Paper Correction and revision part 2

I posted my paper that needs some corrections and a bit of revisions 

I also uploaded below the Original instructions for the paper and the annotations from the teacher as well as a peer review from a students

Don't use plagiarized sources. Get Your Custom Essay on
Paper Correction and revision part 2
Just from $13/Page
Order Essay

im just asking to fixed the changes and re read to make it better

Peterson
ENGL 235

Final Report Peer Review Sheet

Purpose: This assignment will allow you to pass along helpful feedback to a peer
that will aid in their report revision. At the same time, it will also give you the
opportunity to consider your own draft and possible revision choices heading into
the final.

Finally, this assignment will also prepare you to meet each of the class learning
outcomes:

• Locate, evaluate, and integrate credible research into a written document for
a specific purpose and work-world audience;

• Apply appropriate formatting and visual aids for a specific purpose and
work-world audience;

• Edit for accuracy, brevity, clarity, to write an ethical document with a specific
purpose and work-world audience;

• Contribute successfully to a group in the creation of work-world documents.

Instructions: Read over your classmates’ report in detail after considering the
following questions. Then go back and supply your responses (writing on this
document in a different font is best – simply save and upload as an attachment to
your reply post on the discussion forum). Be constructive in your criticism, but
remember that “Good job!” is not helpful feedback!

Technical Writing Quality
How well does this report achieve the following:

meets purpose of assignment?
effectively engages a professional audience?
employs varied sentence structures for style and college-level reader interest?
exhibits a precise and sophisticated vocabulary?

x

x

Peterson
ENGL 235

all sentences are factual, active, clear, concise, and specific?

Comments:

Some of your sentences are confusing to read. Their main idea somewhat gets across, but
I’m left doing double-takes and making sure I’ve read clearly, which distracts from the
overall flow of the piece. I think some of your sentences and phrases are confusing because
they could be said in fewer words. As you revise, I would challenge yourself to condense
your ideas and uncomplicate them as much as possible. It’s tempting to use more words
than necessary because of the potentially intimidating minimum word count requirement
for this assignment, but those extra words come at the cost of clarity. I would cut out
anything unnecessary and worry about meeting the length requirement later. An example of
what I would cut out or alter: “advancements and innovations regarding the respective
subject.”

“The implementation and the operation of the image recognition theory and other related
forms of artificial intelligence are witnessed and realized from the perspectives witnessed
during the actuation and the particular implementation of the image recognition
procedures.” What? I’m having to think way too hard to put this together, and it is still
unclear.

“The numerical values in the representation stand for the different characteristics and
aspects in the image. The different numerical expressions help to distinguish between
various components and aspects of the image.” First, this is the same thing said twice.
Second, what are examples of different characteristics or “aspects”? (Contrast between
pixels, edges, color, etc.) “Aspects” is vague.

What does a python have to do with image recognition?

“Most of the phones are unlocked with the use of image recognition since this method is
more effective as it is rare to find another person with the same features.” Firstly, I don’t
believe that “most of the phones” are unlocked this way; the majority of my family’s phones
aren’t, so I need more convincing. Secondly, how rare is it? This seems like an easy statistic
to find and cite, and an easy win for your report that can be used to argue that an
investment in image recognition is an investment in security.

“[…] image recognition has a very high rate of accuracy.” How high is “very high”? Give me a
statistic that you’ve found in your research. If it’s not as simple as one number, give me
multiple metrics and explain why they are useful for evaluating the efficacy of an artificially
intelligent system.

remains focused on the central research question(s) throughout in an immediately
recognizable way?

shows mastery of the narrowed topic and articulates its complexities?
presents a logical progression of ideas based on the topic?
maintains focus within each paragraph?
uses highly effective subheadings?

x

x
x
x

Peterson
ENGL 235

provides clear and directive topic sentences and sophisticated transitions within and
between paragraphs?

includes logical paragraph breaks?

Comments:

There are some parts that could be split further into multiple paragraphs, but generally I
think you did a good job of separating ideas between paragraphs. The same goes for logical
paragraph breaks.

I didn’t give you a check for “shows mastery of the narrowed topic and articulates its
complexities” simply for the opening section, “Operation of image recognition.” I think this
section could be simplified a lot. The reader doesn’t need to know exactly how these
systems work, but they should come away with a high level understanding, and I felt that
that high-level understanding was a bit too difficult to get to than it should have been. I’m
already familiar with computer vision, and this section was confusing and hard for me to
read.

does not display any serious patterns of error?
maintains a consistent point of view and appropriate verb tense?
contains very few mistakes of syntax, grammar, and punctuation, and none that interfere

with meaning?

Comments:

My reasoning for these check boxes is apparent in my other comments.

Formatting and Visuals Use
How well does this report achieve the following:

correctly uses MLA, APA, or IEEE standards for page layout?

design choices in page layout enhance reader understanding?

all visuals are accompanied by MLA, APA, or IEEE formatted captions?

all visuals are clearly linked to the text?

x
x

Peterson
ENGL 235

Comments:

I recommend altering your report to have the clearly separated sections of Introduction,
Data Collected, and Conclusion, as defined in the instructions for the report assignment.
Each of these sections should start on their own page so that it is markedly clear where the y
begin.

Your pages are numbered with lower-case Roman numerals, but this should only be
reserved for the front-material; the Introduction section should start on page 1.

Research Use
How well does this report achieve the following:

thoroughly supports and develops the topic using relevant, credible, and richly varied
sources?

synthesizes relevant source support through effective interpretation and analysis?

consistently uses an appropriate balance of analysis, summary, paraphrase, and
quotation?

considers and convincingly responds to varying claims?

consistently introduces source material with varied and effective signal phrasing?

maintains strict ethical standards and avoids plagiarism through correct and precise
paraphrasing, use of quotation marks, in-text citations and an MLA Works Cited, APA, or
IEEE References page?

Comments:

Your report doesn’t seem to rely much on information from source material. Either this is
the case, or you are doing a lot of paraphrasing which is not clearly indicated as
paraphrasing. References are mostly mentioned in passing rather than focused on for
analysis of findings.

Overall Impressions
How persuasive did you find the recommendations made by this report?

I do not find the recommendations persuasive. In fact, the conclusion does not make
an explicit recommendation.

Note at least 3 strengths and 3 weaknesses below:

Weaknesses

x

Peterson
ENGL 235

– Word choice and phrasing seems to lack purpose at times and speaks negatively
to your credibility, as if you are pretending to know what you’re talking about
(whether or not you actually are). This mostly has to do with overcomplication.

– Overreliance on words such as “various” (appears 30 times), “particular” (appears
14 times), and “aspects” (appears 17 times). Overall use is not as much of a problem
as repeated, consecutive use. There are many instances in which the use of these
words does not convey additional meaning and distracts from the underlying point.

– Many instances of invalid word choice and grammar. With the right settings
enabled, Microsoft Word and Google Docs should be identifying nearly all of these
for you.

Strengths

– Your care for the subject matter comes across and aids in your pathos (emotional
appeal, as minimal as it may be in technical writing) and ethos (credibility).

– Your “Future of image recognition” section is especially exciting. I think this
section should be much longer and split into multiple sections where you explore
applications in different industries. At the highest level, I think this is the most
important thing you could do to improve your report (fluff removal and
simplification being close seconds). But, this is just my opinion.

– Social awareness. You analyze image recognition from multiple perspectives.

Vasquez
English 235

ii

Image recognition

Table of content

Operation of image recognition…………………………………………………………………

vi

Reference……………………………………………………………………..………………….xii

Abstract

The level of safety in various business sectors is improved by installation of security methods to
protect the premises or the big data. The main aim for this study is to find out the main purpose
of image recognition, its impact on the environment and the people and how the vision will be in
the future.

Vasquez
English 235

iii

Though the image recognition system may have several advantages, there are challenges of the
system as discussed in the report. Data collected on the information concerning the image
recognition is used to provide enough information on the report.

It is recommended that for the perfect security that has being desired by most of the people, the
use of image recognition will help to accomplish the mission. Additionally, as technology
develops in all the sectors, the security sector will also develop as the image recognition involve
to use of advanced technology.

Image recognition

Introduction

Image recognition, also known as visual artificial intelligence refers to the implementation of
computer software and hardware to perform various mandates and functions that relate to the
identification of various aspects and objects in the environment such as animals and human
beings. The implementation of various computer software and their respective hardware devices
give rise to the image recognition. In this process, the computer software is integrated and
merged in a particular setting that includes the methods and techniques that are helpful in the
analysis and detection of images and other visuals. The particular process of detection and
analysis of the images and visuals are implemented to help in the automation of some specific
tasks and mandates. The Image recognition has been in innovation and processing form the early
1950, where researches and scientists found out that the manipulation of mechanics and
machines can be done in such a way that they mimic the Human brain, where they can identify
and name various objects in the environment. However, the ideas that the scientists had by they
were hard to actuate and make reality because of the high prices of computer at the time. Since
the particular time, advancements and innovations regarding the respective subject were
implemented and led to the improvement and the actuation of the particular ideas.

The evolution and the growth of the implementation of artificial intelligence, particularly in
processes such as image recognition have been realized in the recent past. Various requirement
and demands for better results in different aspects and circumstances led to the demand for better
systems that provided efficient automation processes using the image recognition and other
related aspects. The various implementations and circumstances include the security
departments, where the implementation of AI in image recognition is becoming an effective and
essential requirement is circumstances such as access control. Image recognition is realized as a
development that took several years to achieve the respective result and particular result that is
accorded in the present time.

I this report, the main purpose is to address the respective experiences, implementations and
impacts of artificial intelligence, which is image recognition and other experiences realized form
the implementation and the actuation of image recognition in various circumstances and
environments. In this report, the knowledge and the information is intended to reach various
audiences, including the respective organization and companies that benefit from the
implementation of the implementation of image recognition. The implementation of image
recognition is realized and witnessed in various environments and circumstances such as security
enforcement, were image recognition is used to automate access control and other related

Vasquez
English 235

i

v

aspects. Besides, image recognition is also witnessed in other circumstances such as the
automation of driverless cars, automation of bridges and the signing of attendance at working
environments and institutions. Such are the audiences addressed by this report. Beside, other
audiences such as students who seek knowledge and information about image recognition and AI
can also benefit from this report. In this report the limitations witnessed includes the insufficient
funds that led to the failure of the required exposure to various companies and organizations that
employ and also implement the formulation and the implementation of image recognition and
other artificial intelligence applications.

Operation of image recognition

At this point of image recognition systems and software, the various aspects and characters used
to actuate and implement the functions of the image recognition activity is witnessed. The
implementation and the operation of the image recognition theory and other related forms of
artificial intelligence are witnessed and realized from the perspectives witnessed during the
actuation and the particular implementation of the image recognition procedures. The use of
artificial neural networks and other related technologies are among the processes that avails and
produce the function and the operation of image recognition. Foremost, the neural networks in
image recognition are used to help in the recognition and the analysis of various concepts and
other characteristics found in any particular image (“Image Recognition : A Complete Guide –
Deepomatic”, 2021). To achieve this implementation, training of the neural networks is
implemented using primary data collected from various circumstance and environments. After
the particular data is availed and stored in the system, the annotation and the definition of various
characters and other physical aspects of the image helps to build the image recognition process
and its efficiency in operation.

After the annotation and the entry of the required data into the system, various examples of real
world examples and images are then brought in to help tech the neural networks about the
concepts and other various aspects witnessed in image recognition. When different examples and
samples are used in the process, the neural network learns more about the aspects and the
concepts witnessed in the image recognition process (“Image Recognition : A Complete Guide –
Deepomatic”, 2021). The image recognition software and system now identifies various images
with and components in any image in form of digital representation, which are usually numerical
values that stand for the pixels that build up the image. At this point, the particular system is able
to recognize various images and components of images with the representation in numerical
values. Each value represents different aspects and characters of different images. This makes it
possible of the image recognition system to recognize different images and characters in a given
time. An example of the numerical recognition of an image in the system can be witnessed
bellow.

Vasquez
English 235
v

The numerical values in the representation stand for the different characteristics and aspects in
the image. The different numerical expressions help to distinguish between various components
and aspects of the image. The representation above changes from image to image. This implies
that every image possesses its own representation that doesn’t resemble another. Form such
aspects, the image recognition system becomes suitable in circumstances and points such as the
automation of security systems in areas of access control.

