Blue Eyes Submitted By: Shohada Sharmin Roll:03 Regi:00905.

Slides:



Advertisements
Similar presentations
ARTIFICIAL PASSENGER.
Advertisements

Blue Eye T E C H N O L G Y.
A.Mani Kumari 07A21F0007.  Introduction  Definition  Working  Applications  Drawbacks  Conclusion.
SensMax People Counting Solutions Visitors counting makes the most efficient use of resources - people, time and money, which leads to higher profits in.
BlueEyes Human Operator Monitoring System BlueEyes Conscious brain involvement monitor By:-Piyush Kumar Sunil Kumar Sharma Information technology (Vth.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
BlueEyes Human Operator Monitoring System BlueEyes Human-Operator Monitoring System Poznań University of Technology, Poland Team.
Multi-agents based wireless sensor telemedicine network for E-Health monitoring of HIV Aids Patients. By: Muturi Moses Kuria, SCI, University of Nairobi,
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Windows XP Windows XP is a major revision of the Microsoft Windows operating system created for use on desktop and business computer systems. As of February.
BLUE EYES is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human beings. The basic.
Wearable Wireless Physiological Sensors Josh Handley Rosy Logioia Gouri Shintri Clay Smith.
PROJECT PROPOSAL Lennie Giannone, Ryan Savino, Carrie Johnston, and Jessica Fernandes.
Emotional Intelligence and Agents – Survey and Possible Applications Mirjana Ivanovic, Milos Radovanovic, Zoran Budimac, Dejan Mitrovic, Vladimir Kurbalija,
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
IntroOH-1 CSE 5810 Wireless Body Sensor Networks (WBSN) in Healthcare Aljoharah A. Algwaiz Computer Science & Engineering Department The University of.
A Smartphone-based hazard reporting service in disaster areas Fahad Al Harbi Supervisor : Dr. Haifeng Shen.
Microcontroller-Based Wireless Sensor Networks
The PhysioWheel Matt DeGraw, Bobby Zarubin, Drew Jackson, Jonny Locher Drew Jackson, Jonny Locher.
Submitted by:- Vinay kr. Gupta Computer Sci. & Engg. 4 th year.
Three Reasons to Communicate Get something DONE Have a conversation Help with distress.
Security Introduction. Security is a system It is important to realize that security is a system of individual measures, each of which is not fully effective.
PowerPoint 2007 This presentation demonstrates the new capabilities of PowerPoint through examples. You can view it in Slide Show or by browsing through.
PRESENTED BY SUBHASMITA SATPATHY REGD NO :
FLOOR CANDY.
Proposed Task-Based VQEG Project Carolyn Ford, Mikołaj Leszczuk.
Jake Forsberg An environment for research and automation system development.
NETWORK EVOLUTION IN COMING 10 YEARS: WHAT'S THE FUTURE OF NETWORK? VAN CHANNA 4 th Oct 2014 Kameyama Lab, GITS Waseda University.
Blue eye technology Contents What is BlueEye technology ? What is BlueEye technology ? What is BlueEyes ? What is BlueEyes ? System.
MACHINE VISION Machine Vision System Components ENT 273 Ms. HEMA C.R. Lecture 1.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Model of the Human  Name Stan  Emotion Happy  Command Watch me  Face Location (x,y,z) = (122, 34, 205)  Hand Locations (x,y,z) = (85, -10, 175) (x,y,z)
 Motivated by desire for natural human-robot interaction  Encapsulates what the robot knows about the human  Identity  Location  Intentions Human.
Customer Identification system based on Smart Card for PDA shops.
WEARABLE COMPUTERS. Wearable computers are computers that are worn on the body. Wearable computers are especially useful for applications that require.
Hybrid-Structure Robot Design From the authors of Chang Gung University and Metal Industries R&D Center, Taiwan.
Artificial Intelligence, Expert Systems, and Neural Networks Group 10 Cameron Kinard Leaundre Zeno Heath Carley Megan Wiedmaier.
MOBILE SNIFFER WITH PAGING. UNDER THE GUIDENESS OF : Dr. SANTHOSH KULKARNI PROFESSOR.
IEEE N SubmissionLiang Li VinnoSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
REMOTE CONTROL ROBOT WITH HUMAN ARTICULATION Justin Wells Dept. of Technology, CET.
Lecture 5 Defining Objectives Summary Slide Defining Objectives Document Purpose Implicit Purpose Explicit Purpose Why do we need documents ? Defining.
Prepared by : Jakasaniya Ravi Roll no : MCA13
JAI NARAIN COLLEGE OF TECHNOLOGY BHOPAL JAI NARAIN COLLEGE OF TECHNOLOGY BHOPAL “BLUE EYE TECHNOLOGY” “BLUE EYE TECHNOLOGY” SUBMITTED TO SUBMITTED BY SUBMITTED.
Wireless M2M System Architecture for Data Acquisition and Control Elmira Dichkova Bachvarova Central Laboratory of Mechatronics and Instrumentation Bulgarian.
BlueEyes Human Operator Monitoring System BlueEyes Human-Operator Monitoring System PRESENTED BY:- AYUSHI TYAGI B1803B37.
Prepared byMIDHUN.T CHM S5.  Aims at creating computational machines that have perceptual and sensory ability like those of human beings.  Use camera.
Blue Eye Technology By: ARUN DIXIT. CONTENTS Motivation What is BlueEye technology ? What is BlueEyes ? System designing System overview DAU CSU IBM research.
MULTIMODAL AND NATURAL COMPUTER INTERACTION Domas Jonaitis.
Blue eyes ( blue eyes – Human operator monitoring system ) Presented by Shilpa.m(1rg07cs079) Under the guidence M. saranya M s. saranya Lecturer,cse dept.
Presented by TRIPTI TRIPATHI EC Final year. WHAT IS BLUE EYE TECHNOLOGY? Aim at creating computational machine that have perceptual and sensory ability.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
Perceptive Computing Democracy Communism Architecture The Steam Engine WheelFire Zero Domestication Iron Ships Electricity The Vacuum tube E=mc 2 The.
Blue eye technology Prepared by VINIT SHAH 08 CE 099.
Grado en Ingeniería de Tecnologías y Servicios de Telecomunicación
Mandava Institute of Engineering and Technology
Seminar On Blue Eyes Submitted By: Ghaytadak Satish Laxman.
The Distributed Application Debugger (DAD)
Automation Technologies SCADA SENSORS HMI
Security service management of tomorrow
Human-Operator Monitoring System
The move from a rule based system to a risk based system Challenges for the competent authorities October 2017.
How SCADA Systems Work?.
SILENT SOUND TECHNOLOGY
What is blue eyes ? aims on creating computational machines that have perceptual and sensory ability like those of human beings. interactive computer.
PLC / SCADA / HMI Controllers: Name : Muhammad Zunair Comsats University Date: 28-October-2018.
Group 13 Mechanical Engineering
Universal Design Innovation Group 13
 As the idea is to monitor and record operator’s basic physiological parameters, the most important physiological activity is the movement of eyes. 
Presentation transcript:

