You are on page 1of 15

BLUE EYE TECHNOLOGY

P.MEENAKSHI
IV ECE-B

Contents
What is blue eyes technology Why the name blue eyes Technologies used System overview Applications Advantages and Disadvantages Conclusion

Blue Eye Technology aims at creating computational devices that have both perceptual and sensory abilities like those of human beings.

Blue Eye stands for..

Blue for bluetooth

Eye movement enables us to obtain a lot of information.

Blue eye technology

TECHNOLGIES USED
Emotion Mouse Manual And Gaze Input Cascaded (MAGIC) Artificial Intelligent Speech Recognition Simple User Interest Tracker (SUITOR)

Emotional Computing Device Emotion Mouse

Simplest way People spend approximately 1/3 of their total computer time touching input device Physiological data is obtained and emotional state is determined A user model will be built that reflects the personality of user.

Manual And Gaze Input Cascaded(MAGIC)


To dynamically redefine the home position of the pointing cursor to be at the close vicinity of the target Reduce the cursor movement needed for target selection Faster than pure manual pointing Two magic pointing techniques a) Liberal b) Conservative

Liberal

Conservative

ARTIFICIAL INTELLIGIENT SPEECH RECOGNITION


User speaks to the computer through microphone Filtered and fed to ADC and then stored in RAM Binary representation become standard , against which future are compared

Simple User Interest Tracker (SUITOR)


Help by fetching more information at desktop Notice where the users eyes focus on the screen Fills a scrolling ticker on a computer screen with information related to users task

Applications
POD CARS In the automobile industry

To create Face Responsive Display .

ADVANTAGES

Physiological condition monitoring (pulse rate, bloodoxygenation) Reduces manual work. Increases efficiency.
DISADVANTAGES
Not 100% accuracy. System is bulky. Expensive.

Conclusion
The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices. Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units.

You might also like