SlideShare a Scribd company logo
1 of 12
Computer Vesion
Presentation On
Computer Vision
by
Adil Mehmood
adillm717@gmail.com
What is computer vesion
Definition:
The goal of computer vesion is to make useful decisions about real physical objects
and scenes based on sensed images.Or
Computer vision is a subfield of artificial intelligence where information is obtained
through the characteristics of images captured by industrial cameras. Below, there are
some of the techniques and applications performed at ITMA.
mateial techlngy,tecnlogy center in austria
 Computer vision (image understanding) is a discipline that studies
how to reconstruct, interpret and understand a 3D scene from its 2D
images in terms of the properties of the structures present in the scene.
 The ultimate goal of computer vision is to model and replicate human
vision
 using computer software and hardware at diferent levels.
 It combines knowledge in computer science,electrical engineering,
mathematics, physiology, biology, and cognitive science.
 It needs knowledge from all these fields in order to understand and
simulate the operation of the human vision system.
 that focuses on extracting useful information from images and videos.
Examples of "useful information" include detecting the presence and
identify of human faces in a photograph, recovering the 3D geometry of
the objects in a photograph, and tracking and recognizing different
types of motion in a video sequence.
 Computer vision algorithms have found a wide range of applications
from 3D laser scanning systems used in manufacturing, city planning,
entertainment, forensics, etc
Computer vision overlaps significantly with the following fields:
Image processing.
 Image processing focuses on image manipulation to enhance image
 quality,
 to restore an image or to compress/decompress an image.
 Most computer vision algorithms usually assumes a significant
 amount of image processing has taken place to improve image
 quality.
pattern recognition,
 Pattern recognition studies various techniques such as
 statistical techniques,
 neural network,
 support vector machine, etc
 to recognize/classify di erent patterns. Pattern recognition techniquesff
 are widely used in computer vision.
photogrammetry.
 Photogrammetry is concerned with obtaining accurate and reliable
 measurements from images.
 It focuses on accurate mensuration.
 Camera calibration and 3D reconstruction are two areas of interest to
 both.
Relation of Computer Vision
Computer Vision Hierarchy
• Low-level vision: process image for feature extraction (edge,
corner, or optical flow).
• Middle-level vision: object recognition, motion analysis, and 3D
• reconstruction using features obtained from the low-level vision.
• High-level vision: interpretation of the evolving information
• provided by the middle level vision as well as directing what
• middle and low level vision tasks should be performed.
• Interpretation may include conceptual description of a scene
• like activity, intention and behavior.
• we focus mainly on middle level and some low level.
Computer Vision
Make computers understand images and
videos.
What kind of scene?
Where are the cars?
How far is the
building?
…
Components of a computer vision system
Lighting
Scene
Camera
Computer
Scene Interpretation
Srinivasa Narasimhan’s slide
How the Afghan Girl was Identified by Her Iris Patterns
Sign of War and poverty
Sharbat Gula was the girl who had been photographed 17 years
earlier in 1985, the EXPLORER team obtained verification through
iris-scanning technology and face-recognition techniques used by
the U.S. Federal Bureau of Investigation.she again recognized by
iris patttern in 2002 after long search
she caught agian in pakistan some days before during NIC verifaction3/21/2015
Example Applications
• Robotics
• Medicine
• Security
• Transportation
• Industrial automation
• Image/video databases
• Human Computer Interface
• Localization-determine robot location automatically (e.g.
• Vision-based GPS)
• Obstacles avoidance
• Navigation and visual servoing
• Assembly (peg-in-hole, welding, painting)
• Manipulation (e.g. PUMA robot manipulator)
• Human Robot Interaction (HRI): Intelligent robotics to
• interact with and serve people
• Biometrics (iris, finger print, face recognition)
• Surveillance-detecting certain suspicious activities or behaviors
References
• http://www.cns.nyu.edu/eero/vision-links.html
• http://www.cs.berkeley.edu/daf/book.html
• http://www.visionbib.com
• http://www.cs.virginia.edu/~gfx/Courses/2011/C
omputerVision/

More Related Content

What's hot

Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)AshTheMidBenchers
 
AI Computer vision
AI Computer visionAI Computer vision
AI Computer visionKashafnaz2
 
An Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceAn Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceWasif Altaf
 
