SlideShare una empresa de Scribd logo
1 de 24
Presented By-
             Nawal Kishore Sharma




   BlueEyes Technology              1
What is blue eye?




     BlueEyes Technology   2
Introduction
• The BLUE EYES project was started at IBM's
  Almaden Research Centre in USA.
• It aims at giving computers highly developed
  abilities to perceive, integrate and interpret
  visual, auditory and touch information.
• The BLUE EYES project aims at creating
  computers, which can adapt to humans and
  thus enable them to operate much more
  conveniently.

                     BlueEyes Technology           3
What BlueEyes is not?
• Doesn’t predict nor interfere with operator’s
  thoughts.
• Cannot force directly the operator to work.

• How was the term blue-eyes coined?
  Blue in this term stands for Bluetooth, which enables reliable
  wireless communication and the
  Eyes because the eye movement enables us to obtain a lot of
  interesting and important information.



                             BlueEyes Technology                   4
PRESENT
• Animal survival depends on highly developed
  sensory abilities.
• human cognition depends on highly
  developed abilities to perceive, integrate, and
  interpret visual, auditory, and touch
  information.



                     BlueEyes Technology            5
• Without a doubt, computers would be much
  more powerful if they had even a small fraction
  of the perceptual ability of animals or humans.
• Adding such perceptual abilities to computers
  would enable computers and humans to work
  together more as partners.
• Toward this end, the BlueEyes project aims at
  creating computational devices with the sort of
  perceptual abilities that people take for granted.

                      BlueEyes Technology              6
Emotions
• Since emotions are the key issue in blue eye we need to
  define and classify emotions.

What are emotions?
• Are the response to the different situations we experiment
  in our environment and they play an important role in the
  decision-making process and solving problems as well.

Emotions have two components:
1. Mental component (cognitive)
2. Physical component (body)


                         BlueEyes Technology                   7
Classification of Emotions

                                      Occurred as a direct consequence
         EMOTIONS                     of encountering some kind of event.

                                 Cause a detectable physical response in the body:
       PRIMARY                   Fear a heightened heartbeat, increased “flinch”
                                 response, and increased and muscle tension.
                                 Anger       based      on     sensation,     seems
                                 indistinguishable from fear.
     SECONDARY                   Happiness is often felt as an expansive or swelling
                                 feeling in the chest and the sensation of lightness
                                 or buoyancy,
Can     be  caused               Sadness feeling of tightness in the throat and
directly by primary              eyes, and relaxation in the arms and legs.
emotions or come                 Shame can be felt as heat in the upper chest and
from    a  cognitive             face.
process                          Desire can be accompanied by a dry throat, heavy
                                 breathing, and increased heart rate.
   ex. Embarrassment


Antonio Damasio (1994)        BlueEyes Technology                               8
BlueEyes Technology   9
How can we make computers "see"
            and "feel"?
• BlueEyes uses sensing technology to identify a
  user's actions and to extract key information. This
  information is then analyzed to determine the
  user's physical, emotional, or informational state,
  which in turn can be used to help make the user
  more productive by performing expected actions
  or by providing expected information.
• For example, a BlueEyes-enabled television could
  become active when the user makes eye contact,
  at which point the user could then tell the
  television to "turn on".

                      BlueEyes Technology           10
BlueEyes Technology   11
BlueEyes Technology   12
BlueEyes Technology   13
Applications--

In the automobile industry
Surveillance systems that record and interpret
 customer movements in retail shops.
To create "Face-responsive Displays" and
 "Perceptive Environments"




                    BlueEyes Technology       14
Applications
• We can classify applications of blue eyes and
  affective computing into five categories
  mainly, which are:
  – Security.
  – Education.
  – Health and Medicine.
  – Military.
  – Home

                    BlueEyes Technology           15
Applications
 Security:
   Emotions can be reliable in term of security.
Examples:
1. Smart Cameras.
2. Lie detectors.
3. Emotional Speech processing.




                BlueEyes Technology                16
Applications
 Education:
 Knowing the emotional feedback of learners
 enhance teaching styles.


Examples:
1. Electronic Tutoring.
2. E-Learning.
3. Text-to-speech applications.



                BlueEyes Technology           17
Applications
 Health and Medicine :
    Knowing the emotions of patients helps in the
 treatment.


