Blue Eye T E C H N O L G Y.

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Law Office. Law Office Solutions.
Advertisements

Aspire Vertical Markets Executive Suite Solution.
Manar Mousa Al-Hamaidi
A.Mani Kumari 07A21F0007.  Introduction  Definition  Working  Applications  Drawbacks  Conclusion.
SensMax People Counting Solutions Visitors counting makes the most efficient use of resources - people, time and money, which leads to higher profits in.
BIOMETRIC VOTING SYSTEM
BlueEyes Human Operator Monitoring System BlueEyes Conscious brain involvement monitor By:-Piyush Kumar Sunil Kumar Sharma Information technology (Vth.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
PulseHR Time and Attendance software development and coding web development, web hosting IT project management and consulting Str. Ghioceilor.
RAPID Robotic Arm empowering People wIth Disabilities Contact person: Market: Assistive.
Page 1 SIXTH SENSE TECHNOLOGY Presented by: KIRTI AGGARWAL 2K7-MRCE-CS-035.
Introduction (Font: Arial 44) Please prepare your poster according to the following specifications: (Font: Arial 32) 1.Poster size 100 cm X 70 cm. 2.All.
BlueEyes Human Operator Monitoring System BlueEyes Human-Operator Monitoring System Poznań University of Technology, Poland Team.
The Museum Project The Museum Project Yoav Gvili & Asaf Stein Supervisor : Alexander Arlievsky.
BLUE EYES is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human beings. The basic.
1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal Video Conference Archives Indexing System Supervisor: Prof Michael Lyu Presented by: Lewis Ng,
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Final Presentation.
Network Done by: Athra sultan.
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
 At the end of this class, students are able to  Describe definition of input devices clearly  List out the examples of input devices  Describe.
SG-VoIP Page 1 / 14 PLANET Pan / Tilt Internet Camera Internet Surveillance Solution.
Karthiknathan Srinivasan Sanchit Aggarwal
The New Medical Device Audio & Video Player The interactive learning tool that is full of possibilities! from CMO Digital.
ASSISTIVE TECHNOLOGY PRESENTED BY ABDUL BARI KP. CONTENTS WHAT IS ASSISTIVE TECHNOLOGY? OUT PUT: Screen magnifier Speech to Recogonizing system Text to.
Control Over WirelessHART Network S. Han, X. Zhu, Al Mok University of Texas at Austin M. Nixon, T. Blevins, D. Chen Emerson Process Management.
Ruslan Masinjila Aida Militaru.  Nature of the Problem  Our Solution: The Roaming Security Robot  Functionalities  General System View  System Design.
Presentation by: K.G.P.Srikanth. CONTENTS  Introduction  Components  Working  Applications.
11.10 Human Computer Interface www. ICT-Teacher.com.
Mobile Controlled Car Students : Tasneem J. Hamayel Hanan I. Mansour Supervisor : Dr.Aladdin.
Submitted by:- Vinay kr. Gupta Computer Sci. & Engg. 4 th year.
Aspire Vertical Markets Healthcare Solutions (Doctor’s office and Clinics)
PowerPoint 2007 This presentation demonstrates the new capabilities of PowerPoint through examples. You can view it in Slide Show or by browsing through.
A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.
PRESENTED BY SUBHASMITA SATPATHY REGD NO :
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Alarm Network System Supervised by: Dr. Luai Malhis. Prepared by: Mahmoud Musa & Mustafa Assaf.
NETWORK EVOLUTION IN COMING 10 YEARS: WHAT'S THE FUTURE OF NETWORK? VAN CHANNA 4 th Oct 2014 Kameyama Lab, GITS Waseda University.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Blue eye technology Contents What is BlueEye technology ? What is BlueEye technology ? What is BlueEyes ? What is BlueEyes ? System.
Numonic White Board Softkey Wireless Setup White Board Technology The interactive whiteboards by Numonics.
Technology In The Classroom Intergration of Technology Using a Whiteboard Web-based Learning.
Introduction (Font: Arial 44) Please prepare your poster according to the following specifications: (Font: Arial 32) 1.Poster size 100 cm X 70 cm. 2.All.
interactive logbook Paul Kiddie, Mike Sharples et al. The Development of an Application to Enhance.
Controlling Computer Using Speech Recognition (CCSR) Creative Masters Group Supervisor : Dr: Mounira Taileb.
Cevgroup.org C utting E dge V isionaries. cevgroup.org TODAY’s TALK 1) Internet Of Things (IoT) 2) Wi-Fi Controlled Robots 3) Augmented Reality.
Prepared by : Jakasaniya Ravi Roll no : MCA13
Copyright©2008 N.AlJaffan®KSU1 Introduction to Computers Created By: N.AlJaffan Modified By: N.AlShehri Chapter 1.
JAI NARAIN COLLEGE OF TECHNOLOGY BHOPAL JAI NARAIN COLLEGE OF TECHNOLOGY BHOPAL “BLUE EYE TECHNOLOGY” “BLUE EYE TECHNOLOGY” SUBMITTED TO SUBMITTED BY SUBMITTED.
Blue Eyes Submitted By: Shohada Sharmin Roll:03 Regi:00905.
BlueEyes Human Operator Monitoring System BlueEyes Human-Operator Monitoring System PRESENTED BY:- AYUSHI TYAGI B1803B37.
Prepared byMIDHUN.T CHM S5.  Aims at creating computational machines that have perceptual and sensory ability like those of human beings.  Use camera.
Blue Eye Technology By: ARUN DIXIT. CONTENTS Motivation What is BlueEye technology ? What is BlueEyes ? System designing System overview DAU CSU IBM research.
Blue eyes ( blue eyes – Human operator monitoring system ) Presented by Shilpa.m(1rg07cs079) Under the guidence M. saranya M s. saranya Lecturer,cse dept.
Presented by TRIPTI TRIPATHI EC Final year. WHAT IS BLUE EYE TECHNOLOGY? Aim at creating computational machine that have perceptual and sensory ability.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
Perceptive Computing Democracy Communism Architecture The Steam Engine WheelFire Zero Domestication Iron Ships Electricity The Vacuum tube E=mc 2 The.
Blue eye technology Prepared by VINIT SHAH 08 CE 099.
Seminar On Blue Eyes Submitted By: Ghaytadak Satish Laxman.
Title of the Poster (Font: Arial 72)
Security service management of tomorrow
PARKING AUTOMATION SYSTEM
Human-Operator Monitoring System
11.10 Human Computer Interface
Alaa Omar Rana Diab Supervised by Dr.Raed Jaber
How SCADA Systems Work?.
What is blue eyes ? aims on creating computational machines that have perceptual and sensory ability like those of human beings. interactive computer.
Title of the Poster (Font: Arial 72)
 As the idea is to monitor and record operator’s basic physiological parameters, the most important physiological activity is the movement of eyes. 
Presentation transcript:

