SlideShare a Scribd company logo
1 of 41
BLUE EYES TECHNOLOGY BY: S.Madhumitha.
Why blue eyes technology? A study has shown that people with personalities that are similar or complement each other collaborate well. Dryer (1999) has also shown that people view their computer as having a personality.  For these reasons, it is important to develop computers which can work well with its user. This is where the blue eyes technology comes into force. The ABILITIES:to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc.  It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presence, and starts interacting with you
OBJECTIVES: creatingcomputational machines that have perceptual and sensory ability like those of human beings. It uses : (1)non-obtrusive sensing method,  (2)employing most modern video cameras and (3)microphones  to identifies the users actions through the use of imparted sensory abilities .  The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.  Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners.
EMOTION MOUSE
EMOTION MOUSE The diff. ways of getting info could possibly include:      Since  a user is mostly in direct contact with an input device, say a mouse, a mouse is an apt way to gather info
Ekman’s Facial Action Coding System In order to start creating smart computers, the computer must start gaining information about the user SCOPE:to have the computer  adapt to the user in order to create a better working environment where the user is more productive. LOGIC: There is always a correlation between a person’s emotional state and a person’s physiological measurements
So various physiological measurements could be used to distinguish various emotional states.  They are:
Data Analysis: The data corresponding to the various physiological measurements is subjected to 2 analysis:
Overall result of analysis: these four physiological measures are sufficient to determine reliably a person’s specific emotional state. One can take these measurements from the hand. The amount of conductivity of the skin is best taken from the fingers. Changes in the temperature of the finger are reliable for prediction of emotion and by change in movement in the computer mouse.
EXPERIMENTAL DESIGN The diff. instruments used in the measurement of  various physiological measurements are:
THE EXPERIMENT: Participants were asked to sit in front of the computer and hold the temperature and GSR sensors in their left hand hold the mouse with their right hand and wore the chest sensor.  The resting (baseline) measurements were recorded for five minutes and then the participant was instructed to act out one emotion for five minutes.  The emotions consisted of:  				1.anger,  				2.fear,  				3.sadness,  				4.disgust,  				5.happiness and 				6.surprise.
 The only instruction for acting out the emotion was to show the emotion in their facial expressions. The sampling rates of diff. measurements: And now by performing certain calculations with these scores and treating those scores which deviated a lot as missing, 1st analysis is completed.
In order to determine whether the measures of physiology could discriminate among the six different emotions, the data is analyzed with a discriminant function analysis.  Now based on the data the emotion was predicted for the samples which did not deviate much from the mean and two-thirds of the cases were successfully classified.
CLASSIFICATION RESULTS:
ADDITIONAL IMPROVISATION RECOMMENDED: Now that we have proven the method, the next step is to improve the hardware.  Instead of using cumbersome multimeters to gather information about the user, it will be better to use smaller and less intrusive units.  We can use infrared pulse detector which can be placed inside the body of the mouse.  Also, a framework for the user modeling needs to be develop in order to correctly handle all of the information after it has been gathered.
MANUAL AND GAZE INPUT CASCADED (MAGIC) POINTING
What is it? This work explores a new direction in utilizing eye gaze for computer input.  Gaze tracking has long been considered as an alternative or potentially superior pointing method for computer input.  But there are many fundamental limitations existing with traditional gaze pointing.For an example, the user has to be aware of the eye movements. But with MAGIC (an improved form of eye gazing),a large portion of the cursor movement is eliminated by warping the cursor to the eye gaze area, which encompasses the target There are two techniques:(1)conservative,(2)liberal.
THE PROs AND CONs: ADVANTAGES:              Reduced physical effort and fatigue as compared to traditional manual pointing, greater accuracy and naturalness than traditional gaze pointing, and possibly faster speed than manual pointing. DISADVANTAGES:              (1).First, given the one-degree size of the fovea and the subconscious jittery motions that the eyes constantly produce, eye gaze is not precise enough to operate UI widgets such as scrollbars, hyperlinks, and slider handles.               (2). Eye has not evolved to be a control organ. Sometimes its movements are voluntarily controlled while at other times it is driven by external events. With the target selection by dwell time method, considered more natural than selection by blinking, one has to be conscious of where one looks and how long one looks at an object