What is computer vision?
What is computer vision?What is computer vision?
What is computer vision?Qentinel
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingSamir Sabry
 
Image Processing and Computer Vision
Image Processing and Computer VisionImage Processing and Computer Vision
Image Processing and Computer VisionSilicon Mentor
 
camera-based Lane detection by deep learning
camera-based Lane detection by deep learningcamera-based Lane detection by deep learning
camera-based Lane detection by deep learningYu Huang
 
Introduction to Computer Vision.pdf
Introduction to Computer Vision.pdfIntroduction to Computer Vision.pdf
Introduction to Computer Vision.pdfKnoldus Inc.
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer VisionSungjoon Choi
 
Computer vision - Applications and Trends
Computer vision - Applications and TrendsComputer vision - Applications and Trends
Computer vision - Applications and TrendsKshitij Agrawal
 
Image Segmentation Using Deep Learning : A survey
Image Segmentation Using Deep Learning : A surveyImage Segmentation Using Deep Learning : A survey
Image Segmentation Using Deep Learning : A surveyNUPUR YADAV
 
Computer Vision for Traffic Sign Recognition
Computer Vision for Traffic Sign RecognitionComputer Vision for Traffic Sign Recognition
Computer Vision for Traffic Sign Recognitionthevijayps
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 

What's hot (20)

Computer vision
Computer visionComputer vision
Computer vision
 
Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)
 
Introduction to OpenCV
Introduction to OpenCVIntroduction to OpenCV
Introduction to OpenCV
 
AI Computer vision
AI Computer visionAI Computer vision
AI Computer vision
 
An Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceAn Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial Intelligence
 
What is computer vision?
What is computer vision?What is computer vision?
What is computer vision?
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Image Processing and Computer Vision
Image Processing and Computer VisionImage Processing and Computer Vision
Image Processing and Computer Vision
 
face detection
face detectionface detection
face detection
 
camera-based Lane detection by deep learning
camera-based Lane detection by deep learningcamera-based Lane detection by deep learning
camera-based Lane detection by deep learning
 
Computer vision
Computer visionComputer vision
Computer vision
 
Introduction to Computer Vision.pdf
Introduction to Computer Vision.pdfIntroduction to Computer Vision.pdf
Introduction to Computer Vision.pdf
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer Vision
 
Digital image processing
Digital image processingDigital image processing
Digital image processing
 
Computer vision - Applications and Trends
Computer vision - Applications and TrendsComputer vision - Applications and Trends
Computer vision - Applications and Trends
 
Computer vision
Computer visionComputer vision
Computer vision
 
Image Segmentation Using Deep Learning : A survey
Image Segmentation Using Deep Learning : A surveyImage Segmentation Using Deep Learning : A survey
Image Segmentation Using Deep Learning : A survey
 
Computer Vision for Traffic Sign Recognition
Computer Vision for Traffic Sign RecognitionComputer Vision for Traffic Sign Recognition
Computer Vision for Traffic Sign Recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 

Viewers also liked

Diseases caused by Computer
Diseases caused by ComputerDiseases caused by Computer
Diseases caused by ComputerAdil Mehmoood
 
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro..."Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...Edge AI and Vision Alliance
 
"Computer Vision and Artificial Intelligence: Market Trends and Implications,...
"Computer Vision and Artificial Intelligence: Market Trends and Implications,..."Computer Vision and Artificial Intelligence: Market Trends and Implications,...
"Computer Vision and Artificial Intelligence: Market Trends and Implications,...Edge AI and Vision Alliance
 
COM2304: Introduction to Computer Vision & Image Processing
COM2304: Introduction to Computer Vision & Image Processing COM2304: Introduction to Computer Vision & Image Processing
COM2304: Introduction to Computer Vision & Image Processing Hemantha Kulathilake
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceMegha Jain
 
Introducing virtual reality
Introducing  virtual  realityIntroducing  virtual  reality
Introducing virtual realitySagar Suvarnakar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Virtual reality Presentation
Virtual reality PresentationVirtual reality Presentation
Virtual reality PresentationAnand Akshay
 
Big Data
Big DataBig Data
Big DataNGDATA
 
Virtual Reality-Seminar presentation
Virtual Reality-Seminar  presentationVirtual Reality-Seminar  presentation
Virtual Reality-Seminar presentationShreyansh Vijay Singh
 

Viewers also liked (20)

Diseases caused by Computer
Diseases caused by ComputerDiseases caused by Computer
Diseases caused by Computer
 
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro..."Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
 
"Computer Vision and Artificial Intelligence: Market Trends and Implications,...
"Computer Vision and Artificial Intelligence: Market Trends and Implications,..."Computer Vision and Artificial Intelligence: Market Trends and Implications,...
"Computer Vision and Artificial Intelligence: Market Trends and Implications,...
 
