Está en la página 1de 8

BLUE EYES TECHNOLOGY

Abstract— Human error is still one of the most frequent Acquisition Unit are to maintain Bluetooth connections, to get
causes of catastrophes and ecological disasters. The main information from the sensor and sending it over the wireless
reason is that the monitoring systems concern on the state connection, to deliver the alarm messages sent from the
of the processes whereas human contribution to the Central System Unit to the operator and handle personalized
overall performance of the system is left unsupervised. ID cards.
Since the control instruments are automated to a large Central System Unit maintains the other side of the
extent, a human – operator becomes a passive observer of Bluetooth connection, buffers incoming sensor data, performs
the supervised system, which results in weariness and on-line data analysis, records the conclusions for further
vigilance drop. This, he may not notice important changes exploration and provides visualization interface.
of indications causing financial or ecological consequences
and a threat to human life. It therefore is crucial to assure
that the operator’s Conscious brain is involved in an active
system supervising over the whole work time period. It is
possible to measure indirectly the level of the operator’s
conscious brain involvement using eye motility analysis
.Although there are capable sensors available on the
market, a complex solution enabling transformation,
analysis and reasoning based on measured signals still
does not exist. In large control rooms, wiring the operator
to the central system is a serious limitation of his mobility
and disables his operation. Utilization of wireless
technology becomes essential.

Keywords— Blue eyes, software, hardware, CSU (central


system unit), mouse.

I. INTRODUCTION II. PERFORMANCE REQUIREMENTS

The Blue eyes system provides technical means for The portable nature of the mobile unit results in a number of
monitoring and recording the Operator’s basic physiological performance requirements. As the device is intended to run on
parameters. The most important parameter is saccadic activity, batteries, low power consumption is the most important
which enables the system to monitor the status of the constraint. Moreover, it is necessary to assure proper timing
operator’s visual attention along with head acceleration, which while receiving and transmitting sensor signals.. Finally the
accompanies large displacement of the visual axis .Complex use of standard and inexpensive IC does will keep the price of
industrial environment can create a danger of exposing the the device at relatively low level. The priority of the central
operator to toxic substances, which can affect his cardiac, unit is to provide real-time buffering and incoming sensor
circulatory and pulmonary systems..The The Blue eyes system signals and semi-real-time processing of the data, which
checks above parameters against abnormal values and triggers requires speed-optimizes filtering and reasoning algorithms.
user-defined alarms when necessary. Quite often in an
emergency situation operators speak to themselves expressing
their surprise or stating verbally the problem.. This helps to III. SYSTEM OVERVIEWS
reconstruct the course of operators’ work and provides data
for long-term analysis. Blue Eyes consists of a mobile Blue eyes system monitors the status of the operator’s visual
measuring device and a central analytical system. attention through measurement of saccadic activity. These
system checks parameters like heart bitrates and blood
The mobile device is integrated with Bluetooth module oxygenation against abnormal and triggers user defined
providing wireless interface between sensors worn by the alarms.
operator and the central unit. ID cards assigned to each of the So the system consists of
operators and adequate user profiles on the central unit side  Mobile measuring device (DAU)
Provide necessary data personalization so different people can  Central System Unit (CSU)
use a single mobile device. The tasks of the mobile Data
Figure2. System overview identifier enables the supervising system to distinguish
different operators

4.2. CENTRAL SYSTEM UNIT

Central System Unit hardware is the second peer of the


wireless connection. The box contains a Bluetooth module
and a PCM codec for voice data transmission.
The module is interfaced to a PC using a parallel, serial and
USB cable. The audio data is accessible through standard
mini-jack sockets to program operator's personal ID cards we
developed a simple programming device.

