BLUE EYES is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human beings. The basic.

Slides:



Advertisements
Similar presentations
Artificial passenger.
Advertisements

Aspire Vertical Markets Manufacturing and Warehouse Solutions.
Aspire Vertical Markets Banking, Finance and Insurance.
Aspire Vertical Markets Retail Store. Retail Store Solution.
ARTIFICIAL PASSENGER.
DATA PROCESSING SYSTEMS
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Blue Eye T E C H N O L G Y.
SensMax People Counting Solutions Visitors counting makes the most efficient use of resources - people, time and money, which leads to higher profits in.
Working for the future - today
Nocturne Requirements (Element14 discussion on UI) Caregiver 1. Essential - Mobile interface 2. Essential - Some form of user interface 3. Essential -
BlueEyes Human Operator Monitoring System BlueEyes Conscious brain involvement monitor By:-Piyush Kumar Sunil Kumar Sharma Information technology (Vth.
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
Chapter 19: Network Management Business Data Communications, 4e.
BlueEyes Human Operator Monitoring System BlueEyes Human-Operator Monitoring System Poznań University of Technology, Poland Team.
Standard Grade Automated Systems and Industrial Applications Automated Systems and Industrial Applications Standard Grade.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
Interactive Voice Response System (IVRS) Presented by Sateesh Kuna Srinivasrao Dhavanam Prudhvi Bolli Nirup Charan K Ashok Kumar M Under the guidance of.
To control the movement of a manual wheelchair by means of human voice for paralyzed patients. AIM:
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
1. 2 How do I verify that my plant network is OK? Manually: Watch link lights and traffic indicators… Electronically: Purchase a SNMP management software.
Techniques for establishing and maintaining constant temperature in ICT systems in order to reduce energy consumption Mihail Radu Cătălin Truşcă, Ş. Albert,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
Ruslan Masinjila Aida Militaru.  Nature of the Problem  Our Solution: The Roaming Security Robot  Functionalities  General System View  System Design.
11.10 Human Computer Interface www. ICT-Teacher.com.
Microcontroller-Based Wireless Sensor Networks
Module 7: Fundamentals of Administering Windows Server 2008.
IBM - CVUT Student Research Projects Remote Control of a Furby Toy with BlueTooth Tomáš Kunc
PowerPoint 2007 This presentation demonstrates the new capabilities of PowerPoint through examples. You can view it in Slide Show or by browsing through.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
PRESENTED BY SUBHASMITA SATPATHY REGD NO :
Proposed Task-Based VQEG Project Carolyn Ford, Mikołaj Leszczuk.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Blue eye technology Contents What is BlueEye technology ? What is BlueEye technology ? What is BlueEyes ? What is BlueEyes ? System.
Samantha. What is it? –It is a Wi-Fi interface for the Lego Mindstorms –It replaces the Bluetooth connection for running matches It is mostly for running.
UNIT I. EMBEDDED SYSTEM It is an electrical/electro-mechanical system designed to perform a specific function. It is a combination of hardware and software.
Network Troubleshooting
Kaihua Xu, Di Zhang, Yuhua Liu, Ke Xu, Yuanhao Xi ISCCCA-13 Taiyuan, China Design of Deformation Monitoring Terminal System Based on STM32 STM
MultiMedia by Stephen M. Peters© 2001 South-Western Information Management Systems.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Prepared by : Jakasaniya Ravi Roll no : MCA13
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
PRESENTED BY:- P.SREENIVASULU ROLL NO:-12AT5A0420 IV-B.Tech ECE.
NATIONAL IT AUTHORITY MODULE 5 PROCESS HANDLING SKILLS AND KNOWLEDGE.
JAI NARAIN COLLEGE OF TECHNOLOGY BHOPAL JAI NARAIN COLLEGE OF TECHNOLOGY BHOPAL “BLUE EYE TECHNOLOGY” “BLUE EYE TECHNOLOGY” SUBMITTED TO SUBMITTED BY SUBMITTED.
We are an energetic and dynamic young company having specialization in the fields of Electronics and Communication, Mechanical Systems and Robotics. We.
Blue Eyes Submitted By: Shohada Sharmin Roll:03 Regi:00905.
BlueEyes Human Operator Monitoring System BlueEyes Human-Operator Monitoring System PRESENTED BY:- AYUSHI TYAGI B1803B37.
Prepared byMIDHUN.T CHM S5.  Aims at creating computational machines that have perceptual and sensory ability like those of human beings.  Use camera.
Blue Eye Technology By: ARUN DIXIT. CONTENTS Motivation What is BlueEye technology ? What is BlueEyes ? System designing System overview DAU CSU IBM research.
Blue eyes ( blue eyes – Human operator monitoring system ) Presented by Shilpa.m(1rg07cs079) Under the guidence M. saranya M s. saranya Lecturer,cse dept.
Perceptive Computing Democracy Communism Architecture The Steam Engine WheelFire Zero Domestication Iron Ships Electricity The Vacuum tube E=mc 2 The.
Blue eye technology Prepared by VINIT SHAH 08 CE 099.
Seminar On Blue Eyes Submitted By: Ghaytadak Satish Laxman.
Chapter 19: Network Management
AUTOMATED security system
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Security service management of tomorrow
Human-Operator Monitoring System
11.10 Human Computer Interface
Monitoring Robot Prepared by: Hanin Mizyed ,Abdalla Melhem
AUTOMATED security system
How SCADA Systems Work?.
Introduction to System Administration
TIME & ATTENDANCE SYSTEM
What is blue eyes ? aims on creating computational machines that have perceptual and sensory ability like those of human beings. interactive computer.
PLC / SCADA / HMI Controllers: Name : Muhammad Zunair Comsats University Date: 28-October-2018.
Selling IIoT Solutions to End Users
 As the idea is to monitor and record operator’s basic physiological parameters, the most important physiological activity is the movement of eyes. 
Presentation transcript:

