SlideShare ist ein Scribd-Unternehmen logo
1 von 41
BLUE EYES TECHNOLOGY BY: S.Madhumitha.
Why blue eyes technology? A study has shown that people with personalities that are similar or complement each other collaborate well. Dryer (1999) has also shown that people view their computer as having a personality.  For these reasons, it is important to develop computers which can work well with its user. This is where the blue eyes technology comes into force. The ABILITIES:to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc.  It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presence, and starts interacting with you
OBJECTIVES: creatingcomputational machines that have perceptual and sensory ability like those of human beings. It uses : (1)non-obtrusive sensing method,  (2)employing most modern video cameras and (3)microphones  to identifies the users actions through the use of imparted sensory abilities .  The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.  Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners.
EMOTION MOUSE
EMOTION MOUSE The diff. ways of getting info could possibly include:      Since  a user is mostly in direct contact with an input device, say a mouse, a mouse is an apt way to gather info
Ekman’s Facial Action Coding System In order to start creating smart computers, the computer must start gaining information about the user SCOPE:to have the computer  adapt to the user in order to create a better working environment where the user is more productive. LOGIC: There is always a correlation between a person’s emotional state and a person’s physiological measurements
So various physiological measurements could be used to distinguish various emotional states.  They are:
Data Analysis: The data corresponding to the various physiological measurements is subjected to 2 analysis:
Overall result of analysis: these four physiological measures are sufficient to determine reliably a person’s specific emotional state. One can take these measurements from the hand. The amount of conductivity of the skin is best taken from the fingers. Changes in the temperature of the finger are reliable for prediction of emotion and by change in movement in the computer mouse.
EXPERIMENTAL DESIGN The diff. instruments used in the measurement of  various physiological measurements are:
THE EXPERIMENT: Participants were asked to sit in front of the computer and hold the temperature and GSR sensors in their left hand hold the mouse with their right hand and wore the chest sensor.  The resting (baseline) measurements were recorded for five minutes and then the participant was instructed to act out one emotion for five minutes.  The emotions consisted of:  				1.anger,  				2.fear,  				3.sadness,  				4.disgust,  				5.happiness and 				6.surprise.
 The only instruction for acting out the emotion was to show the emotion in their facial expressions. The sampling rates of diff. measurements: And now by performing certain calculations with these scores and treating those scores which deviated a lot as missing, 1st analysis is completed.
In order to determine whether the measures of physiology could discriminate among the six different emotions, the data is analyzed with a discriminant function analysis.  Now based on the data the emotion was predicted for the samples which did not deviate much from the mean and two-thirds of the cases were successfully classified.
CLASSIFICATION RESULTS:
ADDITIONAL IMPROVISATION RECOMMENDED: Now that we have proven the method, the next step is to improve the hardware.  Instead of using cumbersome multimeters to gather information about the user, it will be better to use smaller and less intrusive units.  We can use infrared pulse detector which can be placed inside the body of the mouse.  Also, a framework for the user modeling needs to be develop in order to correctly handle all of the information after it has been gathered.
MANUAL AND GAZE INPUT CASCADED (MAGIC) POINTING
What is it? This work explores a new direction in utilizing eye gaze for computer input.  Gaze tracking has long been considered as an alternative or potentially superior pointing method for computer input.  But there are many fundamental limitations existing with traditional gaze pointing.For an example, the user has to be aware of the eye movements. But with MAGIC (an improved form of eye gazing),a large portion of the cursor movement is eliminated by warping the cursor to the eye gaze area, which encompasses the target There are two techniques:(1)conservative,(2)liberal.
THE PROs AND CONs: ADVANTAGES:              Reduced physical effort and fatigue as compared to traditional manual pointing, greater accuracy and naturalness than traditional gaze pointing, and possibly faster speed than manual pointing. DISADVANTAGES:              (1).First, given the one-degree size of the fovea and the subconscious jittery motions that the eyes constantly produce, eye gaze is not precise enough to operate UI widgets such as scrollbars, hyperlinks, and slider handles.               (2). Eye has not evolved to be a control organ. Sometimes its movements are voluntarily controlled while at other times it is driven by external events. With the target selection by dwell time method, considered more natural than selection by blinking, one has to be conscious of where one looks and how long one looks at an object
