This Presentation aims at explaining how eye tracking works and the usage of Houghman Circle Detection Algorithm in order to detect the iris.
https://www.picostica.com
Eye Movement based Human Computer Interaction TechniqueJobin George
Eye movement-based interaction is one of several areas of current research in human computer interaction in which a new interface style seems to be emerging. In the non-command style, the computer passively monitors the user and responds as appropriate, rather than waiting for the user to issue specific commands. In describing eye movement-based human-computer interaction we can see two distinctions, one is in the nature of the user’s eye movements and the other, in the nature of the responses. In the world created by an eye movement based interface, users could move their eyes to scan the scene, just as they would a real world scene, unaffected by the presence of eye tracking equipment movement, on the eye movement axis. The alternative is to instruct users of the eye movement based interface to move their eyes in particular ways. On the response axis, objects could respond to a user’s eye movements in a natural way that is, the object responds to the user’s looking in the same way real objects do. The alternative is unnatural response, where objects respond in ways not experienced in the real world.
Now a days Eye tracking technology is applied in many fields like automotive defense and medical industries. The fields of advertising, entertainment, packaging and web design have all benefited significantly from studying the visual behavior of the consumer. Every day, as eye tracking is used in creative new ways, the list of applications grows.
Imagine yourself being a intelligent, motivated, and working person in the fiercely competitive
market of information technology, but just one problem You can't use your hands. Or you can't speak.
How do you do your job? How do you stay employed? You can, because of a very good gift from
computer Industry. The Eyegaze, a communication & control system you run with your eyes In humans,
gaze direction and ocular behaviour is probably one of the first distant means of communication
developed. Parents often try to understand what their baby looks at, and they deduce that the object
observed attracts his/her interest. This ability to interact with someone by a transitional object is named
joint attention
The Eyegaze System is a direct-select vision-controlled communication and control system. It was
developed in Fairfax, Virginia, by LC Technologies.
Eye Movement based Human Computer Interaction TechniqueJobin George
Eye movement-based interaction is one of several areas of current research in human computer interaction in which a new interface style seems to be emerging. In the non-command style, the computer passively monitors the user and responds as appropriate, rather than waiting for the user to issue specific commands. In describing eye movement-based human-computer interaction we can see two distinctions, one is in the nature of the user’s eye movements and the other, in the nature of the responses. In the world created by an eye movement based interface, users could move their eyes to scan the scene, just as they would a real world scene, unaffected by the presence of eye tracking equipment movement, on the eye movement axis. The alternative is to instruct users of the eye movement based interface to move their eyes in particular ways. On the response axis, objects could respond to a user’s eye movements in a natural way that is, the object responds to the user’s looking in the same way real objects do. The alternative is unnatural response, where objects respond in ways not experienced in the real world.
Now a days Eye tracking technology is applied in many fields like automotive defense and medical industries. The fields of advertising, entertainment, packaging and web design have all benefited significantly from studying the visual behavior of the consumer. Every day, as eye tracking is used in creative new ways, the list of applications grows.
Imagine yourself being a intelligent, motivated, and working person in the fiercely competitive
market of information technology, but just one problem You can't use your hands. Or you can't speak.
How do you do your job? How do you stay employed? You can, because of a very good gift from
computer Industry. The Eyegaze, a communication & control system you run with your eyes In humans,
gaze direction and ocular behaviour is probably one of the first distant means of communication
developed. Parents often try to understand what their baby looks at, and they deduce that the object
observed attracts his/her interest. This ability to interact with someone by a transitional object is named
joint attention
The Eyegaze System is a direct-select vision-controlled communication and control system. It was
developed in Fairfax, Virginia, by LC Technologies.
Abstract/Introduction/Users of Eye gaze/Skills required by the users/ Hardware Parts/Working//Menu's of Eye Gaze Communication System/Applications/Limitations/New Portable Eye Gaze Communication /Environment require for eye Gaze Communication/The eye gaze communication system components & prices/ Conclusion/ Thank you
normal person can use computer efficiently but a disabled(deficiency of upper limbs) person cannot.
with this technology a disabled can access the computer mouse simply by his eye movements.
The Virtual Dimension Center (VDC) Fellbach has compiled the state of the art as well as the market situation and areas of application of the technology field "Eye Tracking" and put it together in a whitepaper.
In February 2012 Annika Naschitzki presented to both Wellington and Auckland audiences about Optimal Usability's new eye tracker, and what it can do. Here is the presentation, however if you would like Anni to come into your organisation to do the presentation please get in touch: anni@optimalusability.com
The Gesture Recognition Technology is rapidly growing technology and this PPT describes about the working of gesture recognition technology,the sub fields in it, its applications and the challenges it faces.
An ocular prosthesis or artificial eye is a type of craniofacial prosthesis that replaces an absent eye following an enuleatin, evisceration, or orbital exenteration.
EYE GAZE COMMUNICATION SYSTEM
The Eye gaze System is a communication system for people with complex physical disabilities.
This operates with eyes by looking at control keys displayed on a screen.
