You are on page 1of 18

-(WIRELESS)

those of human beings.


The basic idea behind
this technology is to give
ABSTRACT
computer human power.
For example, we can
Our
understand humans’
paper deals with BLUE
emotional state by his
EYES TECHNOLOGY.
facial expressions. If we
Blue eye is a technology,
add these perceptual
which aims at creating
abilities to computers,
computational machines
we would enable them to
that have perceptual and
work together with
sensory abilities like
human beings as intimate
partners. It provides emotional states.It
technical means for realizes the urgency of
monitoring and recording the situation through the
human-operator’s mouse.For instance if
physiological you ask the computer to
condition.It has the dial to your friend at his
ability to gather office, it understands the
information about you situation and establishes
and interact with you a connection.It can
through special reconstruct the course of
techniques like facial operator’s work.
recognition, speech
recognition, etc.

It can even understand


your emotions at the
touch of the mouse.It can
verify your identity, feel
your presence, and start
interacting with you.The
machine can understand
what a user wants, where
he is looking at, and even
realize his physical or
INTRODUCTION: even guess their feelings.

Imagine you in
a world where humans EMOTION-
interact with computers. COMPUTING:
You are sitting in front of
your personal computer
that can listen, talk, or
even scream aloud. It has
the ability to gather One goal of
information about you human computer
and interact with you interaction (HCI) is to
through special make an adaptive, smart
techniques like facial computer system. This
recognition, speech type of project could
recognition, etc.Human possibly include gesture
cognition depends recognition, facial
primarily on the ability recognition, eye tracking,
to perceive, interpret, and speech recognition, etc.
integrate audio-visuals Another non-invasive
and sensoring way to obtain
information. Adding information about a
extraordinary perceptual person is through touch.
abilities to computers People use their
would enable computers computers to obtain,
to work together with store and manipulate data
human beings as intimate using their computer. In
partners. Researchers are order to start creating
attempting to add more smart computers, the
capabilities to computers computer must start
that will allow them to gaining information
interact like humans, about the user. Our
recognize human proposed method for
presents, talk, listen, or gaining user information
through touch is via a giving the computer the
computer input device, ability to express
the mouse. From the emotions. Not only are
physiological data emotions crucial for
obtained from the user, rational decision making
an emotional state may as Picard describes, but
be determined which emotion detection is an
would then be related to important step to an
the task the user is adaptive computer
currently doing on the system. An adaptive,
computer. Over a period smart computer system
of time, a user model has been driving our
will be built in order to efforts to detect a
gain a sense of the user's person’s emotional state.
personality. The scope of By matching a person’s
the project is to have the emotional state and the
computer adapt to the context of the expressed
user in order to create a emotion, over a period of
better working time the person’s
environment where the personality is being
user is more productive. exhibited. Therefore, by
The first steps towards giving the computer a
realizing this goal are longitudinal
described here. understanding of the
emotional state of its
Rosalind Picard user, the computer could
(1997) describes why adapt a working style
emotions are important which fits with its user’s
to the computing personality. The result of
community. There are this collaboration could
two aspects of affective increase productivity for
computing: giving the the user. One way of
computer the ability to gaining information from
detect emotions and a user non-intrusively is
by video. Cameras have
been used to detect a Based on facial
person’s emotional state expression work, we see
(Johnson, 1999). We a correlation between a
have explored gaining person’s emotional state
information through and a person’s
touch. One obvious place physiological
to put sensors is on the measurements. Selected
mouse. Through works from Ekman and
observing normal others on measuring
computer usage (creating facial behaviors describe
and editing documents Ekman’s Facial Action
and surfing the web), Coding System (Ekman
people spend and Rosenberg, 1997).
approximately 1/3 of One of his experiments
their total computer time involved participants
touching their input attached to devices to
device. Because of the record certain