TARGET ACTIVATION: If one does not look at a target continuously for a set threshold (e.g., 200 ms), the target will not be successfully selected.  On the other hand, if one stares at an object for more than the set threshold, the object will be selected, regardless of the user’s intention.  In some cases there is not an adverse effect to a false target selection.  Other times it can be annoying and counter-productive (such as unintended jumps to a web page).
ACTUAL WORKING: In MAGIC, pointingand selection remains primarily  a manual control task but it is aided by gaze tracking. The key idea is to use gaze to dynamically redefine (warp) the “home” position of the pointing cursor to be at the vicinity of the target, which was presumably what the user was looking at, thereby effectively reducing the cursor movement amplitude needed for target selection.  Once the cursor position had been redefined, the user would need to only make a small movement to, and click on, the target with a regular manual input device
Liberal technique: Here the cursor automatically moves to the point where the user is staring or at least to its vicinity. The liberal approach may appear “pro-active”, since the cursor waits readily in the vicinity of or on every potential target.  The user may also feel that the cursor is over-active when he is merely looking at a target.
Conservative: This technique does not warp a cursor to a target until the manual input device has been actuated.  Once the manual input device has been actuated the cursor is warped to the gaze area reported by the eye tracker. This area should be on or in the vicinity of the target. The user would then steer the cursor annually towards the target to complete the target acquisition.  Once the user looks at a target and moves the input device, the cursor will appear “out of the blue” in motion towards the target,
Potential advantages of MAGIC pointing techniques: Reduction of manual stress and fatigue. Practical accuracy level in comparison to traditional pure gaze pointing.  The user does not have to be aware of the role of the eye gaze. Speed. {Fitts’ Law, manual pointing time is logarithmically proportional to the A/W ratio, where A is the movement distance and W is the target size. In other words, targets which are smaller or farther away take longer to acquire. } Improved subjective speed and ease-of-use.
Changes recommended: The cursor warping can be overactive at times, which could be particularly distracting when the user is trying to read. So,Whenthe user’s eye appears to follow a text reading pattern, MAGIC pointing can be automatically suppressed. conservative MAGIC pointing technique adopts a cumbersome strategy: take a touch, wait , and move. Such a strategy may prolong the target acquisition time. The user has to learn a novel hand-eye coordination pattern to be efficient.  Clearly, experimental (implementation and empirical) work is needed to validate, refine, or invent alternative MAGIC pointing techniques.
THE EYE TRACKER One can purchase the a commercial eye tracker (ASL Model 5000), this system is much more compact and reliable.  It is still not robust enough for a variety of people with different eye characteristics, such as pupil brightness and correction glasses. Available commercial systems rely on a single light source that is  positioned either off the camera axis or on-axis. Illumination from an off-axis source (or ambient illumination) generates a dark pupil image.
Dark and bright images: When the light source is placed on-axis with the camera optical axis, the camera is able to detect the light reflected from the interior of the eye, and the image of the pupil appears bright The Almaden system uses two near infrared (IR) time multiplexed light sources, composed of two sets of IR LED's, which were synchronized with the camera frame rate. Bright(left) and dark(right) images resulting from on and off axis illumination. The glints, or corneal reflections, from the on- and off-axis light sources can be easily identified as the bright points in the iris.
Identification of the pupil: One light source is placed very close to the camera's optical axis and is synchronized with the even frames.  Odd frames are synchronized with the second light source, positioned off axis.  The two light sources are calibrated to provide approximately equivalent whole-scene illumination.  Pupil detection is realized by means of subtracting the dark pupil image from the bright pupil image.  After thresholding the difference, the largest connected component is identified as the pupil.  This technique significantly increases the robustness and reliability of the eye tracking system. This is similar pupil detection schemes independently developed by Tomonoetal and Ebisawa and Satoh. But such a method has not been used in the commercial systems.
Implementing MAGIC pointing: The MAGIC pointing program takes data from both the manual input device and the eye tracking system running either on the same machine or on another machine connected via serial port.  Raw data from an eye tracker can not be directly used for gaze-based interaction, due to noise from image processing, eye movement jitters, and samples taken during saccade (ballistic eye movement) periods.
