2 Outline: Introduction How can we make computers “see” and “ feel” How was the term blue-eyes coined?What is Blue Eyes?Need for Blue EyesWhat can we do with blue eyes technology? -What is Blue Eyes not?Applications of blue eyes technologyBlue Eyes Structure
3 IntroductionImagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that can see, feel, listen, talk, or even scream aloud.
4 How can we make computers “see”and “feel ” Using sensing technology like camera and microphone to identify a user’s actions and to extract key information. Information is then analyzed to determine the user’s physical, emotional ,or informational state
5 How was the term blue-eyes coined? Blue in this term stands for Bluetooth, which enables reliable wireless communication . Eyes because the eye movement enables us to obtain a lot of interesting and important information.
6 What is Blue Eyes ?Is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human.
7 The basic idea behind this technology is to give computer human power.
8 How can we give computer the human power? -The blue eyes checks the physiological parameters like eye movement, heart beat rate and blood oxygenation. - The use of a miniature CMOS camera integrated into the eye movement sensor. - voice recognition algorithm will facilitate the communication between the operator and the central system.will enable the system to calculate the point of gaze and observe what the operator is actually looking at2
9 Need for blue eyes To built a machine that can understand your emotions.A pc that can listen, talk or scream.Verify your identity, feels yourpresence and interact with you.
10 What can we do with blue eyes technology? - gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. -The computer can understand what a user wants, where he is looking at, and realize his physical or emotional states.For instance if you ask the computer to dial to your friend at his office, it understands thesituation and establishes a connection.
11 cont.- understand your emotions at the touch of the mouse.
12 What is Blue Eyes not?Doesn’t predict nor interfere with operator’s thoughts.Cannot force directly the operator to work.
13 Applications of blue eyes technology 1. In every working environment requiring permanent operator's attention. 2. At power plant control rooms. 3. At flight control centers. 4. In video games. 5. In automobile industry.
14 Blue Eyes StructureBlue eyes technology requires designing a personal area network.*Blue eyes consists of :mobile measuring device calledData Acquisition Unit (DAU) .a central analytical system called Central System Unit (CSU).
15 DAU Features Lightweight Runs on batteries low power Consumption Easy to use.ID cards for operatorauthorization.
16 DAU- It maintains Bluetooth connections. - Gets information from the sensor. - Sends information over the wireless connection. - Delivers the alarm messages sent from the Central System Unit (CSU) to the operator.
17 CSU - features Connection .management Data processing Visualization Data recordingAccess verificationSystem maintenance
18 CSU- Maintains Bluetooth connections in the other side. - Buffers incoming sensor data. - Performs on-line data analysis. - Records the conclusion for further exploration. - Provides visualization interface.
19 * Users belong to three categories: Type of users* Users belong to three categories:UsersOperatorsSupervisorsSystem administrators
20 :Operator: -Operator is a person whose physiological parameters are supervised. - The operator wears the DAU. - The only functions offers to the operator are Authorization to the systemand receiving alarm alerts. Supervisor: -He is the person responsible for analyzing operators' condition and performance. System Administrator: -He is the user that maintains the system. The administrator can:- Adding new operators to the database.-Defining alarm conditions. -Configuring logging tools. -Creating new analyzer modules.
21 Conclusion :-Provide more user friendly facilities in computing devices. -Gap between the electronic and physical World is reduce. -The computer can be run using implicit commands instead of the explicit commands.