blue eyes technology

44
Blue Eyes Technology By M.Ramki

Upload: ramki-m

Post on 15-Feb-2017

574 views

Category:

Presentations & Public Speaking


0 download

TRANSCRIPT

Blue Eyes Technology

ByM.Ramki

INTRODUCTION WHAT IS BLUE EYE

TECHNOLOGY? HISTORY NEED! SYSTEM OVERVIEW – DAU &

CSU TECHNOLOGIES USED DATA SECURITY PRESENT SCENARIO APPLICATIONS CONCLUSION

CONTENTS:

WHAT IS BLUE EYES TECHNOLOGY?

The BLUE EYES technology aims at creating computational machines that have perceptual and sensory ability like those of human beings.It also aims at creating machines that can satisfy the user’s wants and understands a human’s emotional state.

WHAT IS BLUE EYES??BLUE in the term

stands for Bluetooth, which enables reliable wireless communication.

EYES ,because the eye movement enables us to obtain a lot of interesting and important information.

The research on blue-tooth technology to read human emotions was first carried out by scientists at Microsoft using quantum mechanics.

But now currently blue eyes technology is being developed by the team of 40 researchers at Poznan University of Technology. It makes use of the “blue tooth technology” developed by Ericsson.

History

To avoid and reduce human errors like: Tiredness – Huge load of work to be

performed by an individual. Mental Illness – typical body imbalance. Emotional outcomes – outrage of emotions

like fear or anger. Brain Unconsciousness – continuous brain

involvement while long drives or precision research.

Why Blue Eyes?

To build a machine that can understand your emotions

A pc that can listen, talk or interact.

Verify your identity, feels your presence and interact with you.

Adding such perceptual abilities to computers would enable computers and humans to work together more as partners.

Need for Blue Eyes

What does blue eyes not do?

Neither predicts nor interferes with operator’s thoughts like changing the emotion of the user.

Cannot force the operator to work on different tasks rather the one at present.

How can we make computers “see” and “feel” ?

Blue eyes uses sensing technology to identify a user’s actions and to extract key information from the user.

Information is then analyzed to determine the user’s physical, emotional, or informational state.

SYSTEM OVERVIEW  Blue eyes system monitors the status of the operator’s visual

attention through measurement of saccadic activity. The system checks parameters like heart beat rate and blood oxygenation against abnormal and triggers user defined alarms.

• The system consists of Data Acquisition Unit (DAU) Central System Unit (CSU)

DAU FEATURES

• Lightweight• Runs on batteries - low power consumption

• Easy to use - does not disturb the operator working

• ID cards for operator authorization

• Voice transmission using hardware PCM codec

Data Acquisition Unit

BluetoothAtmel 89C52

microcontroller

JazzMultisensor

DAU COMPONENTS

Atmel 89C52 microcontroller - system core

Bluetooth module (based on ROK101008)

HD44780 - small LCD display 24C16 - I2C EEPROM (on a

removable ID card) MC145483 – 13bit PCM codec Jazz Multi sensor interface Beeper and LED indicators ,6 AA

batteries and voltage level monitor.

DAU COMPONENTS - Representation

CSU FEATURES

Connection management

Data processing

Data recording

Access verification

System maintenance

ConnectionManager

Data Analysis

VisualizationModuleBluetooth Connection

Manager

DataLogger

CSU COMPONENTS

CONNECTION MANAGER – main task to perform low-level blue-tooth communication DATA ANALYSIS MODULE – performs the analysis of the raw sensor dataDATA LOGGER MODULE – provides support for storing the monitored data.VISUALIZATION MODULE – provides user interface for the supervisors

Jazz Multisens

or

AT89C52 Microcontrolle

r

Bluetooth device

DAUsmall CMOS camera to

monitor the operator’s point of gaze single PCB (SMD technology) low voltage ICs

CSUdata mining algorithms,

advanced data- base encryption using AES standards and other cryptic techniques.

Future Improvements

TECHNOLOGIES USED

• Emotion Pointing

• Manual And Gaze Input Cascaded (MAGIC)

• Artificial Intelligent Speech Recognition

• Simple User Interest Tracker (SUITOR)

THE DIFFERENT WAYS ARE-

Facial recognition

Gesture recognition

Eye trackingSpeech

recognition

EMOTION MOUSE

EMOTION MOUSE

Simplest wayPeople spend approximately 1/3 of their total computer time touching input device like mouse etc..Physiological data is obtained from the sensing mouse and emotional state is determined.A user model will be built that reflects the personality or the trait of the user.

