SlideShare a Scribd company logo
1 of 22
1




 BLUE EYES
TECHNOLOGY
2

                                                ?

 WHAT IS BLUE EYES TECHNOLOGY?

Aims at creating computational machines that
 have perceptual and sensory ability.

Use camera and microphone to identify user
 actions and emotions
3




THE TErm BLUE EYES
BLUE in the term stands for Bluetooth,
 which enables reliable wireless communication

EYES , because the eye movement enables
 us to obtain a lot of interesting and
 important information.
4




NEED OF BLUE EYES TECHNOLOGY

  To built a machine that can understand your
   emotions

  A pc that can listen, talk or scream

  Verify your identity, feels your presence and
   interact with you.
5




         TECHNOLGIES USED

• Emotion Mouse

• Manual And Gaze Input Cascaded (MAGIC)

• Artificial Intelligent Speech Recognition

• Simple User Interest Tracker (SUITOR)

• The eye movement Sensor
6



             EmOTION mOUSE
Simplest way

People spend approximately
 1/3 of their total computer
  time touching input device

Physiological data is
 obtained and emotional
 state is determined

A user model will be
 built that reflects the
 personality of user.
7
8


          mAGIC POINTING
 Reduce the cursor movement needed for target
  selection

 Click on the target with a regular manual input
  device

 Two magic pointing techniques
       Liberal
       Conservative
9




                  APPrOACHES
• LIBERAL APPROACH

    To warp the cursor to every new object user
 looks at

• CONSERVATIVE APPROACH

   Does not warp the cursor target until the
 manual input device has been actuated
10
   ArTIFICIAL INTELLIGIENT
    SPEECH rECOGNITION
 Input words are scanned and matched
  against internally stored words

 Identification causes some action to be
  taken
    User speaks to the computer through
  microphone

 Filtered and fed to ADC and then stored
  in RAM
11




     APPLICATION OF ArTIFICIAL
•INTELLIGIENT SPEECH rECOGNITION
  To control weapons by voice commands

• Pilot give commands to computers by
  speaking into microphones

• Can be connected to word processors and
  instead of writing, simply dictate to them
12




                SUITOr

Help by fetching more information at desktop

Notice where the user’s eyes focus on the screen

Fills a scrolling ticker on a computer screen with
 information related to user’s task

Ex. If reading headline ,pops up the story in the
 browser window
13




   THE EYE mOVEmENT SENSOr
           DESIGNING
A personal area network for linking all the operators
 and the supervising system

Two major units
         - DAU (data acquisition unit )
         - CSU (central system unit )
14




                    DAU

• The DAU consists of the following components
• ATMEL 8952 microcontroller
• BLUE TOOTH MODULE – supports
  synchronous voice
• data transmission
• central system sound feedback
• ALPHAUNUMERIC LCD display
• LED indicators
• ID CARD interface
15




                   DAU - FEATUrES
Data Acquisition Unit         • Lightweight
Atmel 89C52
                              • Runs on batteries - low
microcontroller   Bluetooth     power consumption
                              • Easy to use - does not
    Jazz
 Multisensor                    disturb the operator
                                working
                              • ID cards for operator
                                authorization
                              • Voice transmission using
                                hardware PCM codec
16




      CSU – COmPONENTS

 CONNECTION MANAGER – main task to
perform low-level blue tooth communication

 DATA ANALYSIS MODULE – performs the
analysis of the raw sensor data

 DATA LOGGER MODULE – provides support
for storing the monitored data.

 VISULAIZATION MODULE – provides user
interface for the supervisors
17




               CSU FEATUrES
                              Central System Unit
Connection management
                                      Connection     Visualization
                         Bluetooth
 Data processing                      Manager          Module

                                                        Data
                                     Data Analysis
                                                       Logger
 Data recording

Access verification

System maintenance
18




            DATA SECUrITY
Only registered mobile devices can connect to the
 system

Bluetooth connection authentication

 Bluetooth connection encryption

 Access rights restrictions

 Personal and physiological data encryption
19




           APPLICATIONS

In retailing record and interpret customer movements
In automobile industry
In video games
To create “Face Responsive Display” and “Perceptive
 Environment” Generic control rooms
 Power station
Flight control centres
Operating theatres
20