TARGET ACTIVATION: If one does not look at a target continuously for a set threshold (e.g., 200 ms), the target will not be successfully selected.  On the other hand, if one stares at an object for more than the set threshold, the object will be selected, regardless of the user’s intention.  In some cases there is not an adverse effect to a false target selection.  Other times it can be annoying and counter-productive (such as unintended jumps to a web page).
ACTUAL WORKING: In MAGIC, pointingand selection remains primarily  a manual control task but it is aided by gaze tracking. The key idea is to use gaze to dynamically redefine (warp) the “home” position of the pointing cursor to be at the vicinity of the target, which was presumably what the user was looking at, thereby effectively reducing the cursor movement amplitude needed for target selection.  Once the cursor position had been redefined, the user would need to only make a small movement to, and click on, the target with a regular manual input device
Liberal technique: Here the cursor automatically moves to the point where the user is staring or at least to its vicinity. The liberal approach may appear “pro-active”, since the cursor waits readily in the vicinity of or on every potential target.  The user may also feel that the cursor is over-active when he is merely looking at a target.
Conservative: This technique does not warp a cursor to a target until the manual input device has been actuated.  Once the manual input device has been actuated the cursor is warped to the gaze area reported by the eye tracker. This area should be on or in the vicinity of the target. The user would then steer the cursor annually towards the target to complete the target acquisition.  Once the user looks at a target and moves the input device, the cursor will appear “out of the blue” in motion towards the target,
Potential advantages of MAGIC pointing techniques: Reduction of manual stress and fatigue. Practical accuracy level in comparison to traditional pure gaze pointing.  The user does not have to be aware of the role of the eye gaze. Speed. {Fitts’ Law, manual pointing time is logarithmically proportional to the A/W ratio, where A is the movement distance and W is the target size. In other words, targets which are smaller or farther away take longer to acquire. } Improved subjective speed and ease-of-use.
Changes recommended: The cursor warping can be overactive at times, which could be particularly distracting when the user is trying to read. So,Whenthe user’s eye appears to follow a text reading pattern, MAGIC pointing can be automatically suppressed. conservative MAGIC pointing technique adopts a cumbersome strategy: take a touch, wait , and move. Such a strategy may prolong the target acquisition time. The user has to learn a novel hand-eye coordination pattern to be efficient.  Clearly, experimental (implementation and empirical) work is needed to validate, refine, or invent alternative MAGIC pointing techniques.
THE EYE TRACKER One can purchase the a commercial eye tracker (ASL Model 5000), this system is much more compact and reliable.  It is still not robust enough for a variety of people with different eye characteristics, such as pupil brightness and correction glasses. Available commercial systems rely on a single light source that is  positioned either off the camera axis or on-axis. Illumination from an off-axis source (or ambient illumination) generates a dark pupil image.
Dark and bright images: When the light source is placed on-axis with the camera optical axis, the camera is able to detect the light reflected from the interior of the eye, and the image of the pupil appears bright The Almaden system uses two near infrared (IR) time multiplexed light sources, composed of two sets of IR LED's, which were synchronized with the camera frame rate. Bright(left) and dark(right) images resulting from on and off axis illumination. The glints, or corneal reflections, from the on- and off-axis light sources can be easily identified as the bright points in the iris.
Identification of the pupil: One light source is placed very close to the camera's optical axis and is synchronized with the even frames.  Odd frames are synchronized with the second light source, positioned off axis.  The two light sources are calibrated to provide approximately equivalent whole-scene illumination.  Pupil detection is realized by means of subtracting the dark pupil image from the bright pupil image.  After thresholding the difference, the largest connected component is identified as the pupil.  This technique significantly increases the robustness and reliability of the eye tracking system. This is similar pupil detection schemes independently developed by Tomonoetal and Ebisawa and Satoh. But such a method has not been used in the commercial systems.
Implementing MAGIC pointing: The MAGIC pointing program takes data from both the manual input device and the eye tracking system running either on the same machine or on another machine connected via serial port.  Raw data from an eye tracker can not be directly used for gaze-based interaction, due to noise from image processing, eye movement jitters, and samples taken during saccade (ballistic eye movement) periods.
