Wednesday, January 2, 2019
Face Recognition Technology To Augment Security Measures At The Sporting Event Essay
facial nerve perception engine room refers to a computer driven application that mechanically identifies an individual from his or her digital find out by a comparison of crabbed nervus facialis nerve features in a facial database and in the live image ( daring credit rating, 2007). The engineering science pretends a template of flocks facial configurations, such as the lengths of their noses and the angles of their jaws. It thereby functions like the other biometric technologies (e. g. flag s brush offning) that wasting disease biological features for the purposes of acquaintance.According to Visionics, a manufacturer of grammatical construction knowledge engine room, this engineering science is capable of finding human guinea pigs anywhere in the field of view and at any distance, and it can continuously cutting off them and crop them out of the scene, matching the manifestation against a watch list (Kautzer). bandage signal flag scanning and other kinds of biometric technologies atomic number 18 know to be far more(prenominal) accurate than the face wisdom technology, it is believed that the last mentioned would be more widely judge because it is least intrusive.The technology also does non require users to push, click, or insert anything into the outline. Moreover, companies development the face intelligence technology do not require the installation of anything neglect the tender softw ar application. The cameras in array as strong as the pictures of their employees on file are enough for companies that use the technology. Hence, face recognition technology is cheaper for organizations than the iris scanning, for instance, which requires reading setups.According to Frances Zelazney of Visionics, yet other advantage of facial recognition technology as compared to the other biometric technologies is that unlike other biometrics, facial recognition provides for inherent human embossment because we naturally recogniz e one some other If the system goes down, someone can pull off out an ID with a picture as backup, something you cant do with reproduce devices (Rutherford, 2001). Unsurprisingly, facial recognition technology is known as the fastest growing biometric technology in our day.Law enforcement agencies and the military relieve oneself been use the technology successfully for many another(prenominal) years without the public being informed of it. In the year 1988, the Los Angeles County Sheriffs department (Lakewood Division) began using composite sketches of suspects, as strong as video images, in raise to conduct searches on a database of digital facial shots. The department also has a photo database of sex offenders, and plans to find suspects on this database.Then there is the Gang reportage Evaluation Tracking system that can be searched with the use of photos of suspects in severalize for law enforcement to circumvent false realization cards as well as information that has been presented by gang members (Jarvis). there are numerous coupled States embassies about the founding that are already using the face recognition technology to view as criminals from entering the country. The Israel-Palestine border dominance is in addition equipped with the technology to reduce disgust across the border (Jarvis).IQ Biometrix, open up in 2001, is a company providing garter to thousands of law enforcement agencies around the world with the FACESTM, which is a groundbreaking package tool allowing for the induction and recreation of billions of facial images, as well as their encoding, cataloging and transmitting. The technology incorporates a facial composite tool that the FBI and the CIA also use. The United States Department of Defense, the U. S. Navy, and various local as well as state police agencies drive home in like manner opted for this groundbreaking system of facial recognition (IQ Biometrix, 2004).Given the sizeableness of putting a n ame to a face, whether it is to solve abuses, protect the public, or to hear tribute in jails, face recognition technology is proving itself to be of tremendous value. Sheriff Everett strain along with the Pinellas County Sheriffs Office in Florida employs the Viisage face recognition technology to positively identify and verify individuals. Some of these individuals have just been recently arrested, while others are about to released. The face recognition technology is also of use with people that rattle on the courthouse.So far, the application of the technology has been successful, and users of the technology believe that it would have a greater impact on crime control in the years to come (Facial cognizance, 2007). The United States Department of Defense, with its focus on perfecting the face recognition technology to touch modality criminals at the borders of the nation, had been funding scientists research on the technology for more than decade. Private companies were similarly convinced that the face recognition technology could military service dramatically in combating crime within the borders of the United States.Because of their belief, the marketing of the technology became widespread during the mid-1990s (Rutherford). Then came 9/11 the day that changed the security system concerns of the entire world in the matter of only a few hours. There was increased worry in face recognition technology following the terrorist attacks on the American soil. Although the Americans had viewed the face recognition technology with skepticism in advance the attacks, they became confident that widespread use of the new-made technology in security as well as public guard would help protect them from similar attacks in future.Indeed, the face recognition technology could quicken an important role in the legal profession of tragedies. All the aforesaid(prenominal), law enforcement agencies have notice that in the areas covered by the new technology, no terrorist has ever been identified. What is more, despite the redoubling of efforts to create dependable face recognition systems later on 9/11, the technology suffers from problems. The facial recognition technology faces a difficulty, for example, in the recognition of the effects of aging.Digitally compared photos of individuals that had been taken eighteen months apart produced untrue rejections by the software application at least cardinal three percent of the time. Furthermore, it has been found that the technology is more successful when used by casinos to identify cheaters in welfare offices and by drivers license bureaus, precondition the uniformity of lighting and the use of the same cameras in these places (Jarvis OHarrow, 2001).Seeing that the face recognition technology is not put on proof, albeit useful and security experts have substantiate this it is best to use it at the neat final result only to augment security measures. The new technology can help sec urity personnel at the boast event to spot terrorists, for instance. However, face recognition technology should not be considered a replacement for traditional security measures by any means. What is more, this technology is easy to use, and security personnel would not have a difficult time installing and on the job(p) through the system.Hence, the use of face recognition technology at the sporting event is definitely recommended as a encouragement to the traditional security measures. References Face credit System. (2007). Wikipedia. Retrieved 25 exalted 2007, from http//en. wikipedia. org/wiki/Facial_recognition_system. Facial Recognition in Action. (2007). Penton Media. Retrieved 25 revered 2007, from http//govtsecurity. com/ up-to-date/. Jarvis, A. Are Privacy Rights of Citizens Being erode Wholesale? Forensic Evidence.Retrieved 25 August 2007, from http//forensic-evidence. com/site/ID/facialrecog. html. Kautzer, C. Face Recognition Technology. ZMAG. Retrieved 25 August 2 007, from http//www. zmag. org/ZMag/articles/march02kautzer. htm. OHarrow, R. (2001, August 1). unified Faces With Mug Shots. Washington Post, p. A01. Rutherford, Emelie. (2001, July 17). Facial Recognition Tech Has People Pegged. CNN. Retrieved 25 August 2007, from http//www. cnn. com/2001/TECH/ptech/07/17/face. time. idg.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.