SlideShare uma empresa Scribd logo
1 de 11
BLUE EYES TECHNOLOGY
DONE BY:
DAKSHINESH M S
B.TECH CSBS
CONTENTS:
→WHAT IS BLUE EYES TECHNOLOGY?
→WHAT IS BLUE EYES?
→SYSTEM DESIGNING
→DAU
→DATA SECURITY
→IBM RESEARCH
→CONCLUSION
WHAT IS BLUE EYES TECHNOLOGY:
Blue Eye Technology is a term that
refers to a system or technology that uses blue light emitting diodes
(LEDs) to track and analyze eye movements, expressions, and other
physiological factors to help interact with technology or gather data.
It's often used in areas such as market research, gaming, and
human-computer interaction.
HOW CAN WE MAKE COMPUTERS “SEE” AND
“FEEL”?
> Blue Eyes Technology uses sensing
technology to identify a user’s action and to exactly key information.
> Information is then analyzed to determined the user’s
physical,emotional,or informational state.
>The goal of Blue Eyes Technology is to create
more intelligent and intuitive human-computer interfaces for use in fields
such as entertainment, education, and healthcare. The system is designed
to be self-learning, able to adapt and evolve over time.
WHAT IS BLUE EYES?
Blue eyes refer to the color of the iris in the
human eye. This eye color is caused by a lower
concentration of melanin in the iris, which allows light to
scatter in a way that creates a blue hue.
Blue eyes are a common eye color and can
range in shade from light blue to deep blue. The color of
blue eyes is a genetic trait that is determined by variations
in specific genes.
DESIGNING:
→A Person area network for linking all the
operators and the supervising systems.
TWO MAJOR UNITS:
+ DAU(DATA ACQUISITION UNIT).
+ CSU(CENTRAL SYSTEM UNIT).
DAU COMPONENTS:
DAU Features:
CENTRAL SYSTEM UNIT:
DATA SECURITY:
Data Security in technology refers
to the measures and techniques used to protect digital data
from unauthorized access, use, disclosure, disruption,
modification, or destruction. This can include measures
such as encryption, access controls, network security,
backup and disaster recovery planning, and employee
training and security awareness. To ensure data security in
any technology, it is important to regularly assess the risks
and threats, implement appropriate security measures, and
stay up-to-date with the latest security practices and
technologies.
CONCLUSION:
In the near future ,ordinary household devices-
such as television,refrigerators,ovens may be able to do
their jobs when we look at them and speak to them.
Future Application of blue eye technology is
limitless.
THANK YOU !

Mais conteúdo relacionado

Semelhante a BLUE EYES TECHNOLOGY.pptx

Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
Venkata Sreeram
 

Semelhante a BLUE EYES TECHNOLOGY.pptx (20)

Blue eyes ppt
Blue eyes pptBlue eyes ppt
Blue eyes ppt
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 
Blue eyes technology2.pptx
Blue eyes technology2.pptxBlue eyes technology2.pptx
Blue eyes technology2.pptx
 
Blue eyes technology full ppt
Blue eyes technology full pptBlue eyes technology full ppt
Blue eyes technology full ppt
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
presentation_blue_eye_1486105313_257582 (1).ppt
presentation_blue_eye_1486105313_257582 (1).pptpresentation_blue_eye_1486105313_257582 (1).ppt
presentation_blue_eye_1486105313_257582 (1).ppt
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
 
Milestone 2.pdf
Milestone 2.pdfMilestone 2.pdf
Milestone 2.pdf
 
BLU-EYE TECHNOLOGY
BLU-EYE TECHNOLOGYBLU-EYE TECHNOLOGY
BLU-EYE TECHNOLOGY
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimsso
 
Ab1
Ab1Ab1
Ab1
 
4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca
4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca
4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

BLUE EYES TECHNOLOGY.pptx

  • 1. BLUE EYES TECHNOLOGY DONE BY: DAKSHINESH M S B.TECH CSBS
  • 2. CONTENTS: →WHAT IS BLUE EYES TECHNOLOGY? →WHAT IS BLUE EYES? →SYSTEM DESIGNING →DAU →DATA SECURITY →IBM RESEARCH →CONCLUSION
  • 3. WHAT IS BLUE EYES TECHNOLOGY: Blue Eye Technology is a term that refers to a system or technology that uses blue light emitting diodes (LEDs) to track and analyze eye movements, expressions, and other physiological factors to help interact with technology or gather data. It's often used in areas such as market research, gaming, and human-computer interaction.
  • 4. HOW CAN WE MAKE COMPUTERS “SEE” AND “FEEL”? > Blue Eyes Technology uses sensing technology to identify a user’s action and to exactly key information. > Information is then analyzed to determined the user’s physical,emotional,or informational state. >The goal of Blue Eyes Technology is to create more intelligent and intuitive human-computer interfaces for use in fields such as entertainment, education, and healthcare. The system is designed to be self-learning, able to adapt and evolve over time.
  • 5. WHAT IS BLUE EYES? Blue eyes refer to the color of the iris in the human eye. This eye color is caused by a lower concentration of melanin in the iris, which allows light to scatter in a way that creates a blue hue. Blue eyes are a common eye color and can range in shade from light blue to deep blue. The color of blue eyes is a genetic trait that is determined by variations in specific genes.
  • 6. DESIGNING: →A Person area network for linking all the operators and the supervising systems. TWO MAJOR UNITS: + DAU(DATA ACQUISITION UNIT). + CSU(CENTRAL SYSTEM UNIT).
  • 9. DATA SECURITY: Data Security in technology refers to the measures and techniques used to protect digital data from unauthorized access, use, disclosure, disruption, modification, or destruction. This can include measures such as encryption, access controls, network security, backup and disaster recovery planning, and employee training and security awareness. To ensure data security in any technology, it is important to regularly assess the risks and threats, implement appropriate security measures, and stay up-to-date with the latest security practices and technologies.
  • 10. CONCLUSION: In the near future ,ordinary household devices- such as television,refrigerators,ovens may be able to do their jobs when we look at them and speak to them. Future Application of blue eye technology is limitless.