About new techonlogy that combines jewellery and compontes of a phone ,that leads to a new name called digital jewellery .It was developed by IBM ,is is undergoing product....Hope u loved it guys
This document discusses the concept of digital jewelry, which embeds computing capabilities into jewelry items like earrings, necklaces, and rings. It describes how digital jewelry could break smartphones down into separate wearable pieces that communicate wirelessly to perform calling and other functions. Specifically, it presents prototypes where earrings contain speakers, a necklace has a microphone, and a ring acts as a touchpad and stores login credentials. The goal is for these discrete digital accessories to work together wirelessly like a conventional smartphone through technologies like Bluetooth. The document examines how digital jewelry could solve problems like forgotten passwords by storing user information and acting as an all-in-one replacement for various identity cards and devices.
Digital jewelry is emerging as a new technology that embeds computing capabilities into jewelry and accessories. Prototypes include a ring that flashes different colors to identify incoming calls, earrings with speakers, and a bracelet with a small display. The components of a digital jewelry device would include a screen or display, microphone, antenna, and battery. Technical challenges remain around charging and costs, but digital jewelry may soon replace standalone devices by integrating computing into fashion items that are worn.
This document discusses the emerging concept of "digital jewelry", which refers to fashion jewelry that incorporates digital technologies and wireless capabilities. Some key points:
- Companies are developing jewelry items like earrings, necklaces, rings, and bracelets that can perform functions of cell phone components like speakers, microphones, displays, and more through wireless connectivity.
- Examples mentioned include earrings that serve as speakers, a necklace with a microphone, a ring that flashes notifications, and a bracelet with a small display. These could work together wirelessly as a cell phone.
- Other projects are developing head-mounted displays and a ring that functions as a computer mouse. These envision a future where displays
Digital jewellery combines fashion and technology by embedding computer components like displays, microphones, and batteries into jewellery items. Prototypes include earrings with speakers, rings that flash to indicate incoming calls, and bracelets with small screens. Digital jewellery could replace keys, IDs, and payment cards by storing user information. Future versions may break cell phones into separate jewellery pieces that communicate wirelessly. While offering convenience, challenges remain around battery life and durability of embedding technology into accessories worn everyday.
Digital jewelry is fashion jewelry with embedded intelligence and components like displays, microphones, and antennas. A presentation proposed digital jewelry concepts like earrings containing speakers, a necklace with a microphone, and a bracelet or ring with a small display. Prototypes from IBM included a magic decoder ring with LEDs to indicate calls and a mouse-ring using trackpoint technology. Digital jewelry could integrate functions of devices like IDs and payment cards but has challenges with size, cost, and power limitations.
Digital jewelry combines fashion jewelry with wireless computing capabilities. It allows users to communicate via email, voicemail, and calls through embedded intelligent devices. Researchers are working to break cell phones down into basic components that can be worn as different pieces of digital jewelry, like earrings containing speakers, a necklace containing a microphone, and a bracelet containing a display. These pieces would communicate wirelessly to function like a cell phone. Digital jewelry has the potential to replace keys, ID cards, and store personal information like passwords and account details.
Digital jewelry is emerging as a new concept that embeds computing capabilities into jewelry worn on the body. Pieces like earrings, necklaces, and rings can each contain components of a mobile device like microphones, speakers, displays, and sensors. These pieces would communicate wirelessly to perform the functions of a cell phone or allow access to computers and doors. Researchers are developing prototypes to break cell phones into digital jewelry accessories that work together through wireless connections to make mobile computing more wearable and fashionable.
Digital jewelry is fashion jewelry that contains embedded computing technology. It can include pieces like earrings, a necklace, and bracelet that together function as a cell phone using Bluetooth technology. The earrings contain speakers, the necklace has a microphone, and the bracelet displays caller ID information. A Java ring can be used for security purposes by automatically unlocking doors and logging users into systems. While digital jewelry provides wireless functionality and interaction, it also has small displays, potential health risks from radiation, and high costs that limit adoption.
This document discusses the concept of digital jewelry, which embeds computing capabilities into jewelry items like earrings, necklaces, and rings. It describes how digital jewelry could break smartphones down into separate wearable pieces that communicate wirelessly to perform calling and other functions. Specifically, it presents prototypes where earrings contain speakers, a necklace has a microphone, and a ring acts as a touchpad and stores login credentials. The goal is for these discrete digital accessories to work together wirelessly like a conventional smartphone through technologies like Bluetooth. The document examines how digital jewelry could solve problems like forgotten passwords by storing user information and acting as an all-in-one replacement for various identity cards and devices.
Digital jewelry is emerging as a new technology that embeds computing capabilities into jewelry and accessories. Prototypes include a ring that flashes different colors to identify incoming calls, earrings with speakers, and a bracelet with a small display. The components of a digital jewelry device would include a screen or display, microphone, antenna, and battery. Technical challenges remain around charging and costs, but digital jewelry may soon replace standalone devices by integrating computing into fashion items that are worn.
This document discusses the emerging concept of "digital jewelry", which refers to fashion jewelry that incorporates digital technologies and wireless capabilities. Some key points:
- Companies are developing jewelry items like earrings, necklaces, rings, and bracelets that can perform functions of cell phone components like speakers, microphones, displays, and more through wireless connectivity.
- Examples mentioned include earrings that serve as speakers, a necklace with a microphone, a ring that flashes notifications, and a bracelet with a small display. These could work together wirelessly as a cell phone.
- Other projects are developing head-mounted displays and a ring that functions as a computer mouse. These envision a future where displays
Digital jewellery combines fashion and technology by embedding computer components like displays, microphones, and batteries into jewellery items. Prototypes include earrings with speakers, rings that flash to indicate incoming calls, and bracelets with small screens. Digital jewellery could replace keys, IDs, and payment cards by storing user information. Future versions may break cell phones into separate jewellery pieces that communicate wirelessly. While offering convenience, challenges remain around battery life and durability of embedding technology into accessories worn everyday.
Digital jewelry is fashion jewelry with embedded intelligence and components like displays, microphones, and antennas. A presentation proposed digital jewelry concepts like earrings containing speakers, a necklace with a microphone, and a bracelet or ring with a small display. Prototypes from IBM included a magic decoder ring with LEDs to indicate calls and a mouse-ring using trackpoint technology. Digital jewelry could integrate functions of devices like IDs and payment cards but has challenges with size, cost, and power limitations.
Digital jewelry combines fashion jewelry with wireless computing capabilities. It allows users to communicate via email, voicemail, and calls through embedded intelligent devices. Researchers are working to break cell phones down into basic components that can be worn as different pieces of digital jewelry, like earrings containing speakers, a necklace containing a microphone, and a bracelet containing a display. These pieces would communicate wirelessly to function like a cell phone. Digital jewelry has the potential to replace keys, ID cards, and store personal information like passwords and account details.
Digital jewelry is emerging as a new concept that embeds computing capabilities into jewelry worn on the body. Pieces like earrings, necklaces, and rings can each contain components of a mobile device like microphones, speakers, displays, and sensors. These pieces would communicate wirelessly to perform the functions of a cell phone or allow access to computers and doors. Researchers are developing prototypes to break cell phones into digital jewelry accessories that work together through wireless connections to make mobile computing more wearable and fashionable.
Digital jewelry is fashion jewelry that contains embedded computing technology. It can include pieces like earrings, a necklace, and bracelet that together function as a cell phone using Bluetooth technology. The earrings contain speakers, the necklace has a microphone, and the bracelet displays caller ID information. A Java ring can be used for security purposes by automatically unlocking doors and logging users into systems. While digital jewelry provides wireless functionality and interaction, it also has small displays, potential health risks from radiation, and high costs that limit adoption.
Digital jewelry uses wireless technology to turn jewelry items like earrings, necklaces, rings, and bracelets into mobile devices. Researchers are developing jewelry that can unlock doors, log into computers, and make phone calls. For example, an experimental cell phone breaks the phone into digital jewelry pieces - earrings serve as speakers, a necklace holds the microphone, a ring flashes LEDs for calls, and a bracelet displays the caller ID. These wireless pieces would work together to perform the functions of a standard cell phone.
This document discusses digital jewelry, which embeds computing components into jewelry pieces to enable wireless connectivity. It describes existing digital jewelry prototypes from IBM and others. The proposed system would divide a phone's components across multiple jewelry items to provide calling functionality. A necklace would contain a microphone, bracelet would contain a speaker, and they would connect via Bluetooth. Advantages include portability and fashionable design, while disadvantages include high cost and small displays. The conclusion is that digital jewelry can provide wireless mobile access through everyday accessories.
This document discusses digital jewelry, which are wearable computing devices that allow wireless communication. Digital jewelry would break cell phones into their basic components, like microphones, receivers, displays, and batteries, and package them as pieces of jewelry like earrings, necklaces, rings, and wrist displays. An example is the Java Ring, which has memory, a processor, and a Java virtual machine to run apps. Digital jewelry could be used for social networking, reminders, secure communication, and connecting patients to doctors through small, personalized devices. However, challenges remain regarding battery life, user awareness, and further innovation to simplify everyday tasks.
Digital jewelry embeds computing components like microphones, displays, and antennas into jewelry items like necklaces, bracelets, and rings. This allows smartphones and other devices to be broken up into discrete, wearable pieces that communicate wirelessly. One prototype from IBM used a necklace microphone, earring speakers, flashing ring, and wrist display bracelet that together functioned as a mobile phone. While digital jewelry offers wireless convenience and fashionable tech wearables, challenges remain regarding small displays, potential health issues, waterproofing, and high costs.
Digital jewelry incorporates computing components like displays, microphones, and antennas into fashion accessories. A presentation described prototypes that broke cell phones into separate digital jewelry pieces connected wirelessly, including earrings with speakers, a necklace microphone, and a "magic decoder ring" that flashes notifications. Technical challenges include small displays, battery life, and potential health effects, but digital jewelry may eventually replace many everyday devices like keys and ID cards.
