Blue Eyes ppt


Published on

Published in: Technology, Business
  • Its very nice yo undefstand the topic
    Are you sure you want to  Yes  No
    Your message goes here
  • how to download this video?
    Are you sure you want to  Yes  No
    Your message goes here
  • Good one!!
    Are you sure you want to  Yes  No
    Your message goes here
  • how to download??
    Are you sure you want to  Yes  No
    Your message goes here
  • i wanna download it
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Blue Eyes ppt

  2. 2. 2 ? WHAT IS BLUE EYES TECHNOLOGY?Aims at creating computational machines that have perceptual and sensory ability.Use camera and microphone to identify user actions and emotions
  3. 3. 3THE TErm BLUE EYESBLUE in the term stands for Bluetooth, which enables reliable wireless communicationEYES , because the eye movement enables us to obtain a lot of interesting and important information.
  4. 4. 4NEED OF BLUE EYES TECHNOLOGY  To built a machine that can understand your emotions  A pc that can listen, talk or scream  Verify your identity, feels your presence and interact with you.
  5. 5. 5 TECHNOLGIES USED• Emotion Mouse• Manual And Gaze Input Cascaded (MAGIC)• Artificial Intelligent Speech Recognition• Simple User Interest Tracker (SUITOR)• The eye movement Sensor
  6. 6. 6 EmOTION mOUSESimplest wayPeople spend approximately 1/3 of their total computer time touching input devicePhysiological data is obtained and emotional state is determinedA user model will be built that reflects the personality of user.
  7. 7. 7
  8. 8. 8 mAGIC POINTING Reduce the cursor movement needed for target selection Click on the target with a regular manual input device Two magic pointing techniques  Liberal  Conservative
  9. 9. 9 APPrOACHES• LIBERAL APPROACH To warp the cursor to every new object user looks at• CONSERVATIVE APPROACH Does not warp the cursor target until the manual input device has been actuated
  10. 10. 10 ArTIFICIAL INTELLIGIENT SPEECH rECOGNITION Input words are scanned and matched against internally stored words Identification causes some action to be taken User speaks to the computer through microphone Filtered and fed to ADC and then stored in RAM
  11. 11. 11 APPLICATION OF ArTIFICIAL•INTELLIGIENT SPEECH rECOGNITION To control weapons by voice commands• Pilot give commands to computers by speaking into microphones• Can be connected to word processors and instead of writing, simply dictate to them
  12. 12. 12 SUITOrHelp by fetching more information at desktopNotice where the user’s eyes focus on the screenFills a scrolling ticker on a computer screen with information related to user’s taskEx. If reading headline ,pops up the story in the browser window
  13. 13. 13 THE EYE mOVEmENT SENSOr DESIGNINGA personal area network for linking all the operators and the supervising systemTwo major units - DAU (data acquisition unit ) - CSU (central system unit )
  14. 14. 14 DAU• The DAU consists of the following components• ATMEL 8952 microcontroller• BLUE TOOTH MODULE – supports synchronous voice• data transmission• central system sound feedback• ALPHAUNUMERIC LCD display• LED indicators• ID CARD interface
  15. 15. 15 DAU - FEATUrESData Acquisition Unit • LightweightAtmel 89C52 • Runs on batteries - lowmicrocontroller Bluetooth power consumption • Easy to use - does not Jazz Multisensor disturb the operator working • ID cards for operator authorization • Voice transmission using hardware PCM codec
  16. 16. 16 CSU – COmPONENTS CONNECTION MANAGER – main task toperform low-level blue tooth communication DATA ANALYSIS MODULE – performs theanalysis of the raw sensor data DATA LOGGER MODULE – provides supportfor storing the monitored data. VISULAIZATION MODULE – provides userinterface for the supervisors
  17. 17. 17 CSU FEATUrES Central System UnitConnection management Connection Visualization Bluetooth Data processing Manager Module Data Data Analysis Logger Data recordingAccess verificationSystem maintenance
  18. 18. 18 DATA SECUrITYOnly registered mobile devices can connect to the systemBluetooth connection authentication Bluetooth connection encryption Access rights restrictions Personal and physiological data encryption
  19. 19. 19 APPLICATIONSIn retailing record and interpret customer movementsIn automobile industryIn video gamesTo create “Face Responsive Display” and “Perceptive Environment” Generic control rooms Power stationFlight control centresOperating theatres
  20. 20. 20 CONCLUSIONProvide more delicate and user friendly facilities in computing devicesGap between the electronic and physical world is reducedThe computers can be run using implicit commands instead of the explicit commands
  21. 21. 21THANkU…..
  22. 22. 22