IV. THE HARDWARE

4.1. DATA ACQUISITION UNIT:-


Data Acquisition Unit is a mobile part of the Blue eyes
system. Its main task is to fetch the physiological data from
the sensor and to send it to the central system to be processed.
The Data Acquisition Unit comprises several hardware
modules:
1. Atmel 89C52 microcontroller system core
2. Bluetooth module (based on ROK101008)
3 .HD44780 - small LCD display
4.24C16 - I2C EEPROM
5 .MC145483 – 13bit PCM codec
6. Jazz Multi sensor interface
7. Beeper and LED indicators

Hardware specification V. THE SOFTWARE

Microcontrollers (e.g. Atmel 8952 microcontroller) can be Blue Eyes software's main task is to look after working
used as the core of the Data Acquisition Unit since it is a well- operators' physiological condition. To assure instant reaction
established industrial standard and provides necessary on the operators' condition change the software performs real
functionalities) at a low price. The Bluetooth module supports time buffering of the incoming data, real-time physiological
synchronous voice data transmission .The codec reduces the data analysis and alarm triggering.
microcontroller’s tasks and lessens the amount of data being The Blue Eyes software comprises several functional modules
sent over the UART. The Bluetooth module performs voice System core facilitates the transfers flow between other
data compression, which results in smaller bandwidth system modules.
utilization and better sound quality. Communication between The System Core fundamental are single-producer-multi-
the Bluetooth module and the microcontroller is carried on consumer thread safe queues.
using standard UART interface.
The speed of the UART is set to115200 bps in order to assure
that the entire sensor data is delivered in time to the central Parts:
system. The alphanumeric LCD display gives more
information of incoming events and helps the operator enter Connection Manager is responsible for managing the
PIN code. The LED indicators show the result of built-in-self- wireless communication between the mobile Data Acquisition
test, power level and the state of wireless connection the Units and the central system.
simple keyboard is used to react to incoming events and to Data Analysis module performs the analysis of the raw
enter PIN code while performing authorization procedure. The sensor data in order to obtain information about the operator’s
ID card interface helps connect the operator’s personal physiological condition.
identification card to the DAU. After inserting the card Visualization module provides a user interface for the
authorization procedure starts. The operator’s unique supervisors. It enables them to watch each of the working
operator’s physiological condition along with a preview of responsible for analyzing operators’ condition and
selected video source and related sound stream. performance.

During the on-line browsing it is possible to watch a list of


currently working operators and the status of their mobile
devices. Selecting one of the operators enables the supervisor
to check the operator’s current physiological condition (e.g. a
VI. IMPLEMENTATION OF BLUE EYES pie chart showing active brain involvement) and a history of
alarms regarding the operator. All new incoming alerts are
Functional design displayed immediately so that the supervisor is able to react
During the functional design phase we used UML standard fast. However, the presence of the human supervisor is not
use case notation, which shows the functions the system offers necessary since the system is equipped with reasoning
to particular users. Blue Eyes has three groups of users: algorithms and can trigger user-defined actions. During off-
operators, supervisors and system administrators. Operator is line browsing it is possible to reconstruct the course of the
a person whose physiological parameters are supervised. The operator’s duty with all the physiological parameters, audio
operator wears the DAU. The only functions offered to that and video data. A comprehensive data analysis can be
user are authorization in the system and receiving alarm alerts. performed enabling the supervisor to draw conclusions on
Such limited functionality assures the device does not disturb operator’s overall performance and competency System
the work of the operator administrator is a user that maintains the system. The
administrator delivers tools for adding new operators to the
database, defining alarm conditions, configuring logging tools
and creating new analyzer modules.

Authorization – the function is used when the operator’s duty


starts. After inserting his personal ID card into the mobile
device and entering proper PIN code the device will start
listening for incoming Bluetooth connections. Once the
connection has been established and authorization process has
succeeded central system starts monitoring the operator’s
physiological parameters. The authorization process shall be While registering new operators the administrator enters
repeated after reinserting the ID card. It is not, however, appropriate data to the system database and programs his
required on reestablishing Bluetooth connection. Receiving personal ID card.
alerts – the function supplies the operator with the information Defining alarm conditions – the function enables setting up
about the most important alerts regarding his or his co- user-defined alarm conditions by writing condition-action
workers’ condition and mobile device state. Alarms are rules Designing new analyzer modules-based on earlier
signaled by using a beeper, earphone providing central system recorded data the administrator can create new analyzer
sound feedback and a small alphanumeric LCD display, which module that can recognize other behaviors than those which
shows more detailed information. Supervisor is a person are built-in the system. The new modules are created using
decision tree induction algorithm. The administrator names
the new behavior to be recognized and points the data
associated with it. The results received from the new modules
can be used in alarm conditions. Monitoring setup enables the
administrator to choose the parameters to monitor as well as
the algorithms of the desired accuracy to compute parameter
values. Logger setup provides tools for selecting the
parameters to be recorded. For audio data sampling frequency
can be chosen. As regards the video signal, a delay between
storing consecutive frames can be set.
Database maintenance – here the administrator can remove
old or “uninteresting” data from the database. The
uninteresting data is suggested by the built-in reasoning
system.