The image recognition can be implemented and realized in various systems and software. Among
the various examples is python, where the representation of an image is dine using various steps,
where an image is accorded different dimensions in a decreasing manner, to a point where the
respective representation of the image in the python software is diminished by half but all the
aspects and characteristics are maintained. From such an implementation, the particular image
recognition system is able to perform various tasks and mandates regarding to image recognition
of various characters. In this aspect, the involvement of deep learning is implemented (“Image
Recognition : A Complete Guide – Deepomatic”, 2021). This is where the image recognition
system is able to acquire all the required aspects and components of the image to be analyzed.
The components include the color scale, size and other important aspects of every image. This
allows for the accurate representation of the aspects and components of the respective image. As
a result, accurate and precise recognition of the image is achieved. Below is an example of the
image recognition process and illustration of in python.

Vasquez
English 235
vi

Impact

The use of image recognition has brought about several impacts to the environment, mostly the
business sector and to the individuals in general. Organizations are widely using image
recognition for various activities such as to increase their level of security. The future of image
recognition is likely to grow since most of the industries have visions on the services offered by
image recognition. Moreover, there are strategies that will be made to solve the problems of
image recognition to make it more effective in its services.

Findings

There are various findings associated with image recognition. These findings include advantages
and the disadvantages of image recognition;

Advantages

Image recognition contributes in increasing the level of security designed to protect important
information. Image recognition is widely used since it is installed in the private devises of
individuals and it is possible for them to use the security method. Most of the phones are
unlocked with the use of image recognition since this method is more effective as it is rare to
find another person with the same features. Organizations use image recognition to enhance the
security of the business since they deal with big data. Information about the employees in the

Vasquez
English 235

vii

place of work is protected by setting image recognition as security measures. This allows only
few members to have access to the organizations data.

Image recognition is well known of its accuracy since the individuals’ features vary. Face ID has
become more reliable since the advanced technology has introduced the use of 3D facial
recognition. It is not simple for one to trick the system and hence this creates the confidence that
the business premises are secure. Moreover, it is difficult for thieves or any stranger with bad
motives to attack the organization since their images are not in the recognition system. Image
recognition is fully automated as the only have to confirm their identity from the security system.
This creates the advantage of saving time when checking on the security of the organization. The
members of the organization do not have to spend a lot of time in signing in. Additionally, image
recognition has a very high rate of accuracy and this makes the system more convenient to use.
Likely, low cost is incurred in the process of installing the image recognition system. This makes
it affordable by most of the organizations.

Above is a block diagram of face recognition system.

Disadvantages

However, image recognition has various disadvantages to the people since in most cases, the
police department use hidden cameras to track the criminals in a given area hence there are other
people in the same area that carry on their private businesses. This leads to lack of privacy in the
areas since the people cannot carry out their activities in private. Likely, the image recognition
systems can analyze millions of images in a given period since the people operation from the
particular area are many. This makes it less effective to the police concerned since it is not easily
possible track a criminal among a large number of people.

input image

face detec on

face recogni on

data base

Vasquez
English 235

viii

Moreover, since image recognition is likely to taking a sample of an individual’s DNA, most of
the people are worried about their privacy since they have a lot of important information that
they have protected through the face recognition. If incase the details on the image recognition of
an individual are hankered, it impossible to reset since they are permanent. Other security
methods such as passwords when hacked are easy to reset hence people prefer the use of
passwords (“5 Pros and Cons of Face Recognition Technology”, 2021). Moreover, some groups
of people claim that face recognition not reliable since it may portray low illumination when
used hence less effective. Likely, in a state where security cameras have been set to keep close
watch on the property in the particular area, the videos captured in the stipulated period are not
clear to identify the people in the clips.

It is proved that at times, image recognition in form of a video can display the false positivity.
This happens when people are shown on the cameras and yet in actual status there was no one in
the area. This creates a challenge to an organization that is in the process of maintaining a high
security for its premises. Slight changes in the position of the cameras used for security lead to
capturing the wrong angle and may give an advantage to the thieves to steal from the premises
without being notified. With the increased cases of data breaches, image recognition is at risk
since the data on recognition is stored in cloud and incase of hacking, the recognition
information gets to unauthorized hands.

Interpretation of findings

Regardless of the benefits to image recognition, the challenges of using the system make it less
effective to be used by all the people. Due to the big data in most of the organizations, security
methods are used to protect the premises. The effective method is when the members of the
particular organization give there recognition information to the security system. This helps to
control the people who should enter the building of the organization. Maintaining strategies to
protect the cloud system of the organization helps to protect the recognition information which is
stored in the cloud. This is because there is not possible way to reset the facial recognitions of
the individuals.

Future of image recognition

Due to the advanced technology, more devices are being invented that require the use of image
recognition to operate. A good example is the driverless vehicles that can sense the presence of a
person in front of it (“Image Recognition Applications: 7 Essential Future Uses – Data Science
Society”, 2021). This image recognition installed in the driverless vehicle help to reduce the
accidents that happen as a result of a person or people crossing the road. Moreover, image
recognition will be of great importance in future enrolling and admitting students in the specific
schools. Instead of the long process where the school staff have to admit each student at a time
taking their details, the process will be easier when the schools use the image recognition system.
Moreover, the students with learning disabilities are able to rely on the applications that provide
computer vision to read a given content.

The future of image recognition will lead to extensive use of the system in optimizing medical
imagery hence making it more effective in the healthcare centers. Image recognition will be used
in a situation of scanning the patients to identify the presences of a given infection in their body.
The detection of severe diseases including cancer can be identified at their early stage hence
creating a chance for the patient to get their treatment. Moreover, as time goes by, the challenges

Vasquez
English 235

i

x

that are associated with image recognition will be solved to make it more effective. This gives
most of the industries visions to increase their level of security in future.

Interpretation of findings

Image recognition as identified as one of the best security methods in all the sectors. It is relied
on to make more positive impacts in future by improving the state of living of people in various
ways. There are possibilities that the challenges associated with image recognition will be solved
to increase its effectiveness (“What Will We Use Image Recognition for in the Future?”, 2021).
Companies are likely to depend on image recognition for more purposes apart from security
measures. Its application is sectors such as disease identification in healthcare will lead to saving
many lives that had diseases which were easy to detect. Driverless vehicles will become more
effective due to the developed sensors to increase the safety of the passages.

Conclusion

In conclusion, image recognition can be used for various purposes including increasing security
of a premises. This helps to specify the people who have the rightful access to the organization
hence avoiding any issue of theft in the premises. Security cameras are placed in specific areas to
increase the security of the area by getting the identification of the people who might have
intruded in the place. Moreover, the self-driving vehicles are effective due to their ability to
sense hence increasing the safety of the passengers. Despite to challenges of image recognition,
organizations and industries have visions to improve their security through image recognition in
future. It is recommendable that image recognition will grow in future due to its wide usage in
the business sector to provide security and other services.

