Download presentation
Presentation is loading. Please wait.
Published byLee Chandler Modified over 8 years ago
1
Blue Eyes Submitted By: Shohada Sharmin Roll:03 Regi:00905
2
Objectives Introduction. Need for blue Eyes. What can we do with blue eye technology. Features of the system. Structure. Types of users Applications. Conclusion.
3
Introduction A technology, which aims at creating computational machines that have perceptual and sensory abilities like those of human beings. Basic idea behind this technology is to give computer human power. Provides technical means for monitoring and recording human-operator’s physiological condition.
4
Need for blue eyes Human error is still one of the most frequent causes of catastrophes (calamity) and ecological disasters. He may not notice important changes of indications causing financial or ecological consequences, which is a threat to human life. It’s crucial that operator’s brain is involved in an active system supervising over the whole work time period.
5
What can we do with blue eyes technology Has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. Can understand your emotions at the touch of the mouse. Can verify your identity, feel your presence, and start interacting with you. Machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states. Realizes the urgency of the situation through the mouse.
6
Features of the system Visual attention monitoring (eye motility analysis). Physiological condition monitoring (pulse rate, blood oxygenation). Operator’s position detection (standing, lying). Wireless data acquisition using Bluetooth technology.
7
Structure Consists of Data Acquisition Unit (DAU). Central System Unit (CSU). Data Acquisition Unit : It maintains Bluetooth connections. Gets information from the sensor. Sends information over the wireless connection. Central System Unit : Maintains blue tooth connections in the other side. Buffers incoming sensor data. Performs on-line data analysis. Records the conclusion for further exploration. Provides visualization interface.
8
Types Of Users Types Of Users Belong to three categories: Operators Supervisors System administrators Operator: Operator is a person whose physiological parameters are supervised. The only functions offers to the operator are Authorization to the system and receiving alarm alerts.
9
Types Of Users Types Of Users Supervisor: Is the person responsible for analyzing operators’ condition and performance. System Administrator: Is the user that maintains the system. Creating new analyzer modules.
10
Applications Can be applied in every working environment requiring permanent operator's attention. At power plant control rooms. At captain bridges. At flight control centers. Professional drivers.
11
Conclusion The wireless link between the sensors improve overall reliability, safety and assures proper quality of system performance. Can cover areas such as industry, transportation, military command centers or operation theaters. Researchers are attempting to add more capabilities to computers that will allow them to interact like humans, recognize human presents, talk, listen, or even guess their feelings. Avoids potential threats resulting from human errors, such as weariness, oversight, tiredness.
12
Thanks To All
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.