Digital jewelry is fashion jewelry embedded with computer components like displays, microphones, and antennas. A prototype consists of separate pieces like earrings with speakers, a necklace microphone, and a ring with an LED display. The Java Ring aims to automatically unlock doors and computers using passwords stored on a ring. While digital jewelry provides computing on the go without devices, challenges remain regarding battery life, cost, and integrating technology seamlessly into jewelry.
This document discusses digital jewelry, which are fashion accessories that have computer components embedded within them to allow wireless communication capabilities. It describes how different pieces like earrings, necklaces, rings, and bracelets can each contain components like microphones, displays, sensors, and batteries to replace cell phone functions. The technology uses components like LEDs, LCDs, speakers and Bluetooth connectivity. The goal is to make communication convenient while keeping accessories fashionable by distributing phone features across jewelry items.
This document discusses digital jewelry, which is fashion jewelry with embedded intelligence and computer components. Digital jewelry could replace items like driver's licenses and credit cards. Components like microphones, displays, and antennas could be embedded in jewelry pieces like necklaces, earrings, bracelets, and rings. For example, a necklace may have a microphone, earrings could have speakers, and a bracelet could have a small display. The document also discusses the Java Ring introduced in 1998 as an early example of a smart ring. While digital jewelry could provide convenience, challenges remain regarding small displays, potential health effects, waterproofing, and cost.
Digital Jewellery
This presentation helps to know about the various techno jewels in the technological era that people are wearing that will help to do their activities efficiently and conveniently.
Digital jewelry is fashion jewelry with embedded intelligence and components like microphones, displays, and batteries that allow it to function like a computer. A prototype uses separate pieces connected wirelessly like earrings with speakers, a necklace microphone, and a ring display. The Java Ring in particular provides security by unlocking doors and computers without passwords and is a small stainless steel ring with a processor. Digital jewelry provides security without keys and allows computing without carrying devices. However, issues with charging and costs remain to be solved before widespread adoption.
The document discusses digital jewelry, which are fashionable pieces of jewelry that contain computer components and can function as wireless wearable computers. Some examples mentioned include a computerized ring, earrings, necklace, and bracelet that work together using Bluetooth technology. The pieces have small screens, sensors, microcontrollers, and other technical specifications that allow them to be used like a mobile phone or computer. While digital jewelry provides wireless convenience and fashionable interaction, there are also challenges to address like small displays, potential health risks, durability, waterproofing, and high costs.
This document discusses digital jewelry, which are fashion accessories that have embedded computing capabilities. It describes several prototypes of digital jewelry including an IBM magic decoder ring that flashes to indicate phone calls, a mouse ring that controls a computer cursor, a Bluetooth bracelet that vibrates for calls, and a charmed eyepiece that displays information. Digital jewelry provides security by replacing keys and passwords with authentication via items like the Java ring. While digital jewelry would make computing more portable, challenges remain regarding powering and charging the devices affordably.
Digital Jewellery compiled by Anshika NigamAnshika Nigam
This document discusses the concept of digital jewelry, which embeds computing capabilities into fashion jewelry. It describes several types of digital jewelry like earrings that function as speakers, a necklace with an embedded microphone, and a ring that flashes notifications. The document also outlines projects from companies like IBM to shrink computers down for wearable form factors like a magic decoder ring and wrist-worn display. Potential applications are discussed along with some current limitations for digital jewelry.
Digital jewelry consists of various pieces of technology embedded in jewelry items like earrings, necklaces, bracelets, and rings. These pieces work together wirelessly to perform the functions of devices like cell phones. Prototypes include an earring that acts as a speaker, a necklace microphone, and a "magic decoder ring" that flashes notifications. Technical challenges include small displays, charging, and potential health risks from radiation. While providing security and portability, digital jewelry has limitations around usability and cost that must still be addressed.
The document discusses the concept of digital jewelry, which embeds computing capabilities into jewelry items like earrings, necklaces, bracelets, and rings. It describes prototypes created by IBM and other companies that could replace items like phones, keys, and ID cards. Functions like calls, data display, passwords, and wireless controls might be integrated. While the idea combines fashion and technology, challenges remain around technical specifications, powering and programming the devices, and commercializing the concept.
Digital jewelry is fashion jewelry embedded with computer components like displays, microphones, and batteries. Examples include bracelets with small screens and rings with LED lights. The Java Ring by Dallas Semiconductor has memory, processing power, and a blue dot receptor to communicate with other devices. Digital jewelry could replace items like key chains and ID cards. Issues include small displays, potential health risks, waterproofing, and high costs. The technology aims to make computers wearable while staying fashionable.
Digital jewelry is fashion jewelry that contains embedded computer technology to provide wireless connectivity and computing capabilities. It consists of components found in mobile phones miniaturized and embedded in jewelry items like rings, bracelets, and necklaces. Examples presented include an IBM magic decoder ring that flashes lights to handle phone calls and emails, a bracelet with an LED or LCD display to view information, and a necklace prototype displaying the entire Roman alphabet. Digital jewelry provides advantages like convenience and security by unlocking doors or logging into computers like a Java ring. Challenges include battery life and cost, but digital jewelry is predicted to become a future trend as computers are worn instead of used on desktops.
Digital jewelry embeds technology like microphones, displays, and wireless capabilities into jewelry items. An IBM prototype used several connected jewelry pieces like a necklace with a microphone and bracelet with a display to perform mobile phone functions. Digital jewelry can be used as smart watches with screens, ear rings that function as speakers, or rings with buttons. This bridges the physical and digital worlds and technology may become more integrated with the human body in the future. However, digital jewelry also has limitations like small displays, potential health risks from rays, expensive costs, and non-rechargeable batteries.
Digital jewelry embeds the components of communication devices and computers into jewelry items like earrings, necklaces, rings, and bracelets. This allows users to stay fashionable while communicating wirelessly. Key components like microphones, receivers, touchpads, and displays can be broken down and hidden inside jewelry. While charging and costs are drawbacks, digital jewelry provides security by not needing to carry separate devices, and allows for easy, wireless communication on the go.
The document discusses digital jewelry, which uses microcomputer devices embedded in fashion jewelry to allow for mobile computing. Digital jewelry components like earrings, necklaces, rings, and bracelets can work together using Bluetooth to function like a cell phone. Prototypes have been developed like a trackpoint ring and Java ring. Digital jewelry provides wireless wearability and a fashionable interface, but current limitations include small displays, potential health risks from rays, lack of waterproofing, and high costs.
Digital technology uses binary numbers (1s and 0s) to process information. There are several types of digital technology used in education, including productivity tools, instructional software, computer-based learning, general references, and research tools. Productivity tools help with tasks like photo editing and simulations. Instructional software provides lessons and assessments to students. Computer-based learning uses computers as the primary tool for instruction and can track student progress. General references include encyclopedias and dictionaries. Research tools allow students to search various sources online. Digital technology enhances education by creating new learning environments and allowing information manipulation and new teaching strategies.
Digital jewelry uses wireless technology to turn jewelry items like earrings, necklaces, rings, and bracelets into mobile devices. Researchers are developing jewelry that can unlock doors, log into computers, and make phone calls. For example, an experimental cell phone breaks the phone into digital jewelry pieces - earrings serve as speakers, a necklace holds the microphone, a ring flashes LEDs for calls, and a bracelet displays the caller ID. These wireless pieces would work together to perform the functions of a standard cell phone.
This document discusses digital jewelry, which embeds computing components into jewelry pieces to enable wireless connectivity. It describes existing digital jewelry prototypes from IBM and others. The proposed system would divide a phone's components across multiple jewelry items to provide calling functionality. A necklace would contain a microphone, bracelet would contain a speaker, and they would connect via Bluetooth. Advantages include portability and fashionable design, while disadvantages include high cost and small displays. The conclusion is that digital jewelry can provide wireless mobile access through everyday accessories.
This document discusses digital jewelry, which are wearable computing devices that allow wireless communication. Digital jewelry would break cell phones into their basic components, like microphones, receivers, displays, and batteries, and package them as pieces of jewelry like earrings, necklaces, rings, and wrist displays. An example is the Java Ring, which has memory, a processor, and a Java virtual machine to run apps. Digital jewelry could be used for social networking, reminders, secure communication, and connecting patients to doctors through small, personalized devices. However, challenges remain regarding battery life, user awareness, and further innovation to simplify everyday tasks.
Digital jewelry embeds computing components like microphones, displays, and antennas into jewelry items like necklaces, bracelets, and rings. This allows smartphones and other devices to be broken up into discrete, wearable pieces that communicate wirelessly. One prototype from IBM used a necklace microphone, earring speakers, flashing ring, and wrist display bracelet that together functioned as a mobile phone. While digital jewelry offers wireless convenience and fashionable tech wearables, challenges remain regarding small displays, potential health issues, waterproofing, and high costs.
Digital jewelry incorporates computing components like displays, microphones, and antennas into fashion accessories. A presentation described prototypes that broke cell phones into separate digital jewelry pieces connected wirelessly, including earrings with speakers, a necklace microphone, and a "magic decoder ring" that flashes notifications. Technical challenges include small displays, battery life, and potential health effects, but digital jewelry may eventually replace many everyday devices like keys and ID cards.
Digital jewelry is fashion jewelry embedded with computer components like displays, microphones, and antennas. A prototype consists of separate pieces like earrings with speakers, a necklace microphone, and a ring with an LED display. The Java Ring aims to automatically unlock doors and computers using passwords stored on a ring. While digital jewelry provides computing on the go without devices, challenges remain regarding battery life, cost, and integrating technology seamlessly into jewelry.