BLUE EYES is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human beings. The basic idea behind this technology is to give computer human power. It provides technical means for monitoring and recording human-operator’s physiological condition.

 As the idea is to monitor and record operator’s basic physiological parameters, the most important physiological activity is the movement of eyes.  For a computer to sense the eye movement, wiring between operator and the system is required. But, this is a serious limitation of the operator’s mobility and disables his operations in large control rooms.  So utilization of wireless technology becomes essential which can be implemented through blue tooth technology.

Human error- A frequent reason of catastrophes and accidents.  Weariness Oversight Temporal indisposit ion An aid to disabled persons. Availability of capable sensors.

The complex solution for human-operator monitoring: -conscious brain involvement monitoring -triggering user-defined actions -data recording - use of BIOMETRICS What is Blue Eyes not? Doesn’t predict nor interfere with operator’s thoughts. Cannot force directly the operator to work

Generic control rooms -Power station -Flight control centers Common application -A simpler system version for drivers -An aid to disabled people

It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It can verify your identity, feel your presence, and start interacting with you. The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.

It realizes the urgency of the situation through the mouse. For instance if you ask the computer to dial to your friend at his office, it understands the situation and establishes a connection

Visual attention monitoring. Physiological condition monitoring. Operators position detection. Wireless data acquisition using Bluetooth technology. Real time user defined alarm triggering. Recorded data play back.

