Upload
evelin-burrus
View
233
Download
3
Embed Size (px)
Citation preview
Blue Eye
T E C HNOL OGY
Outline: Introduction How can we make computers “see” and “ feel” How was the term blue-eyes coined? What is Blue Eyes? Need for Blue Eyes What can we do with blue eyes technology? - What is Blue Eyes not? Applications of blue eyes technology Blue Eyes Structure
Introduction
Imagine yourself in a world where humans interact with computers .
You are sitting in front of your personal computer that can see, feel, listen, talk, or even scream
aloud .
How can we make computers “see”and “feel”
Using sensing technology like camera and microphone to identify a user’s actions and to extract key information.
Information is then analyzed to determine the user’s physical, emotional ,or informational state
How was the term blue-eyes coined?
Blue in this term stands for Bluetooth, which enables reliable wireless
communication. Eyes because the eye movement
enables us to obtain a lot of interesting and important information .
What is Blue Eyes?
Is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human.
The basic idea behind this technology is to give computer human power.
How can we give computer the human power?
-The blue eyes checks the physiological parameters like eye movement, heart beat rate and blood oxygenation.
-The use of a miniature CMOS camera integrated into the eye movement sensor.
-voice recognition algorithm will facilitate the communication between the operator and the central system.
Need for blue eyes
To built a machine that can understand your emotions.
A pc that can listen, talk or scream.
Verify your identity, feels your presence and interact with you.
What can we do with blue eyes technology?
-gather information about you and interact with you through special
techniques like facial recognition ,speech recognition, etc.
-The computer can understand what a user wants, where he is looking at, and realize his physical or emotional states.
cont. -understand your emotions at the touch of the
mouse.
What is Blue Eyes not?
Doesn’t predict nor interfere with operator’s thoughts.
Cannot force directly the operator to work.
Applications of blue eyes technology
1 .In every working environment requiring permanent operator's attention.
2 .At power plant control rooms.
3 .At flight control centers.
4 .In video games.
5 .In automobile industry.
Blue Eyes StructureBlue eyes technology requires designing a personal area network.
*Blue eyes consists of: mobile measuring device called Data Acquisition Unit (DAU) . a central analytical system called Central System Unit (CSU).
DAU Features
Lightweight
Runs on batteries low
power Consumption
Easy to use.
ID cards for operator
authorization.
DAU
-It maintains Bluetooth connections.
- Gets information from the sensor.
- Sends information over the wireless
connection.
- Delivers the alarm messages sent from the
Central System Unit (CSU) to the operator.
CSU - features
Connection.management
Data processing
Visualization
Data recording
Access verification
System maintenance
-Maintains Bluetooth connections in the other
side.
- Buffers incoming sensor data.
- Performs on-line data analysis.
- Records the conclusion for further
exploration.
- Provides visualization interface.
CSU
Type of users
*Users belong to three categories:
Users
Operators Supervisors System administrators
:Operator:
-Operator is a person whose physiological parameters are supervised.- The operator wears the DAU.- The only functions offers to the operator are Authorization to the system
and receiving alarm alerts.
Supervisor:-He is the person responsible for analyzing operators' condition and performance.
System Administrator:-He is the user that maintains the system.The administrator can:
- -Adding new operators to the database .--Defining alarm conditions.
-Configuring logging tools.-Creating new analyzer modules.
-Provide more user friendly facilities in computing devices.
-Gap between the electronic and physical World is reduce.
-The computer can be run using implicit commands instead of the explicit commands.
Conclusion:
Manar Al-Nejadi
Done by:
Nada Al-Twala
&