2. WHAT IS BLUE EYES TECHNOLOGY?
•Aims at creating computational machines that have
perceptual and sensory ability.
•The basic idea behind this technology is to give the
computer the human power.
•Due to this the machine can understand what a user
wants, where he is looking at and even realize his
physical or emotional states.
•Use camera and microphone to identify user actions
and emotions.
3. How can we make computer see and feel?
•Blue eyes uses sensing technology
to identify a user’s actions
and to extract key information.
•Information is then analyzed to
determine the user’s physical,
emotional, or informational state.
4. Technologies used in BET :-
• Emotion Mouse
• Manual And Gaze Input Cascaded
(MAGIC)
• Artificial Intelligent Speech Recognition
• Simple User Interest Tracker (SUITOR)
• The eye movement Sensor
5. EMOTION MOUSE
• Emotion mouse sense the mood by
analyzing pressure , temperature
and heart beat of the user.
• Hardware: - mouse
⮚Heart rate
⮚Temperature : thermocouple
⮚Galvanic skin response (GSR):
digital multimeter
⮚General somatic activity (GSA):
movement of computer mouse
6. TOUCH RECOGNITION :-
• Analyzing these
parameters six types of
mood can be sensed by
computer.
• Anger, fear, sadness,
disgust, joy, surprise
7. Manual And Gaze Input Cascaded
(MAGIC)
• Webcam is used to quickly
determine the glints and pupils of
the user under variable and
realistic lightning conditions.
• Reduce the cursor movement
needed for target selection.
• Click on the target with a regular
manual input device
8. ARTIFICIAL INTELLIGIENT SPEECH RECOGNITION
• Input words are scanned and
matched against internally stored
words.
• User speaks to the computer
through microphone.
• Pattern matching is designed to
look for the best fit because of
variations in loudness, pitch,
frequency difference, time gap
etc.
9. APPLICATIONS
• Pilot give commands to
computers by speaking
into microphones
• Can be connected to
word processors and
instead of writing,
simply dictate to them
10. Simple User Interest Tracker (SUITOR)
⮚Help by fetching more information at desktop
⮚Notice where the user’s eyes focus on the screen
⮚Fills a scrolling ticker on a computer screen with
information related to user’s task
⮚Ex. If reading headline ,pops up the story in the
browser window
11. THE EYE MOVEMENT SENSOR DESIGNING
⮚A personal area network
for linking all the operators
and the supervising system
⮚Two major units
- DAU (data acquisition
unit)
- CSU (central system unit )
13. CENTRAL SYSTEM UNIT(CSU)– components
⮚CONNECTION MANAGER – main task to perform low-level blue
tooth communication
⮚DATA ANALYSIS MODULE – performs the analysis of the raw sensor
data
⮚DATA LOGGER MODULE – provides support for storing the
monitored data.
⮚VISULAIZATION MODULE – provides user interface for the
supervisors
•
14. CSU FEATURES :-
⮚Connection management
⮚ Data processing
⮚ Data recording
⮚Access verification
⮚System maintenance
Bluetooth Connection
Manager
Visualization
Module
Data Analysis Data
Logger
15. DATA SECURITY:-
⮚Only registered mobile
devices can connect to the
system
⮚Bluetooth connection
authentication
⮚ Bluetooth connection
encryption
⮚ Access rights restrictions
⮚ Personal and physiological
data encryption
16. ADVANTAGES OF BET :-
• Physiological condition monitoring
• Reduces manual work
• Increases efficiency
DISADVANTAGES
• Not 100% accurate.
• System is bulky, needs minimization.
• Expensive
17. APPLICATIONS :-
⮚In retailing record and interpret customer movements
⮚In automobile industry
⮚In video games
⮚To create “Face Responsive Display” and “Perceptive Environment”
Generic control rooms
⮚ Power station
⮚Flight control centres
⮚Operating theatres
18. BLUE EYES ENABLED DEVICES :-
POD-TECHNOLOGY USED IN CARS PONG-A ROBOT
19. CONCLUSION :-
• In the future, ordinary household devices such as
televisions, refrigerators, and ovens may be able to do their
jobs when we look at them and speak to them.
• Provide more delicate and user friendly facilities in
computing devices.
• Gap between the electronic and physical world is reduced
• The computers can be run using implicit commands instead
of the explicit commands