Blue eyes (Download Full Report And Abstract)
#63

SUBMITTED BY
K.CHENNAKRISHNA

[attachment=11408]
ABSTRACT
The computers we use in our day-to-day life have tremendous abilities to sophisticated tasks easily. They can do the tasks assigned to them with a lightning speed. They can understand a variety of computer languages. They can effectively compile the programs written in these languages and understand what to do.
Despite their lightning speed and awesome powers of computation, today's PCs are essentially deaf, dump and blind. If we want our computers to be genuinely intelligent and interact naturally with us, we must give them the power to recognize and understand emotions.
Imagine ourselves in a world where human interact with computers in the same way as with humans. It has the ability to gather information about us and interact accordingly. It can even understand the emotions of it's user at the touch of a mouse. This can be brought into reality with the help of the upcoming technology The BLUE EYES.
For the implementation of The Blue Eyes technology we must give our personnel computers the power to recognize and understand our emotions. The search for a unique and reliable technique for securing resources has finally led to the realization that human physiological traits are unique enough for it to be used as an identifier. The thing lacking was the technology to exploit the potential of these characteristics. The new technology, BIOMETRICS emerged as a solution for this situation. Thus BLUE EYES used biometric sensors can make incredible effect in the field of emotion detection which itself can act as a security measure.
1. INTRODUCTION
Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that can listen, talk, or even scream aloud. It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presents, and starts interacting with you .You ask the computer to dial to your friend at his office. It realizes the urgency of the situation through the mouse, dials your friend at his office, and establishes a connection.
Human cognition depends primarily on the ability to perceive, interpret, and integrate audio-visuals and sensoring information. Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners. Researchers are attempting to add more capabilities to computers that will allow them to interact like humans, recognize human presents, talk, listen, or even guess their feelings.
The BLUE EYES technology aims at creating computational machines that have perceptual and sensory ability like those of human beings. It uses non-obtrusive sensing method, employing most modern video cameras and microphones to identify the user’s actions through the use of imparted sensory abilities. The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.
2. BIOMETRICS
The computers must be given power to sense emotion of its user, in order to make them 'attentive computers'. BIOMETRICS is the science used for the implementation.It is the science by which we measure the physiological &behavioral characteristics of a person. And
by using these characteristics the emotional state of the user is identified.
The eyes are the most expressive part of a human being. So iris scanning is the most important technique used. The emotions of a human being will directly reflect in his physiological attributes. So the measure of heartbeat, blood pressure etc. will give straight information about the emotional state of the user. Several techniques like eye gaze tracking, facial expression detection, speech recognition, detection using Emotion mouse, Jazz multi sensor etc. are used for emotion detection.
Besides the emotion detection, the Biometric techniques can be used for security purposes. The physical characteristics like the finger prints, hand geometry, retina, voice etc. are unique for every human being. Thus by analyzing these characteristics a person can be easily identified. Thus several methods like finger print identification, retinal scan, voice identification etc are successfully implemented for the purpose of security. Here in the implementation of Blue Eyes, the biometric techniques are used mainly for the purpose of emotion detection.
3. MAIN BIOMETRIC TECHNIQUES
3.1 Facial expression detection
The facial expression detection consists of two steps — The Face recognition and Expression detection.
Face Recognition
Face recognition is applied in a variety of domains, predominantly for security. The user's face must be identified before further processing. The first problem to be solved before attempting face recognition is to find the face in the image. The first stage of the process is color segmentation, which simply determines if the proportion of the skin tone pixels is greater than some threshold. Subsequently candidate regions are given scores. Next instead of searching for all the facial features directly in the face image, a few 'high level' features (eyes, nose, mouth) are first located. Then other 26 low level' features that may be parts of eyes, nose, mouth, eyebrows etc. are located with respect to high level feature locations. The approximate locations of the high level features are known from statistics of mean and variance relative to the nose position, gathered on the training database.
Expression Detection
The facial expression determination is a field in which fast researches are going on. The most intriguing invention is Expression Glasses. This is a mobile device which can be worn by the user. This is very comfortable to wear and the survey about it among the subject users provides a good result. This device measures the movement of face muscles. The movement is then compared with some reference index to determine emotion.
This device is used to determine the user's level of interest or confusion by measuring the movement of muscles around the eyes. The output from the expression glasses are fed to the computer for further processing. There it is converted into a two colored bar graph, in which red bars indicate confusion and green for interest. This graph will give a clear indication about the level of interest or confusion.
3.2 Speech Recognition
Speech recognition is the process of converting a speech signal to a set of words, by means of an algorithm implemented as computer program. Voice or speaker identification is a related process that attempts to identify the person speaking, as opposed to what is being said.
Speech is processed by means of complex voice processing algorithms. First the speech signal is converted into a set of words, by proper sampling, quantization and coding. These words are called voice prints. There is already a reference index which contains different voice prints corresponding to each emotion. By comparing the subject user's voice print with these reference the emotion is identified. Mainly the tone of the voice is compared, besides what is being said.
3.3 Emotion Mouse
A non-invasive way to obtain the information about the user's emotional state is through touch. People use their computer to store and manipulate data. The proposed method for obtaining user information through touch is via a computer input device, the mouse. The computer determines the user's emotional state by a simple touch. Sensors in the mouse sense physiological attributes, which are correlated to emotions using a correlation model.
The emotion mouse consists of a number of sensors which will sense individual attributes. The different sensors incorporated in the emotion mouse are IR sensor, thermosister chip, and galvanic sensor. The IR sensor will measure the heartbeat from the fingertip, the thermosister chip will measure the body temperature and galvanic sensor will take the measure of skin conductivity. All these attributes are combined to form a vector which is the representative of the emotional state of the user.
This vector is used to determine the present emotion of the user. This vector is being compared with the emotion-to- attribute correlation model and the emotion detection is realized.
3.4 Eye Gaze Tracking
The eye gaze tracking system monitors the eye movement of the user to detect his emotional state. This system uses a technique called Pupil finder to monitor subject user's eye movement.
3.5 Jazz Multi Sensor
Jazz multi sensor is a sensor which will sense multi attributes. This sensor is a mobile device that the user can wear it on his forehead. This device is a marvelous one which has multi sensors incorporated on it. This device uses all the techniques of emotion detection described above. This single device is capable of detecting a subject user's emotional state. This device is developed at the research laboratory of Poznan University, Poland.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: blue eyes technology summary pdf,
Popular Searches: anharmonic beethoven, an atm with eyes advantages, domination full, st paul seminary in st, reflex blue code, blue eyes in electronics, blue eyes brown eyes experiment video,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
hi - by d.sunny89 - 29-07-2010, 09:28 AM
Blue eyes (Download ppt) - by projectsofme - 27-09-2010, 01:25 PM
RE: Blue eyes (Download Full Report And Abstract) - by seminar class - 31-03-2011, 12:24 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 45,876 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 33,024 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 27,120 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 28,812 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 69,760 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 77,740 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 25,654 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 43,808 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 47,156 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 27,035 08-06-2015, 03:26 PM
Last Post: seminar report asees

Forum Jump: