences. Some consequences of lost money are starving people, unclean because of no utilities, and deathly ill people. Now war has many upsides with money America can win the war and be reimbursed if they succeeded in against the drug lords and drugs all together. The Positives of war for America and job gain is that people who do not have any jobs can get one either fighting in the war or helping the troops at base camp with cooking and cleaning. Also other interesting and less dangerous are jobs building guns and tanks and other machines, these provide the poor with jobs. Now the gain of jobs for Columbia are pretty much the same but they too employ or the drug lords do to help them cut package and deliver the drugs. With a war they need to do things quickly so they get can stop of the product before they are can. Also those who have dedicated their whole life into dealing or selling drugs will end up poor or homeless. There are many consequences when employing people for war because when the war is through they those people that were hired will loseShow MoreRelatedThe Drug War Of America1407 Words à |à 6 PagesThe drug war in America has shaped our society into what we know it as today, the war has so far been a failure where hundreds of millions of dollars, workforce, and policies have only served to maintain the same rates of usage as those in the 1970ââ¬â¢s. When the drugs hit America, they hit hard. Overwhelmed by drugs showing up in almost every town, America decided to declare war. Drugs first surfaced in the late 1880ââ¬â¢s with Opium. Opium at the time was the most in demand drug choice. Opium comes fromRead MoreThe War On Drugs And America Essay1573 Words à |à 7 PagesThe war on Drugs played a heavy role in minority American society. It affected policing and most importantly the American minority people. The war on drugs started by President Nixon and up until President Bush was a disaster that affected America with high incarceration and high recidivism rates for low level and non-violent drug offenses that mainly targeted minorities in America. The war on drugs was a massive American failure that mainly affected minorities. President Obama and his drug reformRead MoreWar On Drugs And America2460 Words à |à 10 PagesWar On Drugs Fifteen billion dollars. The possibilities of things to do with fifteen billion dollars are endless. Some may use this towards college. Others towards health care facilities. Some may even use this hefty amount to renovate homes and still be left with a fortune to spare. All in all, the average American would use this currency toward benefit life in some way or another. The U.S Federal government wished the same when they used these fifteen billion dollars towards the ââ¬Å"War on Drugsâ⬠Read MoreWar on Drugs in America Essay991 Words à |à 4 PagesHuemer: ââ¬Å"Americaââ¬â¢s Unjust Drug Warâ⬠In the essay ââ¬Å"Americaââ¬â¢s Unjust Drug Warâ⬠by Michael Huemer, Huemer discusses the facts and opinions around the subject on whether or not the recreational use of drugs should be banned by law. Huemer believes that the American government should not prohibit the use of drugs. He brings up the point on drugs and how they harm the users and the people in the userââ¬â¢s life; he proves that the prohibition on drugs in unjust. Huemer believes that drug prohibition is an injusticeRead MoreThe War On Drugs And Its Effects On America1065 Words à |à 5 Pagesdeclared drug abuse public enemy number one, initiating an unprecedented global campaign, the War on Drugs. Today, the War on Drugs is a huge failure, with devastating unintended consequences. It led to corruption, violence, and mass incarceration. It negatively affected the lives of millions of people. All of this while we waste billions of dollars every year only to create and fuel powerful drug cartels. This glo bal conflict has to end. The core strategy of the War on Drugs is to eradicate drugs andRead MoreAmerica s War On Drugs Essay1299 Words à |à 6 Pagesserved time in prison for his connection in the Watergate scandal, the Drug War was ââ¬Å"intended to disempower the anti-war and black rights movements in the 1970s.â⬠Itââ¬â¢s no secret that drug use in the United States has been a problem. Many Americans have struggled with addiction to some of the worse drugs. Many lives have been affected in some of the most terrible ways. It can be easily said that due to Americaââ¬â¢s history with drugs that former president Richard Nixon noticed the problem and felt thereRead MoreAmerica s War On Drugs1306 Words à |à 6 Pagesas eugenics. One of the primary focuses of America s War on Drugs has always been the controversial drug Marijuana. In the early twentieth century, Henry Anslinger became the first commissioner of the Federal Bureau of Narcotics where he remained between 1930-62. Anslingerââ¬â¢s campaign was driven primarily by racism. He convinced the public to believe Blacks were negative influences in society and negatively associated African Americans with the drug. Anslinger made heavily racist remarks such asRead MoreAmerica s War On Drugs1539 Words à |à 7 Pages On June 17th, 1971, President Richard Nixon declared drug abuse to be ââ¬Å"Americaââ¬â¢s Public Enemy #1â⬠in a press conference in which he called for an ââ¬Å"all out offensiveâ⬠against this enemy, an initiative that would later be known as Americaââ¬â¢s War on Drugs. By giving this speech, thus starting ââ¬Å"The War