Jeremiah Aizeboje
An approach to using a laser pointer as a mouse
Aizeboje, Jeremiah; Peng, Taoxin
Abstract
Modern technologies have evolved to present different ways users can interact with computers. Nowadays, computers and projectors are commonly used in teaching and presentations, in which the mouse and the USB wireless presenter are two of the main presentation devices. However, the USB wireless presenter, usually a laser pointer, cannot simulate the movement of a mouse but only simulate the actions of a right and left arrow key. This paper proposes a novel approach to allowing users to interact with a computer from a distance without the need of a mouse, but instead using a laser pointing device, a projector and a web camera, by developing a novel screen detection method (based on a simple pattern recognition technique), a laser detection method, and an accuracy algorithm to control the accuracy of the movement of the mouse cursor. The test results confirmed the laser pointer could be used to simulate the movement of the mouse as well as mouse clicks with very high accuracy. It could also be potentially used in a gaming environment.
Citation
Aizeboje, J., & Peng, T. (2015, April). An approach to using a laser pointer as a mouse. Presented at 17th International Conference on Enterprise Information Systems
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 17th International Conference on Enterprise Information Systems |
Start Date | Apr 27, 2015 |
End Date | Apr 30, 2015 |
Publication Date | Apr 27, 2015 |
Deposit Date | Mar 4, 2016 |
Peer Reviewed | Peer Reviewed |
Pages | 543-552 |
Book Title | Proceedings of the 17th International Conference on Enterprise Information Systems Volume 2 |
ISBN | 9789897580963; 9789897580970; 9789897580987 |
DOI | https://doi.org/10.5220/0005378005430552 |
Keywords | Blob Detection; Edge Detection; Corner Recognition; Thresholding; Quadrilateral Transformation; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/9478 |
You might also like
A comparison of techniques for name matching
(2012)
Journal Article
A framework for data cleaning in data warehouses
(2008)
Journal Article
An evaluation of name matching techniques.
(2011)
Presentation / Conference Contribution
The VoIP intrusion detection through a LVQ-based neural network.
(2009)
Presentation / Conference Contribution
Combining dimensional analysis and heuristics for causal ordering.
(2006)
Book Chapter