Presentation on theme: "Blue Eye TECHNOLOGY. Outline: Introduction How can we make computers “see” and “ feel” How was the term blue-eyes coined? What is Blue Eyes? "— Presentation transcript:
Blue Eye TECHNOLOGY
Outline: Introduction How can we make computers “see” and “ feel” How was the term blue-eyes coined? What is Blue Eyes? Need for Blue Eyes What can we do with blue eyes technology? - What is Blue Eyes not? Applications of blue eyes technology Blue Eyes Structure
Introduction Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that can see, feel, listen, talk, or even scream aloud.
How can we make computers “see”and “feel ” How can we make computers “see”and “feel ” Using sensing technology like camera and microphone to identify a user’s actions and to extract key information. Information is then analyzed to determine the user’s physical, emotional,or informational state
How was the term blue-eyes coined? Blue in this term stands for Bluetooth, which enables reliable wireless communication. Eyes because the eye movement enables us to obtain a lot of interesting and important information.
What is Blue Eyes ? Is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human.
The basic idea behind this technology is to give computer human power.
How can we give computer the human power? -The blue eyes checks the physiological parameters like eye movement, heart beat rate and blood oxygenation. - The use of a miniature CMOS camera integrated into the eye movement sensor. - voice recognition algorithm will facilitate the communication between the operator and the central system.
Need for blue eyes To built a machine that can understand your emotions. A pc that can listen, talk or scream. Verify your identity, feels your presence and interact with you.
What can we do with blue eyes technology? - gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. -The computer can understand what a user wants, where he is looking at, and realize his physical or emotional states.
cont. - understand your emotions at the touch of the mouse.
What is Blue Eyes not? Doesn’t predict nor interfere with operator’s thoughts. Cannot force directly the operator to work.
Applications of blue eyes technology 1. In every working environment requiring permanent operator's attention. 2. At power plant control rooms. 3. At flight control centers. 4. In video games. 5. In automobile industry.
Blue Eyes Structure Blue Eyes Structure Blue eyes technology requires designing a personal area network. *Blue eyes consists of : mobile measuring device called Data Acquisition Unit (DAU). a central analytical system called Central System Unit (CSU).
DAU Features Lightweight Runs on batteries low power Consumption Easy to use. ID cards for operator authorization.
DAU - It maintains Bluetooth connections. - Gets information from the sensor. - Sends information over the wireless connection. - Delivers the alarm messages sent from the Central System Unit (CSU) to the operator.
CSU - features CSU - features Connection .management Data processing Visualization Data recording Access verification System maintenance
- Maintains Bluetooth connections in the other side. - Buffers incoming sensor data. - Performs on-line data analysis. - Records the conclusion for further exploration. - Provides visualization interface. CSU
Type of users * Users belong to three categories: UsersOperatorsSupervisors System administrators
Operator :Operator : - Operator is a person whose physiological parameters are supervised. - The operator wears the DAU. - The only functions offers to the operator are Authorization to the system Supervisor: System Administrator: and receiving alarm alerts. Supervisor: -He is the person responsible for analyzing operators' condition and performance. System Administrator: -He is the user that maintains the system. The administrator can: - - Adding new operators to the database. - -Defining alarm conditions. -Configuring logging tools. -Creating new analyzer modules.
-Provide more user friendly facilities in computing devices. -Gap between the electronic and physical World is reduce. -The computer can be run using implicit commands instead of the explicit commands. Conclusion :