on Drugs,â⬠President Nixon created what would eventually become one of the most catastrophic fa ilures in United States political history. Analysis of the historical events surrounding Nixonââ¬â¢s declarationRead MoreAmerica s War On Drugs2885 Words à |à 12 PagesRunning head: AMERICAââ¬â¢S WAR ON DRUGS 1 Americaââ¬â¢s War on Drugs: A Battle against Drugs or a display of Racial Intolerance? Sharon Curry-Robinson, Duval County Court Bailiff Florida Gulf Coast University ââ¬Æ' Americaââ¬â¢s War on Drugs 3 Abstract It was surprising to learn that, while the United States makes up just five percent of the world population, over twenty-five percent of the worldââ¬â¢s detainees are from the United States. Yes, at a projected figure of moreRead MoreAmerica s War On Drugs2030 Words à |à 9 PagesThe ââ¬Å"War on Drugsâ⬠has been a hot topic for several decades in the United States. The argument for the success of this campaign usually varies depending on oneââ¬â¢s political affiliation. The government handled the ongoing campaign differently with each new administration taking command, most of them having no little success. The fact of the matter is that the ideal of a ââ¬Å"drug free civilizationâ⬠is far from reality. The world is coming to terms that the various drug-fighting programs across the world
Tuesday, May 5, 2020
Management Principles TESCO
Questions: Task 1Briefly explain: manager, management and organisation. Assess the significance of managers in achieving organisational success for a company of your own choice. Task 2Analyse how size and strategy of a company can affect its organisational structure? Support your answer with relevant examples.Task 3Scenario:Tesco has said it will close 43 unprofitable stores across the UK, The firm is also shelving plans to open a further 49 new "very large" stores. Additionally, Tesco is closing its staff pension scheme, will make cuts of 250m and reduce overheads by 30%. Shares in Tesco rose by more than 13% on Thursday, as investors welcomed the company's announcements. It comes after two years of troubles at Tesco, which has suffered falling sales, in another development, credit rating agency Moody's downgraded Tesco's rating by one notch to Ba1, equivalent to "junk" status. (BBC, 2015)a) Discuss Tescos current mission, vision and corporate strategy.b) Suggest and explain the process that can help Tesco to formulate its corporate strategy for the year 2015.c) What do you understand by the term organisational culture? Can Tesco improve its performance by changing its culture? Discuss. Answers: Introduction Agnihotri (2014)) outlined that management is basically the art of the perception and also on that basis what any person needs to do and also the seeing which needs to be done through the cheapest and the most possible way. It also necessitates the essentials of all the co ordination of both the resources and also the human efforts which helps the specific organization in doing the achievement of the specific objectives and the goals (Palomares, Martnez and Herrera, 2014). This whole assignment is divided into 3 tasks: in the first task it includes the brief explanation about the topic of manger, management and the organization. It also assesses the significant role of the manger in order to achieve the organizational success (Levenson, 2014). In the second task it does the proper analyze of the affect of the organizational structure with the size and the strategy of the organization (Janicijevic, 2012). In the task it does the critically analyze of the above two tasks on the basis o f the mentioned case study. Task 1 The personnel who is more basically responsible for directing and also to do the planning of all the individual of the specific group, properly monitoring of the works of the team members so that it also can have the capabilities though which it helps to take the counteractive measures which becomes more suitable in respect situations (Levenson, 2014). The manager also possesses some of the capabilities and the powers which include both the hiring and the firing of the peoples (Dauber, Fink and Yolles, 2012). Some of the fundamental roles which the manager needs to follow in respect of the proper guidance of the organization which are mentioned: at first the manager needs to acts as the good leader with the capability of the proper organization of the group or the team and also have the ability to do the proper creation of the effective strategies (Makasi, 2014). The manger needs to also act as an effective mediator between the suppliers and the employees so that the proper basis of the negotiation can occurs with all the available staffs, contractors who are connected with the organization both directly and indirectly (Janicijevic, 2012). The manager also needs to possess some of the capabilities through which it becomes easy to do the proper corroboration of both the mission and the visions of the specific organization to all the employees, stake holders and also the customers (Dauber, Fink and Yolles, 2012). For completing this assignment the organization Tesco is taken into account (Levenson, 2014). Some of the specific roles which the manager needs to cooperate to maintain the proper organization success of the mentioned company are listed below: Operating margin increase The manager needs to maintain the proper knowledge about the employees of the organization which helps them to give