Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
blue eye15

blue eye15

Ratings: (0)|Views: 15|Likes:
Published by Ayesha Siddiqua

More info:

Published by: Ayesha Siddiqua on Oct 21, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

04/04/2011

pdf

text

original

 
1 INTRODUCTION1 INTRODUCTIONImagine yourself in a world where humans interact with computers. You areImagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that can listen, talk, or evensitting in front of your personal computer that can listen, talk, or even scream aloud. It has the ability to gather information about you and interactscream aloud. It has the ability to gather information about you and interact with you through special techniques like facial recognition, speechwith you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of therecognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presents, and starts interactingmouse. It verifies your identity, feels your presents, and starts interacting with you .You ask the computer to dial to your friend at his office. It realizeswith you .You ask the computer to dial to your friend at his office. It realizes the urgency of the situation through the mouse, dials your friend at histhe urgency of the situation through the mouse, dials your friend at his office, and establishes a connection.office, and establishes a connection.Human cognition depends primarily on the ability to perceive, interpret, andHuman cognition depends primarily on the ability to perceive, interpret, and integrate audio-visuals and sensoring information. Adding extraordinaryintegrate audio-visuals and sensoring information. Adding extraordinary  perceptual abilities to computers would enable computers to work together  perceptual abilities to computers would enable computers to work together  with human beings as intimate partners. Researchers are attempting to addwith human beings as intimate partners. Researchers are attempting to add more capabilities to computers that will allow them to interact like humans,more capabilities to computers that will allow them to interact like humans, recognize human presents, talk, listen, or even guess their feelings.recognize human presents, talk, listen, or even guess their feelings.One such technology is blue eyeOne such technology is blue eye
BLUE EYES is a technology, which aims at creating computationalBLUE EYES is a technology, which aims at creating computational machines that have perceptual and sensory abilities like those of machines that have perceptual and sensory abilities like those of  human beings.human beings.
The basic idea behind this technology is to give computer humanThe basic idea behind this technology is to give computer human  power. power.For example, we can understand humans’ emotional state by his facialFor example, we can understand humans’ emotional state by his facial expressions. If we add these perceptual abilities to computers, we wouldexpressions. If we add these perceptual abilities to computers, we would enable them to work together with human beings as intimate partners.enable them to work together with human beings as intimate partners.It provides technical means for monitoring and recording human-operator’sIt provides technical means for monitoring and recording human-operator’s  physiological condition physiological condition
 
 H  H 
OW OW 
 
CAN CAN 
 
WE WE 
 
 MAKE  MAKE 
 
COMPUTERS COMPUTERS 
“ “ 
 SEE  SEE 
” ” 
 AND AND
“ “ 
FEELFEEL
” ?” ? 
BlueEyes uses sensing technology to identify a user's actionsBlueEyes uses sensing technology to identify a user's actions and to extract key information. This information is thenand to extract key information. This information is then analyzed to determine the user's physical, emotional, oranalyzed to determine the user's physical, emotional, or informational state, which in turn can be used to help makeinformational state, which in turn can be used to help make the user more productive by performing expected actions orthe user more productive by performing expected actions or by providing expected information. For example, a BlueEyes-by providing expected information. For example, a BlueEyes-enabled television could become active when the user makesenabled television could become active when the user makes eye contact, at which point the user could then tell theeye contact, at which point the user could then tell the television to "turn on".television to "turn on".Most of us hardly notice the surveillance cameras watchingMost of us hardly notice the surveillance cameras watching over the grocery store or the bank. But lately those lensesover the grocery store or the bank. But lately those lenses have been looking for far more than shoplifters.have been looking for far more than shoplifters.
 D D
 ESIGNING  ESIGNING 
 
Blue eyes system monitors the status of the operator’s visual attentionBlue eyes system monitors the status of the operator’s visual attention through measurement of saccadic activity.The system checks parameters likethrough measurement of saccadic activity.The system checks parameters like heart beat rate and blood oxygenation against abnormal and triggers user heart beat rate and blood oxygenation against abnormal and triggers user  defined alarms.defined alarms.BlueEyes system consists of a mobile measuring device and a centralBlueEyes system consists of a mobile measuring device and a central analytical system. The mobile device is integrated with Bluetooth moduleanalytical system. The mobile device is integrated with Bluetooth module  providing wireless interface between sensors worn by the operator and the providing wireless interface between sensors worn by the operator and the central unit. ID cards assigned to each of the operators and adequate user central unit. ID cards assigned to each of the operators and adequate user   profiles on the central unit side provide necessary data personalization so profiles on the central unit side provide necessary data personalization so The system consists of The system consists of 
Mobile measuring device (DAU)Mobile measuring device (DAU)
Central System Unit (CSU)Central System Unit (CSU)
 
DAUDAUData Acquisition Unit is a mobile part of the Blue eyes system. Its main task Data Acquisition Unit is a mobile part of the Blue eyes system. Its main task  is to fetch the physiological data from the sensor and to send it to the centralis to fetch the physiological data from the sensor and to send it to the central system to be processed. To accomplish the task the device must managesystem to be processed. To accomplish the task the device must manage wireless Bluetooth connections (connection establishment, authenticationwireless Bluetooth connections (connection establishment, authentication and termination). Personaland termination). PersonalIDIDcardscardsandandPINPINcodescodes provide provideoperator's authorization.Communication with the operator is carried on usingoperator's authorization.Communication with the operator is carried on using a simple 5-key keyboard, a small LCD display and a beeper. When ana simple 5-key keyboard, a small LCD display and a beeper. When an exceptional situation is detected the device uses them to notify the operator.exceptional situation is detected the device uses them to notify the operator. Voice data is transferred using a small headset, interfaced to the DAU withVoice data is transferred using a small headset, interfaced to the DAU with standard mini- jack plugs.standard mini- jack plugs.1.1.2 CENTRAL SYSTEM UNIT1.1.2 CENTRAL SYSTEM UNITCentral System Unit hardware is the second peer of the wireless connection.Central System Unit hardware is the second peer of the wireless connection. The box contains a Bluetooth module (based on ROK101008) and a PCMThe box contains a Bluetooth module (based on ROK101008) and a PCM codec for voice data transmission.The module is interfaced to a PC using acodec for voice data transmission.The module is interfaced to a PC using a  parallel, serial and USB cable. The audio data is accessible through standard parallel, serial and USB cable. The audio data is accessible through standard mini-jack sockets To program operator's personal ID cards we developed amini-jack sockets To program operator's personal ID cards we developed a simple programming device. The programmer is interfaced to a PC usingsimple programming device. The programmer is interfaced to a PC using serial and PS/2 (power source) ports. Inside, there is Atmel 89C2051serial and PS/2 (power source) ports. Inside, there is Atmel 89C2051 microcontroller, which handles UART transmission and I2C EEPROM (IDmicrocontroller, which handles UART transmission and I2C EEPROM (ID card) programming.card) programming.
YPES YPES 
 
OF OF 
 
 EMOTIONAL EMOTIONAL
 
 SENSORS  SENSORS 
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->