Examples:
1. Measuring the affects of medicines.
2. Helping people with mental Illness.




                BlueEyes Technology                 18
Applications
 Military :
   To have devices with emotional intelligence.


Examples:
1. Training equipment.

2. Simulation systems.




                BlueEyes Technology               19
Applications
 Home :
   To have devices with emotional intelligence.


Examples:
1. Video Games.
2. Delivering emotions in communication.
3. Toys.




                BlueEyes Technology               20
• We are now poised to imagine a world
At   last-- where computing objects communicate
             with us in-situ; where we are.
           • We use our looks, feelings, and actions
             to give the computer the experience it
             needs to work with us.
           • Keyboards and mouse will not continue
             to dominate computer user interfaces.
           • Sensors are gaining fidelity and ubiquity
             to record presence and actions; sensors
             will notice when we enter a space, sit
             down, lie down, pump iron, etc.
           • Pervasive infrastructure is recording it.
                      BlueEyes Technology          21
THANK YOU!!!




BlueEyes Technology   22
REFERENCES--
 www.alphaworks.ibm.com/awap.nsf/alltype/86ECE8569056DDC
  788256AEE007A9702
 www.cse.ogi.edu/CHCC/Series/text2001.html
 Carpenter R. H. S., Movements of the eyes, 2nd edition, Pion
  Limited, 1988, London.
 Picard, R. (1997). Affective Computing. MIT Press: Cambridge
 Affective Computing - Picard. R.
 Advantages of Eye Gaze Interaction- Silbert.L.
 Bluetooth Module, Ericsson Microelectronics,
 BLUE EYES system overview, Datasheet, Poznan University.
 http://www.eetimes.com
 http://www.ibm.com



                          BlueEyes Technology                23
Any Queries?




               BlueEyes Technology   24

Más contenido relacionado

La actualidad más candente

BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGYChaitanya Ram
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes TechnologyRamki M
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyCK Vashisth
 
Blue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationBlue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationVaibhav Kumar
 
Blue eyes technology full ppt
Blue eyes technology full pptBlue eyes technology full ppt
Blue eyes technology full pptBablu Bambal
 
BLUE EYE TECHNOLOGY
BLUE EYE TECHNOLOGYBLUE EYE TECHNOLOGY
BLUE EYE TECHNOLOGYIti Jain
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYShehin Pm
 
Blue Eyes Technology - Power Point Presentation
Blue Eyes Technology - Power Point Presentation Blue Eyes Technology - Power Point Presentation
Blue Eyes Technology - Power Point Presentation JoobleTPuthiyamadam
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technologyrahuldikonda
 
Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1keerthi k
 
Blue eyes technology..document (1)
Blue eyes technology..document (1)Blue eyes technology..document (1)
Blue eyes technology..document (1)yuvatejreddy
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyYusuf Shaik
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimssomadhavsolanki
 
Blue Eyes Technology PPT
Blue Eyes Technology PPTBlue Eyes Technology PPT
Blue Eyes Technology PPTHRIDHYAJOY
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technologyDivya Mohan
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 

La actualidad más candente (20)

BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue Eye Technology Seminar Presentation
Blue Eye Technology Seminar PresentationBlue Eye Technology Seminar Presentation
Blue Eye Technology Seminar Presentation
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Blue eyes technology full ppt
Blue eyes technology full pptBlue eyes technology full ppt
Blue eyes technology full ppt
 
BLUE EYE TECHNOLOGY
BLUE EYE TECHNOLOGYBLUE EYE TECHNOLOGY
BLUE EYE TECHNOLOGY
 
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
 
Blue Eyes Technology - Power Point Presentation
Blue Eyes Technology - Power Point Presentation Blue Eyes Technology - Power Point Presentation
Blue Eyes Technology - Power Point Presentation
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
 
Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02Blueeyes 140731120825-phpapp02
Blueeyes 140731120825-phpapp02
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1Blue eyes technology monitoring human operator and intelligence sensing 1
Blue eyes technology monitoring human operator and intelligence sensing 1
 
Blue eyes technology..document (1)
Blue eyes technology..document (1)Blue eyes technology..document (1)
Blue eyes technology..document (1)
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimsso
 