the proper knowledge of the technique to draw the relation between the employees and also the companys goals and also helps the employees to properly understand and also the setting up of the goals. To do the proper boost up of the productivity of the employees through which it can lead to increase the percentage of the profits and also the operating margins the manager needs to play the crucial role (Makasi, 2014). The manager also needs to maintain the proper engagement of the concerned staffs and the employees in the development of the smart objectives and the goals (Janicijevic, 2012). Companys strategies execution In order to maintain the proper execution of the goal alignment and also allow to maintain the proper visibility of the goals so that it can occurs the quick execution of the developed strategies by doing the proper allocation of the available resources of the various projects. The manger also helps in the elimination of the redundancy of the job and also needs to maintain the respective focus on all the employees through which it becomes easier to achieve the objectives and the goals of the company (Dauber, Fink and Yolles, 2012). Reduce the employee turn over The manger desires to earn the business values in more numbers with the proper engagement of all the employees (Levenson, 2014). It also needs to clarify the proper alignment of the goals through which they can take the remedial action of the respective situation and also helps to do the proper creation of the ownership of all the employees which helps the manger to earn the companys success. With the help of doing the proper management the manager needs to influence the employees by initiating some of the special plans which includes the incentive program, reward programs etc (Makasi, 2014). Task 2 In order to change both the strategies and the sizes of the organizational structures it needs to take account some of the measures which are given below: Decision making evolution Evolution help to cultivate the respective organizational structure with the availability of both the power of doing the decision making and also the supremacy power which are more concerned with the help of the top level manger (Levenson, 2014). To take part in the effective decision making, the manger needs to plays some of the major roles through which it deals with all the available perspectives and the issues which the employees are facing in doing the top level management (Dauber, Fink and Yolles, 2012). Customer interaction In order to implement some of the new level of the innovative features with both the indirect and the direct interaction of all the customers through the top level management helps them to improve the basic quality of the implemented products of the organization by doing the critically analyzing of the version of the risk, complexity and also the structure of the mechanics (Makasi, 2014). Values of innovation To improve the innovation of all values of the manager it needs to do the proper look after of the organizational structure, control of the just in time value and the total quality management etc. Task 3 The organization Tesco put their main focus on doing the business and also to maintain the long term goals of the business. To do the proper illustration of the vision statement of the organization Tesco it reflects on the five elements which includes the innovation, full and the modern ideas of the concerned products, it also needs to do the proper inspiration and the earning of the trust, faithfulness of the communities and the customers. It also concerned with the growth of the proper structures of the concerned opportunities and the business (Levenson, 2014). By properly analyzing of the mission statement of the organization Tesco it mainly deals with all the basic impression by concerning all the businesses purposes of the organization. It also reflects about the basic objectives and the goals for all the stake holders of the organization. Setting of the mission statement of the organization performs as the basic inspiration of any of the overall principles of all the concerned employees and the stake holders in doing the achievement of the goals and the objectives (Makasi, 2014). In the context of the corporate strategies of the organization Tesco it takes account of some of the basic features which are mentioned below (Palomares, Martnez and Herrera, 2014): Valuation of the money: Tesco always needs to commit in doing the delivery of the quality basis of the products with the guarantee of the unbearable prices. Customer service: Tesco always maintain some of the special focuses on the targeted customers to maintain the unique basis of the products and also needs to compact with the offering of the first class services (Dauber, Fink and Yolles, 2012). Customer loyalty: with the availability of the first quality of the products and also other facilities customer also reward Tesco with their enough loyalty and also the dedication on a specific organization. Stores: Tesco always needs to maintain the investment in some of the existing stores and also helps them in the doing the development of the flexibility of the new stores which gives the customers with the availability of the enough stores so that the customers can get the better experience for doing the shopping (Makasi, 2014). Some of the available key products in the basis of which Tesco formulate their own