SlideShare a Scribd company logo
1 of 23
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
5 Pen PC Technology
Table of contents
 History
 Introduction
 Working Principle
 5 functions
 Block Diagram
 How it takes input
 Why it works with windows only?
 Connectivity 802.11B/G and Blue tooth
 Merits
 Demerits
 Applications
 Conclusion
 References
 "Pen-style Personal Networking Gadget"
created in 2012 by Japanese technology
company NEC.
 Its designer Tour Ichihash.
 P-ISM was first featured at the 2011 ITU
Telecom world held in Geneva,
Switzerland.
History
Introduction
 P-ISM (“Pen-style
Personal Networking
Gadget Package”).
 Connected With A
Wireless Technology.
 Whole Set Is Connected
To Internet Through
Cellular Phone Function.
 This 'pen sort of instrument' produces
both the monitor as well as the keyboard
on any flat surfaces from where you can
carry out functions you would normally
do on your desktop
computer.
Continued…
A computer that utilizes an electronic pen (called a stylus) rather than a
keyboard for input. Pen computers generally require special operating
systems that support handwriting recognition so that users can write on the
screen or on a tablet instead of typing on a keyboard.
Most pen computers are hand-held devices, which are too small for a full-
size keyboard.
Working Principle
P-ISM includes 5 functions
 CPU PEN
 COMMUNICATION PEN
 VISUAL OUTPUT
 VIRTUAL KEYBOARD
 CAMERA
Block diagram of P- ISM
CPU Pen
 The functionality of the
CPU is done by
one of the pen.
 It is also known as
computing engine.
 Dual Core processor
is used.
 Works with windows
operating system.
Communication Pen
 Wireless Bluetooth Technology.
 Connected to internet
through cellular phone
function.
 Uses Wi-Fi technology.
 Exchange information
with wireless connection.
LED Projector
 Monitor is LED Projector.
 Size is A4.
 Resolution capacity
is1024x768 approx.
 It gives more clarity and good
picture.
Virtual Keyboard
 Virtual laser keyboard is a
new gadget.
 It emits laser on desk.
 Uses laser beam to generate
full-size perfect keyboard.
 VKB settings can be
changed.
Digital Camera
 It is useful in video recording ,
video conferencing simply as a
webcam.
 Connected with other devices.
 portable.
 360 degree visual
communication device.
 It is the most important part in the portable type of computers.
 Usually batteries are small in size and work for a long time.
 It comes with a battery life of 6+ (i.e. 6 days).
 For normal use it can be used for 2 weeks.
Battery
It has two methods for input
1. With the virtual keyboard.
2. With digital camera.
How it takes input
 It consists of dual core processor embedded in it and that is
why it works only with WINDOWS operation system.
Why it works with windows only?
Connectivity 802.11B/G and Blue tooth
Portable
Feasible
Ubiquitous computing is done
Wi-Fi technology
Pens produces both the monitor as well as the
keyboard on any flat surfaces from where you
can carry out functions.
Merits
Demerits
 Cost
 Battery
 Keyboard concept is not new
 Positioning is main
Currently un-clear.
Applications
Many researches has been made but there is no clear result so
far.
Only One that uses it is E-fingerprinting the gadget will be
more secure, which allows only owner to activate the Pc. So
even if we loose it, no one else cal access the gadget.
•The communication devices are becoming
smaller and compact.
• 5 Pen PC is only an example for the start of
this new technology.
•We can expect more such developments in
the future.
Conclusion
 www.webstatschecker.com/ieee_paper_on_5_pen_p
c_technology
 www.kguru.info/s/5-pen-pc-technology
 www.ieeexplore.ieee.org/pen-based learning
technologies, 2007. plt 2007. first – ieee
 www.oeclib.in
REFERENCES
5 Pen PC Technology Seminar Summary

More Related Content

What's hot

Deeper Programming for the Mobile First World
Deeper Programming for the Mobile First WorldDeeper Programming for the Mobile First World
Deeper Programming for the Mobile First WorldSriram V Iyer
 
ShopMaster Presentation
ShopMaster PresentationShopMaster Presentation
ShopMaster Presentationguesta3b956
 
Smarter working adam blackwood - altc2011
Smarter working   adam blackwood - altc2011Smarter working   adam blackwood - altc2011
Smarter working adam blackwood - altc2011Adam Blackwood
 
Computer Devices - What Are they?
Computer Devices - What Are they?Computer Devices - What Are they?
Computer Devices - What Are they?Andrew Willetts
 
Smart note taker ppt
Smart note taker ppt  Smart note taker ppt
Smart note taker ppt neeraja neeru
 
Non technical presentation
Non technical presentationNon technical presentation
Non technical presentationbenriddock
 
Smart note taker technology
Smart note taker technologySmart note taker technology
Smart note taker technologyPatel Neel
 
