Prepared by : Jakasaniya Ravi Roll no : MCA13

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Blue Eye T E C H N O L G Y.
A.Mani Kumari 07A21F0007.  Introduction  Definition  Working  Applications  Drawbacks  Conclusion.
BlueEyes Human Operator Monitoring System BlueEyes Conscious brain involvement monitor By:-Piyush Kumar Sunil Kumar Sharma Information technology (Vth.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
BlueEyes Human Operator Monitoring System BlueEyes Human-Operator Monitoring System Poznań University of Technology, Poland Team.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Blog A Blog is a website where entries are written in chronological order and commonly displayed in reverse chronological order.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
BLUE EYES is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human beings. The basic.
AXIS Camera Station Comprehensive video management software for monitoring, recording, playback and event management.
Bluetooth based home automation system N.Sriskanthan, F.Tan, K. Karande Microprocessors and Microsystems 26(2002) Presenter: Bui Phuong Nhung.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
Save-bees’ solution : Consists of standalone devices that are placed in the beehives and offer accurate measurement information for The weight of the.
Confidential & proprietary M2M communications in Transportation industry.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
PowerPoint 2007 This presentation demonstrates the new capabilities of PowerPoint through examples. You can view it in Slide Show or by browsing through.
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Blue eye technology Contents What is BlueEye technology ? What is BlueEye technology ? What is BlueEyes ? What is BlueEyes ? System.
 You will need to be able to Discuss the use of networks both in the workplace and at home.  Because of this, you will need to: › identify different.
By: Nathan Narvaez. A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Safe’n’Sec IT security solutions for enterprises of any size.
Wireless Sensor Network Layout Stefka Fidanova 1, Pencho Marinov 1 Enrique Alba 2 1 Institute of Information and Communication Technologies – BAS 2 University.
IS3220 Information Technology Infrastructure Security
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
NATIONAL IT AUTHORITY MODULE 5 PROCESS HANDLING SKILLS AND KNOWLEDGE.
JAI NARAIN COLLEGE OF TECHNOLOGY BHOPAL JAI NARAIN COLLEGE OF TECHNOLOGY BHOPAL “BLUE EYE TECHNOLOGY” “BLUE EYE TECHNOLOGY” SUBMITTED TO SUBMITTED BY SUBMITTED.
ENGINEERING INNOVATION AWARDS NATIONAL ENGINEERING INNOVATION PRIZE (NIEP) CARDIOCAST.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Blue Eyes Submitted By: Shohada Sharmin Roll:03 Regi:00905.
BlueEyes Human Operator Monitoring System BlueEyes Human-Operator Monitoring System PRESENTED BY:- AYUSHI TYAGI B1803B37.
Blue Eye Technology By: ARUN DIXIT. CONTENTS Motivation What is BlueEye technology ? What is BlueEyes ? System designing System overview DAU CSU IBM research.
Blue eyes ( blue eyes – Human operator monitoring system ) Presented by Shilpa.m(1rg07cs079) Under the guidence M. saranya M s. saranya Lecturer,cse dept.
Perceptive Computing Democracy Communism Architecture The Steam Engine WheelFire Zero Domestication Iron Ships Electricity The Vacuum tube E=mc 2 The.
Blue eye technology Prepared by VINIT SHAH 08 CE 099.
Seminar On Blue Eyes Submitted By: Ghaytadak Satish Laxman.
Human-Operator Monitoring System
Huawei Digital Pipeline Solution
How SCADA Systems Work?.
Evaluating a Real-time Anomaly-based IDS
Wavestore Integrates… OptaSense Acoustic Fibre & PIDS
Wavestore Integrates…
Wavestore Integrates… Paxton Net2 Access Control
Wavestore Integrates…
Wireless Body Area Network (WBAN)
Wavestore Integrates… MAXXESS Access Control
Microsoft Windows 10 Provides Power Behind Mobile Health Monitoring Solution for Patients “Diabetics or heart patients receive a new level of health surveillance.
PLC / SCADA / HMI Controllers: Name : Muhammad Zunair Comsats University Date: 28-October-2018.
Ling-Jyh Chen, Mario Gerla Computer Science Department, UCLA
PREPARED BY: RIDDHI PATEL (09CE085)
Nenad Stefanovic and Danijela Milosevic
Done by:Thikra abdullah
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
 As the idea is to monitor and record operator’s basic physiological parameters, the most important physiological activity is the movement of eyes. 
Presentation transcript:

Prepared by : Jakasaniya Ravi Roll no : MCA13 Blue eye technology Prepared by : Jakasaniya Ravi Roll no : MCA13

Contents What is BlueEye technology ? What is BlueEyes ? What is BlueEyes not? Applications of Blue Eyes Blue Eyes – benefits Data security Conclusion

What is blue eye technology ? The BLUE EYES technology aims at creating computational machines that have perceptual and sensory ability like those of human beings.

How can we make computers “see” and “feel” ? Blue eyes uses sensing technology to identify a user’s actions and to extract key information. Information is then analyzed to determine the user’s physical ,emotional ,or informational state.

What is BlueEyes ? The complex solution for human-operator monitoring: Visual attention monitoring Physiological condition Operator’s position detection Wireless data acquisition using bluetooth Real time user defined alarm triggering Recorded data playback

What is BlueEyes not? Doesn’t predict nor interfere with operator’s thoughts. Cannot force directly the operator to work.

Applications of Blue Eyes Generic control rooms (System can be applied in every working environment requiring permanent operator’s attention) Power station Captain bridge Flight control centers Operating theaters

Blue Eyes - benefits Prevention from dangerous incidents. Minimization of ecological consequences financial loss a threat to a human life The reconstruction of the course of operator’s work

System overview Data Acquisition Unit Central System Unit Bluetooth Bluetooth technology provides means for creating a Personal Area Network linking the operators and the central system. Connection Manager Visualization Module Atmel 89C52 microcontroller Data Analysis Data Logger Jazz Multisensor

Data security Only registered mobile devices can connect to the system Bluetooth connection authentication Bluetooth connection encryption Access rights restrictions Personal and physiological data encryption

Conclusion In the near future ,ordinary household devices- such as television , refrigerators ,ovens may be able to do their jobs when we look at them and speak to them. Future applications of blue eye technology is limitless.

THANK YOU