Does watching (some category of media) increase (identifiable harm) to (an othered
group)? You chose what media, type of impact, and impacted group that you want to study.
Example: Does watching hypermasculine hero characters increase aggression to women (or gays, or
Requirements: You will need to:
select 10 individuals and either randomly assign them to a control or an experimental group. For within group
design vary the order of the tasks for all 10 subjects.
Select a category of media — action shows (often have hypermasculine heros), news shows (but the stories
would need to feature hypermasculine men), sit-coms (often contain emotional violence), reality shows (often
contain a lot of bitchiness).
Develop treatment material and control material. (Remember the control should be as identical as possible to
the treatment material WITHOUT the independent aspect you are testing for.)
Develop the testing instrument that can detect any change produced by treatment.
Example: If I was doing an experiment to find out if high-salt intake increased blood pressure, then I could
design the experiment to give half of the subjects
high salt burgers (experimental treatment)
and half no salt burgers (control treatment)
and test for changes in blood pressure with a blood pressure monitor (testing instrument)
to obtain a quantitative measure of change (the blood pressure number).
Basic structure of essay:
. Facial recognition technologies i. Which facial recognition technologies exist? A numerous of facial recognition techniques and methods are being used for security and authentication purposes which includes areas in detective agencies and military purposes. This way, the facial recognition techniques can play a role in preventing crime. There are multiple methods considered the two primary tasks of facial recognition, i.e. verification and identification. Verification, also called authentication, is presenting a face image of an unknown individual along with a claim of identity, and then ascertaining whether the individual is who he/she claims to be. Identification, also called recognition, is presenting an image of an unknown individual and determining that person’s identity by comparing that image with a database of images of known individuals. There are even some facial recognition techniques that are able to see emotions. These techniques, as well as verification and identification are of great importance when it comes to finding criminals so crime can be prevented. A few examples of the many methods and algorithm that can be used within the field of facial recognition are: Geometric Feature Based Methods, Template Based Methods, Correlation Based Methods, Matching, Pursuit Based Methods, Singular Value Decomposition Based Methods, The Dynamic Link, Matching Methods, Illumination Invariant Processing Methods, Support Vector Machine Approach, Karhunen- Loeve Expansion Based Methods, Feature Based Methods, Neural Network Based Algorithms and Model Based Methods . Later on, one of the most known methods will be discussed in a detailed way. The facial recognition methods that can be used, all have a different approach. Some are more frequently used for facial recognition algorithms than others. The use of a method also depends on the needed applications. For instance, surveillance applications may best be served by capturing face images by means of a video camera while image database investigations may require static intensity images taken by a standard camera. Some other applications, such as access to top security domains, may even necessitate the forgoing of the nonintrusive quality of face recognition by requiring the user to stand in front of a 3D scanner or an infrared>GET ANSWER