SlideShare a Scribd company logo
Computer Clothing
(Wearable Computers)
PRESENTED BY:
Chirag K Jethawa (12BCAB34)
Discussion Topics:
Introduction to Computer Clothing
History of Computer Clothing
Definition of Computer Clothing
Goal of Computer Clothing
Latest Computer Clothing Examples
Uses
How It Works
Computer Clothing diagram
Advantages
Dis-Advantages
Future of Computer Clothing
Conclusion
Reference Sites
Introduction to “Computer Clothing”
Computer Clothing is known as a “Wearable Computers”.
Computer Clothing are usually either attached into the
user's clothing or can be attached to the body. E.x. Mobile
phone, Google Glass.
It is device that always with the user User can also able to
enter command and execute set of command any time.
Continue…
History of Computer Clothing
Computer Clothing were first introduced in the 1500's with the
pocket watch.
In 1967, Hubert Upton developed a technology which allowed
the person wearing the glasses to lip read, this was using the LED
device.
Even in the 1980's and the 1990's wearable computers were
being created.
Continue…
Definition of Computer Clothing:-
A small portable computer that is designed to be worn on
the body or attached into cloth during use.
User can easily intract with this device.
Ex- Wrist Mobile, Google Glass, Bio Matric Smart Shirt.
Goal OF Computer Clothing
User can easily intract with computer device and perform
everyday tasks.
To develop new interfaces that modify non-computer activities.
goal of becoming a seamless extension of body and mind.
Equipped with various sensors which measure heart rate,
respiration, footstep rate etc.
Computer Clothing Example –
Google Glass, Wrist Mobile
Google Glass & Wrist
Mobile “wearable
computer” based.
Computer Clothing, today :-
Bio Matric Smart Wear Shirt which give information about
Heart Rate, Calorie Counter, Step Counter, Breathing Monitor, Fitness
Tracker
10
Uses
Uses of Computer Clothing in Different Fields
◦ Lab Technician
◦ Field Workers
◦ Military
◦ Researchers
◦ Fire Fighters
◦ Medical
◦ Police Department
◦ You?
Uses in Military Field
Use in the MEDICAL FIELD
HOW IT WORKS
How do you operate a wearable computer ? What software do
you use in it ? What do you use it as input and output devices
? Where do you store data ?
Software:- The commonly used operating system on a
wearable computer is WOS (Wearable Computer Operating
System). Red-hat, Android, Microsoft Windows and Linux can
be use as an operating system.
Hardware:- Prices of wearable computers tend to be in
“thousands of dollars” whether you buy old or new. An
alternative approach is to assemble a low cost system. For
example, you can buy an old computer that has NTSC output
and connect to small CRT from camera. Some such complete
wearable computer systems have been built for as little cost.
Continue…
 Storage:- To store data in memory there are two types of
memory primary memory and secondary memory
◦ Primary memory :- this memory is in build memory in
device normally contain 512 MB to 32 GB.
◦ Secondary memory :- this memory is extended memory.
Ex. Memory card, hard disk, disc etc. this memory extend
up to 512 MB to 100 TB.
Continue…
Some Wearable computer use input device like
gesture, speech recognition, keyers, trackballs
etc.
Continue…
output may be displays, lights, sound or touch screen
Computer Clothing Diagram
Overall System Block Diagram :
Advantages
 The advantages of Computer Clothing are:-
- Improve Communication
- Able to use wearable computers to complete daily tasks such
as a computer which tracks the movements and habits of a person.
- Flexibility
- Freedom
- Work from anywhere
Dis-Advantages
Dis-Advantages of Computer Clothing:-
- Equipment can be heavy
- Expensive
- Some Wearable Computers can consist of a lot of wiring
- Can cause irritation in heat, Side-Effects such as Headaches
- It may become easier to get data on an individual if the item is
lost/stolen
Future of Computer Clothing
Computer Clothing would commanding influence over in the near
future.
After few years computers are getting smaller and more powerful
they can be integrated into virtually anything.
Now you can use your mobile phone as a mobile computer, take
photos, surf internet, Calculating and many other things.
We believe that all electronic devices will be able to communicate
with each other. .
Conclusion:
The use of Computer Clothing (Wearable Computers)
on the construction site will enable interaction with smart
infrastructure systems in the future. But to reach this goal, It
need more Improvement in this System. Example- Google
Glass, Mobile. As year passes, the wearable computer size is
becoming smaller and Also more advance.
Once day this topics I read in newspaper. This is latest
technology and useful for us. Then after I search various
Computer Science websites.
Reference Sites
http://electronics.howstuffworks.com/gadgets/high-tech-
gadgets/computer-clothing.htm
http://www.omsignal.com/
http://www.computerworld.com/article/2490537/emerging-
technology/stretchable-electronics-could-lead-to-robotic-skin--
computerized-clothes.html
http://www.seminarsonly.com/forum/computer-clothing-abstract-
t3138.html
en.wikipedia.org/wiki/Google_Glass
http://pediain.com/seminar/Computer-Clothing-Seminar-Report.php