One has to experiment with various filtering techniques. The goal of filter design in general is to make the best compromise between preserving signal bandwidth and eliminating unwanted noise.  Samples collected during a saccade are unwanted and should be avoided.  In designing our algorithm for picking points of fixation, consider our tracking system speed (30 Hz), and that the MAGIC pointing techniques utilize gaze information only once for each new target, probably immediately after a saccade.  Our filtering algorithm was designed to pick a fixation with minimum delay by means of selecting two adjacent points over two samples.
ARTIFICIAL INTELLIGENT SPEECH RECOGNITION
HURDLES OF SPEECH RECOGNITION: It is important to consider the environment in which the speech recognition system has to work:  			(1)The grammar used by the speaker and accepted by the system,  			(2)noise level,  			(3)noise type,  			(4)position of the microphone and  			(5)speed and manner of the user’s speech are some factors that may affect the quality of speech recognition   The best example for speech recognition system : an automatic call-handling system is used without employing any telephone operator.
 THE TECHNOLOGY Two basic ideas: AI makes machines smarter and more useful, and is less expensive than natural intelligence.  Natural language processing (NLP) refers to artificial intelligence methods of communicating with a computer in a natural language like English. The main objective of a NLP program is to understand input and initiate action. The input words are scanned and matched against internally stored known words. Identification of a key word causes some action to be taken.
SPEECH RECOGNITION
Search process The search process takes a considerable amount of time, as the CPU has to make many comparisons before recognition occurs.  This necessitates use of very high-speed processors.  A largeRAM is also required as even though a spoken word may last only a few hundred milliseconds, but the same is translated into many thousands of digital words.  It is important to note that alignment of words and templates are to be matched correctly in time, before computing the similarity score.  This process, termed as dynamic time warping, recognizes that different speakers pronounce the same words at different speeds as well as elongate different parts of the same word.
MAJOR APPLICATIONS: Lets user do other works simultaneously: The user can concentrate on observation and manual operations, and still control the machinery by voice input commands. Military operations: Voice control of weapons is an example. With reliable speech recognition equipment, pilots can give commands and information to the computers by simply speaking into their microphones—they don’t have to use their hands for this purpose. An Radiologist scanning hundreds of X-rays, ultra sonograms, CT scans and simultaneously dictating conclusions to a speech recognition system connected to word processors. For making airline and hotel reservations: A user requires simply to state his needs, to make reservation, cancel a reservation, or make enquiries about schedule.
THE SIMPLE USER INTERST TRACKER (SUITOR)
Why SUITOR? Computers would have been much more powerful, had they gained perceptual and sensory abilities of the living beings on the earth. What needs to be developed is an intimate relationship between the computer and the humans. By observing the Webpage a netizen is browsing, the SUITOR can help by fetching more information at his desktop. By simply noticing where the user’s eyes focus on the computer screen, the SUITOR can be more precise in determining his topic of interest. The success lies in how much the suitor can be intimate to the user
Paul Maglio’S take on SUITOR: SUITOR fills a scrolling ticker on a computer screen with information related to the user's current task.   "If I'm reading a Web page about IBM, for instance," says Paul Maglio, the Almaden cognitive scientist who invented SUITOR, "the system presents the latest stock price or business news stories that could affect IBM. If I read the headline off the ticker, it pops up the story in a browser window. If I start to read the story, it adds related stories to the ticker. That's the whole idea of an attentive system—one that attends to what you are doing, typing, reading, so that it can attend to your information needs."
THE FUTURE FOR BLUE EYES: The nineties witnessed quantum leaps interface designing for improved man machine interactions.  The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices.  Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units.  The day is not far when this technology will push its way into your house hold, making you more lazy. It may even reach your hand held mobile device.  Any way this is only a technological forecast.
But definitely BLUE EYES TECHNOLOGY is the future. After all who would not want to own a computer that    (1)can easily adapt to your mood,    (2)perform tasks the moment you “actually tell” it what you want    (3)help you by gathering more additional information    (4)saves you the job of having to move your cursor to a long distance    (5)with further additions, can even help to monitor your health.
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
Aparna Nk
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
CK Vashisth
 