                CONCLUSION

Provide more delicate and user friendly facilities in
 computing devices

Gap between the electronic and physical world is
 reduced

The computers can be run using implicit commands
 instead of the explicit commands
21




THANk
U…..
22

More Related Content

What's hot

Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyYusuf Shaik
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technologyDivya Mohan
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
eye phone technology
eye phone technologyeye phone technology
eye phone technologyNaga Dinesh
 
Blue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEBlue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEUtkarsh Lokpriye
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer pptTarun tyagi
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computerAnjali Agarwal
 
Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)Mydul Islam Rashed
 
Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPTVikas Kumar
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes TechnologyRamki M
 
Seminar report on blue eyes
Seminar report on blue eyesSeminar report on blue eyes
Seminar report on blue eyesRoshmi Sarmah
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
Haptic Technology ppt
Haptic Technology pptHaptic Technology ppt
Haptic Technology pptArun Sivaraj
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technologyrahuldikonda
 

What's hot (20)

Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Blue brain ppt
Blue brain pptBlue brain ppt
Blue brain ppt
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Blue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEBlue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYE
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
 
Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)
 
Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPT
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 
Seminar report on blue eyes
Seminar report on blue eyesSeminar report on blue eyes
Seminar report on blue eyes
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Haptic Technology ppt
Haptic Technology pptHaptic Technology ppt
Haptic Technology ppt
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
 
skinput technology
skinput technologyskinput technology
skinput technology
 

Similar to Blue Eyes ppt

blue eye_technology
blue eye_technologyblue eye_technology
blue eye_technologykomal jain
 
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...ANSUMAN MISHRA
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimssomadhavsolanki
 
Blueeyetechnology 110925103959-phpapp02
Blueeyetechnology 110925103959-phpapp02Blueeyetechnology 110925103959-phpapp02
Blueeyetechnology 110925103959-phpapp02pramilakanagaraj1
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyCK Vashisth
 
Blues eyes technology
Blues eyes technologyBlues eyes technology
Blues eyes technologyShubham Goyal
 
presentation_blue_eye_1486105313_257582 (1).ppt
presentation_blue_eye_1486105313_257582 (1).pptpresentation_blue_eye_1486105313_257582 (1).ppt
presentation_blue_eye_1486105313_257582 (1).pptAdarshS541264
 
blue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptxblue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptxShubhamsingh861786
 
Blue eye tech new
Blue eye tech newBlue eye tech new
Blue eye tech newAjay Kumar
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYShehin Pm
 
C.N blue eyes technology
C.N blue eyes technologyC.N blue eyes technology
C.N blue eyes technologyTanishq Soni
 
Blue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feelBlue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feelkaishik gundu
 

Similar to Blue Eyes ppt (20)

blue eye_technology
blue eye_technologyblue eye_technology
blue eye_technology
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
 
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
BLUE EYES TECHNOLOGY ( computational machines that have perceptual and sensor...
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimsso
 
BLUE EYES.pptx
BLUE EYES.pptxBLUE EYES.pptx
BLUE EYES.pptx
 
Blueeyetechnology 110925103959-phpapp02
Blueeyetechnology 110925103959-phpapp02Blueeyetechnology 110925103959-phpapp02
Blueeyetechnology 110925103959-phpapp02
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blues eyes technology
Blues eyes technologyBlues eyes technology
Blues eyes technology
 
Blue eye Technology
Blue eye TechnologyBlue eye Technology
Blue eye Technology
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eye
Blue eyeBlue eye
Blue eye
 
presentation_blue_eye_1486105313_257582 (1).ppt
presentation_blue_eye_1486105313_257582 (1).pptpresentation_blue_eye_1486105313_257582 (1).ppt
presentation_blue_eye_1486105313_257582 (1).ppt
 
blue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptxblue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptx
 
Blue eye tech new
Blue eye tech newBlue eye tech new
Blue eye tech new
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
 
C.N blue eyes technology
C.N blue eyes technologyC.N blue eyes technology
C.N blue eyes technology
 
Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02
 
Blue Eyes Technology RAMA.pptx
Blue Eyes Technology RAMA.pptxBlue Eyes Technology RAMA.pptx
Blue Eyes Technology RAMA.pptx
 