More Related Content

What's hot

Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
Habib Siddiqui
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
Neha Raju k
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JoyBhowmik4
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
Shreeraj Nair
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
hanna91
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan
 
Smart Fabrics-ppt
Smart Fabrics-pptSmart Fabrics-ppt
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
Viral Mehta
 
Cyber security
Cyber securityCyber security
Cyber security
Komal Samdariya
 

What's hot (20)

Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Smart Fabrics-ppt
Smart Fabrics-pptSmart Fabrics-ppt
Smart Fabrics-ppt
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewt
Ranol R C
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technology
Ranol R C
 
Project glass ppt
Project glass  pptProject glass  ppt
Project glass ppt
Bopanna P M
 
EMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGYEMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGY
Vinay Kumar
 
wearable technology
 wearable technology wearable technology
wearable technology
Sakshi Bhargava
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
shilpi nagpal
 

Viewers also liked (7)

Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewt
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technology
 
Project glass ppt
Project glass  pptProject glass  ppt
Project glass ppt
 
EMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGYEMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGY
 
wearable technology
 wearable technology wearable technology
wearable technology
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Similar to Chirag jethwa

Wearable computers seminar
Wearable computers seminarWearable computers seminar
Wearable computers seminar
Sibasish Naik
 
Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation
OLADIMEJI ADEKUNLE
 
Computar ppt by shehazad
Computar ppt by shehazadComputar ppt by shehazad
Computar ppt by shehazad
ShehazadHavaldar
 
introduction to computer created by shehazad havaldar
introduction to  computer     created by  shehazad havaldar       introduction to  computer     created by  shehazad havaldar
introduction to computer created by shehazad havaldar
ShehazadHavaldar
 
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALAll about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
georgekurianpottackal
 
Introduction to computer_hardware
Introduction to computer_hardwareIntroduction to computer_hardware
Introduction to computer_hardware
naadiya_khuda_bux
 
New technology
New technologyNew technology
New technology
Arpit Jain
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
Vikram Nandini
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
Saumya Shah
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10
Shradha Maheshwari
 
Uses of computer
Uses of computerUses of computer
Uses of computer
Naymul Islam Hemel
 
WEARABLE COMPUTERS BY SAIKIRAN PANJALA
WEARABLE COMPUTERS BY SAIKIRAN PANJALAWEARABLE COMPUTERS BY SAIKIRAN PANJALA
WEARABLE COMPUTERS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
AndreaTugwell
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
AndreaTugwell
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
Jaydeep Palekar
 
CHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.filCHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.fil
HaftomYitbarek
 
Wearable computers
Wearable computersWearable computers
Wearable computers
manjusha pawar
 
ppt computer by suhel
ppt computer by suhelppt computer by suhel
ppt computer by suhel
SuhelSayyad2
 
mule vocational training institute suhel sayyad
  mule vocational training institute suhel sayyad  mule vocational training institute suhel sayyad
mule vocational training institute suhel sayyad
SuhelSayyad2
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
PaulRomanoBenavidesR
 

Similar to Chirag jethwa (20)

Wearable computers seminar
Wearable computers seminarWearable computers seminar
Wearable computers seminar
 
Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation
 
Computar ppt by shehazad
Computar ppt by shehazadComputar ppt by shehazad
Computar ppt by shehazad
 
introduction to computer created by shehazad havaldar
introduction to  computer     created by  shehazad havaldar       introduction to  computer     created by  shehazad havaldar
introduction to computer created by shehazad havaldar
 
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALAll about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
 
Introduction to computer_hardware
Introduction to computer_hardwareIntroduction to computer_hardware
Introduction to computer_hardware
 
New technology
New technologyNew technology
New technology
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10
 
Uses of computer
Uses of computerUses of computer
Uses of computer
 
WEARABLE COMPUTERS BY SAIKIRAN PANJALA
WEARABLE COMPUTERS BY SAIKIRAN PANJALAWEARABLE COMPUTERS BY SAIKIRAN PANJALA
WEARABLE COMPUTERS BY SAIKIRAN PANJALA
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
CHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.filCHAPTER-ONE to computer science.pptx.fil
CHAPTER-ONE to computer science.pptx.fil
 