VII. EMOTION COMPUTING

There are two aspects of affective computing: giving the


computer the ability to detect emotions and giving the
computer the ability to express emotions. An adaptive, smart X. SENTIC MOUSE
computer system has been driving our efforts to detect a
person’s emotional state. It is a modified computer mouse that includes a directional
An important element of incorporating emotion into pressure sensor for aiding in recognition of emotional valence
computing is for productivity for a computer user.
Figure7. Senetic mouse

VIII. TYPES OF MOTIONAL SENSORS:


For Hand:
 Emotion Mouse
 Sentic Mouse
For Eyes:
1.ExpressionGlasses
2.MagicPointing
3.Eye Tracking
For Voice:
 Artificial Intelligence
 Speech Recognition XI. EXPRESSION GLASSES

IX. EMOTION MOUSE A wearable device which allows any viewer to visualize the
confusion and interest levels of the wearer. Other recent
One proposed, non invasive method for gaining user developments in relatedtechnology is the attempt to learn the
information through touch is via a computer input device, the needs of the user just by following the interaction between the
mouse. This then allows the user to relate the cardiac rhythm, user and the computer in order to know what he/she is
the body temperature, electrical conductivity of the skin and interested in at any given moment.
other physiological attributes with the mood. This has led to
the creation of the “Emotion Mouse”.

The device can measure heart rate temperature galvanic skin


response and minute bodily movements and matches them
with six emotional states: happiness, surprise, anger, fear,
sadness and disgust. The mouse includes a set of sensors
including infrared detectors and temperature-sensitive chips.