One has to experiment with various filtering techniques. The goal of filter design in general is to make the best compromise between preserving signal bandwidth and eliminating unwanted noise.  Samples collected during a saccade are unwanted and should be avoided.  In designing our algorithm for picking points of fixation, consider our tracking system speed (30 Hz), and that the MAGIC pointing techniques utilize gaze information only once for each new target, probably immediately after a saccade.  Our filtering algorithm was designed to pick a fixation with minimum delay by means of selecting two adjacent points over two samples.
ARTIFICIAL INTELLIGENT SPEECH RECOGNITION
HURDLES OF SPEECH RECOGNITION: It is important to consider the environment in which the speech recognition system has to work:  			(1)The grammar used by the speaker and accepted by the system,  			(2)noise level,  			(3)noise type,  			(4)position of the microphone and  			(5)speed and manner of the user’s speech are some factors that may affect the quality of speech recognition   The best example for speech recognition system : an automatic call-handling system is used without employing any telephone operator.
 THE TECHNOLOGY Two basic ideas: AI makes machines smarter and more useful, and is less expensive than natural intelligence.  Natural language processing (NLP) refers to artificial intelligence methods of communicating with a computer in a natural language like English. The main objective of a NLP program is to understand input and initiate action. The input words are scanned and matched against internally stored known words. Identification of a key word causes some action to be taken.
SPEECH RECOGNITION
Search process The search process takes a considerable amount of time, as the CPU has to make many comparisons before recognition occurs.  This necessitates use of very high-speed processors.  A largeRAM is also required as even though a spoken word may last only a few hundred milliseconds, but the same is translated into many thousands of digital words.  It is important to note that alignment of words and templates are to be matched correctly in time, before computing the similarity score.  This process, termed as dynamic time warping, recognizes that different speakers pronounce the same words at different speeds as well as elongate different parts of the same word.
MAJOR APPLICATIONS: Lets user do other works simultaneously: The user can concentrate on observation and manual operations, and still control the machinery by voice input commands. Military operations: Voice control of weapons is an example. With reliable speech recognition equipment, pilots can give commands and information to the computers by simply speaking into their microphones—they don’t have to use their hands for this purpose. An Radiologist scanning hundreds of X-rays, ultra sonograms, CT scans and simultaneously dictating conclusions to a speech recognition system connected to word processors. For making airline and hotel reservations: A user requires simply to state his needs, to make reservation, cancel a reservation, or make enquiries about schedule.
THE SIMPLE USER INTERST TRACKER (SUITOR)
Why SUITOR? Computers would have been much more powerful, had they gained perceptual and sensory abilities of the living beings on the earth. What needs to be developed is an intimate relationship between the computer and the humans. By observing the Webpage a netizen is browsing, the SUITOR can help by fetching more information at his desktop. By simply noticing where the user’s eyes focus on the computer screen, the SUITOR can be more precise in determining his topic of interest. The success lies in how much the suitor can be intimate to the user
Paul Maglio’S take on SUITOR: SUITOR fills a scrolling ticker on a computer screen with information related to the user's current task.   "If I'm reading a Web page about IBM, for instance," says Paul Maglio, the Almaden cognitive scientist who invented SUITOR, "the system presents the latest stock price or business news stories that could affect IBM. If I read the headline off the ticker, it pops up the story in a browser window. If I start to read the story, it adds related stories to the ticker. That's the whole idea of an attentive system—one that attends to what you are doing, typing, reading, so that it can attend to your information needs."
THE FUTURE FOR BLUE EYES: The nineties witnessed quantum leaps interface designing for improved man machine interactions.  The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices.  Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units.  The day is not far when this technology will push its way into your house hold, making you more lazy. It may even reach your hand held mobile device.  Any way this is only a technological forecast.
But definitely BLUE EYES TECHNOLOGY is the future. After all who would not want to own a computer that    (1)can easily adapt to your mood,    (2)perform tasks the moment you “actually tell” it what you want    (3)help you by gathering more additional information    (4)saves you the job of having to move your cursor to a long distance    (5)with further additions, can even help to monitor your health.
THANK YOU