Eye tracking and its economic feasibilityJeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how the economic feasibility of eye tracking technology is becoming better through improvements in infrared LEDs, micro-projectors, image sensors, and microprocessors. The capability to track an eye’s movement can help us better identify tired drivers and equipment operators, understand the eye movements of retail shoppers, and develop better human-computer interfaces. Tired drivers and machine operators lead to accidents and these accidents lead to loss of human life and equipment damage. Retailers would like to better understand the eye movements of their customers in order to better design retail stores. Eye trackers would enable one type of human-computer interface, Google Glasses, to understand the information that users are viewing and thus what they want to access
Eye tracking is done with a combination of infrared LEDs, micro-projectors, image sensors, and microprocessors. All of these components are experiencing rapid improvements in cost and performance as feature sizes are made smaller and the number of transistors are increased. Improvements in image sensors have led to higher accuracy and precision where precision refers to consistency. Much of these improvements have come from higher pixel densities and sampling frequencies of the image sensors; the latter enables tracking even when there are head movements.
These improvements have also led to lower costs and cost reductions continue to occur. The cost of high-end eye tracking systems have dropped from about 30,000 USD in 2000 to 18,000 in 2010 and 5,000 in 2013. Further reductions will occur as Moore’s Law continues and as higher volumes enable lower margins.
Abstract/Introduction/Users of Eye gaze/Skills required by the users/ Hardware Parts/Working//Menu's of Eye Gaze Communication System/Applications/Limitations/New Portable Eye Gaze Communication /Environment require for eye Gaze Communication/The eye gaze communication system components & prices/ Conclusion/ Thank you
normal person can use computer efficiently but a disabled(deficiency of upper limbs) person cannot.
with this technology a disabled can access the computer mouse simply by his eye movements.
The Virtual Dimension Center (VDC) Fellbach has compiled the state of the art as well as the market situation and areas of application of the technology field "Eye Tracking" and put it together in a whitepaper.
In February 2012 Annika Naschitzki presented to both Wellington and Auckland audiences about Optimal Usability's new eye tracker, and what it can do. Here is the presentation, however if you would like Anni to come into your organisation to do the presentation please get in touch: anni@optimalusability.com
The Gesture Recognition Technology is rapidly growing technology and this PPT describes about the working of gesture recognition technology,the sub fields in it, its applications and the challenges it faces.
An ocular prosthesis or artificial eye is a type of craniofacial prosthesis that replaces an absent eye following an enuleatin, evisceration, or orbital exenteration.
EYE GAZE COMMUNICATION SYSTEM
The Eye gaze System is a communication system for people with complex physical disabilities.
This operates with eyes by looking at control keys displayed on a screen.
Eye tracking and its economic feasibilityJeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how the economic feasibility of eye tracking technology is becoming better through improvements in infrared LEDs, micro-projectors, image sensors, and microprocessors. The capability to track an eye’s movement can help us better identify tired drivers and equipment operators, understand the eye movements of retail shoppers, and develop better human-computer interfaces. Tired drivers and machine operators lead to accidents and these accidents lead to loss of human life and equipment damage. Retailers would like to better understand the eye movements of their customers in order to better design retail stores. Eye trackers would enable one type of human-computer interface, Google Glasses, to understand the information that users are viewing and thus what they want to access
Eye tracking is done with a combination of infrared LEDs, micro-projectors, image sensors, and microprocessors. All of these components are experiencing rapid improvements in cost and performance as feature sizes are made smaller and the number of transistors are increased. Improvements in image sensors have led to higher accuracy and precision where precision refers to consistency. Much of these improvements have come from higher pixel densities and sampling frequencies of the image sensors; the latter enables tracking even when there are head movements.
These improvements have also led to lower costs and cost reductions continue to occur. The cost of high-end eye tracking systems have dropped from about 30,000 USD in 2000 to 18,000 in 2010 and 5,000 in 2013. Further reductions will occur as Moore’s Law continues and as higher volumes enable lower margins.
This PPT provides you with the basic Computer knowledge. The presentation takes you through all the main parts of a computer system and types of computer systems.
This PPT gives you a brief description of what exactly is artificial intelligence. How is it made possible? What is machine learning? Examples of machine learning.
Programming languages used to develop, machine learning, etc.
Final Year Project BCA Presentation on Pic-O-SticaSharath Raj
This slide is based on the final year project of BCA. Project was on Online image purchase and Sales System.
The system was developed using PHP at the frontend and Mysql at the Backend.
Image will be uploaded and will be watermarked. USer can buy or sell their lovely images.
Contains a detailed Slides on Artificial Intelligence.
What is artificial intelligence?
What are its uses?
advantages?
disadvantages?
Charasteristics?
examples?
functions
and other criterias.
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
2. Introduction
• An eye has a lot of communicative power. Eye contact
and gaze direction are central and very important
factors in human communication.
• The Computer mouse has gained high popularity as an
input device.
• The Eye Tracking System is a Human Computer
Interaction application where a person can control
the mouse pointer using his/her eyes.
• Useful for Paralyzed / Physically disabled people to
convey their messages to others.
