Professional Documents
Culture Documents
Purpose Example
Defence Soldiers who have regular contact with, say, a
tribal elder, could use it to see whether the
elder is being evasive as well as how well his
mood changes over time. Fig. 1. The architecture of the VoisEye component
A. Considering VoisEye
The aim of VoisEye [5] is to protect children and at-risk
adults from harm. Fig.1 presents the architecture for VoisEye.
Fig.2 presents an embodiment of VoisEye on a smartphone. As
can be seen, it is capable of detecting their affect from their
face and also their body language so as to enable a responsible
person to intervene if the at-risk person is likely to be harmed.
B. Considering VoisJet
The purpose of VoisJet [6] is to identify those likely to
harm children and at-risk adults and to enable the elimination
of them within the scope of international treaties, like the
Geneva Convention. In armed conflict it is important to Fig. 2. An embodiment of VoisEye on a smartphone
differentiate civilians from combatants and so forensic
phonetics have an important part to play in aiding this process.
The role of VoisJet, which can take the form of an unmanned
aerial vehicle, or drone, is to ensure that those responsible for
armed conflict operations have full access to information on
whether an intended target is a civilian or a combatant, so that
they are only eliminated if they are an actual threat. Fig.3 sets
out how VoisJet operates in practice. An example of where
VoisJet would have been effective was at the Wech Baghtu
wedding party. On 7 November 2008 there was a drone killing
of 63 people in Afghanistan, which consisted of 37 Afghan
civilians and 26 combatants. The civilians consisted of 23
children. With VoisJet programmed into the drone, then it Fig. 3. The architecture of the VoisJet component
would have been possible to identify that those at the party
III. DEVELOPING VOISEYE AND VOISJET USING COMPUTING
FACIAL AND AUDITORY DATA TO ASSIST IN FORENSIC
PHONETICAL ANALYSIS
Both VoisEye [5] and VoisJet [6] share a common
architecture that will be developed during the rest of this paper.
This architecture is presented in Fig.4.