Vasquez
English 235
x

Reference

The HoloLens Revolution. (2016, October 4). ASME.
https://www.asme.org/topics-resources/content/the-hololens-revolution

What is Image Recognition their functions, algorithm and its uses. (2021). Retrieved 27 February
2021, from https://www.mygreatlearning.com/blog/image-recognition/

Image Recognition : A Complete Guide – Deepomatic. (2021). Retrieved 27 February 2021, from
https://deepomatic.com/en/what-is-image-recognition

What Is Image Recognition?. (2021). Retrieved 27 February 2021, from
https://towardsdatascience.com/module-6-image-recognition-for-insurance-claim-handling-
part-i-a338d16c9de0

What is image recognition? – Definition from WhatIs.com. (2021). Retrieved 27 February 2021,
from https://searchenterpriseai.techtarget.com/definition/image-recognition

What Will We Use Image Recognition for in the Future?. LogoGrab Blog. (2021). Retrieved 27
February 2021, from https://blog.logograb.com/future-uses-image-recognition/.

Image Recognition Applications: 7 Essential Future Uses – Data Science Society. Data Science
Society. (2021). Retrieved 27 February 2021, from
https://www.datasciencesociety.net/image-recognition-applications-7-essential-future-
uses/.

5 Pros and Cons of Face Recognition Technology. Techfunnel. (2021). Retrieved 27 February
2021, from https://www.techfunnel.com/information-technology/5-pros-and-cons-of-
face-recognition-technology/.

Peterson

ENGL 235

Final Report Assignment

1

Purpose: This report will be your final assignment for the class. The weekly class
assignments are designed to prepare you to successfully create this document. In
that way, this assignment asks you to synthesize all of your learning and
demonstrate your mastery of the following course learning outcomes:

 Locate, evaluate, and integrate credible research into a written document for
a specific purpose and work-world audience;

 Apply appropriate formatting and visual aids for a specific

purpose and

work-world audience; and

 Edit for accuracy, brevity, clarity, to write an ethical document with a

specific

purpose and work-world

audience.

It will also prepare you to meet the following general education program learning
outcomes:

 Obtain, evaluate, and ethically use information; and
 Communicate with various audiences using a variety of methods.

Scenario: As a new employee at Initech, you’ve been given a task: conduct a
feasibility study for the company’s venture capital department on an emerging
technical process or product of your choosing. You need only choose one

topic

(either a product or a process). Here are just a few examples you might consider:

Process

3-D printing

Wave or wind energy

Natural gas fracking

Private space travel

Virtual reality gaming

Product

Driverless vehicles

Hoverboards

Hydrogen fuel cells

Smart homes

The latest social media, gadget,
application, or technology craze

The choice is up to you, but you the information you present should be technical in
nature. In other words, if you were to pick your favorite smart phone game, you
should be prepared to focus on how it’s programmed, how the makers earn money,
how many users subscribe, what their spending habits are, etc., rather than “It’s so
cool because you get to kill zombies with plants!”

Once you have a process or product in mind, the question this study should address
is:

“Is [your process or product] a viable investment for Initech?”

Peterson
ENGL 235

Final Report Assignment

2

In other words, “If we invest in [your process or product], will we see financial gain
as a result?”

Do not worry about any of the logistics of the actual investment itself. You aren’t
expected to research stock offerings or investment contracts. Instead, make sure
that your report addresses the following topics and related questions:

History: How, when, where, and why did this develop?

Explanation: How—precisely and specifically—does this work?

Impact: What effects does this process or product have on 1) the environment, 2)

the economy, and/or 3) society as a whole?

Future: What is the development trend of this process or product? Is it popular?

Does it (or things like it) make money? Based on its past development and its

current use/popularity, is this likely to become more widespread in the future?

Recommendation: Given all your answers to these questions, would this be a good
choice for Initech to invest in?

Essentially, you are conducting a research project that asks the following questions:

“What does the future of [my process or product] look like? Will it be more
widely used? Will it be replaced soon? If so, by what?”

A related question to address here might be “Should [my process or product] be

more widely used? Is it environmentally hazardous or otherwise flawed? If so, are

those flaws serious enough that a company should not invest in it?”

For this reason, you should pick something that is relatively new, or even untested

in its development. Don’t worry about accurately predicting the future. You should

instead make a clear recommendation based on what your credible research is
telling you at this moment in time.

Instructions: Once you have chosen a process or product, you will conduct research
and write a formal feasibility analysis report.

The goal of your report is to 1) investigate the above questions (and others, as

appropriate), 2) gather credible and scholarly research, and then 3) present a

convincing recommendation to a specific audience.

Requirements: Your final report must meet all of the following criteria:

Length: The text of your report from Introduction to Recommendation must be at least 5

single-spaced pages in length NOT including your front matter, Works Cited/References

pages, visuals, or any appendices (see below). This should be at least 3,000 words.

Research: You should include at least 5 credible sources.

Peterson
ENGL 235
Final Report Assignment

3

Visuals: The report should include at least four visuals. At least two of these must be

original visuals of your own making, generated by you yourself. The rest must be

charts, tables, or graphs that you generate originally. These should include an

MLA/APA/IEEE formatted captions and should work with your content to help explain your

findings.

Format: Use 12 pt. font in single-spaced, left-justified paragraphs. Do not TAB to
start your new paragraphs. Your entire report should have a running header, with
lower-case Roman numeral page numbers (i, ii, iii) for the front matter (except the
title page) and starting with Arabic numeral 1 when you being your Introduction.
See the provided course models for guidance.

Also, be sure to skip lines between sections and headings. Use bold face for headings

and italics for subheadings. Make use of bold headings, white space, and varied font

sizes/colors to make your document as readable as possible.

Report Outline: Your report should follow the outline below, but take out the
outline formatting (I. II. A. B., etc.) for the report. Your report must have each of
these 8 parts from the outline. Each one should constitute a new page in your
report (start a new page for each section).

I. Title page

II. Letter of Transmittal Please direct this to me, your instructor. Your letter of

transmittal should be 1-2 pages in length and should include the following elements

(do not number them, though):

1. A reflection on your process in writing the report—how did the project go for
your overall?

2. A reflection on what you learned regarding each of the four course
learning outcomes. You should note what specifically you have learned that
has prepared you to master these outcomes. (Ex: “I have learned to create my
own graphs and charts in Excel to support my written text. As well, I now
know how to set these off with appropriate amount of white space and to
include a properly-formatted caption. I feel that these skills show that I’m
able to ‘Apply appropriate formatting and visual aids for a specific

purpose

and work-world audience.’”) The course learning outcomes you should
discuss are:

a. Locate, evaluate, and integrate credible research into a

written

document for a specific purpose and work-world audience;

b. Apply appropriate formatting and visual aids for a specific purpose
and work-world audience;

c. Edit for accuracy, brevity, clarity, to write an ethical document with a
specific purpose and work-world audience;

Peterson
ENGL 235
Final Report Assignment

4

d. Contribute successfully to a group in the creation of

work-world

documents.

3. A reflection on how you see these skills (or the class in general) translating to
your future work or study. What will you take with you to use in the future?

4. A brief conclusion.

III. Table of Contents

IV. Informative Abstract/Executive Summary

V. Introduction This will include your answers to the “History” questions on page 2.

A thorough introduction should include (not necessarily in this

order):

A. Description, History, and Background of your process or product

B. Purpose of the Report (clear statement of your research question) and

Intended Audience(s)

C. Method of Inquiry

D. Limitations of this Study (such as time or money)

E. Working Definitions (if needed, here or in an appendix glossary)

VI. Collected Data This will include your answers to the “Explanation” and “Impact”

questions on page 2. Divide and subdivide the report into appropriate, manageable

sections. The Data section should include (in the order you best see fit):

A. First Topic for Investigation
1. Definition
2. Findings
3. Interpretation of findings
B. Second Topic for Investigation
1. First subtopic
a. Definition
b. Findings
c. Interpretation of findings
2. Second subtopic (and so on)

VII. Conclusion A thorough conclusion should include (again, not necessarily in this

order):

A. Summary of Findings
B. Overall Interpretation of Findings
C. Recommendations: Is this process or product likely to grow in future?

Should Initech invest in it?

Peterson
ENGL 235
Final Report Assignment

5

VIII. MLA Works Cited page or APA/IEEE References page The style of citation

you use (MLA, APA, or IEEE) is up to you. MLA is used primarily for humanities

writing, while APA is used with scientific writing. IEEE is used for engineering.

Whichever you choose, be sure to consistently follow the formatting guidelines with

respect to:

1. The general format of the paper (including the running header)
2. The use of in-text reference notes
3. The final Works Cited/

References

page

Please scroll down for a summative checklist and a rubric that describes how your
report will be graded.

Peterson
ENGL 235
Final Report Assignment

6

Final Report Checklist

Requirements:

 At least 4 single-spaced pages in length from Introduction to Recommendation

 At least 5 credible sources

 At least 4 visuals, only two of these can be copied and pasted

Format:

 12 pt. font

 single-spacing within

paragraphs

 double-spacing between sections and headings

 left-justified paragraphs – NO TABS

 a running header

 lower-case Roman numerals (i, ii, iii) for the front matter (except the title page)

 Arabic numerals when you being your Introduction

 bold headings, white space, and varied font sizes/colors

Report Content:

 Each of these 8 parts from the outline (start a new page for each section):

 I. Title page

 II. Letter of Transmittal

 III. Table of Contents

 IV. Informative Abstract

 V. Introduction

 VI. Collected Data

 VII. Conclusion

 VIII. MLA Works Cited page or APA/IEEE References page

Peterson
ENGL 235

Final Report Assignment Rubric

7

Outcome Exceeds Mastery Meets Mastery Near Mastery Well Below Mastery

Locate,

evaluate, and

integrate

credible

research into a

written

document for a

specific
purpose and
work-world
audience.

 thoroughly supports and develops the

topic using relevant, credible, and

richly varied sources

 synthesizes relevant source support

through effective interpretation and

analysis

 consistently uses an

appropriate

balance of analysis, summary,

paraphrase,

and quotation

 considers and convincingly responds

to varying claims

 consistently introduces source

material with varied and effective

signal phrasing

 maintains strict ethical standards and

avoids plagiarism through correct and

precise paraphrasing, use of quotation

marks, in-text citations and an MLA

Works Cited, APA, or IEEE

References page

 sufficiently supports and develops

the topic using fairly relevant,

credible, and varied sources

 provides some synthesis of relevant

source support through

interpretation and analysis

 mostly uses an appropriate balance

of analysis, summary, paraphrase,

and quotation

 might rely somewhat too much on

direct quotation

 considers varying claims and offers

some response

 introduces most

source material

with signal phrasing

 avoids plagiarism through

competent paraphrasing and use of

quotation marks, and mostly correct

in-text citations and an MLA Works

Cited, APA, or IEEE References

page

 provides some support and

development of the topic, but may

not be entirely relevant, credible, or

varied

 provides some interpretation and

analysis of source material, but may

fail to effectively synthesize source

material

 has some balance of analysis,

summary,

paraphrase, and quotation

 may use direct quotation where

paraphrase or summary would be

more appropriate

 does not adequately consider or

respond to varying claims

 largely lacks clear signal phrasing

provides minimal framing of source

material

 includes some weak paraphrasing,

errors in the use of quotation marks,

and/or errors in the in-text citations

or an MLA Works Cited, APA, or

IEEE References page

 provides insufficient support and

development of the topic, perhaps

because of too few relevant, credible,

or varied sources

 does not synthesize source material

into report’s recommendation(s) and

lacks interpretation and analysis of

source material

 does not balance analysis, summary,

paraphrase, and quotation

 might rely on direct quotation to the

exclusion of paraphrase and summary

 lacks consideration of varying claims

 lacks signal phrasing

 lacks framing of source material

 includes weak or inadequate

paraphrasing and/or significant errors

in the use of quotation marks

 includes significant errors in the in-

text citations and/or an MLA Works

Cited, APA, or IEEE References

page, or lacks one or both of these

 might be unintentionally plagiarizing

sources because of the above

weaknesses

Apply

appropriate

formatting and

visual aids for

a specific

purpose and
work-world
audience.

 correctly uses MLA, APA, or IEEE

standards for page

layout

 design choices in page layout enhance

reader understanding

 all visuals are accompanied by MLA,

APA, or IEEE formatted

captions

 all visuals are clearly linked to the

text

 largely uses MLA, APA, or IEEE

standards for page layout correctly

with few mistakes

 some pages may need improved

design (too crowded, ineffective

spacing,

etc.)

