PRESENTED BY-.

Slides:



Advertisements
Similar presentations
Mobile Computing Advantages and limitations of mobile computing
Advertisements

Professor Nigel Linge Computer Networking and Telecommunications Research Group University of Salford.
1 Chapter 2 The Digital World. 2 Digital Data Representation.
DIGITAL JEWELLERY.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Presented by : ARJUN.B.M USN: 1RL05CS007 Dept Of CSE RLJIT, Dodballapur Under the guidance of : Basavaraj.S.Pol Asst. Prof Dept of CSE, RLJIT.
Computing Fundamentals Module A © CCI Learning Solutions Inc. 1 Unit 1: Recognizing Computers Lesson Topic 1Computers All Around Us 2Elements of a Personal.
Objectives Overview Discovering Computers 2014: Chapter 6 See Page 248
Arduino Project Street Guardian Alex Castan-Latham John Garner Rebecca Newton.
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
Intermediate GNVQ ICT Input Devices and Methods Manual input devices are used by people to enter data by hand. Keyboard Pointing devices Joystick Digital.
GCSE Information Technology Input Devices and Methods 3 Manual input devices are used by people to enter data by hand. Keyboard Pointing devices Joystick.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
Parts of the Computer.
COMPONENTS OF THE SYSTEM UNIT
Random access memory is a form of computer data storage. A random-access device allows stored data to be accessed directly in any random order.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
Computer Systems. Note to the student Please make brief notes on the following computer hardware + software components After each section research the.
WHAT IS A COMPUTER??? An electronic device that accepts: n Input n Processes the input n Stores the results of the processing n provides Output Computers.
Input and Output devices Input ports are connections at the back of a computer. Input devices are connected to these ports, for example, a keyboard which.
 Chasis / System cabinet  A plastic enclosure that contains most of the components of a computer (usually excluding the display, keyboard and mouse)
Chapter 6 Inside Computers and Mobile Devices Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Computer Hardware and Software
ASSISTIVE TECHNOLOGY Heather Light. LINKS FOR RESOURCES
Module Common Network Environments, Connectivity and Security Issues.
XP Practical PC, 3e Chapter 16 1 Looking “Under the Hood”
ICMAP-Shakeel 1 Infrastructure and Operations. ICMAP-Shakeel 2 Performance Variable for IT Functional capabilities and limitations Price-performance ratio.
Fundamental Principles of Computer Systems Unit B, Objective 3.01 & 3.02.
DIGITAL JEWELLERY INTRODUCTION In Computer Fashion Wave, "Digital Jewellery" looks to be the next sizzling fashion trend of the technological wave. The.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Chapter 4 The Components of The System Unit Matt Vanacore, Ryan Bratton, Thomas Bender.
Presented By MAYA N Roll No: 21 MCA B5
1 Information and Communication Technology Course Code: BTT20 Teacher: Mrs. T. van Biljouw.
Copyright © Wondershare Software Java Ring By D.Pradeep kumar(07241A0587) CSE Gokaraju Rangaraju institute of Engineering and Technology.
Objectives Overview Describe the various computer and mobile device cases and the contents they protect Describe multi-core processors, the components.
Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -1.
Introduction to the Computer System. What is a computer ? A computer is an electronic device that can accept data and instruction, process them or store.
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
1 Computer Systems. A computer is...  A purely digital device  Definition: Digital is a type of electronic signal that is processed, sent and stored.
Java Ring.
Concept brief for the design of VIBYNET 26 August 2005 JARROD AVENANT – AVNJAR001 Aileen Seth – STHAIL001 DESMOND VAN WYK – VWYDES001.
 The TenCup Entertainment Table is an interactive table that enhances the game-play experience of Beirut for both the player and the spectator.
KAMI KITT ASSISTIVE TECHNOLOGY Chapter 7 Human/ Assistive Technology Interface.
TECHNOLOGY. INTRODUCTION Then we will describe a mobile phone and a laptop today.
IPHONE Neeraj Dhiman. CONTENT  INTRODUCTION  HISTORY  HARDWARE  SOFTWARE  FEATURES  SPECIFICATIONS  RESTRICTIONS.
Hardware: Input and Processing. Input and Processing Technology Hardware devices can be grouped according to how and where they are used in the four steps.
Chapter 2 HAEDWAER.
VIRTUAL KEYBOARD By Parthipan.L Roll. No: 36 1 PONDICHERRY ENGINEERING COLLEGE, PUDUCHERRY.
E-ball Technology 1.
Parts of a Computer Created by Carmen Garzes. An electronic device that manipulates information or data. It can store, retrieve or process data. There.
Introducing Networks and the Internet Mrs. Wilson Rocky Point High School.
PRESENTED BY : DIPTIMAYEE PADHIHARI  Introduction to wearable computers  Aim of wearable computing  History of wearable computers  Wearable computing.
Computer Basics Just How Does a Computer Work?
D I G I T A L J E W E L L E R Y I N T R O D U C T I O N  "Digital Jewellery" looks to be the next sizzling fashion trend  combination of shrinking.
Exciting Applications of Polynomials Why Learning Polynomials?
Understanding Essential Computer Concepts. Objectives Investigate types of computers Examine computer systems Examine input devices Examine output devices.
DIGITAL WORLD. INTRODUCTION 1.How various computerized jewellery devices like ear- rings,necklace,ring,bracelet, etc.will work with mobile embedded.
TECHNOLOGY IN ACTION. Chapter 8 Digital Devices and Media: Managing a Digital Lifestyle.
JAVA RING By Sowmya B N.
Computer Information Systems
Input and Output Devices
PC Parts Worksheet- Building Your own Computer
S . Anil Kumar III year MCA
Computer Hardware and Software
DIGITAL JEWELLERY.
Business Computer Technology
Introduction to Computing Lecture # 1
Presented by: K.SWETHAA LAXMI CSE-2 T EAM NAME:JOLD BATCH NO:4.
Introduction To Computing BBA & MBA
Java Ring Presented by, Mr. Y. AROCKIA RAJ, Assistant Professor,
Presentation transcript:

