Provide more delicate and user friendly facilities in computing devices .Gap between the electronic and physical world is reduced. The computers can b...
A fingerstyle arrangement of Behind Blue Eyes as made famous by Limp Bizkit
Limp Bizkit - Behind Blue Eyes [Guitar Tab]
MVFV,G,Descripción completa
Sheet music
Full description
Dark Eyes music bookFull description
wayne shorter
eyesDescrição completa
Análisis del montaje de la película Snake Eyes (Brian de Palma, 1998)Descripción completa
Descripción: spanish
Description complète
angel eyes sheet musicDescription complète
dry eyeFull description
Description complète
Full description
BLUE EYES TECHNOLOGY
1
WHAT WHA T IS BLUE BLU E EYES TECHNOLOGY? TEC HNOLOGY? Aims at creating computational machines that have perceptual and sensory ability.
Use camera and microphone to identify user actions and emotions
2
The term BLUE EYES
BLUE in the term stands for Bluetooth, which enables reliable wireless communication
EYES , because the eye movement enables us to obtain a lot of interesting and important information.
3
NEED OF BLUE EYES TECHNOLOGY
To build a machine that can understand your emotions A pc that can listen, talk or scream Verify your identity, feels your presence and interact with you.
4
TECHNOLGIES USED
Emotion Mouse
Manual And Gaze Input Cascaded (MAGIC)
Artificial Intelligent Speech Recognition
Simple User Interest Tracker (SUITOR)
The eye movement Sensor 5
EMOTION MOUSE
Simplest way
People spend approximately 1/3 of their total computer time touching input device
Physiological data is obtained and emotional state is determined
A user model will be built that reflects the personality of user.
6
MAGIC POINTING
Reduce the cursor movement needed for target selection
Click on the target with a regular manual input device
Two magic pointing techniques
Liberal
Conservative 7
APPROACHES
LIBERAL APPROACH To warp the cursor to every new object user looks at
CONSERVATIVE APPROACH Does not warp the cursor target until the manual input device has been actuated 8
ARTIFICIAL INTELLIGIENT SPEECH RECOGNITION
Input words are scanned and matched against internally stored words
Identification causes some action to be taken User speaks to the computer through microphone
Filtered and fed to ADC and then stored in RAM pattern matching is designed to look for the best fit because of variations in loudness, pitch, frequency difference, time gap etc. 9
SUITOR
Help by fetching more information at desktop
Notice where the user’s eyes focus on the screen
Fills a scrolling ticker on a computer screen with information related to user’s task
Ex. If reading headline ,pops up the story in the browser window 10
THE EYE MOVEMENT SENSOR DESIGNING A personal area network for linking all the operators and the supervising system
Two major units - DAU (data acquisition unit ) - CSU (central system unit )
11
DAU The DAU consists of the following components ATMEL 8952 microcontroller
BLUE TOOTH MODULE – supports synchronous voice
data transmission
central system sound feedback
microcontroller (115200 bps)
ALPHAUNUMERIC LCD display
LED indicators
ID CARD interface
12
DAU - features Data Acquisition Unit Atmel 89C52 microcontroller
Jazz Multisensor
Lightweight
Runs on batteries - low power consumption
Bluetooth
Easy to use - does not disturb the operator working
ID cards for operator authorization
Voice transmission using hardware PCM codec 13
CSU – COMPONENTS CONNECTION MANAGER – main task to perform low-level blue tooth communication
DATA ANALYSIS MODULE – performs the analysis of the raw sensor data
DATA LOGGER MODULE – provides support for storing the monitored data.
VISULAIZATION MODULE – provides user interface for the supervisors
14
Csu features Connection
management
Data processing
Central System Unit
Bluetooth
Connection Manager
Visualization Module
Data Analysis
Data Logger
Data recording
Access
verification
System
maintenance 15
multisensors
16
Future improvements
DAU small CMOS camera to monitor the operator’s point of gaze single PCB (SMD technology) low voltage ICs
CSU data mining algorithms advanced data- base encryption using
17
Data security
Only registered mobile devices can connect to the system
Bluetooth connection authentication & encryption
Access rights restrictions
Personal and physiological data encryption 18
applications
In retailing record and interpret customer movements
In automobile industry
In video games
Power station
Flight control centres
o
Operating theatres
19
BLUE EYES ENABLED DEVICES
POD Technology used in cars
PONG A Robot 20
CONCLUSION
Provide more delicate and facilities in computing devices
user
friendly
Gap between the electronic and physical world is reduced
The computers can be run using implicit commands instead of the explicit commands
For More Information : http://sree.cc/articles/blue-eyes-technology 21