SlideShare a Scribd company logo
1 of 10
Download to read offline
Pattern Recognition and its
Applications
B.Sahithi Nanda
Sajida Mohammad
• What and Why Pattern Recognition ?
• How Pattern Recognition ?
• Where Pattern Recognition ?
• Iris Recognition
• Iris ID- Iris Scan
• How it works ?
Contents
What and Why Pattern Recognition
• Branch of machine learning that focuses
on recognition of patterns and regularities
in data
• Scientific discipline dealing with methods
for object description and classification
• Broad scope of applications
How Pattern Recognition
Where Pattern Recognition ?
• Applications of pattern recognition
systems and techniques are numerous
and cover a broad scope of activities.
• Examples are
– Agriculture : Crop Analysis, Soil Evaluation
– Astronomy : Analysis of telescopic images
– Biology : Genetic studies
– Engineering : Speech Recongition
Iris Recognition
• Automated method of biometric identification
that uses mathematical pattern-recognition
techniques
• measure the unique patterns in the colored circle
around your pupil to identify and authenticate
• Applications : physical access control in private
enterprise and government,transportation,
healthcare, and national identification programs
• Examples of Iris Scanning – IriScan, Project Iris.
Iris ID
• most accurate of the commonly used
biometric technologies
• Iris recognition's accuracy is the data-
richness of the iris itself.
• Uses high resolution digital camera at
visible or IR wavelengths and then uses
specialised computer program called
matching engine to compare iris's
patterns
How Iris recognition?
Thank You
Thank You

More Related Content

What's hot

Introduction to pattern recognization
Introduction to pattern recognizationIntroduction to pattern recognization
Introduction to pattern recognizationAjharul Abedeen
 
12 pattern recognition
12 pattern recognition12 pattern recognition
12 pattern recognitionTalal Khaliq
 
What is pattern recognition (lecture 4 of 6)
What is pattern recognition (lecture 4 of 6)What is pattern recognition (lecture 4 of 6)
What is pattern recognition (lecture 4 of 6)Randa Elanwar
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern RecognitionMaaz Hasan
 
Use of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionUse of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionkamalsrit
 
11.development of a feature extraction technique for online character recogni...
11.development of a feature extraction technique for online character recogni...11.development of a feature extraction technique for online character recogni...
11.development of a feature extraction technique for online character recogni...Alexander Decker
 
Development of a feature extraction technique for online character recognitio...
Development of a feature extraction technique for online character recognitio...Development of a feature extraction technique for online character recognitio...
Development of a feature extraction technique for online character recognitio...Alexander Decker
 
NLP, Expert system and pattern recognition
NLP, Expert system and pattern recognitionNLP, Expert system and pattern recognition
NLP, Expert system and pattern recognitionMohammad Ilyas Malik
 
Qualitative Analysis in Atlas.ti
Qualitative Analysis in Atlas.tiQualitative Analysis in Atlas.ti
Qualitative Analysis in Atlas.tiCelia Emmelhainz
 
Örüntü tanıma - Pattern Recognition
Örüntü tanıma - Pattern RecognitionÖrüntü tanıma - Pattern Recognition
Örüntü tanıma - Pattern RecognitionHassan-k Abdi
 

What's hot (14)

Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Introduction to pattern recognization
Introduction to pattern recognizationIntroduction to pattern recognization
Introduction to pattern recognization
 
12 pattern recognition
12 pattern recognition12 pattern recognition
12 pattern recognition
 
What is pattern recognition (lecture 4 of 6)
What is pattern recognition (lecture 4 of 6)What is pattern recognition (lecture 4 of 6)
What is pattern recognition (lecture 4 of 6)
 
Text Mining
Text MiningText Mining
Text Mining
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Use of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionUse of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognition
 
11.development of a feature extraction technique for online character recogni...
11.development of a feature extraction technique for online character recogni...11.development of a feature extraction technique for online character recogni...
11.development of a feature extraction technique for online character recogni...
 
Development of a feature extraction technique for online character recognitio...
Development of a feature extraction technique for online character recognitio...Development of a feature extraction technique for online character recognitio...
Development of a feature extraction technique for online character recognitio...
 
NLP, Expert system and pattern recognition
NLP, Expert system and pattern recognitionNLP, Expert system and pattern recognition
NLP, Expert system and pattern recognition
 
Qualitative Analysis in Atlas.ti
Qualitative Analysis in Atlas.tiQualitative Analysis in Atlas.ti
Qualitative Analysis in Atlas.ti
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 
Örüntü tanıma - Pattern Recognition
Örüntü tanıma - Pattern RecognitionÖrüntü tanıma - Pattern Recognition
Örüntü tanıma - Pattern Recognition
 

Viewers also liked

Pattern Recognition: digital identity, digital #curation and digital badges (...
Pattern Recognition: digital identity, digital #curation and digital badges (...Pattern Recognition: digital identity, digital #curation and digital badges (...
Pattern Recognition: digital identity, digital #curation and digital badges (...Joyce Seitzinger
 
Visual pattern recognition
Visual pattern recognitionVisual pattern recognition
Visual pattern recognitionRushin Shah
 
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3STM Journals
 

Viewers also liked (7)

Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Pattern Recognition: digital identity, digital #curation and digital badges (...
Pattern Recognition: digital identity, digital #curation and digital badges (...Pattern Recognition: digital identity, digital #curation and digital badges (...
Pattern Recognition: digital identity, digital #curation and digital badges (...
 
Visual pattern recognition
Visual pattern recognitionVisual pattern recognition
Visual pattern recognition
 
CSC446: Pattern Recognition (LN3)
CSC446: Pattern Recognition (LN3)CSC446: Pattern Recognition (LN3)
CSC446: Pattern Recognition (LN3)
 
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 

Similar to Pattern Recognition and its Application

Similar to Pattern Recognition and its Application (20)

Biometrics -Mayank.pptx
Biometrics -Mayank.pptxBiometrics -Mayank.pptx
Biometrics -Mayank.pptx
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
ACET.pptx
ACET.pptxACET.pptx
ACET.pptx
 
Chap 4, market research, demand & information
Chap 4, market research, demand & informationChap 4, market research, demand & information
Chap 4, market research, demand & information
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AI
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
CYBER FORENSIC PPT
CYBER FORENSIC PPTCYBER FORENSIC PPT
CYBER FORENSIC PPT
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
ICS1020CV_2022.pdf
ICS1020CV_2022.pdfICS1020CV_2022.pdf
ICS1020CV_2022.pdf
 
Biometric Course Overview - Purdue ICBR
Biometric Course Overview - Purdue ICBRBiometric Course Overview - Purdue ICBR
Biometric Course Overview - Purdue ICBR
 
RFID Chip
RFID ChipRFID Chip
RFID Chip
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Data
DataData
Data
 
7-1 ARTIFICIAL INTELLIGENCE IN PATHOLOGY semiar 2.pptx
7-1 ARTIFICIAL INTELLIGENCE IN PATHOLOGY  semiar 2.pptx7-1 ARTIFICIAL INTELLIGENCE IN PATHOLOGY  semiar 2.pptx
7-1 ARTIFICIAL INTELLIGENCE IN PATHOLOGY semiar 2.pptx
 

Recently uploaded

20200723_insight_release_plan
20200723_insight_release_plan20200723_insight_release_plan
20200723_insight_release_planJamie (Taka) Wang
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Recently uploaded (20)

20200723_insight_release_plan
20200723_insight_release_plan20200723_insight_release_plan
20200723_insight_release_plan
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Pattern Recognition and its Application

  • 1. Pattern Recognition and its Applications B.Sahithi Nanda Sajida Mohammad
  • 2. • What and Why Pattern Recognition ? • How Pattern Recognition ? • Where Pattern Recognition ? • Iris Recognition • Iris ID- Iris Scan • How it works ? Contents
  • 3. What and Why Pattern Recognition • Branch of machine learning that focuses on recognition of patterns and regularities in data • Scientific discipline dealing with methods for object description and classification • Broad scope of applications
  • 5. Where Pattern Recognition ? • Applications of pattern recognition systems and techniques are numerous and cover a broad scope of activities. • Examples are – Agriculture : Crop Analysis, Soil Evaluation – Astronomy : Analysis of telescopic images – Biology : Genetic studies – Engineering : Speech Recongition
  • 6. Iris Recognition • Automated method of biometric identification that uses mathematical pattern-recognition techniques • measure the unique patterns in the colored circle around your pupil to identify and authenticate • Applications : physical access control in private enterprise and government,transportation, healthcare, and national identification programs • Examples of Iris Scanning – IriScan, Project Iris.
  • 7. Iris ID • most accurate of the commonly used biometric technologies • Iris recognition's accuracy is the data- richness of the iris itself. • Uses high resolution digital camera at visible or IR wavelengths and then uses specialised computer program called matching engine to compare iris's patterns