 visuals are accompanied by captions,

with few errors in following MLA,

APA, or

IEEE formatting models

 most visuals are clearly linked to the

text

 approaches the use of MLA, APA, or

IEEE standards for page layout

 several pages may need improved

design (too crowded, ineffective
spacing, etc.)
 visuals are accompanied by captions,

but do not follow MLA, APA, or

IEEE formatting models

 visuals may not correspond to the

text

 does not display knowledge of MLA,

APA, or IEEE standards for page

layout

 most pages suffer from lack of design

(too crowded, ineffective spacing,

etc.)

 visuals are not accompanied by

captions

 visuals are absent or do not

correspond to the text

Peterson
ENGL 235
Final Report Assignment Rubric

8

Outcome Exceeds Mastery Meets Mastery Near Mastery Well Below Mastery

Edit for

accuracy,

brevity, clarity,

to write an

ethical

document with

a specific
purpose and
work-world
audience.

 meets the assignment’s purpose

 addresses a professional

audience

 uses varied sentences

 exhibits effective word choice

 all sentences meet factual, active,
clear, concise, and specific

standards

 presents a logical progression of ideas
based on the topic

 maintains focus within all paragraphs

 uses effective title and/or

subheadings

 consistently provides topic sentences
and

transitions within and between

paragraphs

 includes logical paragraph

breaks

 displays no patterns of error

 maintains a consistent point of view
and an appropriate use of

tense

 few to no mistakes with syntax,
grammar, or punctuation

 meets the assignment’s purpose
 addresses a professional audience

 uses varied sentences, but may

occasionally repeat certain structures

and lengths

 exhibits largely effective word choice

though there may some misuse,

ineffective repetition, and/or a

minimal use of slang/cliché

 some sentences do not meet factual,

active, clear, concise, or specific

standards

 presents a largely logical progression

of ideas based on the topic

 maintains focus within most

paragraphs

 uses satisfactory title and/or

subheadings

 mostly provides topic sentences and

has basic transitions within and

between paragraphs

 includes largely logical paragraph

breaks

 may display patterns of error, which

do not significantly interfere with

meaning

 rarely strays from a consistent point

of view and an appropriate use of

tense

 features occasional mistakes with

syntax, grammar, and punctuation,

but not enough to significantly

interfere with meaning

 meets the assignment’s purpose
 addresses a professional audience

 little sentences variety

 frequent misuse, ineffective

repetition, and/or slang/cliché

 several sentences do not meet

factual, active, clear, concise, or

specific standards

 little evidence for a logical

progression of ideas based on the

topic

 maintains focus within just a few

paragraphs

 lack of title and/or subheadings

 few topic sentences or basic

transitions within and between
paragraphs

 few logical paragraph breaks

 displays patterns of error, which

occasionally interfere with meaning

 often strays from a consistent point

of view and/or appropriate use of

tense

 repeated mistakes with syntax,

grammar, and punctuation

 fails to meet the assignment’s

purpose

 fails to address a professional

audience

 no sentences variety

 consistent misuse, ineffective

repetition, and/or slang/cliché

 many sentences do not meet factual,

active, clear, concise, or specific
standards

 no evidence for a logical progression

of ideas based on the topic

 no focus within paragraphs

 missing title and/or subheadings

 no topic sentences or basic

transitions within and between
paragraphs

 no logical paragraph breaks

 displays patterns of error, which

consistently interfere with meaning

 consistently strays from a consistent

point of view and/or appropriate use

of tense

 consistent mistakes with syntax,

grammar, and punctuation

i
IMAGE RECOGNITION

Image recognition

Robert Vasquez

Clark College

ii
IMAGE RECOGNITION

Letter of transmittal

Mr. Tobias Peterson,

In is my report, “Image recognition,” one of the challenges I met while writing this report was
finding suitable articles and research about different systems used in image recognition. Most of
the research I could conduct concerns the current use of face recognition and the future of the
technology that is already in existence. In my case, I think that image recognition is widely used
for security purposes. I had plenty of time to work ahead and start the research for the report on
image recognition.

What I learned in response to each of the learning outcomes:

a) Locate, evaluate and integrate credible research into a written document for a specific
purpose and work-world audience.

 I learned the significance of get-together specific evidence from the text when I am
including it in a report document. For example, when pointing out on my ideas, I need to
include a summary from the original source and cite it to support the ideas.

b) Apply appropriate formatting and visual aids for a specific purpose and work-world
audience.

 I learned how to use reference of visual aids in the writing. I didn’t think that was
necessary in writing because visual aids generally have a description.

c) Edit for accuracy, brevity, clarity, to write and ethical document with a specific purpose
and work-world audience.

 This was the most used learning target because it will help you come off as a better writer
and won’t make your audience guess your intentions. Being clear and concise leads to
less misunderstanding.

d) Contribute successfully to a group in the creation of work-world documents.
 It is significant to communicate with team members to have a document that includes all

its necessary information.

I believe this lesson will be most helpful to me in my future studies and career because it
involves a procedure in individual research and findings. This class has made me become aware
of who I am writing to and their knowledge about my topic. Usually I assume someone is
reading my work because they already know what I am writing about. This is because the
instructions to be followed by in the research were from the instructor. Therefore they had a
strong background in that topic. Each learning outcome had significance regarding the
assignment it corresponded to. Every assignment this quarter included the learning outcome to
edit for brevity and to write an ethical document. I believe this would not be an effective class if
that particular learning outcome wasn’t the primary focus. In the beginning of this quarter I
learned what it meant to be a technical writer, and the said learning outcome is a shortened
version of how to be a writer. Being able to integrate credible research into a written document is
also very helpful in writing the final report. Giving your audience solid facts supported by
credible research and citations makes you look better as a writer. Applying visual aids helps to
ease the wordy text in big technical reports.

All in all, I am glad to have completed this course and gained knowledge about the writing skills.

iii
IMAGE RECOGNITION

Sincerely’

Robert Vasquez

v
IMAGE RECOGNITION

Table of content

Conclusion

Reference……………………………………………………………………..………………….8

Abstract

The level of safety in various business sectors is improved by installation of security methods to
protect the premises or the big data. The main aim for this study is to find out the main purpose
of image recognition, its impact on the environment and the people and how the vision will be in
the future.

Though the image recognition system may have several advantages, there are challenges of the
system as discussed in the report. Data collected on the information concerning the image
recognition is used to provide enough information on the report.

It is recommended that for the perfect security that has being desired by most of the people, the
use of image recognition will help to accomplish the mission. Additionally, as technology

vi
IMAGE RECOGNITION

develops in all the sectors, the security sector will also develop as the image recognition involve
to use of advanced technology.