More Related Content

What's hot

Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)Mydul Islam Rashed
 
Blue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEBlue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEUtkarsh Lokpriye
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technologyrahuldikonda
 
Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1keerthi k
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYShehin Pm
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGYChaitanya Ram
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eyeanju ann
 
Seminar report on blue eyes
Seminar report on blue eyesSeminar report on blue eyes
Seminar report on blue eyesRoshmi Sarmah
 
Blue eyes technology ppt
Blue eyes technology pptBlue eyes technology ppt
Blue eyes technology pptijaranjani
 
Blue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationBlue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationVaibhav Kumar
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technologyarslan895
 
5.report (blue eye technology)
5.report (blue eye technology)5.report (blue eye technology)
5.report (blue eye technology)JIEMS Akkalkuwa
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimssomadhavsolanki
 
Blue Eyes Technology - Power Point Presentation
Blue Eyes Technology - Power Point Presentation Blue Eyes Technology - Power Point Presentation
Blue Eyes Technology - Power Point Presentation JoobleTPuthiyamadam
 
Blue Eyes Technology PPT
Blue Eyes Technology PPTBlue Eyes Technology PPT
Blue Eyes Technology PPTHRIDHYAJOY
 

What's hot (20)

Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)
 
Blue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEBlue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYE
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
 
Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eye
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Seminar report on blue eyes
Seminar report on blue eyesSeminar report on blue eyes
Seminar report on blue eyes
 
Blue eyes technology ppt
Blue eyes technology pptBlue eyes technology ppt
Blue eyes technology ppt
 
Blue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationBlue Eye Technology Seminar Presentation
Blue Eye Technology Seminar Presentation
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
5.report (blue eye technology)
5.report (blue eye technology)5.report (blue eye technology)
5.report (blue eye technology)
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimsso
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue Eyes Technology - Power Point Presentation
Blue Eyes Technology - Power Point Presentation Blue Eyes Technology - Power Point Presentation
Blue Eyes Technology - Power Point Presentation
 
Blue Eyes Technology PPT
Blue Eyes Technology PPTBlue Eyes Technology PPT
Blue Eyes Technology PPT
 

Similar to Blue Eyes Technology

20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdfYasmin297583
 
Eye tracking – an innovative monitor
Eye tracking – an innovative monitorEye tracking – an innovative monitor
Eye tracking – an innovative monitorSakthi Sivaraman S
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYgeothomas18
 
Master thesis 2
Master thesis 2Master thesis 2
Master thesis 2Jb Soni
 
eye tracking system and formulation
eye tracking system and formulationeye tracking system and formulation
eye tracking system and formulationsavesun
 
Eyetracking
EyetrackingEyetracking
EyetrackingMD Shafe
 
Eye Tracking Interpretation System
Eye Tracking Interpretation SystemEye Tracking Interpretation System
Eye Tracking Interpretation Systemkurkute1994
 
Eye Tracking Software model of left right all
Eye Tracking Software model of left right allEye Tracking Software model of left right all
Eye Tracking Software model of left right allAtharvaTanawade
 
A computer vision based virtual mouse
A computer vision based virtual mouseA computer vision based virtual mouse
A computer vision based virtual mouseStudentRocks
 
ICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses PapersICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses PapersChun-Feng Chen
 
Cursor Movement with Eyeball
Cursor Movement with EyeballCursor Movement with Eyeball
Cursor Movement with EyeballIRJET Journal
 
Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Ajith Kumar Ravi
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAijcseit
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAijcseit
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAijcseit
 
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIA
E YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIAE YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIA
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIAijcsit
 
Eye Gaze Tracking With a Web Camera in a Desktop Environment
Eye Gaze Tracking With a Web Camera in a Desktop EnvironmentEye Gaze Tracking With a Web Camera in a Desktop Environment
Eye Gaze Tracking With a Web Camera in a Desktop Environment1crore projects
 

Similar to Blue Eyes Technology (20)

ABSTRACT
ABSTRACTABSTRACT
ABSTRACT
 
20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf
 
Eye tracking – an innovative monitor
Eye tracking – an innovative monitorEye tracking – an innovative monitor
Eye tracking – an innovative monitor
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGY
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
 
Master thesis 2
Master thesis 2Master thesis 2
Master thesis 2
 
eye tracking system and formulation
eye tracking system and formulationeye tracking system and formulation
eye tracking system and formulation
 