Blue Eyes Technology PPT
Blue Eyes Technology PPTBlue Eyes Technology PPT
Blue Eyes Technology PPT
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 

Destacado (15)

Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)Blue Eyes (Artificial Intelligence)
Blue Eyes (Artificial Intelligence)
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eye
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
blue-eyes technology
blue-eyes technologyblue-eyes technology
blue-eyes technology
 
Blue eye technology
Blue eye technology Blue eye technology
Blue eye technology
 
smart quill pen
smart quill pensmart quill pen
smart quill pen
 
Best Ever PPT Of Bluebrain
Best Ever PPT Of BluebrainBest Ever PPT Of Bluebrain
Best Ever PPT Of Bluebrain
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
Hacking
HackingHacking
Hacking
 
Seminar on blue eyes
Seminar on blue eyesSeminar on blue eyes
Seminar on blue eyes
 
Blue eyes ppt
Blue eyes pptBlue eyes ppt
Blue eyes ppt
 
CV of Mohammed Ariful Islam
CV of Mohammed Ariful IslamCV of Mohammed Ariful Islam
CV of Mohammed Ariful Islam
 
A Toi Mon Amour
A Toi Mon AmourA Toi Mon Amour
A Toi Mon Amour
 
Bitcoin tech talk @Purdue Bitcoin Club
Bitcoin tech talk @Purdue Bitcoin ClubBitcoin tech talk @Purdue Bitcoin Club
Bitcoin tech talk @Purdue Bitcoin Club
 

Similar a Blue eyes technology and role of emotional computing

BLUE EYES TECHNOLOGY 1.pptx
BLUE EYES TECHNOLOGY 1.pptxBLUE EYES TECHNOLOGY 1.pptx
BLUE EYES TECHNOLOGY 1.pptxKGANESH34
 
Blueeyestechnology document1-130312132338-phpapp01
Blueeyestechnology document1-130312132338-phpapp01Blueeyestechnology document1-130312132338-phpapp01
Blueeyestechnology document1-130312132338-phpapp01Sarada Adiraju
 
Blueeyestechnology document1-130312132338-phpapp01
Blueeyestechnology document1-130312132338-phpapp01Blueeyestechnology document1-130312132338-phpapp01
Blueeyestechnology document1-130312132338-phpapp01Sarada Adiraju
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologykomal jain
 
A Seminar Report On Blue Eyes Technology Submitted By
A Seminar Report On Blue Eyes Technology Submitted ByA Seminar Report On Blue Eyes Technology Submitted By
A Seminar Report On Blue Eyes Technology Submitted ByJennifer Daniel
 
Building the Knowledge of Human Perception into E-Learning
Building the Knowledge of Human Perception into E-LearningBuilding the Knowledge of Human Perception into E-Learning
Building the Knowledge of Human Perception into E-LearningShalin Hai-Jew
 
Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Ajith Kumar Ravi
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes TechnologyNimish Londhe
 
PPT Ketki.pptx
PPT Ketki.pptx PPT Ketki.pptx
PPT Ketki.pptx nkadu0353
 
Blue Technologies : Blue Brain & Blue Eyes
Blue Technologies : Blue Brain & Blue EyesBlue Technologies : Blue Brain & Blue Eyes
Blue Technologies : Blue Brain & Blue EyesMittal Patel
 
Ruchitha.T article.pdf
Ruchitha.T article.pdfRuchitha.T article.pdf
Ruchitha.T article.pdfChinni99
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyHimadri khali
 
Is the rising technology a threat?
Is the rising technology a threat?Is the rising technology a threat?
Is the rising technology a threat?Fabrizio Gramuglio
 
Psychology behind mobile apps, Mobile Trends Conference Kraków 2015
Psychology behind mobile apps, Mobile Trends Conference Kraków 2015Psychology behind mobile apps, Mobile Trends Conference Kraków 2015
Psychology behind mobile apps, Mobile Trends Conference Kraków 2015Piotr Biegun
 
ICCS REASERCH PAPER TOPICS AND ITS SUBBIMISSION
ICCS REASERCH PAPER TOPICS AND ITS SUBBIMISSIONICCS REASERCH PAPER TOPICS AND ITS SUBBIMISSION
ICCS REASERCH PAPER TOPICS AND ITS SUBBIMISSIONsakethgupta243
 