Blue Eye T E C H N O L G Y

Outline: Introduction How can we make computers “see” and “ feel” How was the term blue-eyes coined? What is Blue Eyes? Need for Blue Eyes What can we do with blue eyes technology? - What is Blue Eyes not? Applications of blue eyes technology Blue Eyes Structure

Introduction Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that can see, feel, listen, talk, or even scream aloud.

How can we make computers “see”and “feel ” Using sensing technology like camera and microphone to identify a user’s actions and to extract key information. Information is then analyzed to determine the user’s physical, emotional ,or informational state

How was the term blue-eyes coined? Blue in this term stands for Bluetooth, which enables reliable wireless communication . Eyes because the eye movement enables us to obtain a lot of interesting and important information.

What is Blue Eyes ? Is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human.

The basic idea behind this technology is to give computer human power.

How can we give computer the human power? -The blue eyes checks the physiological parameters like eye movement, heart beat rate and blood oxygenation. - The use of a miniature CMOS camera integrated into the eye movement sensor. - voice recognition algorithm will facilitate the communication between the operator and the central system. will enable the system to calculate the point of gaze and observe what the operator is actually looking at2

Need for blue eyes To built a machine that can understand your emotions. A pc that can listen, talk or scream. Verify your identity, feels your presence and interact with you.

What can we do with blue eyes technology? - gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. -The computer can understand what a user wants, where he is looking at, and realize his physical or emotional states. For instance if you ask the computer to dial to your friend at his office, it understands the situation and establishes a connection.

cont. - understand your emotions at the touch of the mouse.

What is Blue Eyes not? Doesn’t predict nor interfere with operator’s thoughts. Cannot force directly the operator to work.

Applications of blue eyes technology 1. In every working environment requiring permanent operator's attention. 2. At power plant control rooms. 3. At flight control centers. 4. In video games. 5. In automobile industry.

Blue Eyes Structure Blue eyes technology requires designing a personal area network. *Blue eyes consists of : mobile measuring device called Data Acquisition Unit (DAU) . a central analytical system called Central System Unit (CSU).

DAU Features Lightweight Runs on batteries low power Consumption Easy to use. ID cards for operator authorization.

DAU - It maintains Bluetooth connections. - Gets information from the sensor. - Sends information over the wireless connection. - Delivers the alarm messages sent from the Central System Unit (CSU) to the operator.

CSU - features Connection .management Data processing Visualization Data recording Access verification System maintenance

CSU - Maintains Bluetooth connections in the other side. - Buffers incoming sensor data. - Performs on-line data analysis. - Records the conclusion for further exploration. - Provides visualization interface.

* Users belong to three categories: Type of users * Users belong to three categories: Users Operators Supervisors System administrators

:Operator: -Operator is a person whose physiological parameters are supervised. - The operator wears the DAU. - The only functions offers to the operator are Authorization to the system and receiving alarm alerts. Supervisor: -He is the person responsible for analyzing operators' condition and performance. System Administrator: -He is the user that maintains the system. The administrator can: - Adding new operators to the database. -Defining alarm conditions. -Configuring logging tools. -Creating new analyzer modules.

Conclusion : -Provide more user friendly facilities in computing devices. -Gap between the electronic and physical World is reduce. -The computer can be run using implicit commands instead of the explicit commands.

Done by: Manar Al-Nejadi Nada Al-Twala &