Eyetracking
EyetrackingEyetracking
Eyetracking
 
Eye Tracking Interpretation System
Eye Tracking Interpretation SystemEye Tracking Interpretation System
Eye Tracking Interpretation System
 
Eye Tracking Software model of left right all
Eye Tracking Software model of left right allEye Tracking Software model of left right all
Eye Tracking Software model of left right all
 
A computer vision based virtual mouse
A computer vision based virtual mouseA computer vision based virtual mouse
A computer vision based virtual mouse
 
ICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses PapersICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses Papers
 
Cursor Movement with Eyeball
Cursor Movement with EyeballCursor Movement with Eyeball
Cursor Movement with Eyeball
 
Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Blue eyes technology New Version 2017
Blue eyes technology New Version 2017
 
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIA
E YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIAE YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIA
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIA
 
Eye Gaze Tracking With a Web Camera in a Desktop Environment
Eye Gaze Tracking With a Web Camera in a Desktop EnvironmentEye Gaze Tracking With a Web Camera in a Desktop Environment
Eye Gaze Tracking With a Web Camera in a Desktop Environment
 

More from Colloquium

Blue Eyes Technology Abstract
Blue Eyes Technology AbstractBlue Eyes Technology Abstract
Blue Eyes Technology AbstractColloquium
 
Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)Colloquium
 
Virtualization
VirtualizationVirtualization
VirtualizationColloquium
 
Nanotechnology Abstract
Nanotechnology AbstractNanotechnology Abstract
Nanotechnology AbstractColloquium
 
Vinod Robotics
Vinod RoboticsVinod Robotics
Vinod RoboticsColloquium
 
Nanotechnology
NanotechnologyNanotechnology
NanotechnologyColloquium
 
Ce Ppt Sourabh
Ce Ppt SourabhCe Ppt Sourabh
Ce Ppt SourabhColloquium
 
Wireless Charging
Wireless ChargingWireless Charging
Wireless ChargingColloquium
 
Hybrid Electric Vehicles
Hybrid Electric VehiclesHybrid Electric Vehicles
Hybrid Electric VehiclesColloquium
 
Particle Image Velocimetry
Particle Image VelocimetryParticle Image Velocimetry
Particle Image VelocimetryColloquium
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software TestingColloquium
 
Innovations In Burglar Alarms Ppt
Innovations In Burglar Alarms PptInnovations In Burglar Alarms Ppt
Innovations In Burglar Alarms PptColloquium
 
Nanotechnology In Civil Engineering
Nanotechnology   In Civil   EngineeringNanotechnology   In Civil   Engineering
Nanotechnology In Civil EngineeringColloquium
 

More from Colloquium (20)

Blue Eyes Technology Abstract
Blue Eyes Technology AbstractBlue Eyes Technology Abstract
Blue Eyes Technology Abstract
 
Final Nano
Final NanoFinal Nano
Final Nano
 
Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Nanotechnology Abstract
Nanotechnology AbstractNanotechnology Abstract
Nanotechnology Abstract
 
Vinod Robotics
Vinod RoboticsVinod Robotics
Vinod Robotics
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 
Ce Ppt Sourabh
Ce Ppt SourabhCe Ppt Sourabh
Ce Ppt Sourabh
 
Remote
RemoteRemote
Remote
 
Nanotech.
Nanotech.Nanotech.
Nanotech.
 
E Business
E BusinessE Business
E Business
 
Wireless Charging
Wireless ChargingWireless Charging
Wireless Charging
 
Cryogenics
CryogenicsCryogenics
Cryogenics
 
Hybrid Electric Vehicles
Hybrid Electric VehiclesHybrid Electric Vehicles
Hybrid Electric Vehicles
 
Erp1
Erp1Erp1
Erp1
 
Particle Image Velocimetry
Particle Image VelocimetryParticle Image Velocimetry
Particle Image Velocimetry
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
Man Sew
Man SewMan Sew
Man Sew
 
Innovations In Burglar Alarms Ppt
Innovations In Burglar Alarms PptInnovations In Burglar Alarms Ppt
Innovations In Burglar Alarms Ppt
 