PRESENTED BY-

INTRODUCTION What is DIGITAL JEWELLERY? DIGITAL JEWELLERY and its Components EAR RINGS NECKLACE IBM’S MAGIC DECODER RING BRACELET CHARMED COMMUNICATOR EYEPIECE TECHNICAL SPECIFICATIONS DISPLAY TECHNOLOGIES PROTOTYPE OF DIGITAL JEWELLERY THE JAVA RING ADVANTAGES DISADVANTAGES CONCLUSION

By the end of the decade , we could be wearing INTRODUCTION In Computer Fashion Wave ,”Digital Jewellery” looks to be the next sizzling fashion trend of technological wave. The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence. By the end of the decade , we could be wearing our computers instead of sitting in front of them.

WHAT IS DIGITAL JEWELLERY ???? Digital Jewellery is the fashion jewellery with embedded intelligence. Digital Jewellery can help you solve problems like forgotten passwords and security badges. Digital Jewellery will be the evolution in digital technology that makes computer elements entirely compatible with the human form. They have the potential to be all-in-one replacements for your driver’s license, key chain, business cards, credit cards, health insurance card, corporate security badge and loose cash.

DIGITAL JEWELLERY AND ITS COMPONENTS : Soon, “cell phones” will take a totally new form, appearing to have no form at all. The various components that are inside a cell phone: Microphone, Receiver, Touch pad, Display, Circuit board, Antenna, and Battery. IBM has developed a prototype of a cell phone that consists of several pieces of digital jewellery that will work together wirelessly, possibly with Bluetooth wireless.

Cell phones may one day be comprised of digital accessories that Work together through wireless connections.

EAR RINGS: Speakers : embedded into these earrings will be the phone's receiver. These days many manufacturers are developing things like Bluetooth devices in the form of pendants or earrings that people can wear that help enhance their mobile phones, computers PDAs, basically anything that uses similar Technology .