This document discusses digital jewelry, which are fashion accessories that have computer components embedded within them to allow wireless communication capabilities. It describes how different pieces like earrings, necklaces, rings, and bracelets can each contain components like microphones, displays, sensors, and batteries to replace cell phone functions. The technology uses components like LEDs, LCDs, speakers and Bluetooth connectivity. The goal is to make communication convenient while keeping accessories fashionable by distributing phone features across jewelry items.
This document discusses digital jewelry, which is fashion jewelry with embedded intelligence and computer components. Digital jewelry could replace items like driver's licenses and credit cards. Components like microphones, displays, and antennas could be embedded in jewelry pieces like necklaces, earrings, bracelets, and rings. For example, a necklace may have a microphone, earrings could have speakers, and a bracelet could have a small display. The document also discusses the Java Ring introduced in 1998 as an early example of a smart ring. While digital jewelry could provide convenience, challenges remain regarding small displays, potential health effects, waterproofing, and cost.
Digital Jewellery
This presentation helps to know about the various techno jewels in the technological era that people are wearing that will help to do their activities efficiently and conveniently.
Digital jewelry is fashion jewelry with embedded intelligence and components like microphones, displays, and batteries that allow it to function like a computer. A prototype uses separate pieces connected wirelessly like earrings with speakers, a necklace microphone, and a ring display. The Java Ring in particular provides security by unlocking doors and computers without passwords and is a small stainless steel ring with a processor. Digital jewelry provides security without keys and allows computing without carrying devices. However, issues with charging and costs remain to be solved before widespread adoption.
The document discusses digital jewelry, which are fashionable pieces of jewelry that contain computer components and can function as wireless wearable computers. Some examples mentioned include a computerized ring, earrings, necklace, and bracelet that work together using Bluetooth technology. The pieces have small screens, sensors, microcontrollers, and other technical specifications that allow them to be used like a mobile phone or computer. While digital jewelry provides wireless convenience and fashionable interaction, there are also challenges to address like small displays, potential health risks, durability, waterproofing, and high costs.
This document discusses digital jewelry, which are fashion accessories that have embedded computing capabilities. It describes several prototypes of digital jewelry including an IBM magic decoder ring that flashes to indicate phone calls, a mouse ring that controls a computer cursor, a Bluetooth bracelet that vibrates for calls, and a charmed eyepiece that displays information. Digital jewelry provides security by replacing keys and passwords with authentication via items like the Java ring. While digital jewelry would make computing more portable, challenges remain regarding powering and charging the devices affordably.
Digital Jewellery compiled by Anshika NigamAnshika Nigam
This document discusses the concept of digital jewelry, which embeds computing capabilities into fashion jewelry. It describes several types of digital jewelry like earrings that function as speakers, a necklace with an embedded microphone, and a ring that flashes notifications. The document also outlines projects from companies like IBM to shrink computers down for wearable form factors like a magic decoder ring and wrist-worn display. Potential applications are discussed along with some current limitations for digital jewelry.
Digital jewelry consists of various pieces of technology embedded in jewelry items like earrings, necklaces, bracelets, and rings. These pieces work together wirelessly to perform the functions of devices like cell phones. Prototypes include an earring that acts as a speaker, a necklace microphone, and a "magic decoder ring" that flashes notifications. Technical challenges include small displays, charging, and potential health risks from radiation. While providing security and portability, digital jewelry has limitations around usability and cost that must still be addressed.
The document discusses the concept of digital jewelry, which embeds computing capabilities into jewelry items like earrings, necklaces, bracelets, and rings. It describes prototypes created by IBM and other companies that could replace items like phones, keys, and ID cards. Functions like calls, data display, passwords, and wireless controls might be integrated. While the idea combines fashion and technology, challenges remain around technical specifications, powering and programming the devices, and commercializing the concept.
Digital jewelry is fashion jewelry embedded with computer components like displays, microphones, and batteries. Examples include bracelets with small screens and rings with LED lights. The Java Ring by Dallas Semiconductor has memory, processing power, and a blue dot receptor to communicate with other devices. Digital jewelry could replace items like key chains and ID cards. Issues include small displays, potential health risks, waterproofing, and high costs. The technology aims to make computers wearable while staying fashionable.
Digital jewelry is fashion jewelry that contains embedded computer technology to provide wireless connectivity and computing capabilities. It consists of components found in mobile phones miniaturized and embedded in jewelry items like rings, bracelets, and necklaces. Examples presented include an IBM magic decoder ring that flashes lights to handle phone calls and emails, a bracelet with an LED or LCD display to view information, and a necklace prototype displaying the entire Roman alphabet. Digital jewelry provides advantages like convenience and security by unlocking doors or logging into computers like a Java ring. Challenges include battery life and cost, but digital jewelry is predicted to become a future trend as computers are worn instead of used on desktops.
Digital jewelry embeds technology like microphones, displays, and wireless capabilities into jewelry items. An IBM prototype used several connected jewelry pieces like a necklace with a microphone and bracelet with a display to perform mobile phone functions. Digital jewelry can be used as smart watches with screens, ear rings that function as speakers, or rings with buttons. This bridges the physical and digital worlds and technology may become more integrated with the human body in the future. However, digital jewelry also has limitations like small displays, potential health risks from rays, expensive costs, and non-rechargeable batteries.
Digital jewelry embeds the components of communication devices and computers into jewelry items like earrings, necklaces, rings, and bracelets. This allows users to stay fashionable while communicating wirelessly. Key components like microphones, receivers, touchpads, and displays can be broken down and hidden inside jewelry. While charging and costs are drawbacks, digital jewelry provides security by not needing to carry separate devices, and allows for easy, wireless communication on the go.
The document discusses digital jewelry, which uses microcomputer devices embedded in fashion jewelry to allow for mobile computing. Digital jewelry components like earrings, necklaces, rings, and bracelets can work together using Bluetooth to function like a cell phone. Prototypes have been developed like a trackpoint ring and Java ring. Digital jewelry provides wireless wearability and a fashionable interface, but current limitations include small displays, potential health risks from rays, lack of waterproofing, and high costs.
Digital technology uses binary numbers (1s and 0s) to process information. There are several types of digital technology used in education, including productivity tools, instructional software, computer-based learning, general references, and research tools. Productivity tools help with tasks like photo editing and simulations. Instructional software provides lessons and assessments to students. Computer-based learning uses computers as the primary tool for instruction and can track student progress. General references include encyclopedias and dictionaries. Research tools allow students to search various sources online. Digital technology enhances education by creating new learning environments and allowing information manipulation and new teaching strategies.
The latest computer craze has been to be able to wear wireless computers. The Computer Fashion Wave, "Digital Jewelry" looks to be the next sizzling fashion trend of the technological wave. The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence. Today’s, manufacturers place millions of transistors on a microchip, which can be used to make small devices that store tons of digital data.. The whole concept behind this is to be able to communicate to others by means of wireless appliances. The other key factor of this concept market is to stay fashionable at the same time.
Digital jewelry is fashion jewelry embedded with computing technology. It could include a necklace with a microphone, earrings with speakers, and a bracelet with a display. The components would work together wirelessly using technologies like Bluetooth. A prototype called the Java Ring has memory, a clock, and a Java virtual machine to run programs. While digital jewelry aims to make computers more wearable and convenient, challenges remain around usability, battery life, and cost before it becomes widely adopted.
This document discusses digital jewelry, which combines fashion jewelry with embedded computing technology. Digital jewelry devices could include earrings with speakers, a necklace with a microphone, a ring with LEDs to indicate calls, and a bracelet with a small display. The technology allows for a wireless wearable computer using Bluetooth. Issues include small displays, potential health risks from radiation, water damage risks, and high costs, but digital jewelry may eventually replace standalone computers by integrating all necessary functions into fashionable items that are easy to carry everywhere.
Digital technology refers to the evolving suite of digital tools used for learning, including hardware, software, and infrastructure. It encompasses productivity tools like MS Office, instructional software, computer-based learning technologies, general references, research tools, and subject-specific CD-ROMs. Productivity tools are used for creation, collaboration, and planning. Instructional software includes applications, drills, tutorials, simulations, games, and problem-solving programs to assist instruction. Computer-based learning uses educational websites and software to enhance the classroom experience. General references provide multimedia encyclopedias and dictionaries. Research tools retrieve information from online sources, and subject-specific CD-ROMs contain instructional materials for a particular topic.
This presentation discusses various ICT tools that can aid communication and collaboration in a school environment. It provides an overview of tools for online noticeboards, bookmarking, mind mapping, file sharing, video conferencing, and more. Many of the tools highlighted allow for real-time collaboration between colleagues and students.
This document discusses digital jewelry, which embeds computing components like microphones, displays, and antennas into fashion accessories. It describes a prototype phone broken into pieces of digital jewelry that communicate wirelessly, including earrings with microphones, a ring with an LED display to indicate calls, and a wrist display. The Java Ring is highlighted as a programmable access device, containing a processor, memory, and software to interface with other devices. Potential applications include access control, authentication, passwords, and digital signatures. While the concept aims to make computers more wearable and convenient, challenges around charging and costs remain.
Smart Health Prediction Using Data Mining.Data mining is a new powerful technology which is of high interest in computer world. It is a sub field of computer science that uses already existing data in different databases to transform it into new researches and results. It makes use of Artificial Intelligence, machine learning and database management to extract new patterns from large data sets and the knowledge associated with these patterns. The actual task is to extract data by automatic or semi-automatic means. The different parameters included in data mining includes clustering, forecasting, path analysis and predictive analysis.
Smart health prediction using data mining by customsoftCustom Soft
CustomSoft India based software company developed wonderful software for Smart Health prediction using Data Mining for its esteemd Ckients from US, UK, Canada, Singapore, South Africa based clients
This document provides a 3-sentence summary of a seminar report on 3D Internet:
The report discusses the evolution of the Internet from 2D to 3D, describing the 3D Internet as an interactive virtual environment that can more suitably provide services, interaction, and communication compared to traditional 2D websites. It proposes an architecture for implementing the 3D Internet using world servers, content servers, and client programs, and addresses challenges around performance, simulation services, user-created content, and ecosystem development. The report analyzes applications and benefits of the 3D Internet for distance learning, commerce, and more immersive experiences compared to the current 2D web.
Digital technology converts analog signals into binary numeric codes made up of 1s and 0s. It uses bits (binary digits) grouped into bytes to store and transmit digital data. CDs and DVDs store digital data in the form of microscopic pits and bumps on the disc's surface that are read by lasers and interpreted as 1s and 0s. Digital cameras capture light using image sensors composed of photosensitive cells that convert light into electrons and record images as pixel values that are assembled into digital photographs represented as strings of binary code.
Every year at the occasion of BaselWorld, Digital Luxury Group unveils the results of the WorldWatchReport™, the leading market research in the luxury watch industry published in partnership with Europa Star, and the gracious support of the Fondation de la Haute Horlogerie.
The full edition of the report, which this year will cover 60+ brands in 20 markets worldwide, will be available in April 2013 at the time of Baselworld.
This document is a seminar report submitted by Pappu Jaiswal to fulfill requirements for a Bachelor of Technology degree in Electrical Engineering at Madan Mohan Malaviya University of Technology. The report is about solar trees and includes chapters on the working principle of solar cells, the manufacturing process of solar cells, and applications, advantages, and disadvantages of solar trees. It was supervised by Mr. Kishan Bhushan Sahay of the Electrical Engineering department.
This document discusses digital jewelry, which are pieces of jewelry that have small computers embedded in them. It describes several prototypes of digital jewelry created by companies like IBM and Charmed Technology. This includes earrings that act as speakers, a necklace with a microphone, and a ring that flashes different colors to identify callers. It also discusses a "Java Ring" being developed by Dallas Semiconductor that can automatically unlock doors and log users into computers through wireless communication. The document provides details on the technical specifications and components that make up digital jewelry, such as displays, microcontrollers, and batteries. It aims to introduce the concept of digital jewelry and its potential applications.
Digital jewelry is the fashion jewelry with embedded intelligence. “Digital jewelry” can help you solve problems like forgotten passwords and security badges. “Digital jewelry” is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information. They have the potential to be all-in-one replacements for your driver’s license, key chain, business cards, credit cards, health insurance card, corporate security badge, and loose cash. They can also solve a common dilemma of today’s wired world – the forgotten password.
Together, the digital-jewellery cell phone should work just like a conventional cell phone. The various components that are inside a cell phone: Microphone, Receiver, Touch pad, Display, Circuit board, Antenna, and Battery.
This document summarizes digital jewelry, which is fashion jewelry with embedded computing capabilities. It discusses the history and components of digital jewelry, such as microphones, displays, and circuits embedded in items like earrings, necklaces, and rings. The document outlines applications like making calls and checking email without holding a phone. It also discusses advantages like wireless functionality and disadvantages like small displays and cost. Finally, it presents a vision for the future where computers are worn rather than used through standalone devices.
Digital jewelry is fashion jewelry embedded with computing technology that allows users to access information and communicate wirelessly. A proposed system would break cell phones into basic component pieces incorporated into jewelry, like a microphone in earrings, display in a bracelet, and caller ID in a flashing ring. Technical specifications for digital jewelry devices include LED, LCD, and OLED displays. An example is the Java Ring, which uses embedded technology to automatically unlock doors and log into computers. Benefits include portability and immediate access, while challenges include battery life, cost, and health effects of radiation.
Digital jewelry combines fashion and technology by embedding small computers and electronics into jewelry items like rings, bracelets, and necklaces. This allows the jewelry to take on functions like phones, credit cards, or key fobs. The document describes prototypes for different pieces of a digital jewelry "phone" that could be worn instead of carried, such as a ring that flashes LEDs for calls or a bracelet with a small screen. It also discusses technologies like Bluetooth that could allow the jewelry items to work together wirelessly to replace traditional cell phones.
This document discusses digital jewelry, which embeds computing components like microphones, displays, and antennas into jewelry items like necklaces, bracelets, and rings. It describes a prototype from IBM that divides cell phone functions between multiple jewelry pieces connected by Bluetooth. Components are embedded in necklaces to hold microphones, ear rings to act as speakers, rings that flash notifications, and bracelets with small screens. While offering wireless convenience, digital jewelry still faces challenges with small displays, potential health issues, waterproofing, and costs.
Mobile Technologies
HISTORY OF MOBILE TECHNOLOGIES
The Motorola DynaTAC 8000x was the first portable phone, although it was large, heavy and very expensive costing thousands of pounds.
Motorola was the first brand to emerge as a leader in early mobile phone technology, Nokia started creating popular phones in the early 90s.
Nokia continued to lead the industry over the next few years with the production of iconic models including the 5110, 3210, and the 3310. Nokia’s dominance began to recede in the early 2000s, with Sony Ericsson, LG, and Samsung increasingly becoming major players in the market.
2006 -Phones started to become truly smart. As GPS-enabled devices they could now check your emails, play music, surf the internet, download content and take photos.
2007- Phones started to be capable of functions close to those of today with the release of the first iPhone. Blackberry with their full keyboard design useful for emails and instant messaging also enjoyed popularity.
Phones are also able to act as contactless payment devices storing bank card details so an individual can be cashless and cardless. More web pages are now visited on mobile devices than via desktops. Screen sizes have increased, as have security features such as biometric unlocking from fingerprints of facial recognition technology. As far as the future goes there are shaped and curved screens, higher-quality cameras, improved battery life and ever more powerful processors.
Latest trends OF MOBILE
TECHNOLOGIEs
5G Technology: 5G technology is the latest wireless technology that promises faster data transfer speeds, lower latency, and increased capacity. With 5G, mobile devices will be able to handle more data and perform more complex tasks.
Augmented Reality (AR) and Virtual Reality (VR): AR and VR technologies are becoming more accessible to consumers, and developers are finding new and innovative ways to use them. AR and VR technologies offer users a more immersive experience and are being used in industries like education, gaming, and retail.
Internet of Things (IoT): The IoT is a network of connected devices that can communicate with each other and the internet. The IoT is being used in industries like healthcare, manufacturing, and smart homes to improve efficiency and productivity.
Mobile Payments: Mobile payment technologies like Apple Pay, Google Wallet, and Samsung Pay are becoming more popular as consumers seek more convenient and secure payment options.
Artificial Intelligence (AI): AI technologies are being integrated into mobile devices to provide personalized experiences and improve the functionality of apps. AI is being used in industries like healthcare, finance, and retail.
News related articles
Advantages of mobile technologies
The benefits of using mobile technology in business can lead to:
Better communication.
Increased collaboration with your team.
Remote work.
Reduced operational costs and saved time.
Increased productivity.
Real t
This document discusses digital jewelry, which embeds computer components like microphones, displays, and antennas into jewelry items like rings, bracelets, and necklaces. It describes how a cell phone could be comprised of different pieces of digital jewelry that communicate wirelessly, with rings functioning as caller IDs, bracelets as displays, and necklaces and earrings containing microphones and speakers. The Java Ring is highlighted as an example that could automatically unlock doors and log into computers. Advantages include increased security and convenience over traditional devices, though challenges remain around charging and costs.
Digital Jewellery ppt.pptx is about the elctronic devicesmisbanausheenparvam
Digital jewelry is fashion jewelry embedded with computer components like displays, microphones, and antennas. It has the potential to replace items like driver's licenses and credit cards. Prototypes include earrings with speakers, a necklace with a microphone, and a ring with an LED display to indicate incoming calls. The Java Ring is being developed to automatically unlock doors and computers using passwords and keys stored on the ring. While digital jewelry could provide convenience and security, challenges remain regarding battery life, cost, and the technology being integrated into jewelry in an attractive way.
This document discusses several emerging communication technologies including keychain projectors, Google Glass, and homes of the future. Keychain projectors will allow portable presentations without large equipment. Google Glass is an optical head-mounted display that will replace cell phones and allow hands-free communication. Homes of the future will be highly automated with security systems, home theaters, and domestic robots to attend to tasks like cooking and homework.
The document discusses the top 5 best Bluetooth speakers of 2017, outlining the benefits of Bluetooth speakers such as portability and wireless connectivity compared to conventional speakers. It notes that Bluetooth speakers have grown technically and allows wireless connection between devices like smartphones and speakers to play audio within a specified range. The article aims to familiarize readers with the best Bluetooth speakers of 2017 and their key features.
Mobile World Congress 2017 Recap: The Future of ConnectivityIan Beacraft
A recap of the fourteen trends that defined Mobile World Congress 2017, through the lens of Epsilon Agency's innovation platform of Cognition, Connection and Immersion. Here you'll find the best of the show.
The Next IT: A Preview of Tomorrows Innovations and Challengesnbelarbi
This article discusses possible future Information Technology innovations based on current trends. We present three concepts that will likely shape future services and impact corporations, markets and societies: Hyper-Connectivity, Social/Semantic Web, Saas/Cloud computing and Micro-eEconomy.
seminar presentation on Digital JwelleryJawhar Ali
Digital jewelry is fashion jewelry with embedded intelligence that can replace items like driver's licenses, credit cards, and keys. A presentation outlines digital jewelry components like microphones in necklaces, displays in bracelets, and a Java ring that uses biometrics to unlock doors and log into computers. While digital jewelry could make carrying devices more convenient, challenges remain around charging and costs before the technology is widely available.
Whirlpool presents the volume 2 of the Digital School. Lesson 2 is dedicated to explain how everyday objects can become smart and more connected to each other and to the users.
This document provides an overview of 5 technology trends to watch in 2015 according to the Consumer Electronics Association (CEA). It summarizes each trend in 1-2 sentences:
1. Big Data Analytics - With the rise of sensors, devices and digital connectivity, massive amounts of data are being collected and analyzed to provide predictive insights.