Nanotechnology In Civil Engineering
Nanotechnology   In Civil   EngineeringNanotechnology   In Civil   Engineering
Nanotechnology In Civil Engineering
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Blue Eyes Technology

  • 1. BLUE EYES TECHNOLOGY BY: S.Madhumitha.
  • 2. Why blue eyes technology? A study has shown that people with personalities that are similar or complement each other collaborate well. Dryer (1999) has also shown that people view their computer as having a personality. For these reasons, it is important to develop computers which can work well with its user. This is where the blue eyes technology comes into force. The ABILITIES:to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presence, and starts interacting with you
  • 3. OBJECTIVES: creatingcomputational machines that have perceptual and sensory ability like those of human beings. It uses : (1)non-obtrusive sensing method, (2)employing most modern video cameras and (3)microphones to identifies the users actions through the use of imparted sensory abilities . The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states. Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners.
  • 5. EMOTION MOUSE The diff. ways of getting info could possibly include: Since a user is mostly in direct contact with an input device, say a mouse, a mouse is an apt way to gather info
  • 6. Ekman’s Facial Action Coding System In order to start creating smart computers, the computer must start gaining information about the user SCOPE:to have the computer adapt to the user in order to create a better working environment where the user is more productive. LOGIC: There is always a correlation between a person’s emotional state and a person’s physiological measurements
  • 7. So various physiological measurements could be used to distinguish various emotional states.  They are:
  • 8. Data Analysis: The data corresponding to the various physiological measurements is subjected to 2 analysis:
  • 9. Overall result of analysis: these four physiological measures are sufficient to determine reliably a person’s specific emotional state. One can take these measurements from the hand. The amount of conductivity of the skin is best taken from the fingers. Changes in the temperature of the finger are reliable for prediction of emotion and by change in movement in the computer mouse.
  • 10. EXPERIMENTAL DESIGN The diff. instruments used in the measurement of various physiological measurements are:
  • 11. THE EXPERIMENT: Participants were asked to sit in front of the computer and hold the temperature and GSR sensors in their left hand hold the mouse with their right hand and wore the chest sensor. The resting (baseline) measurements were recorded for five minutes and then the participant was instructed to act out one emotion for five minutes. The emotions consisted of: 1.anger, 2.fear, 3.sadness, 4.disgust, 5.happiness and 6.surprise.
  • 12. The only instruction for acting out the emotion was to show the emotion in their facial expressions. The sampling rates of diff. measurements: And now by performing certain calculations with these scores and treating those scores which deviated a lot as missing, 1st analysis is completed.
  • 13. In order to determine whether the measures of physiology could discriminate among the six different emotions, the data is analyzed with a discriminant function analysis. Now based on the data the emotion was predicted for the samples which did not deviate much from the mean and two-thirds of the cases were successfully classified.
  • 15. ADDITIONAL IMPROVISATION RECOMMENDED: Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome multimeters to gather information about the user, it will be better to use smaller and less intrusive units. We can use infrared pulse detector which can be placed inside the body of the mouse. Also, a framework for the user modeling needs to be develop in order to correctly handle all of the information after it has been gathered.
  • 16. MANUAL AND GAZE INPUT CASCADED (MAGIC) POINTING
  • 17. What is it? This work explores a new direction in utilizing eye gaze for computer input. Gaze tracking has long been considered as an alternative or potentially superior pointing method for computer input. But there are many fundamental limitations existing with traditional gaze pointing.For an example, the user has to be aware of the eye movements. But with MAGIC (an improved form of eye gazing),a large portion of the cursor movement is eliminated by warping the cursor to the eye gaze area, which encompasses the target There are two techniques:(1)conservative,(2)liberal.
  • 18. THE PROs AND CONs: ADVANTAGES: Reduced physical effort and fatigue as compared to traditional manual pointing, greater accuracy and naturalness than traditional gaze pointing, and possibly faster speed than manual pointing. DISADVANTAGES: (1).First, given the one-degree size of the fovea and the subconscious jittery motions that the eyes constantly produce, eye gaze is not precise enough to operate UI widgets such as scrollbars, hyperlinks, and slider handles. (2). Eye has not evolved to be a control organ. Sometimes its movements are voluntarily controlled while at other times it is driven by external events. With the target selection by dwell time method, considered more natural than selection by blinking, one has to be conscious of where one looks and how long one looks at an object