Figure: Emotion mouse


XII. MAGIC POINTING

This work explores a new direction in utilizing eye gaze for


computer input. Gaze tracking has long been considered as an
alternative or potentially superior pointing method for
computer input. We believe that many fundamental XIV. ARTIFICIAL INTELLIGENT
limitations exist with traditional gaze pointing. In particular, it
is unnatural to overload a perceptual channel such as vision Artificial intelligence (AI) involves two basic ideas. First, it
with a motor control task. We therefore propose an involves studying the thought processes of human beings.
Alternative approach, dubbed MAGIC (Manual and Gaze Second, it deals with representing those processes via
Input Cascaded) pointing. With such an approach, pointing machines (like computers, robots, etc).
appears to the user to be a manual task used for fine AI is behavior of a machine, which, if performed by a human
manipulation and selection. being, would be called intelligent. It makes machines smarter
However, a large portion of the cursor movement is and more useful, and is less expensive than natural
eliminated by warping the cursor to the eye gaze area, which intelligence.
encompasses the target. Two specific MAGIC pointing Natural language processing (NLP) refers to artificial
techniques, one conservative and one liberal, were designed, intelligence methods of communicating with a computer in a
analyzed, and implemented with an eye tracker we developed. natural language like English. The main objective of a NLP
They were then tested in a pilot study. Pointing and possibly program is to understand input and initiate action stores all the
faster speed than manual pointing. In our view, there are two digital values in a buffer area. This digital information,
fundamental shortcomings to the existing gaze pointing representing the spoken word, is now accessed by the CPU to
techniques, regardless of the maturity of eye tracking process it further. The normal speech has a frequency range of
technology. 200 Hz to 7 kHz. Recognizing a telephone call is more
difficult as it has bandwidth limitation of300 Hz to3.3 kHz.
XIII. EYE TRACKING
XV.SPEECH RECOGNITION
Since the goal of this work is to explore MAGIC pointing as a
user interface technique, we started out by purchasing a The user speaks to the computer through a microphone,
commercial eye tracker after a market survey. In comparison which, in used; a simple system may contain a minimum of
to the system reported in early studies this system is much three filters. The more the number of filters used, the higher
more compact and reliable. However, we felt that it was still the probability of accurate recognition. Presently, switched
not robust enough for a variety of people with different eye capacitor digital filters are used because these can be custom-
characteristics, such as pupil brightness and correction built in integrated circuit form. These are smaller and cheaper
glasses. We hence chose to develop and use our own eye than active filters using operational amplifiers.
tracking system.
The filter output is then fed to the ADC to translate the was a need for a piece of software to establish and test
analogue signal into digital word. The ADC samples the filter Bluetooth connections. Hence created a tool called Blue
outputs many times a second. Each sample represents Dentist. The tool provides support for controlling the currently
different amplitude of the signal .Evenly spaced vertical lines connected Bluetooth device. Its functions are: Local device
represent the amplitude of the audio filter output at the instant management and connection management).
of sampling. Each value is then converted to a binary number
proportional to the amplitude of the sample. A central
processor unit (CPU) controls the input circuits that are fed by
the ADCS. A large RAM (random access memory) stores all
the digital values in a buffer area. This digital information,
representing the spoken word, is now accessed by the CPU to
process it further. The normal speech has a frequency range of
200 Hz to 7 kHz.
Recognizing a telephone call is more difficult as it has
bandwidth limitation of 300 Hz to3.3 kHz. The binary
representation of each of these words becomes a template or
standard, against which the future words are compared. These
templates are stored in the memory. Once the storing process
is completed, the system can go into its active mode and is
capable of identifying spoken words. As each word is spoken,
it is converted into binary equivalent and stored in RAM. The
computer then starts searching and compares the binary input To test the possibilities and performance of the remaining
pattern with the templates. T is to be noted that even if the parts of the Project Kit. Blue Capture was created. The tool
same speaker talks the same text, there are always slight supports capturing video data from various sources and
variations in amplitude or loudness of the signal, pitch, storing the data in the MS SQL Server database. Additionally,
frequency difference, time gap, etc. Due to this reason, there is the application performs sound recording.
never a perfect match between the template and binary input After filtering and removing insignificant fragments the audio
word. data is stored in the database. Finally, the program plays the
The pattern matching process therefore uses statistical recorded audiovisual stream. They used the software to
techniques and is designed to look for the best fit. The values measure database system performance and to optimize some
of binary input words are subtracted from the corresponding of the SQL queries
values in the templates. If both the values are same, the
difference is zero and there is perfect match. If not, the
subtraction produces some difference or error. The smaller the
error, the better the match. When the best match occurs, the
word is identified and displayed on the screen or used in some
other manner. The search process takes a considerable amount
of time, as the CPU has to make many comparisons before
recognition occurs. This necessitates use of very high-speed
processors.
A large RAM is also required as even though a spoken word
may last only a few hundred milliseconds, but the same is
translated into many thousands of digital words. It is
important to note that alignment of words and templates are to
be matched correctly in time, before computing the similarity
score. This process, termed as dynamic time warping,
recognizes that different speakers pronounce the same words
at different speeds as well as elongate different parts of the
same word. This is important for the speaker-independent
recognizers