Blue Eyes Submitted By: Shohada Sharmin Roll:03 Regi:00905

Objectives  Introduction.  Need for blue Eyes.  What can we do with blue eye technology.  Features of the system.  Structure.  Types of users  Applications.  Conclusion.

Introduction  A technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human beings.  Basic idea behind this technology is to give computer human power.  Provides technical means for monitoring and recording human-operator’s physiological condition.

Need for blue eyes  Human error is still one of the most frequent causes of catastrophes (calamity) and ecological disasters.  He may not notice important changes of indications causing financial or ecological consequences, which is a threat to human life.  It’s crucial that operator’s brain is involved in an active system supervising over the whole work time period.

What can we do with blue eyes technology  Has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc.  Can understand your emotions at the touch of the mouse.  Can verify your identity, feel your presence, and start interacting with you.  Machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.  Realizes the urgency of the situation through the mouse.

Features of the system  Visual attention monitoring (eye motility analysis).  Physiological condition monitoring (pulse rate, blood oxygenation).  Operator’s position detection (standing, lying).  Wireless data acquisition using Bluetooth technology.

Structure Consists of Data Acquisition Unit (DAU). Central System Unit (CSU). Data Acquisition Unit :  It maintains Bluetooth connections.  Gets information from the sensor.  Sends information over the wireless connection. Central System Unit :  Maintains blue tooth connections in the other side.  Buffers incoming sensor data.  Performs on-line data analysis.  Records the conclusion for further exploration.  Provides visualization interface.

Types Of Users Types Of Users Belong to three categories: Operators Supervisors System administrators Operator:  Operator is a person whose physiological parameters are supervised.  The only functions offers to the operator are Authorization to the system and receiving alarm alerts.

Types Of Users Types Of Users Supervisor:  Is the person responsible for analyzing operators’ condition and performance. System Administrator:  Is the user that maintains the system.  Creating new analyzer modules.

Applications  Can be applied in every working environment requiring permanent operator's attention.  At power plant control rooms.  At captain bridges.  At flight control centers.  Professional drivers.

Conclusion  The wireless link between the sensors improve overall reliability, safety and assures proper quality of system performance.  Can cover areas such as industry, transportation, military command centers or operation theaters.  Researchers are attempting to add more capabilities to computers that will allow them to interact like humans, recognize human presents, talk, listen, or even guess their feelings.  Avoids potential threats resulting from human errors, such as weariness, oversight, tiredness.

Thanks To All