Similar a Blue eyes technology and role of emotional computing (20)

BLUE EYES TECHNOLOGY 1.pptx
BLUE EYES TECHNOLOGY 1.pptxBLUE EYES TECHNOLOGY 1.pptx
BLUE EYES TECHNOLOGY 1.pptx
 
Blueeyestechnology document1-130312132338-phpapp01
Blueeyestechnology document1-130312132338-phpapp01Blueeyestechnology document1-130312132338-phpapp01
Blueeyestechnology document1-130312132338-phpapp01
 
Blueeyestechnology document1-130312132338-phpapp01
Blueeyestechnology document1-130312132338-phpapp01Blueeyestechnology document1-130312132338-phpapp01
Blueeyestechnology document1-130312132338-phpapp01
 
Blue Eyes Technology.pptx
Blue Eyes Technology.pptxBlue Eyes Technology.pptx
Blue Eyes Technology.pptx
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
A Seminar Report On Blue Eyes Technology Submitted By
A Seminar Report On Blue Eyes Technology Submitted ByA Seminar Report On Blue Eyes Technology Submitted By
A Seminar Report On Blue Eyes Technology Submitted By
 
Building the Knowledge of Human Perception into E-Learning
Building the Knowledge of Human Perception into E-LearningBuilding the Knowledge of Human Perception into E-Learning
Building the Knowledge of Human Perception into E-Learning
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue eyes technology New Version 2017
Blue eyes technology New Version 2017Blue eyes technology New Version 2017
Blue eyes technology New Version 2017
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 
PPT Ketki.pptx
PPT Ketki.pptx PPT Ketki.pptx
PPT Ketki.pptx
 
Blue Technologies : Blue Brain & Blue Eyes
Blue Technologies : Blue Brain & Blue EyesBlue Technologies : Blue Brain & Blue Eyes
Blue Technologies : Blue Brain & Blue Eyes
 
19-4T0-SEMINAR.pptx
19-4T0-SEMINAR.pptx19-4T0-SEMINAR.pptx
19-4T0-SEMINAR.pptx
 
Ruchitha.T article.pdf
Ruchitha.T article.pdfRuchitha.T article.pdf
Ruchitha.T article.pdf
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Is the rising technology a threat?
Is the rising technology a threat?Is the rising technology a threat?
Is the rising technology a threat?
 
Psychology behind mobile apps, Mobile Trends Conference Kraków 2015
Psychology behind mobile apps, Mobile Trends Conference Kraków 2015Psychology behind mobile apps, Mobile Trends Conference Kraków 2015
Psychology behind mobile apps, Mobile Trends Conference Kraków 2015
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
ICCS REASERCH PAPER TOPICS AND ITS SUBBIMISSION
ICCS REASERCH PAPER TOPICS AND ITS SUBBIMISSIONICCS REASERCH PAPER TOPICS AND ITS SUBBIMISSION
ICCS REASERCH PAPER TOPICS AND ITS SUBBIMISSION
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 

Último

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Último (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Blue eyes technology and role of emotional computing

