Академический Документы
Профессиональный Документы
Культура Документы
Paper Presenters:
D.PRAVALLIKA K.S.S.N.V.L.NEEHARIKA
2/4 B.TECH,IT 2/4 B.TECH,IT
EMAIL: EMAIL:
pravallikadevarapalli@gmail.com neeharika.777@gmail.com
1
ABSTRACT: However, researchers are looking to
change the way we think about the
Mobile computing is beginning to beads and bobbles we wear. The
break the chains that tie us to our desks, combination of microcomputer devices
but many of today's mobile devices can and increasing computer power has
still be a bit awkward to carry around. allowed several companies to begin
In the next age of computing, there will producing fashion jewelry with
be an explosion of computer parts embedded intelligence i.e., Digital
across our bodies, rather than across our jewelry. Digital jewelry can best be
desktops. Basically, jewelry adorns the defined as wireless, wearable computers
body, and has very little practical that allow you to communicate by ways
purpose. of e-mail, voicemail, and voice
communication.
This paper enlightens on how various The latest computer craze has been to be
computerized jewelry (like ear-rings, able to wear wireless computers. The
necklace, ring, bracelet, etc.,) will work Computer Fashion Wave, "Digital
with mobile embedded intelligence. Jewelry" looks to be the next sizzling
fashion trend of the technological wave.
It seems that everything we access
The combination of shrinking computer
today is under lock and key. Even the
devices and increasing computer power
devices we use are protected by
has allowed several companies to begin
passwords. It can be frustrating trying to
producing fashion jewelry with
keep with all of the passwords and keys
embedded intelligence. Today’s,
needed to access any door or computer
manufacturers place millions of
program.
transistors on a microchip, which can be
used to make small devices that store
INTRODUCTION:
tons of digital data. The whole concept
behind this is to be able to communicate
2
to others by means of wireless will be broken up into their basic
appliances. The other key factor of this components and packaged as various
concept market is to stay fashionable at pieces of digital jewelry. Each piece of
the same time. jewelry will contain a fraction of the
components found in a conventional
By the end of the decade, we could be
mobile phone. Together, the digital-
wearing our computers instead of
jewelry cell phone should work just like
sitting in front of them.
a conventional cell phone.
The various components that are inside
WHAT IS DIGITAL JEWELERY
a cell phone:
Digital jewelry is the fashion jewelry Microphone, Receiver, Touch
with embedded intelligence. “Digital pad, Display, Circuit board, Antenna,
jewelry” can help you solve problems and Battery.
like forgotten passwords and security IBM has developed a prototype of a cell
badges. “Digital jewelry” is a nascent phone that consists of several pieces of
catchphrase for wearable ID devices digital jewelry that will work together
that contain personal information like wirelessly, possibly with Blue tooth
passwords, identification, and account wireless technology, to perform the
information. They have the potential to functions of the above components.
be all-in-one replacements for your
driver’s license, key chain, business
cards, credit cards, health insurance
card, corporate security badge, and
loose cash. They can also solve a
common dilemma of today’s wired
world – the forgotten password.
3
• Earrings - Speakers embedded into
these earrings will be the phone's
receiver.
• Necklace - Users will talk into the
necklace's embedded microphone.
• Ring - Perhaps the most interesting
piece of the phone, this "magic
decoder ring” is equipped with
light-emitting diodes (LEDs) that
flash to indicate an incoming call. It
FIGURE 2
can also be programmed to flash
different colors to identify a IBM's magic decoder rings will flash when
importance of a call.
The same ring that flashes for phone
• Bracelet - Equipped with a video
calls could also inform you that e-mail
graphics array (VGA) display, this
is piling up in your inbox. This flashing
wrist display could also be
alert could also indicate the urgency of
used as a caller identifier that
the e-mail.
flashes the name and phone number
of the caller.
4
received wirelessly from the Communicator's
belt module.
TECHNICAL
SPECIFICATIONS OF
DIGITAL JEWELRY:
5
Digital jewelry devices consist of a character sets, as can the alternative
screen or display for information, most display for LCDs (liquid-crystal-
likely consisting of 7-16-segment, or displays) also be used, as often found in
dot matrix LEDs, LCDs, or other watches.
technologies such as electroluminescent
material (EL) or others, which could
become an optional display. So too, an
audiovisual or other 'display' could
consist of a speaker, a single flashing
light, a sensor of some kind (such as a
temperature driven EL display), or other
informational aesthetic. The display FIGURE 5
7
It seems that everything we access which houses a 1-million-transistor
today is under lock and key. Even the processor, called an iButton. The ring
devices we use are protected by has 134 KB of RAM, 32 KB of ROM, a
passwords. It can be frustrating trying to real-time clock and a Java virtual
keep with all of the passwords and keys machine, which is a piece of software
needed to access any door or computer that recognizes the Java language and
program. Dallas Semiconductor is translates it for the user's computer
developing a new Java-based, system. Digital jewelry, (designed to
computerized ring that will supplement the personal computer,) will
automatically unlock doors and log on be the evolution in digital technology
to computers. that makes computer elements entirely
compatible with the human form.
CONCLUSION:-
BIBLIOGRAPHY:-
Books:-
Web:-
www.IBM.com
www.howstuffworks.com
www.infoworld.com