Mind reading computer ppt


Published on

Published in: Education, Technology
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Mind reading computer ppt

  1. 1.  Introduction What is Mind Reading? Why Mind Reading? How does it Work? Advantages and uses Disadvantages and Problems Conclusion
  2. 2.  People express their mental state, including emotions, thoughts and desires, all time through facial expression, vocal nuances and gesture Mind reading machine is co-ordination of human psychology and computer techniques. Some Equipment are used to gather data & then analyzed. To use those data for further prediction is known as theory of mind reading.
  3. 3.  The team in the Computer Laboratory at the University of Cambridge has developed Mind Reading Machines-Computers that implement computational model of Mind Reading to infer mental states of people from their facial signal. Prior Knowledge of how particular mental states are expressed in the face is combined with analysis of facial expression and head gestures occurring in real time. Software from Nevenvision identifies 24 feature point on the face and tracks them in real time. For example, a combination of head node, with a smile and eyebrows raised might mean interest.
  4. 4.  The Mind reading Computer system Present information about your mental state as easily as a keyboard and mouse present a text and commands. Current project in Cambridge are considering further input such as body posture and gesture to improve the inference. We also looking at the use of Mind reading to support online shopping and learning system.
  5. 5.  The mind-reading computer system may also be used to monitor and suggestimprovements in human-human interaction.The Affective Computing Group at the MIT Media Laboratory is developing anemotional-social intelligence prosthesis that explores new technologies to augment andimprove people’s social interactions and communication skills.To implement this system in cars to detect driver mental states such asdrowsiness, distraction and anger.
  6. 6.  The mind reading actually involves measuring the volume and oxygen level of the blood around the subject’s brain using tech. called functional near- infrared spectroscopy (fNIRS) The user wears a sort of futuristic head band that send light in that spectrum in to the tissues of the head where it is absorbed by active, blood filled tissues.
  7. 7.  For the first test of sensors, scientists trained the program to recognize six words- including ”go", "left” and “right” -10 numbers. Then researchers put the letters of the alphabet in to a matrix with each column and row labeled with a single digit number. These were used to silently spell ”NASA” into a web search engine using program. “This proved we could browse the web without touching a keyboard”.
  8. 8.  It deals with anatomy and molecular biology of neurons. A neuron is a nerve cell that is the basic building block of the nervous system. Neurons are specialized to transmit information throughout the body. It is done by measuring oxygen level of blood using FNIRS.
  9. 9.  Facial effect detection It is done using hidden Markov Model, Neural Network processing or active appearance model. Emotional Classification Classification by Paul Ekman Anger, Fear, Happiness, Disgust, Sadness, Surprise.
  10. 10. Facial ElectromyographyIt is used to measure electrical activity ofthe facial Muscles. Muscles used are”corruguator supercilii muscle” and others. Galvanic Skin ResponseIt is a measure of Skin conductivity, Whichis dependent on how moist the skin is.
  11. 11. Blood Volume PulseIt is measured by process calledphotoplethysmography.It produce a graph indicating bloodflow through the extremities.
  12. 12.  Can read minds Help paralytic patients Help Handicapped people Help Comma patients Help people who cant speak Can be used for military purposes & sting operations Can be combined with consoles & used for mind gaming, robotics & stuff. Eliminate the capability to lie.
  13. 13.  Breach in privacy Can extract, through an individual, an important, secure & confidential information of individual, state or even a country If developed or used by sinners, can be highly dangerous Eavesdropping No way to neutralize this technology
  14. 14.  Tufts University researchers have begun a three-year research project which, if successful, will allow computers to respond to the brain activity of the computers user. Users wear futuristic-looking head bands to shine light on their foreheads, and then perform a series of increasingly difficult tasks while the device reads what parts of the brain are absorbing the light. That info is then transferred to the computer, and from there the computer can adjust its interface and functions to each individual.