  • 1. Presented By- Nawal Kishore Sharma BlueEyes Technology 1
  • 2. What is blue eye? BlueEyes Technology 2
  • 3. Introduction • The BLUE EYES project was started at IBM's Almaden Research Centre in USA. • It aims at giving computers highly developed abilities to perceive, integrate and interpret visual, auditory and touch information. • The BLUE EYES project aims at creating computers, which can adapt to humans and thus enable them to operate much more conveniently. BlueEyes Technology 3
  • 4. What BlueEyes is not? • Doesn’t predict nor interfere with operator’s thoughts. • Cannot force directly the operator to work. • How was the term blue-eyes coined? Blue in this term stands for Bluetooth, which enables reliable wireless communication and the Eyes because the eye movement enables us to obtain a lot of interesting and important information. BlueEyes Technology 4
  • 5. PRESENT • Animal survival depends on highly developed sensory abilities. • human cognition depends on highly developed abilities to perceive, integrate, and interpret visual, auditory, and touch information. BlueEyes Technology 5
  • 6. • Without a doubt, computers would be much more powerful if they had even a small fraction of the perceptual ability of animals or humans. • Adding such perceptual abilities to computers would enable computers and humans to work together more as partners. • Toward this end, the BlueEyes project aims at creating computational devices with the sort of perceptual abilities that people take for granted. BlueEyes Technology 6
  • 7. Emotions • Since emotions are the key issue in blue eye we need to define and classify emotions. What are emotions? • Are the response to the different situations we experiment in our environment and they play an important role in the decision-making process and solving problems as well. Emotions have two components: 1. Mental component (cognitive) 2. Physical component (body) BlueEyes Technology 7
  • 8. Classification of Emotions Occurred as a direct consequence EMOTIONS of encountering some kind of event. Cause a detectable physical response in the body: PRIMARY Fear a heightened heartbeat, increased “flinch” response, and increased and muscle tension. Anger based on sensation, seems indistinguishable from fear. SECONDARY Happiness is often felt as an expansive or swelling feeling in the chest and the sensation of lightness or buoyancy, Can be caused Sadness feeling of tightness in the throat and directly by primary eyes, and relaxation in the arms and legs. emotions or come Shame can be felt as heat in the upper chest and from a cognitive face. process Desire can be accompanied by a dry throat, heavy breathing, and increased heart rate. ex. Embarrassment Antonio Damasio (1994) BlueEyes Technology 8
  • 10. How can we make computers "see" and "feel"? • BlueEyes uses sensing technology to identify a user's actions and to extract key information. This information is then analyzed to determine the user's physical, emotional, or informational state, which in turn can be used to help make the user more productive by performing expected actions or by providing expected information. • For example, a BlueEyes-enabled television could become active when the user makes eye contact, at which point the user could then tell the television to "turn on". BlueEyes Technology 10
  • 14. Applications-- In the automobile industry Surveillance systems that record and interpret customer movements in retail shops. To create "Face-responsive Displays" and "Perceptive Environments" BlueEyes Technology 14
  • 15. Applications • We can classify applications of blue eyes and affective computing into five categories mainly, which are: – Security. – Education. – Health and Medicine. – Military. – Home BlueEyes Technology 15
  • 16. Applications  Security: Emotions can be reliable in term of security. Examples: 1. Smart Cameras. 2. Lie detectors. 3. Emotional Speech processing. BlueEyes Technology 16
  • 17. Applications  Education: Knowing the emotional feedback of learners enhance teaching styles. Examples: 1. Electronic Tutoring. 2. E-Learning. 3. Text-to-speech applications. BlueEyes Technology 17
  • 18. Applications  Health and Medicine : Knowing the emotions of patients helps in the treatment. Examples: 1. Measuring the affects of medicines. 2. Helping people with mental Illness. BlueEyes Technology 18
  • 19. Applications  Military : To have devices with emotional intelligence. Examples: 1. Training equipment. 2. Simulation systems. BlueEyes Technology 19
  • 20. Applications  Home : To have devices with emotional intelligence. Examples: 1. Video Games. 2. Delivering emotions in communication. 3. Toys. BlueEyes Technology 20
  • 21. • We are now poised to imagine a world At last-- where computing objects communicate with us in-situ; where we are. • We use our looks, feelings, and actions to give the computer the experience it needs to work with us. • Keyboards and mouse will not continue to dominate computer user interfaces. • Sensors are gaining fidelity and ubiquity to record presence and actions; sensors will notice when we enter a space, sit down, lie down, pump iron, etc. • Pervasive infrastructure is recording it. BlueEyes Technology 21
  • 23. REFERENCES--  www.alphaworks.ibm.com/awap.nsf/alltype/86ECE8569056DDC 788256AEE007A9702  www.cse.ogi.edu/CHCC/Series/text2001.html  Carpenter R. H. S., Movements of the eyes, 2nd edition, Pion Limited, 1988, London.  Picard, R. (1997). Affective Computing. MIT Press: Cambridge  Affective Computing - Picard. R.  Advantages of Eye Gaze Interaction- Silbert.L.  Bluetooth Module, Ericsson Microelectronics,  BLUE EYES system overview, Datasheet, Poznan University.  http://www.eetimes.com  http://www.ibm.com BlueEyes Technology 23
  • 24. Any Queries? BlueEyes Technology 24