Was ist angesagt? (20)

Blue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYEBlue eyes technology ppt. by UTKARSH LOKPRIYE
Blue eyes technology ppt. by UTKARSH LOKPRIYE
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
abstract on skinput technology
abstract on skinput technologyabstract on skinput technology
abstract on skinput technology
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
BLUE EYE TECHNOLOGY
BLUE EYE TECHNOLOGYBLUE EYE TECHNOLOGY
BLUE EYE TECHNOLOGY
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimsso
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
skinput technology
skinput technologyskinput technology
skinput technology
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
blue-eyes technology
blue-eyes technologyblue-eyes technology
blue-eyes technology
 
Seminar on isphere
Seminar on isphereSeminar on isphere
Seminar on isphere
 

Ähnlich wie Blue Eyes Technology

20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf
Yasmin297583
 
Master thesis 2
Master thesis 2Master thesis 2
Master thesis 2
Jb Soni
 
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
International Journal of Technical Research & Application
 

Ähnlich wie Blue Eyes Technology (20)

ABSTRACT
ABSTRACTABSTRACT
ABSTRACT
 
20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf20922174-Blue-Eyes-Technology.pdf
20922174-Blue-Eyes-Technology.pdf
 
Eye tracking – an innovative monitor
Eye tracking – an innovative monitorEye tracking – an innovative monitor
Eye tracking – an innovative monitor
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGY
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
 
Master thesis 2
Master thesis 2Master thesis 2
Master thesis 2
 
eye tracking system and formulation
eye tracking system and formulationeye tracking system and formulation
eye tracking system and formulation
 
Eyetracking
EyetrackingEyetracking
Eyetracking
 
Eye Tracking Interpretation System
Eye Tracking Interpretation SystemEye Tracking Interpretation System
Eye Tracking Interpretation System
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Eye Tracking Software model of left right all
Eye Tracking Software model of left right allEye Tracking Software model of left right all
Eye Tracking Software model of left right all
 
A computer vision based virtual mouse
A computer vision based virtual mouseA computer vision based virtual mouse
A computer vision based virtual mouse
 
ICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses PapersICCE 2016 NCTU Courses Papers
ICCE 2016 NCTU Courses Papers
 
Cursor Movement with Eyeball
Cursor Movement with EyeballCursor Movement with Eyeball
Cursor Movement with Eyeball
 
Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Blue eyes technology New Version 2017
Blue eyes technology New Version 2017
 
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
REGION MAP GENERATION OF EYE PUPIL MOVEMENTS TO PRESCRIBE CUSTOMISED PROGRESS...
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIAEYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
EYE SCRUTINIZED WHEEL CHAIR FOR PEOPLE AFFECTED WITH TETRAPLEGIA
 
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIA
E YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIAE YE  S CRUTINIZED  W HEEL  C HAIR FOR  P EOPLE  A FFECTED  W ITH  T ETRAPLEGIA
E YE S CRUTINIZED W HEEL C HAIR FOR P EOPLE A FFECTED W ITH T ETRAPLEGIA
 

Mehr von Colloquium (20)

Blue Eyes Technology Abstract
Blue Eyes Technology AbstractBlue Eyes Technology Abstract
Blue Eyes Technology Abstract
 
Final Nano
Final NanoFinal Nano
Final Nano
 
Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)Innovations In Burglar Alarms Abstract(Ce)
Innovations In Burglar Alarms Abstract(Ce)
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Nanotechnology Abstract
Nanotechnology AbstractNanotechnology Abstract
Nanotechnology Abstract
 
Vinod Robotics
Vinod RoboticsVinod Robotics
Vinod Robotics
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 
Ce Ppt Sourabh
Ce Ppt SourabhCe Ppt Sourabh
Ce Ppt Sourabh
 
Remote
RemoteRemote
Remote
 
Nanotech.
Nanotech.Nanotech.
Nanotech.
 
E Business
E BusinessE Business
E Business
 
Wireless Charging
Wireless ChargingWireless Charging
Wireless Charging
 
Cryogenics
CryogenicsCryogenics
Cryogenics
 
Hybrid Electric Vehicles
Hybrid Electric VehiclesHybrid Electric Vehicles
Hybrid Electric Vehicles
 
Erp1
Erp1Erp1
Erp1
 
Particle Image Velocimetry
Particle Image VelocimetryParticle Image Velocimetry
Particle Image Velocimetry
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
Man Sew
Man SewMan Sew
Man Sew
 
Innovations In Burglar Alarms Ppt
Innovations In Burglar Alarms PptInnovations In Burglar Alarms Ppt
Innovations In Burglar Alarms Ppt
 
Nanotechnology In Civil Engineering
Nanotechnology   In Civil   EngineeringNanotechnology   In Civil   Engineering
Nanotechnology In Civil Engineering
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Blue Eyes Technology

  • 1. BLUE EYES TECHNOLOGY BY: S.Madhumitha.
  • 2. Why blue eyes technology? A study has shown that people with personalities that are similar or complement each other collaborate well. Dryer (1999) has also shown that people view their computer as having a personality. For these reasons, it is important to develop computers which can work well with its user. This is where the blue eyes technology comes into force. The ABILITIES:to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presence, and starts interacting with you
  • 3. OBJECTIVES: creatingcomputational machines that have perceptual and sensory ability like those of human beings. It uses : (1)non-obtrusive sensing method, (2)employing most modern video cameras and (3)microphones to identifies the users actions through the use of imparted sensory abilities . The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states. Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners.
  • 5. EMOTION MOUSE The diff. ways of getting info could possibly include: Since a user is mostly in direct contact with an input device, say a mouse, a mouse is an apt way to gather info
  • 6. Ekman’s Facial Action Coding System In order to start creating smart computers, the computer must start gaining information about the user SCOPE:to have the computer adapt to the user in order to create a better working environment where the user is more productive. LOGIC: There is always a correlation between a person’s emotional state and a person’s physiological measurements
  • 7. So various physiological measurements could be used to distinguish various emotional states.  They are:
  • 8. Data Analysis: The data corresponding to the various physiological measurements is subjected to 2 analysis:
  • 9. Overall result of analysis: these four physiological measures are sufficient to determine reliably a person’s specific emotional state. One can take these measurements from the hand. The amount of conductivity of the skin is best taken from the fingers. Changes in the temperature of the finger are reliable for prediction of emotion and by change in movement in the computer mouse.
  • 10. EXPERIMENTAL DESIGN The diff. instruments used in the measurement of various physiological measurements are:
  • 11. THE EXPERIMENT: Participants were asked to sit in front of the computer and hold the temperature and GSR sensors in their left hand hold the mouse with their right hand and wore the chest sensor. The resting (baseline) measurements were recorded for five minutes and then the participant was instructed to act out one emotion for five minutes. The emotions consisted of: 1.anger, 2.fear, 3.sadness, 4.disgust, 5.happiness and 6.surprise.
  • 12. The only instruction for acting out the emotion was to show the emotion in their facial expressions. The sampling rates of diff. measurements: And now by performing certain calculations with these scores and treating those scores which deviated a lot as missing, 1st analysis is completed.
  • 13. In order to determine whether the measures of physiology could discriminate among the six different emotions, the data is analyzed with a discriminant function analysis. Now based on the data the emotion was predicted for the samples which did not deviate much from the mean and two-thirds of the cases were successfully classified.
  • 15. ADDITIONAL IMPROVISATION RECOMMENDED: Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome multimeters to gather information about the user, it will be better to use smaller and less intrusive units. We can use infrared pulse detector which can be placed inside the body of the mouse. Also, a framework for the user modeling needs to be develop in order to correctly handle all of the information after it has been gathered.
  • 16. MANUAL AND GAZE INPUT CASCADED (MAGIC) POINTING
  • 17. What is it? This work explores a new direction in utilizing eye gaze for computer input. Gaze tracking has long been considered as an alternative or potentially superior pointing method for computer input. But there are many fundamental limitations existing with traditional gaze pointing.For an example, the user has to be aware of the eye movements. But with MAGIC (an improved form of eye gazing),a large portion of the cursor movement is eliminated by warping the cursor to the eye gaze area, which encompasses the target There are two techniques:(1)conservative,(2)liberal.
  • 18. THE PROs AND CONs: ADVANTAGES: Reduced physical effort and fatigue as compared to traditional manual pointing, greater accuracy and naturalness than traditional gaze pointing, and possibly faster speed than manual pointing. DISADVANTAGES: (1).First, given the one-degree size of the fovea and the subconscious jittery motions that the eyes constantly produce, eye gaze is not precise enough to operate UI widgets such as scrollbars, hyperlinks, and slider handles. (2). Eye has not evolved to be a control organ. Sometimes its movements are voluntarily controlled while at other times it is driven by external events. With the target selection by dwell time method, considered more natural than selection by blinking, one has to be conscious of where one looks and how long one looks at an object
  • 19. TARGET ACTIVATION: If one does not look at a target continuously for a set threshold (e.g., 200 ms), the target will not be successfully selected. On the other hand, if one stares at an object for more than the set threshold, the object will be selected, regardless of the user’s intention. In some cases there is not an adverse effect to a false target selection. Other times it can be annoying and counter-productive (such as unintended jumps to a web page).
  • 20. ACTUAL WORKING: In MAGIC, pointingand selection remains primarily a manual control task but it is aided by gaze tracking. The key idea is to use gaze to dynamically redefine (warp) the “home” position of the pointing cursor to be at the vicinity of the target, which was presumably what the user was looking at, thereby effectively reducing the cursor movement amplitude needed for target selection. Once the cursor position had been redefined, the user would need to only make a small movement to, and click on, the target with a regular manual input device
  • 21. Liberal technique: Here the cursor automatically moves to the point where the user is staring or at least to its vicinity. The liberal approach may appear “pro-active”, since the cursor waits readily in the vicinity of or on every potential target. The user may also feel that the cursor is over-active when he is merely looking at a target.
  • 22. Conservative: This technique does not warp a cursor to a target until the manual input device has been actuated. Once the manual input device has been actuated the cursor is warped to the gaze area reported by the eye tracker. This area should be on or in the vicinity of the target. The user would then steer the cursor annually towards the target to complete the target acquisition. Once the user looks at a target and moves the input device, the cursor will appear “out of the blue” in motion towards the target,
  • 23. Potential advantages of MAGIC pointing techniques: Reduction of manual stress and fatigue. Practical accuracy level in comparison to traditional pure gaze pointing. The user does not have to be aware of the role of the eye gaze. Speed. {Fitts’ Law, manual pointing time is logarithmically proportional to the A/W ratio, where A is the movement distance and W is the target size. In other words, targets which are smaller or farther away take longer to acquire. } Improved subjective speed and ease-of-use.
  • 24. Changes recommended: The cursor warping can be overactive at times, which could be particularly distracting when the user is trying to read. So,Whenthe user’s eye appears to follow a text reading pattern, MAGIC pointing can be automatically suppressed. conservative MAGIC pointing technique adopts a cumbersome strategy: take a touch, wait , and move. Such a strategy may prolong the target acquisition time. The user has to learn a novel hand-eye coordination pattern to be efficient. Clearly, experimental (implementation and empirical) work is needed to validate, refine, or invent alternative MAGIC pointing techniques.
  • 25. THE EYE TRACKER One can purchase the a commercial eye tracker (ASL Model 5000), this system is much more compact and reliable. It is still not robust enough for a variety of people with different eye characteristics, such as pupil brightness and correction glasses. Available commercial systems rely on a single light source that is positioned either off the camera axis or on-axis. Illumination from an off-axis source (or ambient illumination) generates a dark pupil image.
  • 26. Dark and bright images: When the light source is placed on-axis with the camera optical axis, the camera is able to detect the light reflected from the interior of the eye, and the image of the pupil appears bright The Almaden system uses two near infrared (IR) time multiplexed light sources, composed of two sets of IR LED's, which were synchronized with the camera frame rate. Bright(left) and dark(right) images resulting from on and off axis illumination. The glints, or corneal reflections, from the on- and off-axis light sources can be easily identified as the bright points in the iris.
  • 27. Identification of the pupil: One light source is placed very close to the camera's optical axis and is synchronized with the even frames. Odd frames are synchronized with the second light source, positioned off axis. The two light sources are calibrated to provide approximately equivalent whole-scene illumination. Pupil detection is realized by means of subtracting the dark pupil image from the bright pupil image. After thresholding the difference, the largest connected component is identified as the pupil. This technique significantly increases the robustness and reliability of the eye tracking system. This is similar pupil detection schemes independently developed by Tomonoetal and Ebisawa and Satoh. But such a method has not been used in the commercial systems.