Non technical presentation
Non technical presentationNon technical presentation
Non technical presentationadamgreenhalgh
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systemshar139
 
smart note taker
smart note takersmart note taker
smart note takerveena jl
 
Non technical presentation
Non technical presentationNon technical presentation
Non technical presentationconnorhowe131
 

What's hot (20)

Deeper Programming for the Mobile First World
Deeper Programming for the Mobile First WorldDeeper Programming for the Mobile First World
Deeper Programming for the Mobile First World
 
E ball seminar
E ball seminarE ball seminar
E ball seminar
 
ShopMaster Presentation
ShopMaster PresentationShopMaster Presentation
ShopMaster Presentation
 
Smarter working adam blackwood - altc2011
Smarter working   adam blackwood - altc2011Smarter working   adam blackwood - altc2011
Smarter working adam blackwood - altc2011
 
Computer Devices - What Are they?
Computer Devices - What Are they?Computer Devices - What Are they?
Computer Devices - What Are they?
 
Smart note taker ppt
Smart note taker ppt  Smart note taker ppt
Smart note taker ppt
 
Non technical presentation
Non technical presentationNon technical presentation
Non technical presentation
 
Smart note taker technology
Smart note taker technologySmart note taker technology
Smart note taker technology
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Non technical presentation
Non technical presentationNon technical presentation
Non technical presentation
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systems
 
smart note taker
smart note takersmart note taker
smart note taker
 
Presentation1
Presentation1Presentation1
Presentation1
 
E-ball Technology
E-ball  TechnologyE-ball  Technology
E-ball Technology
 
Eballppt final
Eballppt finalEballppt final
Eballppt final
 
sm t
sm tsm t
sm t
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
Non technical presentation
Non technical presentationNon technical presentation
Non technical presentation
 
Ebulyne
EbulyneEbulyne
Ebulyne
 

Similar to 5 Pen PC Technology Seminar Summary

5pen pc technology
5pen pc technology5pen pc technology
5pen pc technologyAkhil Kumar
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete pptatinav242
 
5penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp015penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp01Ma'az Khan
 
5penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp015penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp01Rajeshwar Reddy
 
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdfKAWDEPALLAVI
 
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdfKAWDEPALLAVI
 
5penpctechnology
5penpctechnology 5penpctechnology
5penpctechnology lechupass
 
5 PEN TECHNOLOGY SLIDES
5 PEN TECHNOLOGY SLIDES5 PEN TECHNOLOGY SLIDES
5 PEN TECHNOLOGY SLIDESZulafqar Ahmed
 
5 pen-pc-technology-powerpoint-presentation.ppt (1)
5 pen-pc-technology-powerpoint-presentation.ppt (1)5 pen-pc-technology-powerpoint-presentation.ppt (1)
5 pen-pc-technology-powerpoint-presentation.ppt (1)Sreenath Bolgam
 
5 Pen Technology
5 Pen Technology5 Pen Technology
5 Pen TechnologyPatelRajan4
 
5-Pen-PC-Technology-Presentation
5-Pen-PC-Technology-Presentation5-Pen-PC-Technology-Presentation
5-Pen-PC-Technology-PresentationKuhinoor Alom
 
5-Pen-PC-Technology by Akankshya.pptx
5-Pen-PC-Technology by Akankshya.pptx5-Pen-PC-Technology by Akankshya.pptx
5-Pen-PC-Technology by Akankshya.pptxAnimeshBehera5
 
5 pen-pc-technology-powerpoint-presentation
5 pen-pc-technology-powerpoint-presentation5 pen-pc-technology-powerpoint-presentation
5 pen-pc-technology-powerpoint-presentationBachu Sainath
 

Similar to 5 Pen PC Technology Seminar Summary (20)

5-pen-pc-ppt.pptx
5-pen-pc-ppt.pptx5-pen-pc-ppt.pptx
5-pen-pc-ppt.pptx
 
5pen pc technology
5pen pc technology5pen pc technology
5pen pc technology
 
5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
5penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp015penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp01
 
47 5penpctechnology
47 5penpctechnology47 5penpctechnology
47 5penpctechnology
 
5penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp015penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp01
 
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
 
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
5-pen-pc-technologyfinalppt-130519232810-phpapp01.pdf
 
5penpctechnology
5penpctechnology 5penpctechnology
5penpctechnology
 
5 PEN TECHNOLOGY SLIDES
5 PEN TECHNOLOGY SLIDES5 PEN TECHNOLOGY SLIDES
5 PEN TECHNOLOGY SLIDES
 
5 pen-pc-technology-powerpoint-presentation.ppt (1)
5 pen-pc-technology-powerpoint-presentation.ppt (1)5 pen-pc-technology-powerpoint-presentation.ppt (1)
5 pen-pc-technology-powerpoint-presentation.ppt (1)
 
5pc pen technology
5pc pen technology5pc pen technology
5pc pen technology
 
5 Pen Technology
5 Pen Technology5 Pen Technology
5 Pen Technology
 
5-Pen-PC-Technology-Presentation
5-Pen-PC-Technology-Presentation5-Pen-PC-Technology-Presentation
5-Pen-PC-Technology-Presentation
 
5 pen technology[1]
5 pen technology[1]5 pen technology[1]
5 pen technology[1]
 
5-Pen-PC-Technology by Akankshya.pptx
5-Pen-PC-Technology by Akankshya.pptx5-Pen-PC-Technology by Akankshya.pptx
5-Pen-PC-Technology by Akankshya.pptx
 
5 pen pc tech
5 pen pc tech5 pen pc tech
5 pen pc tech
 
5 pen-pc-technology-powerpoint-presentation
5 pen-pc-technology-powerpoint-presentation5 pen-pc-technology-powerpoint-presentation
5 pen-pc-technology-powerpoint-presentation
 

More from OECLIB Odisha Electronics Control Library

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

5 Pen PC Technology Seminar Summary

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On 5 Pen PC Technology
  • 2. Table of contents  History  Introduction  Working Principle  5 functions  Block Diagram  How it takes input  Why it works with windows only?  Connectivity 802.11B/G and Blue tooth  Merits  Demerits  Applications  Conclusion  References
  • 3.  "Pen-style Personal Networking Gadget" created in 2012 by Japanese technology company NEC.  Its designer Tour Ichihash.  P-ISM was first featured at the 2011 ITU Telecom world held in Geneva, Switzerland. History
  • 4. Introduction  P-ISM (“Pen-style Personal Networking Gadget Package”).  Connected With A Wireless Technology.  Whole Set Is Connected To Internet Through Cellular Phone Function.
  • 5.  This 'pen sort of instrument' produces both the monitor as well as the keyboard on any flat surfaces from where you can carry out functions you would normally do on your desktop computer. Continued…
  • 6. A computer that utilizes an electronic pen (called a stylus) rather than a keyboard for input. Pen computers generally require special operating systems that support handwriting recognition so that users can write on the screen or on a tablet instead of typing on a keyboard. Most pen computers are hand-held devices, which are too small for a full- size keyboard. Working Principle
  • 7. P-ISM includes 5 functions  CPU PEN  COMMUNICATION PEN  VISUAL OUTPUT  VIRTUAL KEYBOARD  CAMERA
  • 9. CPU Pen  The functionality of the CPU is done by one of the pen.  It is also known as computing engine.  Dual Core processor is used.  Works with windows operating system.
  • 10. Communication Pen  Wireless Bluetooth Technology.  Connected to internet through cellular phone function.  Uses Wi-Fi technology.  Exchange information with wireless connection.
  • 11. LED Projector  Monitor is LED Projector.  Size is A4.  Resolution capacity is1024x768 approx.  It gives more clarity and good picture.
  • 12. Virtual Keyboard  Virtual laser keyboard is a new gadget.  It emits laser on desk.  Uses laser beam to generate full-size perfect keyboard.  VKB settings can be changed.
  • 13. Digital Camera  It is useful in video recording , video conferencing simply as a webcam.  Connected with other devices.  portable.  360 degree visual communication device.
  • 14.  It is the most important part in the portable type of computers.  Usually batteries are small in size and work for a long time.  It comes with a battery life of 6+ (i.e. 6 days).  For normal use it can be used for 2 weeks. Battery
  • 15. It has two methods for input 1. With the virtual keyboard. 2. With digital camera. How it takes input
  • 16.  It consists of dual core processor embedded in it and that is why it works only with WINDOWS operation system. Why it works with windows only?
  • 18. Portable Feasible Ubiquitous computing is done Wi-Fi technology Pens produces both the monitor as well as the keyboard on any flat surfaces from where you can carry out functions. Merits
  • 19. Demerits  Cost  Battery  Keyboard concept is not new  Positioning is main Currently un-clear.
  • 20. Applications Many researches has been made but there is no clear result so far. Only One that uses it is E-fingerprinting the gadget will be more secure, which allows only owner to activate the Pc. So even if we loose it, no one else cal access the gadget.
  • 21. •The communication devices are becoming smaller and compact. • 5 Pen PC is only an example for the start of this new technology. •We can expect more such developments in the future. Conclusion
  • 22.  www.webstatschecker.com/ieee_paper_on_5_pen_p c_technology  www.kguru.info/s/5-pen-pc-technology  www.ieeexplore.ieee.org/pen-based learning technologies, 2007. plt 2007. first – ieee  www.oeclib.in REFERENCES