Face Detection
Face DetectionFace Detection
Face Detection
 
COM2304: Introduction to Computer Vision & Image Processing
COM2304: Introduction to Computer Vision & Image Processing COM2304: Introduction to Computer Vision & Image Processing
COM2304: Introduction to Computer Vision & Image Processing
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading Track
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Augmented Reality
Augmented RealityAugmented Reality
Augmented Reality
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Introducing virtual reality
Introducing  virtual  realityIntroducing  virtual  reality
Introducing virtual reality
 
Drone technology
Drone technologyDrone technology
Drone technology
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Drones: Present & Future
Drones: Present & FutureDrones: Present & Future
Drones: Present & Future
 
Virtual reality Presentation
Virtual reality PresentationVirtual reality Presentation
Virtual reality Presentation
 
Augmented Reality ppt
Augmented Reality pptAugmented Reality ppt
Augmented Reality ppt
 
Drones
DronesDrones
Drones
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Big Data
Big DataBig Data
Big Data
 
Virtual Reality-Seminar presentation
Virtual Reality-Seminar  presentationVirtual Reality-Seminar  presentation
Virtual Reality-Seminar presentation
 

Similar to Computer vesion

Introduction-to-Computer-Vision PPPP.pptx
Introduction-to-Computer-Vision PPPP.pptxIntroduction-to-Computer-Vision PPPP.pptx
Introduction-to-Computer-Vision PPPP.pptxShivaniPaswan6
 
What is Computer Vision and How Does it Work.pdf
What is Computer Vision and How Does it Work.pdfWhat is Computer Vision and How Does it Work.pdf
What is Computer Vision and How Does it Work.pdfSoftmaxAi
 
Project ppt 2.pptx
Project ppt 2.pptxProject ppt 2.pptx
Project ppt 2.pptxAKASHCSE1137
 
Saksham seminar report
Saksham seminar reportSaksham seminar report
Saksham seminar reportSakshamTurki
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxAROCKIAJAYAIECW
 
Lecture No. 1 introduction.pptx
Lecture No. 1 introduction.pptxLecture No. 1 introduction.pptx
Lecture No. 1 introduction.pptxAlifahadHussain
 
Computer vision basics
Computer vision basicsComputer vision basics
Computer vision basicsShilpa Sharma
 
Computer vision and robotics
Computer vision and roboticsComputer vision and robotics
Computer vision and roboticsBiniam Asnake
 
Class PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxClass PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxDivyaKumari588020
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
 
image processing
image processingimage processing
image processingDhriya
 
Saksham presentation
Saksham presentationSaksham presentation
Saksham presentationSakshamTurki
 
A study on the importance of image processing and its apllications
A study on the importance of image processing and its apllicationsA study on the importance of image processing and its apllications
A study on the importance of image processing and its apllicationseSAT Publishing House
 
Computer Vision for Object Detection and Tracking.pdf
Computer Vision for Object Detection and Tracking.pdfComputer Vision for Object Detection and Tracking.pdf
Computer Vision for Object Detection and Tracking.pdfNexgits Private Limited
 
IRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually ImpairedIRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually ImpairedIRJET Journal
 
AI GRPOUP 4 PRESENTATION.pptx
AI GRPOUP 4 PRESENTATION.pptxAI GRPOUP 4 PRESENTATION.pptx
AI GRPOUP 4 PRESENTATION.pptxBaakoMohammed
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Robot Machine Vision
Robot Machine VisionRobot Machine Vision
Robot Machine Visionanand hd
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in roboticsIAEME Publication
 

Similar to Computer vesion (20)

Introduction-to-Computer-Vision PPPP.pptx
Introduction-to-Computer-Vision PPPP.pptxIntroduction-to-Computer-Vision PPPP.pptx
Introduction-to-Computer-Vision PPPP.pptx
 