  • 28. Implementing MAGIC pointing: The MAGIC pointing program takes data from both the manual input device and the eye tracking system running either on the same machine or on another machine connected via serial port. Raw data from an eye tracker can not be directly used for gaze-based interaction, due to noise from image processing, eye movement jitters, and samples taken during saccade (ballistic eye movement) periods.
  • 29. One has to experiment with various filtering techniques. The goal of filter design in general is to make the best compromise between preserving signal bandwidth and eliminating unwanted noise. Samples collected during a saccade are unwanted and should be avoided. In designing our algorithm for picking points of fixation, consider our tracking system speed (30 Hz), and that the MAGIC pointing techniques utilize gaze information only once for each new target, probably immediately after a saccade. Our filtering algorithm was designed to pick a fixation with minimum delay by means of selecting two adjacent points over two samples.
  • 31. HURDLES OF SPEECH RECOGNITION: It is important to consider the environment in which the speech recognition system has to work: (1)The grammar used by the speaker and accepted by the system, (2)noise level, (3)noise type, (4)position of the microphone and (5)speed and manner of the user’s speech are some factors that may affect the quality of speech recognition The best example for speech recognition system : an automatic call-handling system is used without employing any telephone operator.
  • 32.  THE TECHNOLOGY Two basic ideas: AI makes machines smarter and more useful, and is less expensive than natural intelligence. Natural language processing (NLP) refers to artificial intelligence methods of communicating with a computer in a natural language like English. The main objective of a NLP program is to understand input and initiate action. The input words are scanned and matched against internally stored known words. Identification of a key word causes some action to be taken.
  • 34. Search process The search process takes a considerable amount of time, as the CPU has to make many comparisons before recognition occurs. This necessitates use of very high-speed processors. A largeRAM is also required as even though a spoken word may last only a few hundred milliseconds, but the same is translated into many thousands of digital words. It is important to note that alignment of words and templates are to be matched correctly in time, before computing the similarity score. This process, termed as dynamic time warping, recognizes that different speakers pronounce the same words at different speeds as well as elongate different parts of the same word.
  • 35. MAJOR APPLICATIONS: Lets user do other works simultaneously: The user can concentrate on observation and manual operations, and still control the machinery by voice input commands. Military operations: Voice control of weapons is an example. With reliable speech recognition equipment, pilots can give commands and information to the computers by simply speaking into their microphones—they don’t have to use their hands for this purpose. An Radiologist scanning hundreds of X-rays, ultra sonograms, CT scans and simultaneously dictating conclusions to a speech recognition system connected to word processors. For making airline and hotel reservations: A user requires simply to state his needs, to make reservation, cancel a reservation, or make enquiries about schedule.
  • 36. THE SIMPLE USER INTERST TRACKER (SUITOR)
  • 37. Why SUITOR? Computers would have been much more powerful, had they gained perceptual and sensory abilities of the living beings on the earth. What needs to be developed is an intimate relationship between the computer and the humans. By observing the Webpage a netizen is browsing, the SUITOR can help by fetching more information at his desktop. By simply noticing where the user’s eyes focus on the computer screen, the SUITOR can be more precise in determining his topic of interest. The success lies in how much the suitor can be intimate to the user
  • 38. Paul Maglio’S take on SUITOR: SUITOR fills a scrolling ticker on a computer screen with information related to the user's current task. "If I'm reading a Web page about IBM, for instance," says Paul Maglio, the Almaden cognitive scientist who invented SUITOR, "the system presents the latest stock price or business news stories that could affect IBM. If I read the headline off the ticker, it pops up the story in a browser window. If I start to read the story, it adds related stories to the ticker. That's the whole idea of an attentive system—one that attends to what you are doing, typing, reading, so that it can attend to your information needs."
  • 39. THE FUTURE FOR BLUE EYES: The nineties witnessed quantum leaps interface designing for improved man machine interactions. The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices. Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units. The day is not far when this technology will push its way into your house hold, making you more lazy. It may even reach your hand held mobile device. Any way this is only a technological forecast.
  • 40. But definitely BLUE EYES TECHNOLOGY is the future. After all who would not want to own a computer that (1)can easily adapt to your mood, (2)perform tasks the moment you “actually tell” it what you want (3)help you by gathering more additional information (4)saves you the job of having to move your cursor to a long distance (5)with further additions, can even help to monitor your health.