SlideShare a Scribd company logo
1
BLUE EYES
TECHNOLOGY
PRESENTED BY:-
NAME:-SHUBHAM GOYAL
WHAT IS BLUE EYES TECHNOLOGY?
Aims at creating computational machines that
have perceptual and sensory ability.
Use camera and microphone to identify user
actions and emotions
2
?
The term BLUE EYES
BLUE in the term stands for Bluetooth,
which enables reliable wireless communication
EYES , because the eye movement enables
us to obtain a lot of interesting and
important information.
3
NEED OF BLUE EYES TECHNOLOGY
 To built a machine that can understand your
emotions
 A pc that can listen, talk or scream
 Verify your identity, feels your presence and interact
with you.
4
TECHNOLGIES USED
Emotion Mouse
Manual And Gaze Input Cascaded (MAGIC)
Artificial Intelligent Speech Recognition
5
EMOTION MOUSE
 Simplest way
 People spend approximately
1/3 of their total computer
time touching input device
 Physiological data is
obtained and emotional
state is determined
 A user model will be
built that reflects the
personality of user.
6
MAGIC POINTING
Reduce the cursor movement needed for target
selection
Click on the target with a regular manual input device
Two magic pointing techniques
 Liberal
 Conservative
7
APPROACHES
 LIBERAL APPROACH
To warp the cursor to every new object user looks
at
 CONSERVATIVE APPROACH
Does not warp the cursor target until the manual
input device has been actuated
8
ARTIFICIAL
INTELLIGENT SPEECH
RECOGNITION
 Input words are scanned and matched against
internally stored words
 Identification causes some action to be taken
User speaks to the computer through microphone
 Filtered and fed to ADC and then stored in RAM
9
APPLICatiON OF ARTIFICIAL INTELLIGIENT SPEECH
RECOGNITION
 To control weapons by voice commands
 Pilot give commands to computers by speaking into
microphones
 Can be connected to word processors and instead of
writing, simply dictate to them
10
Data security
Only registered mobile devices can connect to the
system
Bluetooth connection authentication
 Bluetooth connection encryption
 Access rights restrictions
 Personal and physiological data encryption
11
Applications
In retailing record and interpret customer movements
In automobile industry
In video games
To create “Face Responsive Display” and “Perceptive
Environment” Generic control rooms.
Flight control centres
Operating theatres
12
CONCLUSION
Provide more delicate and user friendly facilities in
computing devices
Gap between the electronic and physical world is
reduced
The computers can be run using implicit commands
instead of the explicit commands
13
references
www.seminarsonly.com
http://dspace.cusat.ac.in/jspui/bitstream/123456789/2
221/1/BLUE%20EYES%20TECHNOLOGY.pdf
www.wikipedia.com
14
Thank u…..
15

More Related Content

What's hot

Leap motion
Leap motionLeap motion
Leap motion
vipin sharma
 
Leap motion
Leap motionLeap motion
Leap motion
Jay Poojara
 
Leap Motion
Leap MotionLeap Motion
Leap Motion
Sandeep Garg
 
Smart quill
Smart quillSmart quill
Smart quill
khushinafri
 
Vspppt 190114085912
Vspppt 190114085912Vspppt 190114085912
Vspppt 190114085912
ThimmaReddy18
 
Virtual Smart Phone ppt
Virtual Smart Phone pptVirtual Smart Phone ppt
Virtual Smart Phone ppt
SOHEL ISLAM
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
Stephen Raj
 
Blue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feelBlue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feel
kaishik gundu
 
type of interfaces pen and haptic
type of interfaces pen and haptictype of interfaces pen and haptic
type of interfaces pen and haptic
aka4merah
 
VERBAL SPEAKING SOFTWARES
VERBAL SPEAKING SOFTWARESVERBAL SPEAKING SOFTWARES
VERBAL SPEAKING SOFTWARESKumar Saurabh
 
leap motion controller
leap motion controllerleap motion controller
leap motion controllermayyunes1234
 
Mobile Devices and Technology
Mobile Devices and TechnologyMobile Devices and Technology
Mobile Devices and Technology
Oishik Sarkar
 
Technology behind Virtual Keyboard
Technology behind Virtual KeyboardTechnology behind Virtual Keyboard
Technology behind Virtual Keyboard
Kate Yeng
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
Abhiram Sadhu
 
Fin - A Wearable Gesture Controlled Ring
Fin - A Wearable Gesture Controlled RingFin - A Wearable Gesture Controlled Ring
Fin - A Wearable Gesture Controlled Ring
Ganesh Xe
 
Cognitive problem of smart phone
Cognitive problem of smart phoneCognitive problem of smart phone
Cognitive problem of smart phone
yoshiharu sato
 
Sixth sense
Sixth senseSixth sense
Sixth sense
Sushmitha Gurubaran
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
jyothsna vanka
 
Leap motion controller
Leap motion controllerLeap motion controller
Leap motion controller
ARUN S L
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
kaushik golakiya
 