What is Computer Vision and How Does it Work.pdf
What is Computer Vision and How Does it Work.pdfWhat is Computer Vision and How Does it Work.pdf
What is Computer Vision and How Does it Work.pdf
 
Project ppt 2.pptx
Project ppt 2.pptxProject ppt 2.pptx
Project ppt 2.pptx
 
Saksham seminar report
Saksham seminar reportSaksham seminar report
Saksham seminar report
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
 
Lecture No. 1 introduction.pptx
Lecture No. 1 introduction.pptxLecture No. 1 introduction.pptx
Lecture No. 1 introduction.pptx
 
Computer vision basics
Computer vision basicsComputer vision basics
Computer vision basics
 
Computer vision and robotics
Computer vision and roboticsComputer vision and robotics
Computer vision and robotics
 
Class PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxClass PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptx
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
image processing
image processingimage processing
image processing
 
Saksham presentation
Saksham presentationSaksham presentation
Saksham presentation
 
A study on the importance of image processing and its apllications
A study on the importance of image processing and its apllicationsA study on the importance of image processing and its apllications
A study on the importance of image processing and its apllications
 
Computer Vision for Object Detection and Tracking.pdf
Computer Vision for Object Detection and Tracking.pdfComputer Vision for Object Detection and Tracking.pdf
Computer Vision for Object Detection and Tracking.pdf
 
IRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually ImpairedIRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually Impaired
 
ICS1020 CV
ICS1020 CVICS1020 CV
ICS1020 CV
 
AI GRPOUP 4 PRESENTATION.pptx
AI GRPOUP 4 PRESENTATION.pptxAI GRPOUP 4 PRESENTATION.pptx
AI GRPOUP 4 PRESENTATION.pptx
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Robot Machine Vision
Robot Machine VisionRobot Machine Vision
Robot Machine Vision
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in robotics
 

More from Adil Mehmoood

Docker + Node "hello world" Application
Docker + Node "hello world" ApplicationDocker + Node "hello world" Application
Docker + Node "hello world" ApplicationAdil Mehmoood
 
Java database connectivity with MYSQL
Java database connectivity with MYSQLJava database connectivity with MYSQL
Java database connectivity with MYSQLAdil Mehmoood
 
What is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeWhat is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeAdil Mehmoood
 
Inner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in javaInner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in javaAdil Mehmoood
 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in javaAdil Mehmoood
 
Project Engineer and Deputy project manger
Project Engineer and Deputy project manger Project Engineer and Deputy project manger
Project Engineer and Deputy project manger Adil Mehmoood
 
Swing and AWT in java
Swing and AWT in javaSwing and AWT in java
Swing and AWT in javaAdil Mehmoood
 
Software Engineering 2 lecture slide
Software Engineering 2 lecture slideSoftware Engineering 2 lecture slide
Software Engineering 2 lecture slideAdil Mehmoood
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error controlAdil Mehmoood
 
Proposal defence format
Proposal defence formatProposal defence format
Proposal defence formatAdil Mehmoood
 
Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...Adil Mehmoood
 
System quality attributes
System quality attributes System quality attributes
System quality attributes Adil Mehmoood
 
Graph Clustering and cluster
Graph Clustering and clusterGraph Clustering and cluster
Graph Clustering and clusterAdil Mehmoood
 
diseases caused by computer
diseases caused by computerdiseases caused by computer
diseases caused by computerAdil Mehmoood
 
What is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resumeWhat is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resumeAdil Mehmoood
 
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Adil Mehmoood
 

More from Adil Mehmoood (18)

Docker + Node "hello world" Application
Docker + Node "hello world" ApplicationDocker + Node "hello world" Application
Docker + Node "hello world" Application
 
Java database connectivity with MYSQL
Java database connectivity with MYSQLJava database connectivity with MYSQL
Java database connectivity with MYSQL
 
What is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeWhat is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its type
 
Inner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in javaInner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in java
 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in java
 
Project Engineer and Deputy project manger
Project Engineer and Deputy project manger Project Engineer and Deputy project manger
Project Engineer and Deputy project manger
 
Swing and AWT in java
Swing and AWT in javaSwing and AWT in java
Swing and AWT in java
 
Software Engineering 2 lecture slide
Software Engineering 2 lecture slideSoftware Engineering 2 lecture slide
Software Engineering 2 lecture slide
 
Expert system
Expert systemExpert system
Expert system
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error control
 
Proposal defence format
Proposal defence formatProposal defence format
Proposal defence format
 
Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...
 