Wearable computers
Wearable computersWearable computers
Wearable computers
 
ppt computer by suhel
ppt computer by suhelppt computer by suhel
ppt computer by suhel
 
mule vocational training institute suhel sayyad
  mule vocational training institute suhel sayyad  mule vocational training institute suhel sayyad
mule vocational training institute suhel sayyad
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Chirag jethwa

  • 1. Computer Clothing (Wearable Computers) PRESENTED BY: Chirag K Jethawa (12BCAB34)
  • 2. Discussion Topics: Introduction to Computer Clothing History of Computer Clothing Definition of Computer Clothing Goal of Computer Clothing Latest Computer Clothing Examples Uses How It Works Computer Clothing diagram Advantages Dis-Advantages Future of Computer Clothing Conclusion Reference Sites
  • 3. Introduction to “Computer Clothing” Computer Clothing is known as a “Wearable Computers”. Computer Clothing are usually either attached into the user's clothing or can be attached to the body. E.x. Mobile phone, Google Glass. It is device that always with the user User can also able to enter command and execute set of command any time.
  • 5. History of Computer Clothing Computer Clothing were first introduced in the 1500's with the pocket watch. In 1967, Hubert Upton developed a technology which allowed the person wearing the glasses to lip read, this was using the LED device. Even in the 1980's and the 1990's wearable computers were being created.
  • 7. Definition of Computer Clothing:- A small portable computer that is designed to be worn on the body or attached into cloth during use. User can easily intract with this device. Ex- Wrist Mobile, Google Glass, Bio Matric Smart Shirt.
  • 8. Goal OF Computer Clothing User can easily intract with computer device and perform everyday tasks. To develop new interfaces that modify non-computer activities. goal of becoming a seamless extension of body and mind. Equipped with various sensors which measure heart rate, respiration, footstep rate etc.
  • 9. Computer Clothing Example – Google Glass, Wrist Mobile Google Glass & Wrist Mobile “wearable computer” based.
  • 10. Computer Clothing, today :- Bio Matric Smart Wear Shirt which give information about Heart Rate, Calorie Counter, Step Counter, Breathing Monitor, Fitness Tracker 10
  • 11. Uses Uses of Computer Clothing in Different Fields ◦ Lab Technician ◦ Field Workers ◦ Military ◦ Researchers ◦ Fire Fighters ◦ Medical ◦ Police Department ◦ You?
  • 13. Use in the MEDICAL FIELD
  • 14. HOW IT WORKS How do you operate a wearable computer ? What software do you use in it ? What do you use it as input and output devices ? Where do you store data ? Software:- The commonly used operating system on a wearable computer is WOS (Wearable Computer Operating System). Red-hat, Android, Microsoft Windows and Linux can be use as an operating system. Hardware:- Prices of wearable computers tend to be in “thousands of dollars” whether you buy old or new. An alternative approach is to assemble a low cost system. For example, you can buy an old computer that has NTSC output and connect to small CRT from camera. Some such complete wearable computer systems have been built for as little cost.
  • 15. Continue…  Storage:- To store data in memory there are two types of memory primary memory and secondary memory ◦ Primary memory :- this memory is in build memory in device normally contain 512 MB to 32 GB. ◦ Secondary memory :- this memory is extended memory. Ex. Memory card, hard disk, disc etc. this memory extend up to 512 MB to 100 TB.
  • 16. Continue… Some Wearable computer use input device like gesture, speech recognition, keyers, trackballs etc.
  • 17. Continue… output may be displays, lights, sound or touch screen
  • 18. Computer Clothing Diagram Overall System Block Diagram :
  • 19. Advantages  The advantages of Computer Clothing are:- - Improve Communication - Able to use wearable computers to complete daily tasks such as a computer which tracks the movements and habits of a person. - Flexibility - Freedom - Work from anywhere
  • 20. Dis-Advantages Dis-Advantages of Computer Clothing:- - Equipment can be heavy - Expensive - Some Wearable Computers can consist of a lot of wiring - Can cause irritation in heat, Side-Effects such as Headaches - It may become easier to get data on an individual if the item is lost/stolen
  • 21. Future of Computer Clothing Computer Clothing would commanding influence over in the near future. After few years computers are getting smaller and more powerful they can be integrated into virtually anything. Now you can use your mobile phone as a mobile computer, take photos, surf internet, Calculating and many other things. We believe that all electronic devices will be able to communicate with each other. .
  • 22. Conclusion: The use of Computer Clothing (Wearable Computers) on the construction site will enable interaction with smart infrastructure systems in the future. But to reach this goal, It need more Improvement in this System. Example- Google Glass, Mobile. As year passes, the wearable computer size is becoming smaller and Also more advance. Once day this topics I read in newspaper. This is latest technology and useful for us. Then after I search various Computer Science websites.