What's hot (20)

Leap motion
Leap motionLeap motion
Leap motion
 
Leap motion
Leap motionLeap motion
Leap motion
 
Leap Motion
Leap MotionLeap Motion
Leap Motion
 
Smart quill
Smart quillSmart quill
Smart quill
 
Vspppt 190114085912
Vspppt 190114085912Vspppt 190114085912
Vspppt 190114085912
 
Virtual Smart Phone ppt
Virtual Smart Phone pptVirtual Smart Phone ppt
Virtual Smart Phone ppt
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
Blue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feelBlue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feel
 
type of interfaces pen and haptic
type of interfaces pen and haptictype of interfaces pen and haptic
type of interfaces pen and haptic
 
VERBAL SPEAKING SOFTWARES
VERBAL SPEAKING SOFTWARESVERBAL SPEAKING SOFTWARES
VERBAL SPEAKING SOFTWARES
 
leap motion controller
leap motion controllerleap motion controller
leap motion controller
 
Mobile Devices and Technology
Mobile Devices and TechnologyMobile Devices and Technology
Mobile Devices and Technology
 
Technology behind Virtual Keyboard
Technology behind Virtual KeyboardTechnology behind Virtual Keyboard
Technology behind Virtual Keyboard
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
Fin - A Wearable Gesture Controlled Ring
Fin - A Wearable Gesture Controlled RingFin - A Wearable Gesture Controlled Ring
Fin - A Wearable Gesture Controlled Ring
 
Cognitive problem of smart phone
Cognitive problem of smart phoneCognitive problem of smart phone
Cognitive problem of smart phone
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
Leap motion controller
Leap motion controllerLeap motion controller
Leap motion controller
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 

Viewers also liked

Am website presentation may 2016
Am website presentation   may 2016Am website presentation   may 2016
Am website presentation may 2016
anteromidstream
 
Am website presentation december 2015
Am website presentation   december 2015Am website presentation   december 2015
Am website presentation december 2015
anteromidstream
 
Am website presentation october 2015
Am website presentation   october 2015Am website presentation   october 2015
Am website presentation october 2015
anteromidstream
 
Am website presentation july 2015
Am website presentation   july 2015Am website presentation   july 2015
Am website presentation july 2015
anteromidstream
 
Vagrant
VagrantVagrant
Vagrant
Nav Appaiya
 
Persuasive language and advertising techniques; the key ingredients of adver...
Persuasive language and advertising techniques;  the key ingredients of adver...Persuasive language and advertising techniques;  the key ingredients of adver...
Persuasive language and advertising techniques; the key ingredients of adver...X-ton
 
Am website presentation april 2016
Am website presentation   april 2016Am website presentation   april 2016
Am website presentation april 2016
anteromidstream
 
Am website presentation (a) april 2015
Am website presentation (a)   april 2015Am website presentation (a)   april 2015
Am website presentation (a) april 2015
anteromidstream
 
Am website presentation (a) august 2016
Am website presentation (a)   august 2016Am website presentation (a)   august 2016
Am website presentation (a) august 2016
anteromidstream
 
Slide idico
Slide idicoSlide idico
Slide idico
NTNTuyen
 
Sunview town
Sunview townSunview town
Sunview town
NTNTuyen
 
Company website-presentation-january-2015
Company website-presentation-january-2015Company website-presentation-january-2015
Company website-presentation-january-2015
anteromidstream
 
Am website presentation june 2015
Am website presentation   june 2015Am website presentation   june 2015
Am website presentation june 2015
anteromidstream
 

Viewers also liked (14)

Am website presentation may 2016
Am website presentation   may 2016Am website presentation   may 2016
Am website presentation may 2016
 
Am website presentation december 2015
Am website presentation   december 2015Am website presentation   december 2015
Am website presentation december 2015
 
Am website presentation october 2015
Am website presentation   october 2015Am website presentation   october 2015
Am website presentation october 2015
 
Am website presentation july 2015
Am website presentation   july 2015Am website presentation   july 2015
Am website presentation july 2015
 
Vagrant
VagrantVagrant
Vagrant
 
At
AtAt
At
 
Persuasive language and advertising techniques; the key ingredients of adver...
Persuasive language and advertising techniques;  the key ingredients of adver...Persuasive language and advertising techniques;  the key ingredients of adver...
Persuasive language and advertising techniques; the key ingredients of adver...
 