1
IMAGE RECOGNITION

Image recognition

Introduction

Image recognition, also known as visual artificial intelligence refers to the implementation of
computer software and hardware to perform various mandates and functions that relate to the
identification of various aspects and objects in the environment such as animals and human
beings. The implementation of various computer software and their respective hardware devices
give rise to the image recognition. In this process, the computer software is integrated and
merged in a particular setting that includes the methods and techniques that are helpful in the
analysis and detection of images and other visuals. The particular process of detection and
analysis of the images and visuals are implemented to help in the automation of some specific
tasks and mandates. The Image recognition has been in innovation and processing form the early
1950, where researches and scientists found out that the manipulation of mechanics and
machines can be done in such a way that they mimic the Human brain, where they can identify
and name various objects in the environment. However, the ideas that the scientists had by they
were hard to actuate and make reality because of the high prices of computer at the time. Since
the particular time, advancements and innovations regarding the respective subject were
implemented and led to the improvement and the actuation of the particular ideas.

The evolution and the growth of the implementation of artificial intelligence, particularly in
processes such as image recognition have been realized in the recent past. Various requirement
and demands for better results in different aspects and circumstances led to the demand for better
systems that provided efficient automation processes using the image recognition and other
related aspects. The various implementations and circumstances include the security
departments, where the implementation of AI in image recognition is becoming an effective and
essential requirement is circumstances such as access control. Image recognition is realized as a
development that took several years to achieve the respective result and particular result that is
accorded in the present time.

I this report, the main purpose is to address the respective experiences, implementations and
impacts of artificial intelligence, which is image recognition and other experiences realized form
the implementation and the actuation of image recognition in various circumstances and
environments. In this report, the knowledge and the information is intended to reach various
audiences, including the respective organization and companies that benefit from the
implementation of the implementation of image recognition. The implementation of image
recognition is realized and witnessed in various environments and circumstances such as security
enforcement, were image recognition is used to automate access control and other related
aspects. Besides, image recognition is also witnessed in other circumstances such as the
automation of driverless cars, automation of bridges and the signing of attendance at working
environments and institutions. Such are the audiences addressed by this report. Beside, other
audiences such as students who seek knowledge and information about image recognition and AI
can also benefit from this report. In this report the limitations witnessed includes the insufficient
funds that led to the failure of the required exposure to various companies and organizations that
employ and also implement the formulation and the implementation of image recognition and
other artificial intelligence applications.

2
IMAGE RECOGNITION

Collected data

At this point of image recognition systems and software, the various aspects and characters used
to actuate and implement the functions of the image recognition activity is witnessed. The
implementation and the operation of the image recognition theory and other related forms of
artificial intelligence are witnessed and realized from the perspectives witnessed during the
actuation and the particular implementation of the image recognition procedures. The use of
artificial neural networks and other related technologies are among the processes that avails and
produce the function and the operation of image recognition. Foremost, the neural networks in
image recognition are used to help in the recognition and the analysis of various concepts and
other characteristics found in any particular image (“Image Recognition : A Complete Guide –
Deepomatic”, 2021). To achieve this implementation, training of the neural networks is
implemented using primary data collected from various circumstance and environments. After
the particular data is availed and stored in the system, the annotation and the definition of various
characters and other physical aspects of the image helps to build the image recognition process
and its efficiency in operation.

After the annotation and the entry of the required data into the system, various examples of real
world examples and images are then brought in to help tech the neural networks about the
concepts and other various aspects witnessed in image recognition. When different examples and
samples are used in the process, the neural network learns more about the aspects and the
concepts witnessed in the image recognition process (“Image Recognition : A Complete Guide –
Deepomatic”, 2021). The image recognition software and system now identifies various images
with and components in any image in form of digital representation, which are usually numerical
values that stand for the pixels that build up the image. At this point, the particular system is able
to recognize various images and components of images with the representation in numerical
values. Each value represents different aspects and characters of different images. This makes it
possible of the image recognition system to recognize different images and characters in a given
time. An example of the numerical recognition of an image in the system can be witnessed
bellow

The numerical values in the representation stand for
the different characteristics and aspects in the image.
The different numerical expressions help to distinguish
between various components and aspects of the image.
The representation above changes from image to
image. This implies that every image possesses its
own representation that doesn’t resemble another.
Form such aspects, the image recognition system
becomes suitable in circumstances and points such as
the automation of security systems in areas of access
control.

The image recognition can be implemented and
realized in various systems and software. Among the

3
IMAGE RECOGNITION

various examples is python, where the representation of an image is dine using various steps,
where an image is accorded different dimensions in a decreasing manner, to a point where the
respective representation of the image in the
python software is diminished by half but all
the aspects and characteristics are maintained.
From such an implementation, the particular
image recognition system is able to perform
various tasks and mandates regarding to image
recognition of various characters. In this aspect,
the involvement of deep learning is
implemented (“Image Recognition : A
Complete Guide – Deepomatic”, 2021). This is
where the image recognition system is able to
acquire all the required aspects and components
of the image to be analyzed. The components
include the color scale, size and other important
aspects of every image. This allows for the
accurate representation of the aspects and
components of the respective image. As a
result, accurate and precise recognition of the image is achieved. Below is an example of the
image recognition process and illustration of in python.

Impact

The use of image recognition has brought about several impacts to the environment, mostly the
business sector and to the individuals in general. Organizations are widely using image
recognition for various activities such as to increase their level of security. The future of image
recognition is likely to grow since most of the industries have visions on the services offered by
image recognition. Moreover, there are strategies that will be made to solve the problems of
image recognition to make it more effective in its services.

Findings

There are various findings associated with image recognition. These findings include advantages
and the disadvantages of image recognition;

Advantages

Image recognition contributes in increasing the level of security designed to protect important
information. Image recognition is widely used since it is installed in the private devises of
individuals and it is possible for them to use the security method. Most of the phones are
unlocked with the use of image recognition since this method is more effective as it is rare to
find another person with the same features. Organizations use image recognition to enhance the
security of the business since they deal with big data. Information about the employees in the
place of work is protected by setting image recognition as security measures. This allows only
few members to have access to the organizations data. Below is an example of facial recognition
in an office set up to enhance security.