Blue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feelBlue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feel
 

Recently uploaded

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Recently uploaded (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Blue Eyes ppt

  • 2. 2 ? WHAT IS BLUE EYES TECHNOLOGY? Aims at creating computational machines that have perceptual and sensory ability. Use camera and microphone to identify user actions and emotions
  • 3. 3 THE TErm BLUE EYES BLUE in the term stands for Bluetooth, which enables reliable wireless communication EYES , because the eye movement enables us to obtain a lot of interesting and important information.
  • 4. 4 NEED OF BLUE EYES TECHNOLOGY  To built a machine that can understand your emotions  A pc that can listen, talk or scream  Verify your identity, feels your presence and interact with you.
  • 5. 5 TECHNOLGIES USED • Emotion Mouse • Manual And Gaze Input Cascaded (MAGIC) • Artificial Intelligent Speech Recognition • Simple User Interest Tracker (SUITOR) • The eye movement Sensor
  • 6. 6 EmOTION mOUSE Simplest way People spend approximately 1/3 of their total computer time touching input device Physiological data is obtained and emotional state is determined A user model will be built that reflects the personality of user.
  • 7. 7
  • 8. 8 mAGIC POINTING  Reduce the cursor movement needed for target selection  Click on the target with a regular manual input device  Two magic pointing techniques  Liberal  Conservative
  • 9. 9 APPrOACHES • LIBERAL APPROACH To warp the cursor to every new object user looks at • CONSERVATIVE APPROACH Does not warp the cursor target until the manual input device has been actuated
  • 10. 10 ArTIFICIAL INTELLIGIENT SPEECH rECOGNITION  Input words are scanned and matched against internally stored words  Identification causes some action to be taken User speaks to the computer through microphone  Filtered and fed to ADC and then stored in RAM
  • 11. 11 APPLICATION OF ArTIFICIAL •INTELLIGIENT SPEECH rECOGNITION To control weapons by voice commands • Pilot give commands to computers by speaking into microphones • Can be connected to word processors and instead of writing, simply dictate to them
  • 12. 12 SUITOr Help by fetching more information at desktop Notice where the user’s eyes focus on the screen Fills a scrolling ticker on a computer screen with information related to user’s task Ex. If reading headline ,pops up the story in the browser window
  • 13. 13 THE EYE mOVEmENT SENSOr DESIGNING A personal area network for linking all the operators and the supervising system Two major units - DAU (data acquisition unit ) - CSU (central system unit )
  • 14. 14 DAU • The DAU consists of the following components • ATMEL 8952 microcontroller • BLUE TOOTH MODULE – supports synchronous voice • data transmission • central system sound feedback • ALPHAUNUMERIC LCD display • LED indicators • ID CARD interface
  • 15. 15 DAU - FEATUrES Data Acquisition Unit • Lightweight Atmel 89C52 • Runs on batteries - low microcontroller Bluetooth power consumption • Easy to use - does not Jazz Multisensor disturb the operator working • ID cards for operator authorization • Voice transmission using hardware PCM codec
  • 16. 16 CSU – COmPONENTS  CONNECTION MANAGER – main task to perform low-level blue tooth communication  DATA ANALYSIS MODULE – performs the analysis of the raw sensor data  DATA LOGGER MODULE – provides support for storing the monitored data.  VISULAIZATION MODULE – provides user interface for the supervisors
  • 17. 17 CSU FEATUrES Central System Unit Connection management Connection Visualization Bluetooth  Data processing Manager Module Data Data Analysis Logger  Data recording Access verification System maintenance
  • 18. 18 DATA SECUrITY Only registered mobile devices can connect to the system Bluetooth connection authentication  Bluetooth connection encryption  Access rights restrictions  Personal and physiological data encryption
  • 19. 19 APPLICATIONS In retailing record and interpret customer movements In automobile industry In video games To create “Face Responsive Display” and “Perceptive Environment” Generic control rooms  Power station Flight control centres Operating theatres
  • 20. 20 CONCLUSION Provide more delicate and user friendly facilities in computing devices Gap between the electronic and physical world is reduced The computers can be run using implicit commands instead of the explicit commands
  • 22. 22