SlideShare a Scribd company logo
1 of 5
Computer vision
 What do you think about computer
vision?
History of
Computer Vision
 History The origins of computer vision go back to an MIT
undergraduate summer project in
 Early experiments in computer vision took place in the 1950s,
using some of the first neural networks to detect the edges of
an object and to sort simple objects into categories like
circles and squares
 Computer vision tasks include methods for acquiring,
processing, analyzing and understanding digital images, and
extraction of high-dimensional data from the real world in
order to produce numerical or symbolic information, e.g., in
the forms of decisions
 Computer vision is building algorithms that can understand
the content of images and use it for other applications
How computer
vision works
 There are many types of computer vision that are used in
different ways: ➢ Image segmentation partitions an image into
multiple regions or pieces to be examined separately
 Advanced object detection recognizes many objects in a single
image: a football field, an offensive player, a defensive player, a
ball and so on
 ➢ Feature matching is a type of pattern detection that matches
similarities in images to help classify them Simple applications
of computer vision may only use one of these techniques, but
more advanced users, like computer vision for self-driving cars,
rely on multiple techniques to accomplish their goal
Applications of
computer vision
 Computer vision is being used today in a wide variety of real-world
applications, which include: ➢ Optical character recognition : reading
handwritten postal codes on letters and automatic number plate
recognition ; ➢ Machine inspection: rapid parts inspection for quality
assurance using stereo vision with specialized illumination to measure
tolerances on aircraft wings or auto body parts or looking for defects in
steel castings using X-ray vision; ➢ Retail: object recognition for
automated checkout lanes ➢ Medical imaging: registering pre-operative
and intra-operative imagery or performing long-term studies of people’s
brain morphology as they age; ➢ Automotive safety: detecting
unexpected obstacles such as pedestrians on the street, under
conditions where active vision techniques such as radar or lidar do not
work well ➢ Fingerprint recognition and biometrics: for automatic access
authentication as well as forensic applications

More Related Content

Similar to Computer vision.pptx

Project ppt 2.pptx
Project ppt 2.pptxProject ppt 2.pptx
Project ppt 2.pptx
AKASHCSE1137
 
Deep Learning Algorithm Using Virtual Environment Data For Self-Driving Car
Deep Learning Algorithm Using Virtual Environment Data For Self-Driving CarDeep Learning Algorithm Using Virtual Environment Data For Self-Driving Car
Deep Learning Algorithm Using Virtual Environment Data For Self-Driving Car
sushilkumar1236
 

Similar to Computer vision.pptx (20)

Project ppt 2.pptx
Project ppt 2.pptxProject ppt 2.pptx
Project ppt 2.pptx
 
Computer vision
Computer visionComputer vision
Computer vision
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...
 
Uc13.chapter.04
Uc13.chapter.04Uc13.chapter.04
Uc13.chapter.04
 
Saksham presentation
Saksham presentationSaksham presentation
Saksham presentation
 
Computer vision basics
Computer vision basicsComputer vision basics
Computer vision basics
 
Traffic Violation Detector using Object Detection
Traffic Violation Detector using Object DetectionTraffic Violation Detector using Object Detection
Traffic Violation Detector using Object Detection
 
final presentation (1258)52.524p2070525ptx
final presentation (1258)52.524p2070525ptxfinal presentation (1258)52.524p2070525ptx
final presentation (1258)52.524p2070525ptx
 
ASHISH SEMINAR PRESENTATION fully animated.pptx
ASHISH SEMINAR PRESENTATION fully animated.pptxASHISH SEMINAR PRESENTATION fully animated.pptx
ASHISH SEMINAR PRESENTATION fully animated.pptx
 
Computer vision
Computer visionComputer vision
Computer vision
 
Application of image processing.ppt
Application of image processing.pptApplication of image processing.ppt
Application of image processing.ppt
 
vision.ppt
vision.pptvision.ppt
vision.ppt
 
vision_2.ppt
vision_2.pptvision_2.ppt
vision_2.ppt
 
vision.ppt
vision.pptvision.ppt
vision.ppt
 
How to Test Computer Vision Apps like Google Lens and Google Photos.pdf
How to Test Computer Vision Apps like Google Lens and Google Photos.pdfHow to Test Computer Vision Apps like Google Lens and Google Photos.pdf
How to Test Computer Vision Apps like Google Lens and Google Photos.pdf
 
Computer architecture for vision system
Computer architecture for vision systemComputer architecture for vision system
Computer architecture for vision system
 
Deep Learning Algorithm Using Virtual Environment Data For Self-Driving Car
Deep Learning Algorithm Using Virtual Environment Data For Self-Driving CarDeep Learning Algorithm Using Virtual Environment Data For Self-Driving Car
Deep Learning Algorithm Using Virtual Environment Data For Self-Driving Car
 
vision-1.ppt
vision-1.pptvision-1.ppt
vision-1.ppt
 
What Is a Computer Vision Engineer- Unlocking the Power of Sight in Machines
What Is a Computer Vision Engineer- Unlocking the Power of Sight in MachinesWhat Is a Computer Vision Engineer- Unlocking the Power of Sight in Machines
What Is a Computer Vision Engineer- Unlocking the Power of Sight in Machines
 
Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)
 

More from TamiratDejene1

More from TamiratDejene1 (20)

Ch-3 lecture.pdf
Ch-3 lecture.pdfCh-3 lecture.pdf
Ch-3 lecture.pdf
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Wireless LANs.ppt
Wireless LANs.pptWireless LANs.ppt
Wireless LANs.ppt
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.ppt
 
Congestion Control and QOS.ppt
Congestion Control and QOS.pptCongestion Control and QOS.ppt
Congestion Control and QOS.ppt
 
Analog Transmission.ppt
Analog Transmission.pptAnalog Transmission.ppt
Analog Transmission.ppt
 
Chapter 5 (Part I) - Pointers.pdf
Chapter 5 (Part I) - Pointers.pdfChapter 5 (Part I) - Pointers.pdf
Chapter 5 (Part I) - Pointers.pdf
 
Chapter 7 (Part I) - User Defined Datatypes.pdf
Chapter 7 (Part I) - User Defined Datatypes.pdfChapter 7 (Part I) - User Defined Datatypes.pdf
Chapter 7 (Part I) - User Defined Datatypes.pdf
 
00-intro-to-classes.pdf
00-intro-to-classes.pdf00-intro-to-classes.pdf
00-intro-to-classes.pdf
 
DLD Chapter-5.pdf
DLD Chapter-5.pdfDLD Chapter-5.pdf
DLD Chapter-5.pdf
 
DLD Chapter-4.pdf
DLD Chapter-4.pdfDLD Chapter-4.pdf
DLD Chapter-4.pdf
 
DLD Chapter-2.pdf
DLD Chapter-2.pdfDLD Chapter-2.pdf
DLD Chapter-2.pdf
 
DLD Chapter-1.pdf
DLD Chapter-1.pdfDLD Chapter-1.pdf
DLD Chapter-1.pdf
 
DLD_Chapter_1.pdf
DLD_Chapter_1.pdfDLD_Chapter_1.pdf
DLD_Chapter_1.pdf
 
Chapter 8_Shift Registers (EEEg4302)1.pdf
Chapter 8_Shift Registers (EEEg4302)1.pdfChapter 8_Shift Registers (EEEg4302)1.pdf
Chapter 8_Shift Registers (EEEg4302)1.pdf
 
Chapter 7_Counters (EEEg4302).pdf
Chapter 7_Counters (EEEg4302).pdfChapter 7_Counters (EEEg4302).pdf
Chapter 7_Counters (EEEg4302).pdf
 
Chapter 5_combinational logic (EEEg4302).pdf
Chapter 5_combinational logic (EEEg4302).pdfChapter 5_combinational logic (EEEg4302).pdf
Chapter 5_combinational logic (EEEg4302).pdf
 
Chapter 3_Logic Gates (EEEg4302).pdf
Chapter 3_Logic Gates (EEEg4302).pdfChapter 3_Logic Gates (EEEg4302).pdf
Chapter 3_Logic Gates (EEEg4302).pdf
 
Chapter 2_Number system (EEEg4302).pdf
Chapter 2_Number system (EEEg4302).pdfChapter 2_Number system (EEEg4302).pdf
Chapter 2_Number system (EEEg4302).pdf
 
Chapter 1_Introduction to digital design (EEEg4302).pdf
Chapter 1_Introduction to digital design (EEEg4302).pdfChapter 1_Introduction to digital design (EEEg4302).pdf
Chapter 1_Introduction to digital design (EEEg4302).pdf
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

Computer vision.pptx

  • 2.  What do you think about computer vision?
  • 3. History of Computer Vision  History The origins of computer vision go back to an MIT undergraduate summer project in  Early experiments in computer vision took place in the 1950s, using some of the first neural networks to detect the edges of an object and to sort simple objects into categories like circles and squares  Computer vision tasks include methods for acquiring, processing, analyzing and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical or symbolic information, e.g., in the forms of decisions  Computer vision is building algorithms that can understand the content of images and use it for other applications
  • 4. How computer vision works  There are many types of computer vision that are used in different ways: ➢ Image segmentation partitions an image into multiple regions or pieces to be examined separately  Advanced object detection recognizes many objects in a single image: a football field, an offensive player, a defensive player, a ball and so on  ➢ Feature matching is a type of pattern detection that matches similarities in images to help classify them Simple applications of computer vision may only use one of these techniques, but more advanced users, like computer vision for self-driving cars, rely on multiple techniques to accomplish their goal
  • 5. Applications of computer vision  Computer vision is being used today in a wide variety of real-world applications, which include: ➢ Optical character recognition : reading handwritten postal codes on letters and automatic number plate recognition ; ➢ Machine inspection: rapid parts inspection for quality assurance using stereo vision with specialized illumination to measure tolerances on aircraft wings or auto body parts or looking for defects in steel castings using X-ray vision; ➢ Retail: object recognition for automated checkout lanes ➢ Medical imaging: registering pre-operative and intra-operative imagery or performing long-term studies of people’s brain morphology as they age; ➢ Automotive safety: detecting unexpected obstacles such as pedestrians on the street, under conditions where active vision techniques such as radar or lidar do not work well ➢ Fingerprint recognition and biometrics: for automatic access authentication as well as forensic applications