4
IMAGE RECOGNITION

Image recognition is well
known of its accuracy since
the individuals’ features vary.
Face ID has become more
reliable since the advanced
technology has introduced the
use of 3D facial recognition. It
is not simple for one to trick
the system and hence this
creates the confidence that the
business premises are secure.
Moreover, it is difficult for
thieves or any stranger with bad motives to attack the organization since their images are not in
the recognition system. Image recognition is fully automated as the only have to confirm their
identity from the security system. This creates the advantage of saving time when checking on
the security of the organization. The members of the organization do not have to spend a lot of
time in signing in. Additionally, image recognition has a very high rate of accuracy and this
makes the system more convenient to use. Likely, low cost is incurred in the process of installing
the image recognition system. This makes it affordable by most of the organizations.

Above is a block diagram of face recognition system.

Disadvantages

However, image recognition has various disadvantages to the people since in most cases, the
police department use hidden cameras to track the criminals in a given area hence there are other
people in the same area that carry on their private businesses. This leads to lack of privacy in the
areas since the people cannot carry out their activities in private. Likely, the image recognition

input image

face detec on

face recogni on

data base

5
IMAGE RECOGNITION

systems can analyze millions of images in a given period since the people operation from the
particular area are many. This makes it less effective to the police concerned since it is not easily
possible track a criminal among a large number of people.

Moreover, since image recognition is likely to taking a sample of an individual’s DNA, most of
the people are worried about their privacy since they have a lot of important information that
they have protected through the face recognition. If incase the details on the image recognition of
an individual are hankered, it impossible to reset since they are permanent. Other security
methods such as passwords when hacked are easy to reset hence people prefer the use of
passwords (“5 Pros and Cons of Face Recognition Technology”, 2021). Moreover, some groups
of people claim that face recognition not reliable since it may portray low illumination when
used hence less effective. Likely, in a state where security cameras have been set to keep close
watch on the property in the particular area, the videos captured in the stipulated period are not
clear to identify the people in the clips.

It is proved that at times, image recognition in form of a video can display the false positivity.
This happens when people are shown on the cameras and yet in actual status there was no one in
the area. This creates a challenge to an organization that is in the process of maintaining a high
security for its premises. Slight changes in the position of the cameras used for security lead to
capturing the wrong angle and may give an advantage to the thieves to steal from the premises
without being notified. With the increased cases of data breaches, image recognition is at risk
since the data on recognition is stored in cloud and incase of hacking, the recognition
information gets to unauthorized hands.

Interpretation of findings

Regardless of the benefits to image recognition, the challenges of using the system make it less
effective to be used by all the people. Due to the big data in most of the organizations, security
methods are used to protect the premises. The effective method is when the members of the
particular organization give there recognition information to the security system. This helps to
control the people who should enter the building of the organization. Maintaining strategies to
protect the cloud system of the organization helps to protect the recognition information which is
stored in the cloud. This is because there is not possible way to reset the facial recognitions of
the individuals.

A. Future of image recognition

Due to the advanced technology, more devices are being invented that require the use of image
recognition to operate. A good example is the driverless vehicles that can sense the presence of a
person in front of it (“Image Recognition Applications: 7 Essential Future Uses – Data Science
Society”, 2021). This image recognition installed in the driverless vehicle help to reduce the
accidents that happen as a result of a person or people crossing the road. Moreover, image
recognition will be of great importance in future enrolling and admitting students in the specific
schools. Instead of the long process where the school staff have to admit each student at a time
taking their details, the process will be easier when the schools use the image recognition system.
Moreover, the students with learning disabilities are able to rely on the applications that provide
computer vision to read a given content.

6
IMAGE RECOGNITION

The future of image recognition will lead to extensive use of the system in optimizing medical
imagery hence making it more effective in the healthcare centers. Image recognition will be used
in a situation of scanning the patients to identify the presences of a given infection in their body.
The detection of severe diseases including cancer can be identified at their early stage hence
creating a chance for the patient to get their treatment. Moreover, as time goes by, the challenges
that are associated with image recognition will be solved to make it more effective. This gives
most of the industries visions to increase their level of security in future.

Interpretation of findings

Image recognition as identified as one of the best security methods in all the sectors. It is relied
on to make more positive impacts in future by improving the state of living of people in various
ways. There are possibilities that the challenges associated with image recognition will be solved
to increase its effectiveness (“What Will We Use Image Recognition for in the Future?”, 2021).
Companies are likely to depend on image recognition for more purposes apart from security
measures. Its application is sectors such as disease identification in healthcare will lead to saving
many lives that had diseases which were easy to detect. Driverless vehicles will become more
effective due to the developed sensors to increase the safety of the passages.

7
IMAGE RECOGNITION

1. Conclusion

In conclusion, image recognition can be used for various purposes including increasing security
of a premises. This helps to specify the people who have the rightful access to the organization
hence avoiding any issue of theft in the premises. Security cameras are placed in specific areas to
increase the security of the area by getting the identification of the people who might have
intruded in the place. Moreover, the self-driving vehicles are effective due to their ability to
sense hence increasing the safety of the passengers. Despite to challenges of image recognition,
organizations and industries have visions to improve their security through image recognition in
future. It is recommendable that image recognition will grow in future due to its wide usage in
the business sector to provide security and other services.

8
IMAGE RECOGNITION

Reference

What is Image Recognition their functions, algorithm and its uses. (2021). Retrieved 27 February
2021, from https://www.mygreatlearning.com/blog/image-recognition/

Image Recognition : A Complete Guide – Deepomatic. (2021). Retrieved 27 February 2021, from
https://deepomatic.com/en/what-is-image-recognition

What Is Image Recognition?. (2021). Retrieved 27 February 2021, from
https://towardsdatascience.com/module-6-image-recognition-for-insurance-claim-handling-
part-i-a338d16c9de0

What is image recognition? – Definition from WhatIs.com. (2021). Retrieved 27 February 2021,
from https://searchenterpriseai.techtarget.com/definition/image-recognition

What Will We Use Image Recognition for in the Future?. LogoGrab Blog. (2021). Retrieved 27
February 2021, from https://blog.logograb.com/future-uses-image-recognition/.

Image Recognition Applications: 7 Essential Future Uses – Data Science Society. Data Science
Society. (2021). Retrieved 27 February 2021, from
https://www.datasciencesociety.net/image-recognition-applications-7-essential-future-
uses/.

5 Pros and Cons of Face Recognition Technology. Techfunnel. (2021). Retrieved 27 February
2021, from https://www.techfunnel.com/information-technology/5-pros-and-cons-of-
face-recognition-technology/.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy