Haar Based Head Movement Tracking with Voice commands for Computer control
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
This Paper, Mouse movement is done by vision based Head tracking. The centre of head detection is mapped to the mouse coordinates in computer screen. Left click and right click are controlled by voice left and right click command, respectively. Computer Vision has increased the size of research aiming to provide robust and effective techniques of real-time head movement detection and tracking. It provides alternative solutions for convenient device control, which confidences the application of interactive computer games, machine learning and guidance, robotic arm control, and machine access for disabled people who are physically challenged to do day to day life activity. For Head movement detection, several different approaches have been proposed and used to implement different algorithms for these technologies. Main objective is to overcome the limitations of the existing system by providing efficient touch less environment to the user, access computer’s content via user’s speech and different types of cursors, provide interactive visual sensing gaming.
Authors and Affiliations
Devanand G. Khandar, Prof. R. V. Mante, Prof. Dr. P. N. Chatur
Hybrid Algorithm for Gray-Level Image Contrast Enhancement
Nowadays, images play important role in real world but sometimes when they are captured often due to bad weather, atmospheric conditions like fog or due to lower illumination or lightening etc. images are not clear. Ima...
Steering System of Electric Go-Kart
Manual rack and pinion steering systems are commonly used due to their simplicity in construction and compactness. The main purpose of this paper is to design and Manufacture manual rack and pinion steering system accor...
A Review on Modular Smartphones: Phonebloks
What would be the first thing which comes in mind when accidently your mobile falls on the solid floor and brakes up? Obviously! You would go to the repair shop and get your mobile repaired. But what if the camera gets...
A Review on Sinkhole Attack in WSN
Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended...
Mitigation of HTTP-GET flood Attack
An HTTP GET flood is a volumetric attack that does not use malformed packets, spoofing or reflection techniques. HTTP flood attacks may be one of the most advanced non-vulnerability threats facing web servers today. It...