Blue Eye Technology Give Computer Human Power Computer Science Essay
✅ Paper Type: Free Essay | ✅ Subject: Computer Science |
✅ Wordcount: 1761 words | ✅ Published: 1st Jan 2015 |
ABSTRACT
The basic idea of Blue Eye technology is to give the computer the human power. We all have some perceptual abilities. That is we can understand each other’s feelings. For example we can understand ones emotional state by analyzing his facial expression. If we add these perceptual abilities of human to computers would enable computers to work together with human beings as intimate partners. The “BLUE EYES” technology aims at creating computational machines that have perceptual and sensory ability like those of human beings.
Blue Eyes uses sensing technology to identify a user’s actions and to extract key information. This information is then analyzed to determine the user’s physical, emotional, or informational state, which in turn can be used to help make the user more productive by performing expected actions or by providing expected information. For example, in future a Blue Eyes-enabled television could become active when the user makes eye contact, at which point the user could then tell the television to “turn on”. This paper is about the hardware, software, benefits and interconnection of various parts involved in the “blue eye” technology.
INTRODUCTION
Animal survival depends on highly developed sensory abilities. Likewise, human cognition depends on highly developed abilities to perceive, integrate, and interpret visual, auditory, and touch information. Without a doubt, computers would be much more
powerful if they had even a small fraction of the perceptual ability of animals or humans. Adding such perceptual abilities to computers would enable computers and humans to work together more as partners. Toward this end, the Blue Eyes aims at creating computational devices with the sort of perceptual abilities that people take for granted Blue eyes is being developed by the team of Poznan University of Technology& Microsoft. It makes use of the “blue tooth technology “developed by Ericsson.
Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Find out more about our Essay Writing Service
Why blue eyes technology?
A study has shown that people with personalities that are similar or complement each other collaborate well. Dryer (1999) has also shown that people view their computer as having a personality. For these reasons, it is important to develop computers which can work well with its user. This is where the blue eyes technology comes into force. The ABILITIES: to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presence, and starts interacting with you.
Why it’s named ‘Blue Eyes’?
Blue Eyes emphasizes – Bluetooth technology and the movements of the eyes. Bluetooth provides reliable wireless communication whereas the eye movements enable us to obtain a lot of interesting and important information.
PARTS OF BLUE EYE SYSTEM
The main parts in the Blue eye system are
THE HARDWARE
1. Data Acquisition Unit
The tasks of the mobile Data Acquisition Unit are to maintain Bluetooth connections, to get information from the sensor and sending it over the wireless connection, to deliver the alarm messages sent from the Central System Unit to the operator and handle personalized ID cards.
2. Central System Unit
Central System Unit maintains the other side of the Blue tooth connection, buffers incoming sensor data, performs on-line data analysis, records the conclusions for further exploration and provides visualization interface.
C:Documents and SettingsAdministratorDesktop1.jpg
THE SOFTWARE
Blue Eyes software’s main task is to look after working operators’ physiological condition. To assure instant reaction on the operators’ condition change the software performs real time buffering of the incoming data, real-time physiological data analysis and alarm triggering.
The Blue Eyes software comprises several functional modules System core facilitates the
transfers flow between other system modules (e.g. transfers raw data from the Connection Manager to data analyzers, processed data from the data analyzers to GUI controls, other data analyzers, data logger etc.).
EMOTION COMPUTING
Rosalind Picard (1997) describes why emotions are important to the computing community. There are two aspects of affective computing: giving the computer the ability to detect emotions and giving the computer the ability to express emotions. Not only are emotions crucial for rational decision making as Picard describes, but emotion detection is an important step to an adaptive computer system. An adaptive, smart computer system has been driving our efforts to detect a person’s emotional state. An important element of incorporating emotion into computing is for productivity for a computer user.