3. • Eye Tracking is the process of
measuring where we look, also
known as our Point of Gaze.
• Eye Tracking is a technology that
puts you in control of your device by
using your eyes as you naturally
would.
• A device or computer equipped with
eye tracker knows what a user is
looking at. This makes it possible for
users to interact with computers
using their eyes.
4. How Human Eye Works?
Light enters the eye through the cornea.
From the cornea, the light passes through the pupil. The amount of
light passing through is regulated by the iris, or the colored part of
the eye.
From there, the light then hits the lens, the transparent structure
inside the eye, which focuses light rays onto the retina.
Finally, it reaches the retina, the light-sensitive nerve layer that lines
the back of the eye, where the image appears inverted.
The optic nerve carries signals of light, dark, and colors to the area
of the brain, which assembles signals into images (our vision).
5. Eye Tracking Terminology
Fixation – A single instance where the eye momentarily stops
Saccade - The rapid eye movement from one fixation to the next
Scan Path – A series of sequential fixations and saccades.
6. Goal of the System
• Hands – free Computing
• Facilitating the handicapped in using the Computer
• Controlling the mouse pointer through eye movement.
• Eye based Human – Computer interaction provides real Time Eye Tracking
and Eye - Gaze estimation.
7. • Image Acquisition: A web – cam is required to acquire images. System will
start with image acquisition using an integrated web-cam or USB web-cam.
• Image Pre-processing: Pre-processing the data is always helpful in
extracting useful information. Images acquired by web-cam must be
converted into appropriate formats required by different algorithm at next
stages.
• Eyes Features Detection: Necessary eye features are identified, Using HCT
for pupil detection and Template Matching Technique for eye corners
detection.
• Screen Mapping: Mapping the coordinates of the screen with the pupil
movements is done.
8.
9. System Components and interactions of the project virtual mouse system.
• The software application is organized into two parts:
The eye tracking engine part and mouse simulation part.
The eye tracking engine part matches our software application with eye tracking
device to eye control mouse function.
10. MODULE DESCRIPTION
Main Interface Module : It Sets and manages the startup dialogue.
Mouse/Keyboard Engine Simulation Module : It create dynamic tool window, automatically
changes the size of the tool window according to the screen resolution, and decides whether to
display or obscure the toolbar.
User Action Detection Module : The fixation function in this module is defined to calculate the
gaze time of the user and determine the mouse coordinates.
Halt Module : It determines whether to stop eye tracking and enter the sleep mode and
determines whether to jump out of the sleep mode and restart the eye tracking.
Mouse Function Module : It receives the view point of user from simulation engine and transfers
the coordinate to the fixation function within user action detection module.
11. Algorithm Description
• Eye Detection using Viola - Jones Algorithm
• Detecting Iris using Circular Hough Transform Algorithm
12. Viola – Jones Algorithm
Computers cannot detect face very easily as humans.
When an image is prompted to the computer, all that it sees is a matrix of numbers.
A regular image is composed of thousands of pixels. Even a small 28 X 28 image is composed by
784 pixels.
Each pixel can assume 255 values. So that’s 255784 possible values.
Viola Jones algorithm extracts a much simpler representations of the image, and combine those
simple representations into more high – level representation in a hierarchical way.
13. STEPS INVOLVED IN VIOLA – JONES ALGORITHM
Haar – like Feature Extraction
We have some primitive masks. Those masks are slide
over the image, and the sum of the values of the pixels
within the white side is subtracted from the black side.
The result is a feature that represents that region.
14. Circular Hough
Transform
Algorithm
Now we detected the eyes using the viola – jones algorithm, the next
step is to detect the iris.
For that we are going to look for the most circular object in the eye
region.
15. STEPS INVOLVED IN CIRCULAR HOUGH
TRANSFORM
• By using CHT, the circle parameters within a given image are
identified: the circle centre coordinates “a” and “b” and the
circle radius “r”, as represented in the circle equation:
• To improve precision we implement a pre-processing step:
– Segmentation threshold to cut image components such as
eyelashes and eyebrows and keep only the pupil contour.
• This is done using the dark pupil technique.
16. HARDWARE AND SOFTWARE REQUIREMENTS
• Operating System – Windows 7 or above, Linux, Mac OS
• Processor – 2Ghz or More
• RAM – 2GB
• Hard Disk – Minimum 120GB
• IR LED
• Web Camera
• OpenCV(Computer Vision)
• MATLAB
• Python IDLE
17. The system combines both the mouse and keyboard functions, so that users can achieve
almost all of the inputs to the computer without traditional input equipment.
The idea of eye control is of great use to not only the future of natural input but more
importantly the handicapped and disabled.
The use of Standard Circular Hough Transformation in image processing module of the
implementation combined with the grid analysis approach is practically successful and has
high potential in future applications.
18. Future Works
One can control home automation system.
Can be used to find the persons interest in a product.
One can control LCD in automobile with the movement of the eye.
Can be used in medical industries while performing high end operations to control
the PC or its various operations.
Can be used by astronauts in space to control various operations inside their suits.