strategies of the corporate values are given below: External: concerning of the external environment of the organization it includes the various types of the variables like employees, customers, competitors, trade associations, creditors etc. Internal: in the internal environment of the organization it includes both the weakness and the strength of the organizations which takes the control of the short run variables of the top level management of the organization. By taking account all the internal factors of the organization it mainly deals with the proper assessment of the value chain which includes both the strengths and also the weakness of the business on the basis of the linked activities which helps in doing the generation of the values to the customers (Seal, 2012). Environmental issues and trends: the issues which have that ability to create an impacts on the organizations are concerned with the both the external and the internal factors. Under the external factors it includes threats, outsourcing etc and then under the internal factors services, needs, skills, resources etc. (Levenson, 2014). The concerned cultures and the behaviors of the employees of the organization and also the process through which the employees are attached to the concerned nature and the behavior of the organization are conferred as the organizational culture. Under the organizational cultures it includes the norms, mission, visions, beliefs and the assumption of the organization. Organizational culture also includes some of the seven characteristics which are given below: Teamwork: companies needs to organize all the work activities in a team so that it becomes easy to build up the natures of the team build up inside the organization which helps to place the high quality values in the characteristics of the organization. Innovation: to maintain the profits of the organization the companies always needs to maintain the innovative natures so that they can introduce the new types of the products and also needs to keep more focus on the improvement of the performance of the employees. Emphasis on the outcome: it also needs to maintain the more focuses on the outcomes and the results of the organization which helps to create the values and also the importance of the organization (Janicijevic, 2012). In doing some of the changes of the organizational cultures of the Tesco it helps in the improvement of the performance of Tesco. Tesco also needs to do the implementation some of the new techniques and the innovative features in the context of the organizational cultures so that they can improve their revenues and the values of the organization by implementing some of the new features and also innovating the existing features on the basis of the requirements of the customers (Clausen, Pohjola, Sapprasert and Verspagen, 2011). Conclusion The main beliefs of the management are fundamentally the guidelines based on which the organization can takes their essential decisions and also the specific actions of the manager and the managerial role. To give the proper conclusion of the entire task it describes all about the managerial roles, organizational cultures and also some of the aspects of these mentioned factors on any of the specific organization. References Agnihotri, A. (2014). Corporate reputation based theory of choice between organic, hybrid and inorganic growth strategies. Corp Comm: An Int Jnl, 19(3), pp.247-259. Clausen, T., Pohjola, M., Sapprasert, K. and Verspagen, B. (2011). Innovation strategies as a source of persistent innovation. Industrial and Corporate Change, 21(3), pp.553-585. Janicijevic, N. (2012). Organizational culture and strategy. Ekonomika preduzeca, 60(3-4), pp.127-139. Levenson, A. (2014). Organization design and talent strategies for emerging markets. Organizational Dynamics, 43(3), pp.205-213. Seal, C. (2012). Managerial Roles and Implications in Emergent Change. Organization Management Journal, 9(1), pp.3-3. Baker, E. (2014). Leadership and ManagementGuiding Principles, Best Practices, and Core Attributes. Journal of Public Health Management and Practice, 20(3), pp.356-357. Dauber, D., Fink, G. and Yolles, M. (2012). A Configuration Model of Organizational Culture. SAGE Open, 2(1). Grey, C. (2014). An organizational culture of secrecy: the case of Bletchley Park. Management Organizational History, 9(1), pp.107-122. Vizzoto, A., Pereira, B., Campanher, M. and Ravanello, F. (2014). An Overview on the Studies of Organizational Culture in Journals Indexed in the Business Administration Area (2008-2013). FSRJ, 6(1), pp.132-151. Prictor, R. (2012). The Strategic Quality Manager: A Handbook for Navigating Quality Management Roles in Health and Aged Care. Australian Journal of Primary Health, 18(1), p.88. Baker, E. (2014). Leadership and ManagementGuiding Principles, Best Practices, and Core Attributes. Journal of Public Health Management and Practice, 20(3), pp.356-357. Jere, M. (2014). Customer Perceptions of Loyalty Programs in an Emerging Market Context. Mediterranean Journal of Social Sciences. Makasi, A. (2014). The Impact of Operational Customer Relationship Management on Customer Loyalty. Mediterranean Journal of Social Sciences. Palomares, I., Martnez, L. and Herrera, F. (2014). MENTOR: A graphical monitoring tool of preferences evolution in large-scale group decision making. Knowledge-Based Systems, 58, pp.66-74.
Subscribe to:
Posts (Atom)