incredible amount of measurements including
time spent touching an pulse, galvanic skin
input device, we will response (GSR),
explore the possibility of temperature, somatic
detecting emotion movement and blood
through touch. pressure. He then
recorded the
measurements as the
FACIAL participants were
EXPRESSION: instructed to mimic facial
expressions which
corresponded to the six
basic emotions. He
defined the six basic
emotions as anger, fear,
sadness, disgust, joy and
surprise.
Six participants were
trained to exhibit
the facial expressions of that all four
the six basic emotions. physiological variables
While each participant made significant,
exhibited these nonredundant
expressions, the contributions to the
physiological changes functions that distinguish
associated with affect the six states. Moreover,
were assessed. The these analyses indicate
measures taken were that these four
GSR, heart rate, skin physiological measures
temperature and general are sufficient to
somatic activity (GSA). determine reliably a
These data were then person’s specific
subject to two analyses. emotional state. Because
For the first analysis, a of our need to
multidimensional scaling incorporate these
(MDS) procedure was measurements into a
used to determine the small, non-intrusive
dimensionality of the form, we will explore
data. This analysis taking these
suggested that the measurements from the
physiological similarities hand. The amount of
and dissimilarities of the conductivity of the skin
six emotional states fit is best taken from the
within a four fingers. However, the
dimensional model. For other measures may not
the second analysis, a be as obvious or robust.
discriminant function We hypothesize that
analysis was used to changes in the
determine the temperature of the finger
mathematic functions are reliable for prediction
that would distinguish of emotion. We also
the six emotional states. hypothesize the GSA can
This analysis suggested be measured by change
in movement in the eliminated by warping
computer mouse. the cursor to the eye gaze
area, which encompasses
MAGIC-POINTING: the target. Two specific
This work MAGIC pointing
explores a new direction techniques, one
in utilizing eye gaze for conservative and one
computer input. Gaze liberal, were designed,
tracking has long been analyzed, and
considered as an implemented with an eye
alternative or potentially tracker we developed.
superior pointing method They were then tested in
for computer input. We a pilot study. This early
believe that many stage exploration showed
fundamental limitations that the MAGIC pointing
exist with traditional techniques might offer
gaze pointing. In many advantages,
particular, it is unnatural including reduced
to overload a perceptual physical effort and
channel such as vision fatigue as compared to
with a motor control traditional manual
task. We therefore pointing, greater
propose an alternative accuracy and naturalness
approach, dubbed than traditional gaze
MAGIC (Manual and pointing, and possibly
Gaze Input Cascaded) faster speed than manual
pointing. With such an pointing. The pros and
approach, pointing cons of the two
appears to the user to be techniques are discussed
a manual task, used for in light of both
fine manipulation and performance data and
selection. However, a subjective reports.
large portion of the
cursor movement is
being, would be called
intelligent. It makes
machines smarter and
more useful, and is less
expensive than natural
intelligence. Natural
language processing
(NLP) refers to artificial
intelligence methods of
communicating with a
computer in a natural
language like English.
The main objective of a
NLP program is to
understand input and
initiate action. The input
words are scanned and
matched against
internally stored known
words. Identification of a
THE TECHNOLOGY: key word causes some
action to be taken. In this
Artificial intelligence way, one can
(AI) involves two basic communicate with the
ideas. First, it involves computer in one’s
studying the thought language. No special
processes of human commands or computer
beings. Second, it deals language are required.
with representing those There is no need to enter
processes via machines programs in special
(like computers, robots, language forcreating-
etc). AI is behavior of a software.
machine, which, if
performed by a human
SPEECH- amplifiers. The filter
RECOGNITION: output is then fed to the
ADC to translate the
analogue signal into
digital word. The ADC
samples the filter outputs
many times a second.
Each sample represents
different amplitude of the
signal .Evenly spaced
vertical lines represent
the amplitude of the
audio filter output at the
instant of sampling. Each
value is then converted
to a binary number
The
proportional to the
user speaks to the
amplitude of the sample.