  • 19. TARGET ACTIVATION: If one does not look at a target continuously for a set threshold (e.g., 200 ms), the target will not be successfully selected. On the other hand, if one stares at an object for more than the set threshold, the object will be selected, regardless of the user’s intention. In some cases there is not an adverse effect to a false target selection. Other times it can be annoying and counter-productive (such as unintended jumps to a web page).
  • 20. ACTUAL WORKING: In MAGIC, pointingand selection remains primarily a manual control task but it is aided by gaze tracking. The key idea is to use gaze to dynamically redefine (warp) the “home” position of the pointing cursor to be at the vicinity of the target, which was presumably what the user was looking at, thereby effectively reducing the cursor movement amplitude needed for target selection. Once the cursor position had been redefined, the user would need to only make a small movement to, and click on, the target with a regular manual input device
  • 21. Liberal technique: Here the cursor automatically moves to the point where the user is staring or at least to its vicinity. The liberal approach may appear “pro-active”, since the cursor waits readily in the vicinity of or on every potential target. The user may also feel that the cursor is over-active when he is merely looking at a target.
  • 22. Conservative: This technique does not warp a cursor to a target until the manual input device has been actuated. Once the manual input device has been actuated the cursor is warped to the gaze area reported by the eye tracker. This area should be on or in the vicinity of the target. The user would then steer the cursor annually towards the target to complete the target acquisition. Once the user looks at a target and moves the input device, the cursor will appear “out of the blue” in motion towards the target,
  • 23. Potential advantages of MAGIC pointing techniques: Reduction of manual stress and fatigue. Practical accuracy level in comparison to traditional pure gaze pointing. The user does not have to be aware of the role of the eye gaze. Speed. {Fitts’ Law, manual pointing time is logarithmically proportional to the A/W ratio, where A is the movement distance and W is the target size. In other words, targets which are smaller or farther away take longer to acquire. } Improved subjective speed and ease-of-use.
  • 24. Changes recommended: The cursor warping can be overactive at times, which could be particularly distracting when the user is trying to read. So,Whenthe user’s eye appears to follow a text reading pattern, MAGIC pointing can be automatically suppressed. conservative MAGIC pointing technique adopts a cumbersome strategy: take a touch, wait , and move. Such a strategy may prolong the target acquisition time. The user has to learn a novel hand-eye coordination pattern to be efficient. Clearly, experimental (implementation and empirical) work is needed to validate, refine, or invent alternative MAGIC pointing techniques.
  • 25. THE EYE TRACKER One can purchase the a commercial eye tracker (ASL Model 5000), this system is much more compact and reliable. It is still not robust enough for a variety of people with different eye characteristics, such as pupil brightness and correction glasses. Available commercial systems rely on a single light source that is positioned either off the camera axis or on-axis. Illumination from an off-axis source (or ambient illumination) generates a dark pupil image.
  • 26. Dark and bright images: When the light source is placed on-axis with the camera optical axis, the camera is able to detect the light reflected from the interior of the eye, and the image of the pupil appears bright The Almaden system uses two near infrared (IR) time multiplexed light sources, composed of two sets of IR LED's, which were synchronized with the camera frame rate. Bright(left) and dark(right) images resulting from on and off axis illumination. The glints, or corneal reflections, from the on- and off-axis light sources can be easily identified as the bright points in the iris.
  • 27. Identification of the pupil: One light source is placed very close to the camera's optical axis and is synchronized with the even frames. Odd frames are synchronized with the second light source, positioned off axis. The two light sources are calibrated to provide approximately equivalent whole-scene illumination. Pupil detection is realized by means of subtracting the dark pupil image from the bright pupil image. After thresholding the difference, the largest connected component is identified as the pupil. This technique significantly increases the robustness and reliability of the eye tracking system. This is similar pupil detection schemes independently developed by Tomonoetal and Ebisawa and Satoh. But such a method has not been used in the commercial systems.
  • 28. Implementing MAGIC pointing: The MAGIC pointing program takes data from both the manual input device and the eye tracking system running either on the same machine or on another machine connected via serial port. Raw data from an eye tracker can not be directly used for gaze-based interaction, due to noise from image processing, eye movement jitters, and samples taken during saccade (ballistic eye movement) periods.
