SlideShare a Scribd company logo
Software Developer
Facial Structure
To recognized the facial
characteristics of terrorists.
- it can recognized the specific
region of face
- Physical changes
- Terrorists can use other person
that has no record yet
- Can be used widely for other
purposes
- This system can be hacked and
changed image of the terrorists
and replaced it to other image.
- It should have automatic
image editor that can match
the part of the damaged region.
- We therefore conclude that,
this system is specifically made
for the security against
terrorists and it is not well-
reliable to be used as a
security.
- We recommend this system to
add some function such as an
automatic image editor.

More Related Content

Viewers also liked

Uterine volume an aid to determine the route and technique
Uterine volume   an aid to determine the route and  techniqueUterine volume   an aid to determine the route and  technique
Uterine volume an aid to determine the route and technique
Santoshkumar Patil
 
การศึกษาการยอมรับรูปแบบการนำเสนอหัวข้อโครงงานแบบเสมือนสำหรับรายวิชาโครงงานนัก...
การศึกษาการยอมรับรูปแบบการนำเสนอหัวข้อโครงงานแบบเสมือนสำหรับรายวิชาโครงงานนัก...การศึกษาการยอมรับรูปแบบการนำเสนอหัวข้อโครงงานแบบเสมือนสำหรับรายวิชาโครงงานนัก...
การศึกษาการยอมรับรูปแบบการนำเสนอหัวข้อโครงงานแบบเสมือนสำหรับรายวิชาโครงงานนัก...
Nakhon Pathom Rajabhat University
 
Uterine volume an aid to determine the route and technique
Uterine volume   an aid to determine the route and  techniqueUterine volume   an aid to determine the route and  technique
Uterine volume an aid to determine the route and technique
Santoshkumar Patil
 
Peluang Bisnis Modal Kecil
Peluang Bisnis Modal KecilPeluang Bisnis Modal Kecil
Peluang Bisnis Modal Kecil
Umi Lathifah
 
PELUANG BISNIS MODAL KECIL HASIL JUTAAN RUPIAH
PELUANG BISNIS MODAL KECIL HASIL JUTAAN RUPIAHPELUANG BISNIS MODAL KECIL HASIL JUTAAN RUPIAH
PELUANG BISNIS MODAL KECIL HASIL JUTAAN RUPIAH
Umi Lathifah
 
Hipnoparenting mataram
Hipnoparenting mataramHipnoparenting mataram
Hipnoparenting mataram
Edy Muljana
 
Arts apps Folk Dance
Arts apps Folk DanceArts apps Folk Dance
Arts apps Folk Dance
Edlynne Ogena
 
History of the Philippines Chapter 7
History of the Philippines Chapter 7History of the Philippines Chapter 7
History of the Philippines Chapter 7
Edlynne Ogena
 

Viewers also liked (8)

Uterine volume an aid to determine the route and technique
Uterine volume   an aid to determine the route and  techniqueUterine volume   an aid to determine the route and  technique
Uterine volume an aid to determine the route and technique
 
การศึกษาการยอมรับรูปแบบการนำเสนอหัวข้อโครงงานแบบเสมือนสำหรับรายวิชาโครงงานนัก...
การศึกษาการยอมรับรูปแบบการนำเสนอหัวข้อโครงงานแบบเสมือนสำหรับรายวิชาโครงงานนัก...การศึกษาการยอมรับรูปแบบการนำเสนอหัวข้อโครงงานแบบเสมือนสำหรับรายวิชาโครงงานนัก...
การศึกษาการยอมรับรูปแบบการนำเสนอหัวข้อโครงงานแบบเสมือนสำหรับรายวิชาโครงงานนัก...
 
Uterine volume an aid to determine the route and technique
Uterine volume   an aid to determine the route and  techniqueUterine volume   an aid to determine the route and  technique
Uterine volume an aid to determine the route and technique
 
Peluang Bisnis Modal Kecil
Peluang Bisnis Modal KecilPeluang Bisnis Modal Kecil
Peluang Bisnis Modal Kecil
 
PELUANG BISNIS MODAL KECIL HASIL JUTAAN RUPIAH
PELUANG BISNIS MODAL KECIL HASIL JUTAAN RUPIAHPELUANG BISNIS MODAL KECIL HASIL JUTAAN RUPIAH
PELUANG BISNIS MODAL KECIL HASIL JUTAAN RUPIAH
 
Hipnoparenting mataram
Hipnoparenting mataramHipnoparenting mataram
Hipnoparenting mataram
 
Arts apps Folk Dance
Arts apps Folk DanceArts apps Folk Dance
Arts apps Folk Dance
 
History of the Philippines Chapter 7
History of the Philippines Chapter 7History of the Philippines Chapter 7
History of the Philippines Chapter 7
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Ethics Case

  • 1.
  • 2.
  • 3.
  • 5. To recognized the facial characteristics of terrorists.
  • 6. - it can recognized the specific region of face - Physical changes - Terrorists can use other person that has no record yet
  • 7. - Can be used widely for other purposes - This system can be hacked and changed image of the terrorists and replaced it to other image.
  • 8. - It should have automatic image editor that can match the part of the damaged region.
  • 9. - We therefore conclude that, this system is specifically made for the security against terrorists and it is not well- reliable to be used as a security.
  • 10. - We recommend this system to add some function such as an automatic image editor.