An Approach to using a Laser Pointer as a Mouse

Jeremiah Aizeboje, Taoxin Peng

2015

Abstract

Modern technologies have evolved to present different ways users can interact with computers. Nowadays, computers and projectors are commonly used in teaching and presentations, in which the mouse and the USB wireless presenter are two of the main presentation devices. However, the USB wireless presenter, usually a laser pointer, cannot simulate the movement of a mouse but only simulate the actions of a right and left arrow key. This paper proposes a novel approach to allowing users to interact with a computer from a distance without the need of a mouse, but instead using a laser pointing device, a projector and a web camera, by developing a novel screen detection method (based on a simple pattern recognition technique), a laser detection method, and an accuracy algorithm to control the accuracy of the movement of the mouse cursor. The test results confirmed the laser pointer could be used to simulate the movement of the mouse as well as mouse clicks with very high accuracy. It could also be potentially used in a gaming environment.

References

  1. Bailey, D. G., 2011. Design for Embedded Image Processing on FPGAs. Singapore: John Wiley & Sons (Asia) Ltd.
  2. Beauchemin, M., 2013. Image thresholding based on semivariance. International Association for Pattern Recognition 34(5). Pp. 456-462.
  3. DIGIFLEX, 2015. TRIXES 5in1 Green Laser Pointer Pen with 5 Patterned Projection Caps. Retrieved January 27, 2015 from. http://www.digiflex.co.uk/p-2046- trixes-5in1-green-laser-pointer-pen-with-5-patternedprojection-caps.aspx.
  4. Hinz, S., 2005. Fast and subpixel precise blob detection and attribution. IEEE International Conference on Image Processing, Vol 3, pp. 11 - 15.
  5. Huang, T. S., Aizawa, K., 1993. Image Processing: Some challenging Problems. Proceedings of the National Academy of Sciences of the United States of America, 90(21), pp. 9766-9769.
  6. Luo, Y., Duraiswami, R., 2008. Canny edge detection on NVIDIA CUDA. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. Anchorage, Alaska, USA, pp.1-8.
  7. Moon, W. K., Shen, Y., Bae, M. S., Huang, C., Chen, J., Chang, R., 2013. IEEE Transactions on Medical Imaging. 32(7), pp. 1191 - 1200.
  8. OpenCV, 2014. Basic Thresholding Operations. Retrieved January 20, 2014 from. http://docs.opencv.org/doc/ tutorials/imgproc/threshold/threshold.html.
  9. Parker, J. R., 2010. Algorithms for Image Processing and Computer Vision (2nd ed.). Indiana: Wiley Publishing, Inc.
  10. Rajesh, F., 2010. Rectangle shape recognition using onedimensional array. IEEE International Conference on Computational Intelligence and Computing Research.
  11. SANOXY, 2015. RF Wireless remote control USB PowerPoint PPT presenter laser pointer PenSmart. Retrieved January 27, 2015 from. http://sanoxy.com/product/computer-accessoriespresentation-pointers/laser-pointer/
  12. Sharma, V., 2012. A blob representation for tracking robust to merging and fragmentation. IEEE Workshop on Applications of Computer Vision. Colorado, USA, pp. 161-168.
  13. SMART, 2015. SMART Board 8000 Series. Retrieved January 27, 2015 from. http://smarttech.com/ Home+Page/Solutions/Business+Solutions/Products/8 000+series+interactive+flat+panels.
  14. WaveMetrics, 2014. Image Threshold. Retrieved February 17, 2014 from. http://www.wavemetrics.com/ products/igorpro/imageprocessing/thresholding.htm.
  15. Yao, N., Liu, Z., Qian, F. & Sun, Z., 2013. Target Tracking Method Based on Image Patches Exemplars. Journal of Computational Information Systems 9(21). Pp. 8561-8570.
Download


Paper Citation


in Harvard Style

Aizeboje J. and Peng T. (2015). An Approach to using a Laser Pointer as a Mouse . In Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-097-0, pages 543-552. DOI: 10.5220/0005378005430552


in Bibtex Style

@conference{iceis15,
author={Jeremiah Aizeboje and Taoxin Peng},
title={An Approach to using a Laser Pointer as a Mouse},
booktitle={Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2015},
pages={543-552},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005378005430552},
isbn={978-989-758-097-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - An Approach to using a Laser Pointer as a Mouse
SN - 978-989-758-097-0
AU - Aizeboje J.
AU - Peng T.
PY - 2015
SP - 543
EP - 552
DO - 10.5220/0005378005430552