Working individually at home (or in res), each student is required to: Conduct a home energy audit to determine the energy consumed per month, either from direct energy readings, or from inferred values (one is not constrained to this, any environment with interesting loads may be audited); Find the applicable municipal tariffs and to estimate the energy costs incurred from the above; Plot a daily- and a weekly- load profile (power vs time graphs), derived from the power requirements of the appliances used, based on their time of use, and duration of use; Propose a load-shifting schedule, based on the above, that would minimise the peak power demand – this would be done in the form of a daily- and weekly- power vs time graph; Propose a generic strategy that could be used by someone wishing to reduce their peak power demand; Communicate the results in a short report and brief video presentation. Access to one’s electricity meter (or pre-paid meter) albeit an advantage, is not mandatory, as estimations can be made from the name-plate or datasheet values of one’s appliances and knowing their time-of-use and duration-of-use. The assessment comprises two parts: a short project report and a brief video presentation.
privacy. It can help to prevent crime and detect criminals, thus people feel safer. But the opponents state that there will be too much loss of privacy, the technology can make errors and can be misused. This makes people fearful. There should be made strict guidelines concerning privacy when using facial recognition to prevent everyday crime. Furthermore, the technologies should be checked very well, so that there are no chances on false positives. 5. Conclusion Facial recognition systems can be used in various ways to prevent crimes. One of these ways is using FaceIt. FaceIt is a face recognition system that can search through a crowd for a face and match this face with the mugshot history of this specific person. It is considered to be the most accurate facial recognition software as of today. Other results are: matching faces from live security images, face recognition in photographs and face recognition from sketches. These are all methods in which a face (of e.g. a possible criminal) is compared to a face in respectively live security images, photographs and sketches, to see if there is a match. The facial recognition system is far from perfect. There are still a lot of dangers that need to be considered. Some of the risks that facial recognition brings are: the increasing of crime opportunities, the possibility of falsely accusing innocent people and a loss of privacy. From this paper can be concluded that facial recognition creates a lot of opportunities to help prevent crime. However, there are still a lot of difficulties that can cause problem when these techniques are used in the real world.>GET ANSWER