SlideShare a Scribd company logo
1 of 17
PRECISION LIVESTOCK FARMING: CATTLE 
IDENTIFICATION BASED ON BIOMETRIC DATA 
By 
Tarek Mahmmed Gaber, PhD 
Faculty of Computers and Informatics 
Suez Canal University 
08/04/2014 – Faculty of Agriculture, Ismailia, Egypt
Scientific Research Group in Egypt 
www.egyptscience.net
Overview 
 Introduction 
 Current work (cattle identification) 
 Proposed System 
 Experimental Results 
 Conclusion
Introduction: What is the Problem 
 Worldwide demand for meat is expected to increase 
with >40% in next 15 years 
 Health: Relationship between animal health and 
healthy food 
 Animal welfare 
 Economic importance 
 Others ……. 
 Source: [TIVO-project]
Introduction: Livestock Farm 
Livestock farming in the 
past 
The farmer spends some time for 
noticing and monitoring
Livestock Farming Today 
Experts do audio-visual 
scoring by 
visiting farms and 
looking to 0behavior 
of animal.
Precision Livestock Farming 
(PLF) 
“ Management of livestock farming by continuous automated real-time 
monitoring/controlling/tracing of production/reproduction, health and 
welfare of livestock.”
Benefit for Farmers from PLF 
 By automating the farming process, the farmer 
is able to receive real-time information on his 
livestock, so can: 
 Manage and optimise animal production and 
welfare in a fast and accurate way.
Research Area in PLF 
 Examples of research points of PLF 
 Monitoring feed times 
 Feed in-take 
 Condition scoring 
 Real-time analysis of sound
Animal Tracing: Animal Identification 
 Radio Frequency Identification 
(RFID) is currently the most well 
used method for animal 
identification. 
 Ear tag or as a microchip the skin. 
 Problems: 
 Invasive and religious matters
Animal Biometric-based 
Solutions 
 Can produce accurate results of cattle 
recognition in real production conditions. 
 Do not need to attach any additional elements 
with or within the animals. 
 Comply with most countries legal rules (e.g. 
the current EU legislation) for beef traceability 
in slaughterhouses.
Unique Features of Cattle 
 Breeds muzzle pattern or 
nose print has been 
investigated and proven to 
be unique for each cattle 
 It is then concluded that 
muzzle print is similar to 
the human's fingerprint
Identification based on Biometric 
Data 
 Training phase 
 Collecting all training 
muzzle print images. 
 Extracting the features 
 Representing each image 
by one feature vector. 
 Applying a dimensionality 
reduction (e.g, LDA) to 
reduce the number 
features in the vector 
 Testing phase 
 Collecting the muzzle print 
image, 
 Extract the features 
 Feature vector is projected 
on LDA space. 
 Applying machine learning 
techniques for classifying 
the test feature vector to 
decide whether the animal 
is identified or not).
Results 
Accuracy results (in %) when applying our proposed 
algorithm using different training images
Conclusion 
 Precision Livestock farming could 
 Increase the efficiency and sustainability for farming 
and livestock production by monitoring (individual) 
animals 
 Our proposal approach for cattle identification 
could 
 Deliver quantitative information and complete 
traceability of livestock in the food chain. 
 Image-based identification could be a promising non-intrusive 
method for cattle identification
Thanks

More Related Content

More from Tarek Gaber

Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationTarek Gaber
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareTarek Gaber
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarekTarek Gaber
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Tarek Gaber
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Tarek Gaber
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberTarek Gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...Tarek Gaber
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014Tarek Gaber
 

More from Tarek Gaber (9)

Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image Authentication
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid share
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarek
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Precision livestock farming cattle identification based on biometric data by Dr. Tarek Gaber

  • 1. PRECISION LIVESTOCK FARMING: CATTLE IDENTIFICATION BASED ON BIOMETRIC DATA By Tarek Mahmmed Gaber, PhD Faculty of Computers and Informatics Suez Canal University 08/04/2014 – Faculty of Agriculture, Ismailia, Egypt
  • 2. Scientific Research Group in Egypt www.egyptscience.net
  • 3. Overview  Introduction  Current work (cattle identification)  Proposed System  Experimental Results  Conclusion
  • 4. Introduction: What is the Problem  Worldwide demand for meat is expected to increase with >40% in next 15 years  Health: Relationship between animal health and healthy food  Animal welfare  Economic importance  Others …….  Source: [TIVO-project]
  • 5. Introduction: Livestock Farm Livestock farming in the past The farmer spends some time for noticing and monitoring
  • 6. Livestock Farming Today Experts do audio-visual scoring by visiting farms and looking to 0behavior of animal.
  • 7. Precision Livestock Farming (PLF) “ Management of livestock farming by continuous automated real-time monitoring/controlling/tracing of production/reproduction, health and welfare of livestock.”
  • 8. Benefit for Farmers from PLF  By automating the farming process, the farmer is able to receive real-time information on his livestock, so can:  Manage and optimise animal production and welfare in a fast and accurate way.
  • 9. Research Area in PLF  Examples of research points of PLF  Monitoring feed times  Feed in-take  Condition scoring  Real-time analysis of sound
  • 10. Animal Tracing: Animal Identification  Radio Frequency Identification (RFID) is currently the most well used method for animal identification.  Ear tag or as a microchip the skin.  Problems:  Invasive and religious matters
  • 11. Animal Biometric-based Solutions  Can produce accurate results of cattle recognition in real production conditions.  Do not need to attach any additional elements with or within the animals.  Comply with most countries legal rules (e.g. the current EU legislation) for beef traceability in slaughterhouses.
  • 12. Unique Features of Cattle  Breeds muzzle pattern or nose print has been investigated and proven to be unique for each cattle  It is then concluded that muzzle print is similar to the human's fingerprint
  • 13. Identification based on Biometric Data  Training phase  Collecting all training muzzle print images.  Extracting the features  Representing each image by one feature vector.  Applying a dimensionality reduction (e.g, LDA) to reduce the number features in the vector  Testing phase  Collecting the muzzle print image,  Extract the features  Feature vector is projected on LDA space.  Applying machine learning techniques for classifying the test feature vector to decide whether the animal is identified or not).
  • 14.
  • 15. Results Accuracy results (in %) when applying our proposed algorithm using different training images
  • 16. Conclusion  Precision Livestock farming could  Increase the efficiency and sustainability for farming and livestock production by monitoring (individual) animals  Our proposal approach for cattle identification could  Deliver quantitative information and complete traceability of livestock in the food chain.  Image-based identification could be a promising non-intrusive method for cattle identification