computer through a
A central processor unit
microphone, which, in
(CPU) controls the input
used; a simple system
circuits that are fed by
may contain a minimum
the ADCS. A large RAM
of three filters. The more
(random access memory)
the number of filters
stores all the digital
used, the higher the
values in a buffer area.
probability of accurate
This digital information,
recognition. Presently,
representing the spoken
switched capacitor
word, is now accessed by
digital filters are used
the CPU to process it
because these can be
further. The normal
custom-built in
speech has a frequency
integrated circuit form.
range of 200 Hz to 7
These are smaller and
kHz. Recognizing a
cheaper than active
telephone call is more
filters using operational
difficult as it has time gap, etc. Due to this
bandwidth limitation of reason, there is never a
300 Hz to3.3 kHz.As perfect match between
explained earlier, the the template and binary
spoken words are input word.
processed by the filters The values of binary
and ADCs. The binary input words are
representation of each of subtracted from the
these words becomes a corresponding values in
template or standard, the templates. If both the
against which the future values are same, the
words are compared. difference is zero and
These templates are there is perfect match. If
stored in the memory. not, the subtraction
Once the storing process produces some difference
is completed, the system or error. The smaller the
can go into its active error, the better the
mode and is capable of match. When the best
identifying spoken match occurs, the word is
words. As each word is identified and displayed
spoken, it is converted on the screen or used in
into binary equivalent some other manner. The
and stored in RAM. The search process takes a
computer then starts considerable amount of
searching and compares time, as the CPU has to
the binary input pattern make many comparisons
with the templates. t is to before recognition
be noted that even if the occurs. This necessitates
same speaker talks the use of very high-speed
same text, there are processors. A large RAM
always slight variations is also required as even
in amplitude or loudness though a spoken word
of the signal, pitch, may last only a few
frequency difference, hundred milliseconds,
but the same is translated more information at his
into many thousands of desktop. By simply
digital words. It is noticing where the user’s
important to note that eyes focus on the
alignment of words and computer screen, the
templates are to be SUITOR can be more
matched correctly in precise in determining
time, before computing his topic of interest. It
the similarity score. This can even deliver relevant
process, termed as information to a
dynamic time warping, handheld device. The
recognizes that different success lies in how much
speakers pronounce the the suitor can be intimate
same words at different to the user. IBM's
speeds as well as BlueEyes research
elongate different parts project began with a
of the same word. simple question,
according to Myron
SUITOR: Flickner, a manager in
Almaden's USER group:
Computers Can we exploit
would have been much nonverbal cues to create
more powerful, had they more effective user
gained perceptual and interfaces? One such cue
sensory abilities of the is gaze—the direction in
living beings on the which a person is
earth. What needs to be looking. Flickner and his
developed is an intimate colleagues have created
relationship between the some new techniques for
computer and the tracking a person's eyes
humans.By observing the and have incorporated
Webpage a netizen is this gaze-tracking
browsing, the SUITOR technology into two
can help by fetching prototypes. One, called
SUITOR (Simple User parameters. The most
Interest Tracker), fills a important parameter is
scrolling ticker on a saccadic activity1, which
computer screen with enables the system to
information related to the monitor the status of the
user's current task. operator’s visual
SUITOR knows where attention along with head
you are looking, what acceleration, which
applications you are accompanies large
running, and what Web displacement of the
pages you may be visual axis (saccades
browsing. "If I'm reading larger than 15 degrees).
a Web page about IBM, Complex industrial
for instance," says Paul environment can create a
Maglio, the Almaden danger of exposing the
cognitive scientist who operator to toxic
invented SUITOR, "the substances, which can
system presents the latest affect his cardiac,
stock price or business circulatory and
news stories that could pulmonary systems.
affect IBM. If I read the Thus, on the grounds of
headline off the ticker, it lethysmographic signal
pops up the story in a taken from the forehead
browser window. skin surface, the system
computes heart beat rate

SYSTEM- and blood oxygenation.

OVERVIEW: The BLUEEYES system


checks above parameters

BLUEEYES against abnormal or

system provides undesirable values and

technical means for triggers user-defined

monitoring and recording alarms when necessary.

the operator’s basic Quite often in an

physiological emergency situation


operators speak to mount, connect and test
themselves expressing various peripheral
their surprise or stating devices cooperating with
verbally the problem. the microcontroller.
Therefore, the operator’s During the
voice, physiological implementation of the
parameters and an DAU we needed a piece
overall view of the of software to establish
operating room are and test Bluetooth
recorded. This helps to connections. We
reconstruct the course of therefore created a tool
operators’ work and called Blue Dentist. The
provides data for long- tool provides support for
term analysis. This controlling the currently
system consists of a connected Bluetooth
mobile measuring device device. Its functions are:
and a central analytical local device
system. The mobile management&connectio
device is integrated with n management. To test
Bluetooth module the possibilities and
providing wireless performance of the
interface between remaining parts of the
sensors worn by the Project Kit (computer,
operator and the central camera and database
unit. software) we created
BlueCapture The tool
TOOLS- supports capturing video
DEVELOPED: data from various
sources (USB web-cam,
In creating the industrial camera) and
hardware part of the storing the data in the
DAU we built a MS SQL Server
development board, database. Additionally,
which enabled us to the application performs
sound recording. After 1. Researchers
filtering and removing from IBM Center in San
insignificant fragments Jose, CA, report that a
(i.e. silence) the audio number of large retailers
data is stored in the have implemented
database. Finally, the surveillance systems that
program plays the record and interpret
recorded audiovisual customer movements,
stream. We used the using software from
software to measure Almaden's BlueEyes
database system research project.
performance and to BlueEyes software
optimize some of the makes sense of what the
SQL queries (e.g. we cameras see to answer
replaced correlated SQL key questions for
queries with cursor retailers, including, how
operations). Since all the many shoppers ignored a
components of the promotion? How many
application have been stopped? How long did
tested thoroughly they they stay? Did their faces
were reused in the final register boredom or
software, which delight? How many
additionally reduced reached for the item and
testing time. We also put it in their shopping
created a simple tool for carts? BlueEyes works
recording Jazz by tracking pupil,
Multisensor eyebrow and mouth
measurements. The movement. When
program reads the data monitoring pupils, the
using a parallel port and system uses a camera
writes it to a file. and two infrared light
sources placed inside the

APPLICATIONS: product display. One


light source is aligned
with the camera's focus; see its use in video
the other is slightly off games where, it could
axis. When the eye looks give individual
into the camera-aligned challenges to customers
light, the pupil appears playing video
bright to the sensor, and games.Typically
the software registers the targeting commercial
customer's attention. This business.The integration
is way it captures the of children's toys,
person's income and technologies and
buying preferences. computers is enabling
BlueEyes is actively new play experiences
been incorporated in that were not
some of the leading commercially feasible
retailoutlets. until recently. The Intel
2. Blue Eyes Play QX3 Computer
can be applied in the Microscope, the
automobile industry. By Me2Cam with Fun Fair,
simply touching a and the Computer Sound
computer input device Morpher are
such as a mouse, the commercially available
computer system is smart toy products
designed to be able to developed by the Intel
determine a person's Smart Toy Lab in. One
emotional state. For cars, theme that is common
it could be useful to help across these PC-
with critical decisions connected toys is that
like: "I know you want to users interact with them
get into the fast lane, but using a combination of
I'm afraid I can't do that. visual, audible and tactile
Your too upset right input & output
now" and therefore assist modalities.
in drivingsafely. 4. The familiar
3. We could and useful come from
things we recognize. computers and humans
Many of our favorite can present information
things' appearance vividly, but have no
communicate their use; sense of whether that
they show the change in information is ever
their value though patina. viewed or understood. In
As technologists we are contrast, new real-time
now poised to imagine a computer vision
world where computing techniques for perceiving
objects communicate people allows us to
with us in-situ; where we create "Face-responsive
are. We use our looks, Displays" and
feelings, and actions to "Perceptive
give the computer the Environments", which
experience it needs to can sense and respond to
work with us. Keyboards users that are viewing
and mice will not them. Using stereo-
continue to dominate vision techniques, we are
computer user interfaces. able to detect, track, and
Keyboard input will be identify users robustly
replaced in large measure and in real time. This
by systems that know information can make
what we want and spoken language
require less explicit interface more robust, by
communication. Sensors selecting the acoustic
are gaining fidelity and information from a
ubiquity to record visually-localized source.
presence and actions; Environments can
sensors will notice when become aware of how
we enter a space, sit many people are present.
down,liedown,pump,iron
,etc.
5. Current
interfaces between
CONCLUSION: www.scribd.com/doc/13
763040/Blue-Eyes-
The Technology
nineties witnessed
quantum leaps interface
designing for improved
man machine
interactions. The BLUE
EYES technology
ensures a convenient way
of simplifying the life by
providing more delicate
and user friendly
facilities in computing
devices. Now that we
have proven the method,
the next step is to
improve the
hardware.Instead of
using cumbersome
modules to gather
information about the
user, it will be better to
use smaller and less
intrusive units.

REFERENCE:
www.wherisdoc.com
www.fixya.com
www.penniblack56.gratis
phphost.info/blue-eyes-
technology

You might also like