Am website presentation april 2016
Am website presentation   april 2016Am website presentation   april 2016
Am website presentation april 2016
 
Am website presentation (a) april 2015
Am website presentation (a)   april 2015Am website presentation (a)   april 2015
Am website presentation (a) april 2015
 
Am website presentation (a) august 2016
Am website presentation (a)   august 2016Am website presentation (a)   august 2016
Am website presentation (a) august 2016
 
Slide idico
Slide idicoSlide idico
Slide idico
 
Sunview town
Sunview townSunview town
Sunview town
 
Company website-presentation-january-2015
Company website-presentation-january-2015Company website-presentation-january-2015
Company website-presentation-january-2015
 
Am website presentation june 2015
Am website presentation   june 2015Am website presentation   june 2015
Am website presentation june 2015
 

Similar to Blues eyes technology

BLUE EYE TECHNOLOGY.pptx
BLUE EYE TECHNOLOGY.pptxBLUE EYE TECHNOLOGY.pptx
BLUE EYE TECHNOLOGY.pptx
ckthesolo
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
Chaitanya Ram
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
rahuldikonda
 
blue eyes seminar ppt.pptx
blue eyes seminar ppt.pptxblue eyes seminar ppt.pptx
blue eyes seminar ppt.pptx
Kvaishnavi6
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
shreyagadiya100
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
Mo Irshad Ansari
 
Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02
sree vidyanikethan engineering college
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
kajol agarwal
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
ANSUMAN MISHRA
 
Blueeyetechnology 110925103959-phpapp02
Blueeyetechnology 110925103959-phpapp02Blueeyetechnology 110925103959-phpapp02
Blueeyetechnology 110925103959-phpapp02
pramilakanagaraj1
 
blue eye_technology
blue eye_technologyblue eye_technology
blue eye_technology
komal jain
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
SouravMazumdar5
 
Blue eyes technology.pptx
Blue eyes technology.pptxBlue eyes technology.pptx
Blue eyes technology.pptx
sivabalaji525
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
Alapati Krishna
 

Similar to Blues eyes technology (20)

BLUE EYE TECHNOLOGY.pptx
BLUE EYE TECHNOLOGY.pptxBLUE EYE TECHNOLOGY.pptx
BLUE EYE TECHNOLOGY.pptx
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
 
blue eyes seminar ppt.pptx
blue eyes seminar ppt.pptxblue eyes seminar ppt.pptx
blue eyes seminar ppt.pptx
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
 
Blueeyestechnologyppt1
Blueeyestechnologyppt1Blueeyestechnologyppt1
Blueeyestechnologyppt1
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Ppt
PptPpt
Ppt
 
Blueeyetechnology 110925103959-phpapp02
Blueeyetechnology 110925103959-phpapp02Blueeyetechnology 110925103959-phpapp02
Blueeyetechnology 110925103959-phpapp02
 
Bet
BetBet
Bet
 
blue eye_technology
blue eye_technologyblue eye_technology
blue eye_technology
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eyes technology.pptx
Blue eyes technology.pptxBlue eyes technology.pptx
Blue eyes technology.pptx
 
Blue eye-bhupesh
Blue eye-bhupeshBlue eye-bhupesh
Blue eye-bhupesh
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Blues eyes technology

  • 2. WHAT IS BLUE EYES TECHNOLOGY? Aims at creating computational machines that have perceptual and sensory ability. Use camera and microphone to identify user actions and emotions 2 ?
  • 3. The term BLUE EYES BLUE in the term stands for Bluetooth, which enables reliable wireless communication EYES , because the eye movement enables us to obtain a lot of interesting and important information. 3
  • 4. NEED OF BLUE EYES TECHNOLOGY  To built a machine that can understand your emotions  A pc that can listen, talk or scream  Verify your identity, feels your presence and interact with you. 4
  • 5. TECHNOLGIES USED Emotion Mouse Manual And Gaze Input Cascaded (MAGIC) Artificial Intelligent Speech Recognition 5
  • 6. EMOTION MOUSE  Simplest way  People spend approximately 1/3 of their total computer time touching input device  Physiological data is obtained and emotional state is determined  A user model will be built that reflects the personality of user. 6
  • 7. MAGIC POINTING Reduce the cursor movement needed for target selection Click on the target with a regular manual input device Two magic pointing techniques  Liberal  Conservative 7
  • 8. APPROACHES  LIBERAL APPROACH To warp the cursor to every new object user looks at  CONSERVATIVE APPROACH Does not warp the cursor target until the manual input device has been actuated 8
  • 9. ARTIFICIAL INTELLIGENT SPEECH RECOGNITION  Input words are scanned and matched against internally stored words  Identification causes some action to be taken User speaks to the computer through microphone  Filtered and fed to ADC and then stored in RAM 9
  • 10. APPLICatiON OF ARTIFICIAL INTELLIGIENT SPEECH RECOGNITION  To control weapons by voice commands  Pilot give commands to computers by speaking into microphones  Can be connected to word processors and instead of writing, simply dictate to them 10
  • 11. Data security Only registered mobile devices can connect to the system Bluetooth connection authentication  Bluetooth connection encryption  Access rights restrictions  Personal and physiological data encryption 11
  • 12. Applications In retailing record and interpret customer movements In automobile industry In video games To create “Face Responsive Display” and “Perceptive Environment” Generic control rooms. Flight control centres Operating theatres 12
  • 13. CONCLUSION Provide more delicate and user friendly facilities in computing devices Gap between the electronic and physical world is reduced The computers can be run using implicit commands instead of the explicit commands 13