  • 29. One has to experiment with various filtering techniques. The goal of filter design in general is to make the best compromise between preserving signal bandwidth and eliminating unwanted noise. Samples collected during a saccade are unwanted and should be avoided. In designing our algorithm for picking points of fixation, consider our tracking system speed (30 Hz), and that the MAGIC pointing techniques utilize gaze information only once for each new target, probably immediately after a saccade. Our filtering algorithm was designed to pick a fixation with minimum delay by means of selecting two adjacent points over two samples.
  • 31. HURDLES OF SPEECH RECOGNITION: It is important to consider the environment in which the speech recognition system has to work: (1)The grammar used by the speaker and accepted by the system, (2)noise level, (3)noise type, (4)position of the microphone and (5)speed and manner of the user’s speech are some factors that may affect the quality of speech recognition The best example for speech recognition system : an automatic call-handling system is used without employing any telephone operator.
  • 32.  THE TECHNOLOGY Two basic ideas: AI makes machines smarter and more useful, and is less expensive than natural intelligence. Natural language processing (NLP) refers to artificial intelligence methods of communicating with a computer in a natural language like English. The main objective of a NLP program is to understand input and initiate action. The input words are scanned and matched against internally stored known words. Identification of a key word causes some action to be taken.
  • 34. Search process The search process takes a considerable amount of time, as the CPU has to make many comparisons before recognition occurs. This necessitates use of very high-speed processors. A largeRAM is also required as even though a spoken word may last only a few hundred milliseconds, but the same is translated into many thousands of digital words. It is important to note that alignment of words and templates are to be matched correctly in time, before computing the similarity score. This process, termed as dynamic time warping, recognizes that different speakers pronounce the same words at different speeds as well as elongate different parts of the same word.
  • 35. MAJOR APPLICATIONS: Lets user do other works simultaneously: The user can concentrate on observation and manual operations, and still control the machinery by voice input commands. Military operations: Voice control of weapons is an example. With reliable speech recognition equipment, pilots can give commands and information to the computers by simply speaking into their microphones—they don’t have to use their hands for this purpose. An Radiologist scanning hundreds of X-rays, ultra sonograms, CT scans and simultaneously dictating conclusions to a speech recognition system connected to word processors. For making airline and hotel reservations: A user requires simply to state his needs, to make reservation, cancel a reservation, or make enquiries about schedule.
  • 36. THE SIMPLE USER INTERST TRACKER (SUITOR)
  • 37. Why SUITOR? Computers would have been much more powerful, had they gained perceptual and sensory abilities of the living beings on the earth. What needs to be developed is an intimate relationship between the computer and the humans. By observing the Webpage a netizen is browsing, the SUITOR can help by fetching more information at his desktop. By simply noticing where the user’s eyes focus on the computer screen, the SUITOR can be more precise in determining his topic of interest. The success lies in how much the suitor can be intimate to the user
  • 38. Paul Maglio’S take on SUITOR: SUITOR fills a scrolling ticker on a computer screen with information related to the user's current task. "If I'm reading a Web page about IBM, for instance," says Paul Maglio, the Almaden cognitive scientist who invented SUITOR, "the system presents the latest stock price or business news stories that could affect IBM. If I read the headline off the ticker, it pops up the story in a browser window. If I start to read the story, it adds related stories to the ticker. That's the whole idea of an attentive system—one that attends to what you are doing, typing, reading, so that it can attend to your information needs."
  • 39. THE FUTURE FOR BLUE EYES: The nineties witnessed quantum leaps interface designing for improved man machine interactions. The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices. Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units. The day is not far when this technology will push its way into your house hold, making you more lazy. It may even reach your hand held mobile device. Any way this is only a technological forecast.
  • 40. But definitely BLUE EYES TECHNOLOGY is the future. After all who would not want to own a computer that (1)can easily adapt to your mood, (2)perform tasks the moment you “actually tell” it what you want (3)help you by gathering more additional information (4)saves you the job of having to move your cursor to a long distance (5)with further additions, can even help to monitor your health.