XVI.TOOLS USED TO DEVELOP BLUE EYES: Also a simple tool for recording Jazz Multisensory
measurements was introduced. The program reads the data
In creating the hardware part of the DAU a development using a parallel port and writes it to a file. To program the
board was built, which enabled to mount, connect and test operator’s personal ID card we use a standard parallel port, as
various peripheral devices cooperating with the the EEPROMs and the port are both TTL-compliant. A simple
microcontroller. During the implementation of the DAU there dialog-based application helps to accomplish the task.
XVII. THE SIMPLE USER INTERST TRACKER
XV. APPLICATION OF
Computers would have been much more powerful, had they BLUE- EYE TECHNOLOGY
gained perceptual and sensory abilities of the living beings on • Blue Eyes is developing ways for computers to
the earth. What needs to be developed is an intimate anticipate users' wants by gathering video data on
relationship between the computer and the humans. And the eye movement and facial expression. The first
Simple User Interest Tracker (SUITOR) is a revolutionary practical use for the research turns out to be
approach in this direction. snooping on shoppers.
By observing the Webpage at bedizen is browsing, the • Another application would be in the automobile
SUITOR can help by fetching more information at his industry. By simply touching a computer input
desktop. By simply noticing where the user’s eyes focus on device such as a mouse, the computer system is
the computer screen, the SUITOR can be more precise in designed to be able to determine a person's emotional
determining topic of interest. It can even deliver relevant state. For cars, it could be useful to help with critical
information to a handheld device. The success lies in how decisions like: "I know you want to get into the fast
much the suitor can be intimate to the user. lane, but I'm afraid I can't do that. Your too upset
Flicker and his colleagues have created some new techniques right now" and therefore assist in driving safely.
for tracking a person's eyes and have incorporated this gaze- • Current interfaces between computers and humans
tracking technology into two prototypes. One, called SUITOR can present information vividly, but have no sense of
(Simple User Interest Tracker), fills a scrolling ticker on a whether that information is ever viewed or
computer screen with information related to the user's current understood.
task. SUITOR knows where you are looking, what • Using stereo-vision techniques, we are able to detect,
applications you are running, and what Web pages you may track, and identify users robustly and in real time.
be browsing. This information can make spoken language
interface more bust, by selecting the acoustic
SUMMARY information from a visually-localized source.
The Blue Eyes system is developed because of the need for a
real-time monitoring system for a human operator. The XVI. CONCLUSIONS
approach is innovative since it helps supervise the operator
not the process, as it is in presently available solutions. We The nineties witnessed quantum leaps interface designing for
hope the system in its commercial release will help avoid improved man machine interactions. The BLUE EYES
potential threats resulting from human errors, such as technology ensures a convenient way of simplifying the life
weariness, oversight, tiredness or temporal indisposition. by providing more delicate and user friendly facilities in
However, the prototype developed is a good estimation of the computing devices.
possibilities of the final product. The use of a miniature Instead of using cumbersome modules to gather information
CMOS camera integrated into the eye movement sensor will about the user, it will be better to use smaller and less
enable the system to calculate the point of gaze and observe intrusive units. Ordinary household devices such as
what the operator is actually looking at. televisions, refrigerators, and ovens may be able to do their
Introducing voice recognition algorithm will facilitate the jobs when we look at them and speak to them. It is only a
communication between the operator and the central system technological forecast.
and simplify authorization process. Despite considering in the
report only the operators working in control rooms, our XVII.DISADVANTAGES
solution may well be applied to everyday life situations.
Assuming the operator is a driver and the supervised process 1. Does not predict nor interfere with operators
is car driving it is possible to build a simpler embedded on- thoughts
line system, which will only monitor conscious brain
involvement and warn when necessary. 2. Cannot force directly the operator to work
As in this case the logging module is redundant, and the
Bluetooth technology is becoming more and more popular, the
commercial implementation of such a system would be
relatively inexpensive. The final thing is to explain the name
of our system. Blue Eyes emphasizes the foundations of the
project – Bluetooth technology and the movements of the
eyes. Bluetooth provides reliable wireless communication
whereas the eye movements enable us to obtain a lot of
interesting and important information
REFERENCES
[1] Joseph j.carr & john m.brown,”introduction to blue
eyestechnology”,published in IEEE spectrum magazine.

[2] A.jajszczyk,”automatically switched blue eyes


networks:Benefits and Requirement,”IEEE blue toooth.feb
2005,vol 3,no1,pp.

[3] A .Banerjee, ”Generalized multi protocol label switching:


an over view of computer enhancements and recovery
techniques,”IEEE” commun. Magvol39
.
[4] J.jones, L.ong, and m.lazer,”creating and intelligent
technology network /worldwide nteroperability
demonstration.”IEEEcomm un .mag.,vol 42.

[5] Blue Eyes Technology, Computer Edge,Oct.2002,pages


23-27.

También podría gustarte