2. Digital Health and the Quantified Self - Technologies like wearables, apps and remote monitoring devices allow people to quantify biological metrics to track health and fitness.
3. Entertainment and Immersive Content - Advances in displays, processing power and connectivity enable new immersive entertainment experiences through virtual and augmented reality.
4. The Rise of the Machines - Robot
This document provides a guide for building smart products. It discusses why it is the right time for IoT products, the skills needed to build smart products, and the step-by-step process for building a smart product. This includes ideating, designing, simulating, testing, optimizing, preparing for production, and bringing all elements together. It emphasizes user experience, component selection and pricing, prototyping, app development, production, and security/analytics.
The document summarizes key trends from Mobile World Congress 2017 related to connectivity, cognition, and immersion in technology. Some of the major trends discussed include the rise of 5G and its impact on areas like smart cities and entertainment. Advanced biometrics, evolving voice assistants that integrate facial recognition and 1:1 communication, and voice-based biometrics for authentication in voice interfaces were highlighted as trends in connectivity. For cognition, machine learning as a service focused on 1:1 personalized predictions from user data was discussed. Plug and play solutions for IoT device development and smartphone augmentation through high-quality modular add-ons were also summarized.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Digital jewellery
1. i
Digital jewelry
Technical Seminar Report
Submitted in partial fulfilment of the requirement for the award of the Degree of
Bachelor of Technology
In
Electronics and Communications Engineering
By
T. Harish Kumar (11621A0456)
Under the guidance of
Ms .T. Sireesha
Associate professor
Department of Electronics and Communication Engineering
Aurora's Engineering College
Bhuvanagiri, Nalgonda District – 508 116
(Affiliated to JNTUH and Accredited by NBA, New Delhi)
(2014-15)
2. ii
Aurora's Engineering College
Bhuvanagiri, Nalgonda District – 508 116
(Affiliated to JNTUH and Accredited by NBA, New Delhi)
CERTIFICATE
This is to certify that the Technical Seminar report entitled Digital Jewelry has been submitted
by Mr T. Harish kumar bearing Roll No 11621A0456 under my guidance in partial fulfilment of the
degree of Bachelor of Technology in Electronics and Communication Engineering to the Jawaharlal
Nehru Technological University Hyderabad during the academic year 2014-15.
Date:
Name of the Supervisor Seminar Coordinator
Mr. V. Kumara Swamy Mr. J. Srikanth
Head of Department Principal
3. iii
Acknowledgment
It givesme immensepleasure toexpressmydeepsense of gratitude tomy
supervisorShri.VinodChavanforhisinvaluable guidance,motivation,constantinspirationand
above all hereverco-operatingattitude enabledme in bringingupthisthesisinpresentelegant
form.
I am extremely thankful to Mr.V.Kumara Swamy, Head, Department of
Electronics & Communication Engineering and the faculty members of Electronics &
Communication Engineering Department for providing all kinds of possible help and advice
during the course of this project.
I am greatly thankful to all the staff members of the department and all my
well-wishers, class mates and friends for their inspiration and help. It is a great pleasure for me
to acknowledge and express my gratitude to my parent for their understanding, unstinted
support and endless encouragement during my study.
T.HARISH KUMAR
ROLL NO: 11621A0456
Department of Electronics &Communication Engineering
AURORA’S Engineering College, Bhuvanagiri.
4. iv
Abstract
Mobile computing is beginning to break the chains that lie us to our decks .but many
of today‘s mobile devices can still be a bit awkward to carry around. In the next age of
computing, there will be an explosion of computer parts across our bodies, rather than across
our desktops. However, researchers are looking to change the way we think about the beads
and bobbles we wear. The combination of microcomputer devices and increasing computer
power has allowed several companies to begin producing fashion jewelry with embedded
intelligence i.e., Digital jewelry. Digital jewelry can best be defined as wireless, wearable
computers that allow you to communicate by ways of e-mail, voicemail, and voice
communications. This paper enlightens on how various computerized jewelry (Like ear-rings,
necklace, ring bracelet, etc.,) will work with mobile embedded intelligence
It seems that everything we access today is under lock and key. Even the devices we
use are protected by passwords. It can be frustrating trying to keep with all of the passwords
and keys needed to access any door or computer program. This paper discusses about a new
Java-based, computerized ring that will automatically unlock doors and log on to computers.
5. v
CONTENTS
TITLE PAGE NO.
1. INTRODUCTION 1
1.1 Scope 1
1.2 Purpose 2
1.3 what is digital jewellery 2
1.4 Digital jewellery and its components 2
1.5 charmed communicator’s eyepiece 6
2. LITERATURE SURVEY 7
2.1 history of wireless communications 7
2.2 Wireless vision 8
2.3 Low cost and low power radios: Bluetooth and zigbee 8
2.4 Jewellery as communication 9
2.5 People and their awareness 11
3. TECHNICAL SPECIFICATIONS OF DIGITAL JEWELRY 12
3.1 Display technologies 12
3.2 Electromagnetic beads 13
3.3 Prototypes of digital jewellery 14
4. THE JAVA RING 16
4.1 Components of java ring 17
4.2 Working of java ring 18
4.3 Operating system of java ring 20
4.4 Applications of java ring 20
4.5 Advantages of java ring 21
5. APPLICATION, ADVANTAGES AND LIMITATIONS 22
5.1 Applications 22
5.2 Ongoing achievements 22
5.3 Advantages 23
5.4 Limitations 23
6. CONCLUSION 25
6. vi
LIST OF FIGURES
FIGURE NAME PAGE NO
1.1 Digital accessions 3
1.2 Speakers embedded in to earnings 3
1.3 Microphone embedded necklace 4
1.4 Magic decoder ring 4
1.5 .a Bluetooth bracelet 5
.b Prototype bracelet 5
1.6 The eyepiece 6
2.1 IDEO’S techno jewelry 11
3.1 Alphanumeric or graphic types 12
3.2 Electromagnetics beads 14
3.3 Hiox necklace 14
3.4 Programmable HIOX ring 15
4.1a. The java ring 16
b. DS9104 Digital Decoder 16
4.2 Blue dot receptor 18
4.3 Opening door using java ring 19
4.4 Working process of java ring 19
6.1 Digital watch 24
7. 1
1. INTRODUCTION
The latest computer craze has been to be able to wear wireless computers. The
Computer Fashion Wave, "Digital Jewelry" looks to be the next sizzling fashion trend of the
technological wave. The combination of shrinking computer devices and increasing computer
power has allowed several companies to begin producing fashion jewelry with embedded
intelligence. Today’s manufacturers place millions of transistors on a microchip, which can be
used to make small devices that store tons of digital data. The whole concept behind this is to
be able to communicate to others by means of wireless appliances. The other key factor of this
concept market is to stay fashionable at the same time.
As computing and technology become more ubiquitous in their conception, there is
evidence that designers are looking for methods of bridging technology with the human form
(corporate examples include IBM, Philips and Nike). The technology of the large corporate
companies is about mass-produced changes in our personal experience of the world. Mass-
production is by its nature detrimental to intimacy and the sense of individual experience.
Jewelry is about an intimate relationship between an individual and an object, and often forms
a link in the relationship between one person and another. This paper illuminates the
contribution that contemporary jewelry design can make to the design and conception of digital
communication devices, illustrating a creative methodology for creating new objects
embodying technology. The method acts to bridge the areas of HCI, contemporary jewelry and
other design disciplines. This research is not about inventing new mobile phones or PDAs,
which are worn in a novel way on the body, but is about the design and application of wearable
digital technology using the methods and perspective of a Contemporary Jeweler. The results
include a new model and perspective for viewing objects, in particular wearable objects
involving computer technologies. This paper has significance both directly within design and
craft as well as wider implications outside of this field.
By the end of the decade, we could be wearing our computers instead of sitting in front of them.
1.1 scope
This seminar is about the design and application of digital jewelry which will be
implemented very soon in the real world. Through developing the pieces and critiquing existing
forms of information and communication devices I became aware that the issues raised by the
potential integration of digital technologies and jewelry were considerable. There has been a
8. 2
radical shift in our relationships with, and experiences of, digital technologies during the last
sixty years. Developments of body-focused digital objects have fundamentally altered our
relationship with digital technologies, both physically and emotionally.
1.2 Purpose
The advent of digital jewelry has revolutionized the jewelry business by making it more
than just a fashion accessory, and in the near future we could all be wearing it as a vital means
of communication. Mobile phones may have reduced in size over the years, due to shrinking
computer devices and a major increase in computer power, but digital jewelry will enable you
to go one step further by adorning your body with a selection of compatible mobile components
that will work together as well as any mobile phone, and look stylish at the same time.
1.3 What Is Digital Jewelry?
Digital jewelry is the fashion jewelry with embedded intelligence. “Digital jewelry”
can help you solve problems like forgotten passwords and security badges. “Digital jewelry”
is a nascent catchphrase for wearable ID devices that contain personal information like
passwords, identification, and account information. They have the potential to be all-in-one
replacements for your driver’s license, key chain, business cards, credit cards, health insurance
card, corporate security badge, and loose cash. They can also solve a common dilemma of
today’s wired world – the forgotten password.
1.4 Digital Jewelry and Its Components
Soon, cell phones will take a totally new form, appearing to have no form at all. Instead
of one single device, cell phones will be broken up into their basic components and packaged
as various pieces of digital jewelry. Each piece of jewelry will contain a fraction of the
components found in a conventional mobile phone. Together, the digital-jewelry cell phone
should work just like a conventional cell phone.
The various components that are inside a cell phone: -
Microphone, Receiver, Touch pad, Display, Circuit board, Antenna, and Battery.
IBM has developed a prototype of a cell phone that consists of several pieces of digital
jewelry that will work together wirelessly, possibly with Blue tooth wireless technology, to
perform the functions of the above components {1}.
9. 3
Figure 1.1: cell phones may one day comprised of digital accessories that work
Together through wireless connections
Here are the pieces of computerized-jewelry phone and their functions:
Earrings - Speakers embedded into these earrings will be the phone's receiver.
Figure 1.2: Speakers Embedded Into Earnings
These days many manufacturers are developing things like Bluetooth devices in the
form of pendants or earrings that people can wear that help enhance their mobile phones,
computers PDAs, basically anything that uses similar Technology.
10. 4
Necklace - Users will talk into the necklace's embedded microphone
Figure 1.3: Microphone Embedded Necklace
Necklace transfer the information in the forms of signals. It works with the help of
sensors which is embedded in it. It is mainly by blue tooth technology.
Ring - Perhaps the most interesting piece of the phone, this "magic decoder ring” is
equipped with light-emitting diodes (LEDs) that flash to indicate an incoming call. It can
also be programmed to flash different colors to identify a particular caller or indicate the
importance of a call.
Two of the most identifiable components of a personal computer are the mouse and
monitor. These devices are as familiar to us today as a television set. However, in the next
decade, we could witness the disappearance of these devices, at least in their current form.
Several companies, including IBM and Charmed Technology, are working on ways to
create a head-mounted display. IBM is also working to shrink the computer mouse to the size
of a ring and create a wrist-worn display.
Figure 1.4: IBM's magic decoder rings will flash when you get a call.
11. 5
The same ring that flashes for phone calls could also inform you that e-mail is piling
up in your inbox. This flashing alert could also indicate the urgency of the e-mail.
The mouse-ring that IBM is developing will use the company's Track Point technology
to wirelessly move the cursor on a computer-monitor display. (Track Point is the little button
embedded in the keyboard of some laptops). IBM Researchers have transferred TrackPoint
technology to a ring, which looks something like a black-pearl ring. On top of the ring is a little
black ball that users will swivel to move the cursor, in the same way that the TrackPoint button
on a laptop is used.
This Track Point ring will be very valuable when monitors shrink to the size of watch
face. In the coming age of ubiquitous computing, displays will no longer be tied to desktops or
wall screens. Instead, you'll wear the display like a pair of sunglasses or a bracelet. Researchers
are overcoming several obstacles facing these new wearable displays, the most important of
which is the readability of information displayed on these tiny devices.
Bracelet - Equipped with a video graphics array (VGA) display, this wrist display could
also be used as a caller identifier that flashes the name and phone number of the caller.
Figure 1.5: (a) Bluetooth Bracelet built in rechargeable battery, when a call is coming
the bracelet will vibrate and lamp flash (b) Prototype bracelet display developed by
IBM
With a jewelry phone, the keypad and dialing function could be integrated into the
bracelet, or else dumped altogether -- it's likely that voice-recognition software will be used to
make calls, a capability that is already commonplace in many of today's cell phones. Simply
12. 6
say the name of the person you want to call and the phone will dial that person. IBM is also
working on a miniature rechargeable battery to power these components.
1.5 Charmed Communicator’s Eyepiece
Charmed Technology is already marketing its digital jewelry, including a futuristic-
looking eyepiece display.
Figure 1.6: The eyepiece above displays images and data received wirelessly from the
communicator’s belt module
13. 7
2. LITERATURE SURVEY
Wireless communications is, by any measure, the fastest growing segment of the
communications industry. As such, it has captured the attention of the media and the
imagination of the public. Cellular systems have experienced exponential growth over the last
decade and there are currently around two billion users worldwide. Indeed, cellular phones
have become a critical business tool and part of everyday life in most developed countries, and
are rapidly supplanting antiquated wire line systems in many developing countries. In addition,
wireless local area networks currently supplement or replace wired networks in many homes,
businesses, and campuses. Many new applications, including wireless sensor networks,
automated highways and factories, smart homes and appliances, and remote telemedicine, are
emerging from research ideas to concrete systems.
2.1 History of Wireless Communications
The first wireless networks were developed in the Pre-industrial age. These systems
transmitted information over line-of-sight distances (later extended by telescopes) using smoke
signals, torch signaling, flashing mirrors, signal flares, or semaphore flags. An elaborate set of
signal combinations was developed to convey complex messages with these rudimentary
signals. Observation stations were built on hilltops and along roads to relay these messages
over large distances. These early communication networks were replaced first by the telegraph
network (invented by Samuel Morse in 1838) and later by the telephone. In 1895, a few decades
after the telephone was invented, Marconi demonstrated the first radio transmission from the
Isle of Wight to a tugboat 18 miles away, and radio communications was born. The first
network based on packet radio, ALOHANET, was developed at the University of Hawaii in
1971. This network enabled computer sites at seven campuses spread out over four islands to
communicate with a central computer on Oahu via radio transmission. The network
architecture used a star topology with the central computer at its hub. The U.S. military was
extremely interested in the combination of packet data and broadcast radio inherent to
ALOHANET. Throughout the 1970’s and early 1980’s the Defense Advanced Research
Projects Agency (DARPA) invested significant resources to develop networks using packet
radios for tactical communications in the battlefield. Packet radio networks also found
commercial application in supporting wide-area wireless data services. These services, first
introduced in the early 1990’s, enable wireless data access (including email, file transfer, and
14. 8
web browsing) at fairly low speeds, on the order of 20 Kbps. A strong market for these wide-
area wireless data services never really materialized, due mainly to their low data rates, high
cost, and lack of ―killer applications. These services mostly disappeared in the 1990s,
supplanted by the wireless data capabilities of cellular telephones and wireless local area
networks (LANs). The introduction of wired Ethernet technology in the 1970’s steered many
commercial companies away from radio-based networking.
2.2 Wireless Vision
The vision of wireless communications supporting information exchange between
people or devices is the communications frontier of the next few decades, and much of it
already exists in some form. This vision will allow multimedia communication from anywhere
in the world using a small handheld device or laptop. Wireless networks will connect palmtop,
laptop, and desktop computers anywhere within an office building or campus, as well as from
the corner cafe. In the home these networks will enable a new class of intelligent electronic
devices that can interact with each other and with the Internet in addition to providing
connectivity between computers, phones, and security/monitoring systems. Such smart homes
can also help the elderly and disabled with assisted living, patient monitoring, and emergency
response. Wireless entertainment will permeate the home and any place that people congregate.
Video teleconferencing will take place between buildings that are blocks or continents apart,
and these conferences can include travelers as well, from the salesperson who missed his plane
connection to the CEO off sailing in the Caribbean. Wireless video will enable remote
classrooms, remote training facilities, and remote hospitals anywhere in the world. Wireless
sensors have an enormous range of both commercial and military applications.
2.3 Low-Cost Low-Power Radios: Bluetooth and Zigbee
As radios decrease their cost and power consumption, it becomes feasible to embed
them in more types of electronic devices, which can be used to create smart homes, sensor
networks, and other compelling applications. Two radios have emerged to support this trend:
Bluetooth and Zigbee. Bluetooth radios provide short range connections between wireless
devices along with rudimentary networking capabilities. The Bluetooth standard is based on a
tiny microchip incorporating a radio transceiver that is built into digital devices. The
transceiver takes the place of a connecting cable for devices such as cell phones, laptop and
palmtop computers, portable printers and projectors, and network access points. Bluetooth is
mainly for short range communications, e.g. from a laptop to a nearby printer or from a cell
15. 9
phone to a wireless headset. Its normal range of operation is 10 m (at 1 mw transmit power),
and this range can be increased to 100 m by increasing the transmit power to 100 mw. The
system operates in the unlicensed 2.4 GHz frequency band. The Bluetooth standard is named
after Harald I Bluetooth, the king of Denmark between 940 and 985 AD who united Denmark
and Norway.
2.4 Jewelry as Communication
When designing devices that enable communication between individuals using
technology, the significance of how the device relates to the user as an individual, rather than
a member of a collective, is of great importance. This paper draws on practice centered research
into the integration of digital technologies within contemporary jewelry and focuses on
opposing notions of jewelry and the gadget within the conception and design of wearable
digital communication devices.
The desire to make the human form the locus for digital devices is increasingly evident
in the proposals and developments of digital device designers. This motivation is often
technology led as a result of the increasing ubiquitous and miniaturized nature of computing
and technology. However, the body, as a site for interactive devices, has much wider
possibilities. This paper explores the contribution and perspective of Contemporary Jewelry in
the design and conception of wearable digital devices, reflecting the awareness of jewelers to
the person/object relationship and notions of personal significance.
Randall White, professor of anthropology at New York University suggests that any
discovery of collective human coexistence can be described as a society if there is evidence of
jewelry in that collective. He states that "What people wear, and what they do to and with their
bodies in general, forms an important part of the flow of information - establishing, modifying,
and commenting on major social categories. This perspective provides a view of jewelry, which
establishes it as a defining signifier of society and the power relationships within it {1}.
There is evidence throughout history that objects have been worn or attached to the
body to symbolize status, difference and a way of asserting individualism. These first
connections between purpose and self-adornment form the precursors of what we now know
as jewelry. Traditionally jewelry has followed in these footsteps. It has been used to symbolize
wealth, social status and cultural positioning. However the power an object has, particularly
one worn on the body, to exemplify and express many broader concepts has advanced the
medium of jewelry from this traditional role [1].
IBM’s design approach can be characterized as a 'problem solving' one, and has led to
16. 10
solutions of equivalent quality to high street, commercial accessories, with a predictability of
form and function. Turning to jewelry because "if you have something with you all the time,
you might as well be able to wear It." shows a narrow interpretation of what jewelry is and a
naivety in this case of the problems which are in need of solving. In allowing function to lead
the concept the perceived issues or problems are potentially shallow and the resulting designs
will only echo this. The more important, significant problems of why such devices should be
made, or how such devices can enhance communication between people are not evident in
these pieces.
Research and Development at Philips has produced concepts for the integration of
technology in our communities, homes and clothing. Philips is an example of a company with
a number of approaches to the design of digital devices. They take a user centered approach
stating "The traditional design disciplines are integrated with expertise from the human
sciences and technology through a multi-disciplinary, research-based approach that makes it
possible to create new solutions that satisfy and anticipate people's needs and aspirations.
Philips suggest that "As new technological developments advance they become well
and smaller as we use refined, miniaturized technology. But there are limits to miniaturization.
It can help make products smaller and easier to use, but the ultimate dream is not to have easier
tools: it is not to have to bother with tools at all! The step forward then is the integration of
functions into objects that we do not feel clutters us, which are part of our life. Philips approach
shows an openness to form and mode of interaction, their proposed devices often suggest
playful ways of interacting with the systems, but in terms of wearable devices their suggestions
echo qualities of 'products' rather than 'jewelry.
Product Design Company IDEO has produced proposals for wearable digital
appliances, which intimate notions of jewelry. The ideas consist of: Cell phone rings, where
the ear piece and mouth piece telephony are embedded in finger jewelry, 'Toe Jewelry', which
facilitates navigation around a city, through the use of satellites and a PDA power plant on a
belt, a Sports watch which supplies data of your performance, to upload to your PDA for
analysis and a low powered ear mounted phone. The forms still resemble products, rather than
jewelry, but they show a more imaginative interpretation of how to wear digital devices than
many product design companies.
As these examples illustrate, the majority of digital devices to date using the body as
their canvas and locus are from a functionalist led standpoint. Craft theorists such as
Greenhalgh (2002) discuss the relevance of technology for makers of craft objects and there is
a recognizable shift in the embrace of such notions. However there are very few contemporary
17. 11
jewelers going beyond the expression of ideas and aesthetics attributed to digital technology in
their work.
IDEO’s Techno jewelry proposals for digital jewelry include Cell phone, Rings, where
the ear piece and mouth piece are embedded in finger jewelry, and GPS Toes, toe rings which
act as directional indicators and are wirelessly connected to a GPS receiver kept in a bag or
worn on a belt. Elements of these designs show a more sensitive understanding of what it means
to integrate an object into your appearance by wearing it. Their focus on the hands and feet are
described by IDEO as: “non-intrusive locations for useful innovations, these concepts prove
that new devices needn’t look alien to your person and that we can make technology adapt to
our lifestyles rather than the other way around.”
Figure 2.1: IDEO’s Techno jewelry
2.5 People and Their Awareness of Digital Jewelry
A survey was conducted for this purpose through social network (Facebook, Twitter)
Participants included: 138 people, age group 19-30, Male and Female. Our results concluded
the following-There are 106 people(77%) do not about digital jewelry, while there are 32
people (23%) they may have heard or read about it. About 73% accept the idea of digital
jewelry. The most popular field used for Digital Jewelry is Intelligence. This is comparing with
medical and social fields.
18. 12
3. TECHNICAL SPECIFICATIONS OF DIGITAL JEWELRY
Digital jewelry devices consist of a screen or display for information, most likely
consisting of 7-16-segment, or dot matrix LEDs, LCDs, or other technologies such as
electroluminescent material (EL) or others, which could become an optional display.
So too, an audiovisual or other 'display' could consist of a speaker, a single flashing
light, a sensor of some kind (such as a temperature driven EL display), or other informational
aesthetic. The display layer sits on a face of the device, which is enclosed in some material
such as plastic, metal, crystal, or other material.
It has external switches and buttons on its side and a data-port for accessing the
programmable electronic circuit inside. A micro controller that is a surface mounted device
(SMD) on a printed circuit board (PCB) with resistors (R) and capacitors (C) are the internal
‘guts' of the jewelry.
3.1 Display Technologies
The digital jewelry display, for instance, every alphabet and number system has found
representation within the electronics realm and 'dot-matrix' (a matrix of single LEDs) is used
to display Chinese and Japanese and other character sets, as can the alternative display for
LCDs (liquid-crystal-displays) also be used, as often found in watches.
Figure 3.1: Alphanumeric or graphic display types
Digital Jewelry can be made in many different sizes and shapes with a variety of
materials ranging from plastic and metal to rubber and glass. They utilize electromagnetic
properties and electronics to display information through a screen or display of some kind. This
could range from LED 7-segment, 16-segment, dot matrix, and other programmable LEDs
19. 13
devices to LCDs, OLEDs, and other displays, which are all driven by the self-contained jewelry
devices themselves[1].
A dot matrix is a 2-dimensional patterned array, used to represent characters, symbols
and images. Every type of modern technology uses dot matrices for display of information,
including cell phones, televisions, and printers. They are also used in textiles with sewing,
knitting, and weaving.
In printers, the dots are usually the darkened areas of the paper. In displays, the dots
may light up, as in an LED, CRT, or plasma display, or darken, as in an LCD. Although the
output of modern computers is generally all in the form of dot matrices (technically-speaking),
computers may internally store data as either a dot matrix or as a vector pattern of lines and
curves. Vector data encoding requires less memory and less data storage, in situations where
the shapes may need to be resized, as with font typefaces. For maximum image quality using
only dot matrix fonts, it would be necessary to store a separate dot matrix pattern for the many
different potential point sizes that might be used. Instead, a single group of vector shapes is
used to render all the specific dot matrix patterns needed for the current display or printing
task.
Sixteen-segment displays were originally designed to display alphanumeric characters
(Latin letters and Arabic digits). Later they were used to display Thai numerals and Persian
characters. Before the advent of inexpensive dot-matrix displays, sixteen and fourteen-segment
displays were some of the few options available for producing alphanumeric characters
on calculators and other embedded systems. However, they are still sometimes used
on VCRs, car stereos, microwave ovens, telephone Caller ID displays, and slot
machine readouts.
Sixteen-segment displays may be based on one of several technologies, the three most
common optoelectronics types being LED, LCD and VFD. The LED variant is typically
manufactured in single or dual character packages, to be combined as needed into text line
displays of a suitable length for the application in question.
3.2 Electromagnetic Beads
The closest comparison to this model is that of 'beads' which are strung together to make
a custom necklace or bracelet, with interchangeable electromagnetic component systems or
devices. One bead may be a capacitor on the inside, and a solar panel on the outside.
20. 14
Another bead may have an internal resistor which feed power into a programmed
microcontroller bead which drives an external screen, with other options available in a variety
of bead configurations which compose a circuit, including beads with a Piezo element, voltage
regulator, crystal, or rechargeable battery as part of the modular jewel circuit [2].
The number of data pins on the microcontroller needs to be enough to easily program
the display layer plus the switches without overly complex and advanced coding methods. The
key to the device's ability to work effectively is a balancing of electronic components within
the circuit with a light-duty processing and limited power consumption required for the display
(d) layer.
Figure 3.2: Electromagnetic Beads
3.3 Prototypes of Digital Jewelry
Figure 3.3: Hiox Necklace
21. 15
The figure 3.3 shows a complete HIOX necklace showing al 26 letters of roman alphabets
extended in 4-dimentional space lifetime. Metal with leather cord.
Figure 3.4: Programmable HIOX Ring with 16-Segment LED Display
A Sixteen-Segment Display (SISD), sometimes called a "Union Jack" display or a
"British Flag" display is a type of display based on 16 segments that can be turned on or off
according to the graphic pattern to be produced. It is an extension of the more common seven-
segment display, adding four diagonal and two vertical segments and splitting the
three horizontal segments in half. Other variants include the fourteen-segment display which
splits only the middle horizontal segment.
22. 16
4. THE JAVA RING
It seems that everything we access today is under lock and key. Even the devices we
use are protected by passwords. It can be frustrating trying to keep with all of the passwords
and keys needed to access any door or computer program.
Dallas Semiconductor is developing a new Java-based, computerized ring that will
automatically unlock doors and log on to computers.
Figure 4.1
(a)The Java Ring can be programmed to give you access to every door and device.
(b)DS9104 Digital Decoder
For over 10years, Dallas semiconductor also has been designing, making and selling a
line of highly secure microprocessors are used in satellite TV descramblers, automatic teller
machines, point of sale terminals, and other similar applications requiring cryptographic
security and high resistance to attack by hackers. Postal Service's (USPS) Information Based
Indicia Program Postal Security Device Specification, intended to permit printing of valid U.S.
postage on any PC, provided the first opportunity to combine two areas of expertise when a
secure microprocessor was designed into an I Button the resulting product, named the Crypto
I Button, combines high processor performance and high-speed cryptographic primitives, and
exceptional protection against physical and cryptographic attacks of outsiders. An agreement
between Dallas Semiconductor and RSA Data Security Inc. Provides a paid-up license for
anyone using the Crypto I Button to perform RSA encryption and digital signatures so that no
more further licensing of the RSA encryption technology is required so far. High security is
afforded by the ability to erase the contents of NVRAM extremely quickly. This feature, rapid
zeroization, is a requirement for high security devices that may be subjected to attacks by
hackers. As a result of its high security, the Crypto I Button is expected to win the FIPS 140-1
security certification by the National Institute of Standards and Technology (N IST).A special
23. 17
operating system was designed and stored in the ROM of the Crypto I Button to support
cryptography and general-purpose financial transactions -- such as those required by the Postal
Service program. While not a Java virtual machine, the Ecommerce firmware designed for this
application had several points of similarity with Java, including an object-oriented design and
a byte code interpreter to interpret and execute Dallas Semiconductor's custom-designed with
the E-Commerce Script language
The DS9104 Digital Decoder Ring is a portable database disguised as jewelry with the
DS1996 Memory I Button as signet. Data is transferred serially using the 1-Wire® protocol
through a simple interface. Data is first written to a scratchpad, verified, and then transferred
to NV memory. The 64-bit serial number guarantees that each ring is unique and traceable. The
ring communicates by touch through a parallel or serial port interface. Applications include
access control to buildings, doors, and computers and digitized storage of personal information
Note: Rings cannot be resized as the I Button will not withstand the high temperatures
required.