NECKLACE: Users will talk into the necklace's embedded microphone. They transfer the information in the forms of signals. It works with the help of sensors which is embedded in it. It is mainly by blue tooth technology.

IBM’s MAGIC DECODER RING: Perhaps the most interesting piece of the phone, this "magic decoder ring” is equipped with LEDs that flash to indicate an incoming call. It can also be programmed to flash different colors to identify a particular caller or indicate the importance of a call.

The same ring that flashes for phone calls could also inform you that e-mail is piling up in your inbox. This flashing alert could also indicate the urgency of the e-mail. The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display. Track Point is the little button embedded in the keyboard of some laptops. IBM Researchers have transferred Track Point technology to a ring, which looks something like a black-pearl.

BRACELET: Equipped with a video graphics array (VGA) display, this wrist display could also be used as a caller identifier that flashes the name and phone number of the caller.

Bluetooth Bracelet built in rechargeable battery, when a call is coming the bracelet will vibrate and lamp flash

CHARMED COMMUNICATOR EYEPIECE :

While IBM is in the development stage, Charmed Technology is already marketing its digital jewellery, including a futuristic-looking eyepiece display. The eyepiece is the display component of the company's Charmed Communicator, a wearable, wireless, broadband-Internet device that can be controlled by voice, pen or handheld keypad. The company says that the device could be ready for the mainstream market by the end of 2001 or early 2002. The Communicator can be used as an MP3 player, video player and cell phone. The Communicator runs on the company's Linux-based Nanix operating system.

CHARMED COMMUNICATOR EYEPIECE The eye piece above displays images and data received wirelessly from the Communicator's belt module.

Technical specifications: Digital jewellery devices consist of a screen or display for information, most likely consisting of 7-16-segment, or dot matrix LEDs, LCDs. An audio visual or other 'display' could consist of a speaker, a single flashing light, a sensor of some kind .

Display Technologies : The digital jewelry display, for instance, every alphabet and number system has found representation within the electronics realm and 'dot-matrix. It is used to display Chinese and Japanese and other character sets, as can the alternative display for LCDs (liquid-crystal-displays) also be used, as often found in watches.

Digital Jewellery can be made in many different sizes and shapes with a variety of materials ranging from plastic and metal to rubber and glass. This could range from LED 7-segment, 16-segment, dot matrix, and other programmable LEDs devices to LCDs, OLEDs, and other displays.

PROTOTYPES OF DIGITAL JEWELLERY: Complete HIOX necklace showing all 26 letters of the Roman alphabet extended in 4-dimensional space-time.

THE JAVA RING :

It seems that everything we access today is under lock and key It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. Dallas semiconductor is developing a new Java-based, computerized ring that will automatically unlock doors and log on to computers.

The ring has 134 KB of RAM, 32 KB of ROM, a real-time clock & a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system. Digital jewelry, (designed to supplement the personal computer,) will be the evolution in digital technology that makes computer elements entirely compatible with the human form.

BLUE DOT RECEPTOR : The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring. The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, which houses a 1-million-transistor processor, called an iButton.

Runs Java better (plus portions enhance Java Card 2.0). HIGHLIGHTS OF JAVA RING : Runs Java better (plus portions enhance Java Card 2.0). Careful attention to physical security. Durability to stand up to everyday use. High memory capacity (up to 134K bytes NV SRAM). Retail connectivity to 250 million existing computers.

ADVANTAGES: It provides SECURITY. For example., JAVA RING is used to lock or unlock doors or computers...as we use passwords and keys to lock our doors and computers. we dont need to remember all those passwords and carry all those keys. So java ring is designed to provide security. 2) As COMPUTING DEVICES are embedded it is not necessary to carry CELLS or COMPUTERS...hence it is easy to carry everywhere.

DISADVANTAGES: Charging capabilities & Cost are just a sample of problems.

CONCLUSION: The basic idea behind the digital jewelry concept is to have the convenience of wireless, wearable computers while remaining fashionably sound. It is hoped to be marketable soon, however, several bugs remain. Charging capabilities and cost are just a sample of the problems that lurk.