SENTIC MOUSE - It is a modified computer mouse that includes a directional pressure sensor foraiding in recognition of emotional valence

EXPRESSION GLASSES - A wearable device which allows any viewer to visualize the confusion andinterest levels of the wearer.

Measurement of heart rate, temperature, galvanic skin response (GSR), general somatic activity.

Heart rate was measured with chest strap sensor, temperature with thermocouple attached to a digital multi-meter (DMM), GSR also with DMM, somatic movement with computer mouse movements.

Six basic emotions that were recorded are anger, fear, sadness, disgust, joy and surprise .

EXPERIMENT

SAMPLE OBTAINED FROM

EMOTIONAL MOUSE

Happy

SadSurprise

Disguise

FACIAL EXPRESSIONS ….!!

Anger

BLUE EYE – EMOTIONAL MOUSE sensors is the mouse which senses the psychological attributes which are correlated to emotions using correlation model by simply touching the mouse, the computer will be able to determine a person’s emotional state. BLUE EYE enabled TELEVISION

– could become active when the user makes an eye contact.

IBM Research

MAGIC POINTING

Reduce the cursor movement needed for target selection

Click on the target with a regular manual input device

Two magic pointing techniques

Liberal Conservative

MAGIC pointing is the technique of tracking eye movement of the user and perform the desired operation.

Eye Detection through infrared rays

To warp the cursor to every

new object the user looks at.

User takes control of the target by find and search or ignore it and search for next.

“Pro-Active” since cursor waits on every single potential target.

“Over-Active” when user merely looks at something or nothing.

Liberal Approach

Does not warp the cursor

target until the manual pointing device is activated or used.

Cursor is warped to the gaze area through eye tracker.

Steer the cursor towards the target to acquire it.

Cursor position is offset to the intersection of manual activating vector and the boundary of gaze area.

Conservative Approach

Limitations of MAGIC

Unnatural to overload a perceptual with a motor control task.

The subconscious jittery motion of eyes could not be actively used as a perceptual device.

Target not selected if not looked at for a specified period of time.

Unwanted target gets selected if stared at without user intention.

Speech recognition Scanned input words are matched against

internally stored known words

Slight variations: statistical techniques for matching process

Input words are scanned and matched against internally stored words.

Identification causes some action to be taken. User speaks to the computer through

microphone. Filtered and fed to ADC and then stored in RAM Binary representation become standard , against

which future are compared . Pattern matching is designed to look for the best

fit because of variations in loudness, pitch, frequency difference, time gap, etc.

ARTIFICIAL INTELLIGENT SPEECH RECOGNITION

To control weapons by voice commands. Pilot give commands to computers by speaking

into microphones. For making airline and hotel reservations. For making reservations, canceling reservations

or making enquiries. Can be connected to word processors and

instead of writing, simply dictate to them.

APPLICATION OF ARTIFICIAL INTELLIGIENT SPEECH

RECOGNITION

SUITOR

Help by fetching more information at desktop

Notice where the user’s eyes focus on the screen

Fills a scrolling ticker on a computer screen with information related to user’s task

Ex. If reading headline ,pops up the story in the browser window

DATA SECURITY

Only registered mobile devices can connect to the systemBluetooth connection authentication Bluetooth connection encryption Access rights restrictions Personal and physiological data encryption

BlueEyes® is a conceptual

project that utilizes Bluetooth technology in a guidance system for visually impaired in the “underground” Paris Metro area. It provides users with mobility solution information and assistance suited to public transport networks, which gives them autonomy over their routes known and unknown.

The Present Scenario

Blue Eyes technology concept can

be used at schools in case of emergencies like fire accident etc..

The concept can be used at ATM’s for secure transactions.

APPLICATIONS

In smart cameras ,lie detectors and emotional speech processing.Retailing record and interpret customer movementsIn automobile industryIn video games MilitaryPower stationFlight control centresOvens and refrigeratorsTo create “Face Responsive Display” and “Perceptive Environment” Generic control rooms.

CONCLUSION

Provides more delicate and user friendly facilities in computing devices

Gap between the electronic and physical world is reduced

The computers can be run using implicit commands instead of the explicit commands

Allows easy multi-tasking by the human without the use of robots.

A GLIMPSE OF FUTURE

BLUE EYES

n www.seminar4u.com n www.howstuffswork.com n www.cs.put.poznan.com n www.whitepapers.com n www.ibmresearchcenter.com n www.almaden.ibm.com n www.research.ibm.com

References