System quality attributes
System quality attributes System quality attributes
System quality attributes
 
Graph Clustering and cluster
Graph Clustering and clusterGraph Clustering and cluster
Graph Clustering and cluster
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
diseases caused by computer
diseases caused by computerdiseases caused by computer
diseases caused by computer
 
What is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resumeWhat is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resume
 
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Computer vesion

  • 2. Presentation On Computer Vision by Adil Mehmood adillm717@gmail.com
  • 3. What is computer vesion Definition: The goal of computer vesion is to make useful decisions about real physical objects and scenes based on sensed images.Or Computer vision is a subfield of artificial intelligence where information is obtained through the characteristics of images captured by industrial cameras. Below, there are some of the techniques and applications performed at ITMA. mateial techlngy,tecnlogy center in austria
  • 4.  Computer vision (image understanding) is a discipline that studies how to reconstruct, interpret and understand a 3D scene from its 2D images in terms of the properties of the structures present in the scene.  The ultimate goal of computer vision is to model and replicate human vision  using computer software and hardware at diferent levels.  It combines knowledge in computer science,electrical engineering, mathematics, physiology, biology, and cognitive science.  It needs knowledge from all these fields in order to understand and simulate the operation of the human vision system.  that focuses on extracting useful information from images and videos. Examples of "useful information" include detecting the presence and identify of human faces in a photograph, recovering the 3D geometry of the objects in a photograph, and tracking and recognizing different types of motion in a video sequence.  Computer vision algorithms have found a wide range of applications from 3D laser scanning systems used in manufacturing, city planning, entertainment, forensics, etc
  • 5. Computer vision overlaps significantly with the following fields: Image processing.  Image processing focuses on image manipulation to enhance image  quality,  to restore an image or to compress/decompress an image.  Most computer vision algorithms usually assumes a significant  amount of image processing has taken place to improve image  quality. pattern recognition,  Pattern recognition studies various techniques such as  statistical techniques,  neural network,  support vector machine, etc  to recognize/classify di erent patterns. Pattern recognition techniquesff  are widely used in computer vision. photogrammetry.  Photogrammetry is concerned with obtaining accurate and reliable  measurements from images.  It focuses on accurate mensuration.  Camera calibration and 3D reconstruction are two areas of interest to  both.
  • 7. Computer Vision Hierarchy • Low-level vision: process image for feature extraction (edge, corner, or optical flow). • Middle-level vision: object recognition, motion analysis, and 3D • reconstruction using features obtained from the low-level vision. • High-level vision: interpretation of the evolving information • provided by the middle level vision as well as directing what • middle and low level vision tasks should be performed. • Interpretation may include conceptual description of a scene • like activity, intention and behavior. • we focus mainly on middle level and some low level.
  • 8. Computer Vision Make computers understand images and videos. What kind of scene? Where are the cars? How far is the building? …
  • 9. Components of a computer vision system Lighting Scene Camera Computer Scene Interpretation Srinivasa Narasimhan’s slide
  • 10. How the Afghan Girl was Identified by Her Iris Patterns Sign of War and poverty Sharbat Gula was the girl who had been photographed 17 years earlier in 1985, the EXPLORER team obtained verification through iris-scanning technology and face-recognition techniques used by the U.S. Federal Bureau of Investigation.she again recognized by iris patttern in 2002 after long search she caught agian in pakistan some days before during NIC verifaction3/21/2015
  • 11. Example Applications • Robotics • Medicine • Security • Transportation • Industrial automation • Image/video databases • Human Computer Interface • Localization-determine robot location automatically (e.g. • Vision-based GPS) • Obstacles avoidance • Navigation and visual servoing • Assembly (peg-in-hole, welding, painting) • Manipulation (e.g. PUMA robot manipulator) • Human Robot Interaction (HRI): Intelligent robotics to • interact with and serve people • Biometrics (iris, finger print, face recognition) • Surveillance-detecting certain suspicious activities or behaviors
  • 12. References • http://www.cns.nyu.edu/eero/vision-links.html • http://www.cs.berkeley.edu/daf/book.html • http://www.visionbib.com • http://www.cs.virginia.edu/~gfx/Courses/2011/C omputerVision/