The Java Ring, first introduced at Java One Conference, has been tested at Celebration
School, an innovative K-12 school just outside Orlando, FL. The rings given to students are
programmed with Java applets that communicate with host applications on networked systems.
Applets are small applications that are designed to be run within another application
At Celebration School, the rings have been programmed to store electronic cash to pay
for lunches, automatically unlock doors, take attendance, store a student's medical information
and allow students to check out books. All of this information is stored on the ring's I Button.
Students simply press the signet of their Java Ring against the Blue Dot receptor, and the
system connected to the receptor performs the function that the applet instructs it to. In the
future, the Java Ring may start your car.
4.1 Components of Java Ring
The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, which
houses a 1-million-transistor processor, called an I Button. The ring has 134 KB of RAM, 32
KB of ROM, a real-time clock and a Java virtual machine, which is a piece of software that
recognizes the Java language and translates it for the user's computer system[4].
Digital jewelry, (designed to supplement the personal computer,) will be the evolution
in digital technology that makes computer elements entirely compatible with the human form.
24. 18
Highlights of Java Ring
Runs Java better (plus portions enhance Java Card 2.0)
Careful attention to physical security (rapid zeroization)
Durability to stand up to everyday use
High memory capacity (up to 134K bytes NV SRAM)
Retail connectivity to 250 million existing computers (less if designed-in before
manufacturing)
Figure 4.2: Blue Dot Receptor
The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow
communication between a host system and the Java Ring. I Button requires connection to a
reader known as a Blue Dot Receptor in order to be supplied with power and to receive input
and send output. The read/write operation will be done by this blue dot receptor provided by
RS232 serial port adaptor.
Receptor cable connects to the USB port of PC or any embedded system. The
information is transferred between the I Button and pc with momentary touching java ring.
4.2 Working of Java Ring
Since java ring is programmed with the applets and the programming is done according
to our application and this will specific for the specific user. All information of the user is
stored in the java ring. Figure 4.3 shows how java ring is used to open the door. User simply
has to press the signet of the java ring against the blue dot receptor and the system connected
to the receptor performs the function that the applets instruct it to.java ring has the user profile
and the same profile is present in the door embedded
25. 19
Figure 4.3: Opening door using Java Ring
system also, when the user press the signet of the java ring against the java ring reader which
is embedded at the handle of the door the data is transferred from the ring to door system. if
the profile is authentic means user is authentic to open the door the applets president in the ring
instruct the door to open.
Information is transferred between I Button and a PC with a momentary contact, at up
to 142K bits per second. To do that one presses I Button to the Blue Dot receptor, a 15 pipeline
into PC. The Blue Dot sticks to any convenient spot on the front of a PC and is cabled to the
serial or parallel port in the back.
Figure 4.4: Working process of Java Ring (Source: Java Card Technology)
26. 20
According to the Dallas Superconductor’s information, over 41 million I buttons are
currently in circulation. List of the major users include the U.S. Post Office, entire truck fleet
fitted with I Buttons that track vehicle maintenance; Citizens of Istanbul, Turkey, who store
digital cash in the I Button, using the device as a small change purse on their mass transit
system. It was also said that the U.S. Postal service has approved.
Java ring is programmed with the applets according to our application. For specific
class of user specific java applets is preloaded in to the java ring. All the information of the
user is stored in the java ring. User simply presses the signet of the java ring against the “blue
dot” receptor and the system connected to the receptor performs the function that the applet
instructs to.
Java rings are authorized through Personal Identification Numbers (PINs) so that no
one can steal a person’s ring and use that ring. The java ring provides very high degree of
security for the confidential data that is stored in the NVRAM memory.
4.3 Operating System in Java Ring
A special operating system was designed and stored in the ROM of the Crypto I Button
to support cryptography and general-purpose financial transactions – such as those required by
the Postal Service program. While not a Java virtual machine, the E-Commerce firmware
designed for this application had several points of similarity with Java, including an object-
oriented design and a byte code interpreter to interpret and execute Dallas Semiconductor’s
custom-designed E-Commerce Script Language [3].
A Compiler was also written to compile the high-level language representation of the
Script Language to a byte code form that could be interpreted by the E-Commerce
VM.Although the E-Commerce firmware was intended primarily for the USPS application, the
firmware supports a variety of general electronic commerce models that are suitable for many
different applications. The E-Commerce firmware also supports cryptographic Protocols for
secure information exchange such as the Simple Key-Management for Internet Protocol (SKIP)
developed by Sun Microsystems Inc.
4.4 Applications of Java Ring
Access control to buildings and equipment
Secure network login using challenge/response authentication
Storage vault for user names and passwords
User profile for rapid Internet form-filling
27. 21
Digital signatures for e-commerce
United States Postal Service Postal Security Device for PC Postage downloadable over
the Internet.
Digital photo ID and fingerprint biometrics
Thermochron applications
4.5 Advantages
Java ring is wearable.
Completely controlled by the user. Provides authentication to users which is crucial for
many applications. Easier for administrator to maintain the security infrastructure.
Rapid Zeroization -zeroisation (also spelled zeroization) is the practice of erasing
sensitive parameters (electronically stored data, cryptographic keys, and CSPs) from a
cryptographic module to prevent their disclosure if the equipment is captured. This is
generally accomplished by altering or deleting the contents to prevent recovery of the
data.
More secure than using passwords.
Portable.
Provides real memory, more power, and a capacity for dynamic programming.
28. 22
5. APPLICATION, ADVANTAGES AND LIMITATIONS
5.1 Application
I. In Social Networking
The use of digital jewelry in the areas of social communication help to easy
communication between users as well as help to interact and respond faster as it helps
to share the latest information around the world then the digital jewelry helps rapid
response and high efficiently.
You can communicate with your friends, family, as your need as effective way.
II. In Personal Field
The java ring help the employee in the companies to reminder the time of the meeting
by saving the date on this ring (Rings can notify for not only phones, it may include
email and messages or any other kind of notification) , or to communicate with other
stuff easily by using the other component of the jewelry eg: Earrings, Necklace…etc
III. In Intelligence Field
Digital jewelry can be used to adjust the Security Council, where it is considered a
modern method and easy to use in the transfer of information in a more secure and
confidential due to their small size and used it on a personal level.
IV. In Medical Fields
That the use of jewelry digital in the medical field a big impact at facilitating their career
where it’s become a means of: communication very easy between the patient and the
doctor or the medical staff as a whole, used in follow-up patients and outside the
hospital easily, the patient can communicate with his doctor with ease, whether in the
hospital or at home as well as at the medical level they.
5.2 Ongoing achievements:
Charm badge
Intelligent Spectacles
Smart Wrist Watch
Magic Decoder ring
Charmed Communicator Eyepiece
Mouse Ring
29. 23
5.3 Advantages
It provides SECURITY.
For example, JAVA RING is used to lock or unlock doors or computers. As we
use passwords and keys to lock our doors and computers. We don’t need to
remember all those passwords and carry all those keys. So java ring is designed
to provide security.
It is easy to carry everywhere.
As COMPUTING DEVICES are embedded, it is not necessary to carry CELLS
or COMPUTERS it is not necessary to carry CELLS or COMPUTERS.
5.4 Limitations
Charging capabilities and cost are the sample of problems.
Display is very small
Rays may be harmful
No water proof should be taken
Very expensive to afford
30. 24
6. CONCLUSION
The basic idea behind the digital jewelry concept is to have the convenience of wireless,
wearable computers while remaining fashionably sound. The combination of shrinking
computer devices and increasing computer power has allowed several companies to begin
producing fashion jewelry with embedded intelligence. Today, manufacturers can place
millions of transistors on a microchip, which can be used to make small devices that store tons
of digital data. Researchers have already created an array of digital-jewelry prototypes. "We've
made one of almost everything except tongue rings," says Dan Russell, senior manager
of IBM's Alma den Research Lab, where IBM is developing digital-jewelry technology.
Figure 6.1: Digital Watch
Russell says that digital jewelry is the beginning of the disintegration of the personal
computer into tiny pieces. It is hoped to be marketable soon, however, several bugs remain.
Charging capabilities and cost are just a sample of the problems that lurk.
The role posited, through this research, of a contemporary jeweler is not how to add an
aesthetic to a technology, or how you wear something, but that a jeweler can force much bigger
questions and issues, which involves questioning motivations, relevance’s, and forms of digital
appliances and interaction. As a result of this next phase the aim is to use the findings to develop
a reflective review of the researcher's own practice.
The research will generate empirical data for mainly qualitative analysis. In this way
the activities will inform one another and allow refinement and development of the research
methodology and in turn the researcher's own practice. It is anticipated that the research will
31. 25
test the appropriateness of Contemporary Jewelry as a creative strategy in the further
development of such technologies.
Furthermore it will define new design methodologies, which will bridge the roles of
Designer and Jeweler. If successful this research will enhance the relevance of Contemporary
Jewelry and establish its value as a source of knowledge in a post-industrial age. The researcher
will produce a thesis and a series of jewelry objects, which will be presented in the form of one
or more exhibitions, which will address the issue of transparency and communication of
content. As stated by Professor Randall White Jewelry is a defining signifier, it was in the
Middle-Upper Paleolithic age and this research can demonstrate that it still is today.
The purpose of having digital jewelry is to use the different technologies provided in
computers or other devices in a smaller easy to carry device. We have went so far down that
road with all the existing digital jewelry. However, the future is wide open for any new ideas
in that field to make our lives much easier .New combinations of this sort may change our
everyday tasks to make it simpler, thus saving our time money and energy.