Affective Computing The process of making emotional computers with sensing abilities is known as affective computing. The steps used are: 1)Giving sensing abilities - to give machines the equivalent of the eyes, ears, and other sensory organs - voice-recognition software - cameras 2)Detecting human emotions -by biometric techniques 3)Respond properly

Affect detection: detecting our emotional states from the expressions on our face MAGIC pointing: Manual Acquisition with Gaze Tracking Technology SUITOR: Simple User Interface Tracker Emotion mouse: expected accuracy is 75%

Facial expression detection -face recognition -expression detection Speech Recognition Emotion Mouse -IR sensor, thermosister chip, galvanic sensor Eye Gaze Tracking Jazz Multi Sensor

 Eye position measuring - direct infrared occulography  Oxy- and deoxyhaemoglobin measurement  Two axial accelerometer  Ambient light sensor Jazz Multisensor

Bluetooth technology provides means for creating a Personal Area Network linking the operators and the central system. Bluetooth Connection manager Data analysis Visualization module Data logger Atmel 89C52 microcontroller Jazz Multisensor

Data Acquisition Unit  Atmel 89C52 microcontroller - system core  Bluetooth module (based on ROK101008)  HD small LCD display  24C16 - I2C EEPROM (on a removable ID card)  MC bit PCM codec  Jazz Multisensor interface  beeper and LED indicators  6 AA batteries and voltage level monitor

o Lightweight o Runs on batteries - low power consumption o Easy to use - does not disturb the operator working o ID cards for operator authorization o Voice transmission using hardware PCM codec Data Acquisition Unit Atmel 89C52 microcontroller Jazz Multisensor Bluetooth

 Connection Manager  Operator Manager  Data Logger Module  Data Analysis Module  Alarm Dispatcher Module  Visualization Module

Connection management Data processing Visualization Data recording Access verification System maintenance Data analysis Data logger Visualization module Connection manager Bluetooth

Raw and processed data visualization

 Blue Eyes software is called “agent”.  It analyzes and modifies the mother program, according to the user’s needs and moods.

 Operators  Supervisors  System administrators

 Operator is a person whose physiological parameters are supervised  The operator wears the DAU  The only functions offers to the operator are Authorization to the system and receiving alarm alerts.  Authorization: Operator has to enter his personal PIN into DAU, if PIN is accepted, authorization is said to be complete.  Receiving Alerts: This function supplies the operator with the most important alerts about his and his co- workers’ condition and mobile device state.

 He is the person responsible for analyzing operators’ condition and performance.  The supervisor receives tools for inspecting present values of the parameters (on-line browsing) as well as browsing the results of the long-term analysis (off- line browsing).

 He is the user that maintains the system  The administrator is delivered tools for adding new operators to the database. Defining alarm conditions.  Configuring logging tools.  Creating new analyzer modules.

 POD  The first blue Eye enabled mass production device  It’s a car manufactured by TOYOTA  It could keep the driver alert and active  It could tell the driver to go slow if he is driving too fast  It could hear the driver some sort of interesting music when he is getting bored.

 PONG  It’s a robot released by IBM designed for demonstrating the new technology  Its equipped with a computer capable of analyzing a person's glances and other forms of expressions of feelings  It smiles when the person calls his name  It expresses loneliness when it loses sight of the person

 SECURE PAD  an electronic badge that can identify the wearer and track his movements and activities with an array of sensors  It knows who you are and where you are, and it has a pretty good idea of what you are doing and when you are doing it.  The device was designed for a major health-care provider to track the activities of doctors and other personnel at large medical faciliti es  it's interchangeable

 enables the computer to adapt a working style that fits users personality to increase his productivity  The technology can also be incorporated into automobiles  Blue Eyes is going to find its way in the routines of human beings with application such as TV, washing machine etc.  In a company, the supervisor can be given the power to access the database containing his employees profile, which is linked with Blue Eyes technology. hereby he can evaluate the performance of his employees.

The wireless link between the sensors worn by the operator and the supervising system makes it possible to improve overall reliability, safety and assures proper quality of system performance. These new possibilities can cover areas such as industry, transportation, military command centers or operation theaters. Researchers are attempting to add more capabilities to computers that will allow them to interact like humans, recognize human presents, talk, listen, or even guess their feelings. It avoids potential threats resulting from human errors, such as weariness, oversight, tiredness.

THANK YOU FOR YOUR ATTENTION

ANY QUESTIONS?