TYPES OF EMOTION SENSORS
For Hand:
Emotion Mouse
One proposed, none-invasive method for gaining user information through touch is via a computer input device, the mouse. This then allows the user to relate the cardiac rhythm, the body temperature, electrical conductivity of the skin and other physiological attributes with the mood. This has led to the creation of the “Emotion Mouse”. The device can measure heart rate, temperature, galvanic skin response and minute bodily movements and matches them with six emotional states: happiness, surprise, anger, fear, sadness and disgust.
C:Documents and SettingsAdministratorDesktop2.jpg
Sentic Mouse
It is a modified computer mouse that includes a directional pressure sensor for aiding in recognition of emotional valence (liking/attraction vs. disliking/avoidance).
For Eyes:
Expression Glasses
A wearable device which allows any viewer to visualize the confusion and Interest levels of the wearer. Other recent developments in related technology are the attempt to learn the needs of the user just by following the interaction between the user and the computer in order to know what he/she is interested in at any given moment. For example, by remembering the type of websites that the user links to according to the mood and time of the day, the computer could search on related sites and suggest the results the user.
Manual And Gaze Input Cascaded (MAGIC)Pointing
This work explores a new direction in utilizing eye gaze for computer input. Gaze tracking has long been considered as an alternative or potentially superior pointing method for computer input. eye gaze area, which encompasses the target. Two specific MAGIC pointing techniques, one conservative and one liberal, were designed, analyzed, and implemented with an eye tracker we developed. They were then tested in a pilot study. This early stage exploration showed that the MAGIC pointing techniques might offer many advantages, including reduced physical effort and fatigue as compared to traditional manual pointing, greater accuracy and naturalness than traditional gaze pointing, and possibly faster speed than manual pointing. C:Documents and SettingsAdministratorDesktop5.jpg
Eye Tracking
One can purchase the commercial eye tracker (ASL Model 5000), this system is much more compact and reliable. It is still not robust enough for a variety of people with different eye characteristics, such as pupil brightness and correction glasses. Available commercial systems rely on a single light source that is positioned either off the camera axis or on-axis. Illumination from an off-axis source (or ambient illumination) generates a dark pupil image. Pupil detection is realized by means of subtracting the dark pupil image from the bright pupil image. After thresholding the difference, the largest connected component is identified as the pupil. This technique significantly increases the robustness and reliability of the eye tracking system.
C:Documents and SettingsAdministratorDesktop3.jpg
For Voice:
Artificial Intelligence Speech Recognition
AI is behavior of a machine, which, if performed by a human being, would be called intelligent. It makes machines smarter and more useful, and is less expensive than natural intelligence. The user speaks to the computer through a microphone, which, in used; a simple system may contain a minimum of three filters. The more the number of filters used, the higher the probability of accurate recognition. With reliable speech recognition equipment, pilots can give commands and information to the computers by simply speaking into their microphones-they don’t have to use their hands for this purpose.
BLUE-EYES BENEFITS:
Prevention from dangerous incidents Minimization of ecological consequences financial loss a threat to a human life Blue Eyes system provides technical means for monitoring and recording human-operator’s physiological condition. The key features of the system are:
visual attention monitoring (eye motility analysis)
physiological condition monitoring (pulse rate, blood oxygenation)
operator’s position detection (standing, lying)
wireless data acquisition using Blue tooth technology
real-time user-defined alarm triggering
physiological data, operator’s voice and overall view of the control room recording
recorded data playback
C:Documents and SettingsAdministratorDesktop4.jpg
Blue Eyes system can be applied in every working environment requiring permanent operator’s attention:
at power plant control rooms
At captain bridges
at flight control centers
CONCLUSION
The nineties witnessed quantum leaps interface designing for improved man machine interactions. The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices. Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units. The day is not far when this technology will push its way into your house hold, making you more lazy. It may even reach your hand held mobile device. Any way this is only a technological forecast.
Cite This Work
To export a reference to this article please select a referencing stye below:
Related Services
View allDMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: