You are on page 1of 18

BLUE in the term stands for Bluetooth, which enables

reliable wireless communication. EYES, because the eye movement enables us to obtain a lot of interesting and important information

The BLUE EYES technology aims at creating computational machines that have perceptual and sensory ability like those of human beings. It uses non-obtrusive sensing method, employing most modern video cameras and microphones to identify the users actions through the use of imparted sensory abilities . The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states

Contents
1.
2. 3.

4.
5. 6. 7. 8.

What can we do with Blue Eyes? Method accomplishing affective computing System Overview: DAU and CSU Software Technologies Used Emotional Computing Devices Applications Used Conclusion

It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It can verify your identity, feel your presence, and start interacting with you. The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states. For instance if you ask the computer to dial to your friend at his office, it realizes the urgency of the situation and establishes a connection

Affective Computing
The process of making emotional computers with sensing abilities is known as affective computing.

The steps used are:


1)Giving sensing abilities - to give machines the equivalent of the eyes, ears, and other sensory organs - voice-recognition software - cameras 2)Detecting human emotions -by biometric techniques 3)Respond properly

Data Acquisition Unit

Central System Unit

Bluetooth

Bluetooth

Bluetooth technology provides means for creating a Network linking the operators and the central system.

Data Acquisition Unit

Atmel 89C52 microcontroller

Bluetooth

Jazz Multisensor

Lightweight Runs on batteries low power consumption Easy to use ID cards for operator authorization

microphone earphone
Jazz Multisensor

MC 145483 PCM codec

Beeper LCD display LED indicators

Atmel 89C52 Microcontroller UART


MAX232

ID card interface
ID card

Simple keyboard

Maintains Bluetooth connections Data processing Records conclusion for further exploration Provides visualization interface

Softwares main task is to look after working operators


physiological condition Features instant reaction on the operators condition change System core facilitates flow on control between functional modules System core fundamentals: single-producer-multiconsumer thread safe queues High System Scalability

Emotion Mouse
Simple User Interest Tracker (SUITOR) Artificial Intelligent Speech Recognition

Emotion Mouse

SUITOR
BLUE EYE enabled SUITOR becomes active when the user makes an eye contact and automatically detect users area of interest and start searching it. Help by fetching more information at desktop. Notice where the users eyes focus on the screen. For ex: If reading headline pops up the story in the browser window.

Input words are scanned and matched against internally stored words. Identification causes some action to be taken. User speaks to the computer through microphone. Pattern matching is designed to look for the best fit because of variations in loudness, pitch, frequency difference, time gap etc.

APPLICATIONS OF BLUE EYES


BLUE EYES technology can be used :
In automobile industry-The first mass production car called

POD has been released by Toyota. In video games To create Face Responsive Display. For eg: A blue eyes enabled TV set would become active when we look in its directions . Voice commands could then tune your favorite channel and adjust the volume.

In the future, ordinary household devices -- such as televisions,

refrigerators, and ovens -- may be able to do their jobs when we look at them and speak to them. devices.

Provide more delicate and user friendly facilities in computing The computers can be run using implicit commands instead of the

explicit commands. It avoids potential threats resulting from human errors, such as weariness, oversight, tiredness. that will allow them to interact like humans, recognize human presence, talk, listen, or even guess their feelings.

Researchers are attempting to add more capabilities to computers

You might also like