Blue Eye TECHNOLOGY. Outline: Introduction How can we make computers “see” and “ feel” ...

Post on 01-Apr-2015

234 views 3 download

Transcript of Blue Eye TECHNOLOGY. Outline: Introduction How can we make computers “see” and “ feel” ...

Blue Eye

T E C HNOL OGY

Outline: Introduction How can we make computers “see” and “ feel” How was the term blue-eyes coined? What is Blue Eyes? Need for Blue Eyes What can we do with blue eyes technology? - What is Blue Eyes not? Applications of blue eyes technology Blue Eyes Structure

Introduction

Imagine yourself in a world where humans interact with computers .

You are sitting in front of your personal computer that can see, feel, listen, talk, or even scream

aloud .

How can we make computers “see”and “feel”

Using sensing technology like camera and microphone to identify a user’s actions and to extract key information.

Information is then analyzed to determine the user’s physical, emotional ,or informational state

How was the term blue-eyes coined?

Blue in this term stands for Bluetooth, which enables reliable wireless

communication. Eyes because the eye movement

enables us to obtain a lot of interesting and important information .

What is Blue Eyes?

Is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human.

The basic idea behind this technology is to give computer human power.

How can we give computer the human power?

-The blue eyes checks the physiological parameters like eye movement, heart beat rate and blood oxygenation.

-The use of a miniature CMOS camera integrated into the eye movement sensor.

-voice recognition algorithm will facilitate the communication between the operator and the central system.

Need for blue eyes

To built a machine that can understand your emotions.

A pc that can listen, talk or scream.

Verify your identity, feels your presence and interact with you.

What can we do with blue eyes technology?

-gather information about you and interact with you through special

techniques like facial recognition ,speech recognition, etc.

-The computer can understand what a user wants, where he is looking at, and realize his physical or emotional states.

cont. -understand your emotions at the touch of the

mouse.

What is Blue Eyes not?

Doesn’t predict nor interfere with operator’s thoughts.

Cannot force directly the operator to work.

Applications of blue eyes technology

1 .In every working environment requiring permanent operator's attention.

2 .At power plant control rooms.

3 .At flight control centers.

4 .In video games.

5 .In automobile industry.

Blue Eyes StructureBlue eyes technology requires designing a personal area network.

*Blue eyes consists of: mobile measuring device called Data Acquisition Unit (DAU) . a central analytical system called Central System Unit (CSU).

DAU Features

Lightweight

Runs on batteries low

power Consumption

Easy to use.

ID cards for operator

authorization.

DAU

-It maintains Bluetooth connections.

- Gets information from the sensor.

- Sends information over the wireless

connection.

- Delivers the alarm messages sent from the

Central System Unit (CSU) to the operator.

CSU - features

Connection.management

Data processing

Visualization

Data recording

Access verification

System maintenance

-Maintains Bluetooth connections in the other

side.

- Buffers incoming sensor data.

- Performs on-line data analysis.

- Records the conclusion for further

exploration.

- Provides visualization interface.

CSU

Type of users

*Users belong to three categories:

Users

Operators Supervisors System administrators

:Operator:

-Operator is a person whose physiological parameters are supervised.- The operator wears the DAU.- The only functions offers to the operator are Authorization to the system

and receiving alarm alerts.

Supervisor:-He is the person responsible for analyzing operators' condition and performance.

System Administrator:-He is the user that maintains the system.The administrator can:

- -Adding new operators to the database .--Defining alarm conditions.

-Configuring logging tools.-Creating new analyzer modules.

-Provide more user friendly facilities in computing devices.

-Gap between the electronic and physical World is reduce.

-The computer can be run using implicit commands instead of the explicit commands.

Conclusion:

Manar Al-Nejadi

Done by:

Nada Al-Twala

&