Human Computer Interaction Based Control Over Home Appliances
S. Kanimozhi1, S. Prabavathi2

1S. Kanimozhi, Assistant Professor, Department of Information Technology, M. Kumarasamy College of Engineering, Karur (Tamil Nadu), India.
2S. Prabavathi, Assistant Professor, Department of Information Technology, M. Kumarasamy College of Engineering, Karur (Tamil Nadu), India.
Manuscript received on 21 May 2019 | Revised Manuscript received on 07 June 2019 | Manuscript Published on 15 June 2019 | PP: 290-292 | Volume-8 Issue-1S2 May 2019 | Retrieval Number: A00670581S219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With the recent advancement in science and technology, various techniques like voice controlled, android controlled, GSM controlled, Zigbee controlled are used to control home appliances. This paper applies the virtual reality projection technology to control and automate home appliance. Virtual Reality is a technique that uses motion sensor to control the home appliance with the aid of computer simulation that simulates physical presence of the object in the real or imaginary world. The operation performed using virtual reality illustrates the action of real-world environments using special stereoscopic displays on the computer screen. The environment is controlled and regulated using additional sensory information captured from the devices. The information emphasizes an action with real sound through speakers or headsets targeted towards witnesses. A projection device is an input device whereby the image of a virtual key can be projected onto the surface. It involves laser, an interference, the diffraction light intensity records and an illumination of the recording. Light is traced wherever needed and then key is pressed and the image is captured by wireless digital camera. Image is processed using MATLAB to perform a corresponding task.
Keywords: Cloud Computing, Data Security, User Behavior, Decoy Technology, Fingerprint Authentication, Face Recognition.
Scope of the Article: Computer Architecture and VLSI