0% found this document useful (0 votes)
30 views19 pages

Misba

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views19 pages

Misba

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

GOVERNMENT ENGINEERING COLLEGE,

RAICHUR-584135
TECHNICAL SEMINAR
ON
DIGITAL JEWELLERY
by
MISBA NAUSHEEN
Under the Guidance of
Dr. Shashikala Patil
Principal
GEC, Raichur
ABSTRACT
The combination of microcomputer devices and
increasing computer power has allowed several
companies to begin producing fashion jewellery with
embedded intelligence i.e., Digital jewellery. Digital
jewellery can best be defined as wireless, wearable
computers that allow you to communicate by ways of
e-mail, voicemail, and voice communication. This
paper enlightens on how various computerized
jewellery (like ear-rings, necklace, ring, bracelet,
etc.,) will work with mobile embedded intelligence.
It seems that everything we access today is under
lock and key.
TABLE OF CONTENTS
1. INTRODUCTION
2. WHAT IS DIGITAL JEWELLERY
3. COMPONENTS OF DIGITAL JEWELLERY
4. JAVA RING
5. ADVANTAGES
6. DISADVANTAGES
7. CONCLUSION
8. REFERENCES
INTRODUCTION

The latest computer craze has been to be able to


wear wireless computers. The Computer Fashion
Wave, "Digital Jewelry" looks to be the next
sizzling fashion trend of the technological wave.
The combination of shrinking computer devices and
increasing computer power has allowed several
companies to begin producing fashion jewelry with
embedded intelligence. The advent of digital jewelry
has revolutionized the jewelry business by making it
more than just a fashion accessory, and in the near
future we could all be wearing it as a vital means of
communication.
WHAT IS DIGITAL JEWELLERY?
Digital jewelry is the fashion jewellery with
embedded intelligence. “Digital jewellery” can help
you solve problems like forgotten passwords and
security badges. “Digital jewellery” can be used as
wearable ID devices that contain personal
information like passwords, identification, and
account information. They have the potential to be
all-in-one replacements for your driver’s license, key
chain, business cards, credit cards, health insurance
card, corporate security badge, and loose cash. They
can also solve a common dilemma of today’s wired
world – the forgotten password.
COMPONENTS OF DIGITAL
JEWELLERY
Instead of one single device, cell phones will be
broken up into their basic components and packaged
as various pieces of digital jewellery. Each piece of
jewellery will contain a fraction of the components
found in a conventional mobile phone. Together, the
digital-jewellery cell phone should work just like a
conventional cell phone.
The various components that are inside a cell phone:
• Microphone
• Receiver
• Touch pad
• Display
• Circuit board
• Antenna
• Battery
Here are the pieces of computerized-jewellery and
their functions:

Earrings:
Speakers embedded into these earrings will be the
phone's receiver

Necklace: Speakers Embedded Into Earnings


Users will talk into the necklace's embedded
microphone.
Necklace transfer the information in the forms of
signals. It works with the help of sensors which is
embedded in it. It is mainly by blue tooth technology.

Microphone Embedded Necklace


Ring:
• Perhaps the most interesting piece of the phone,
this "magic decoder ring” is equipped with light-
emitting diodes (LEDs) that flash to indicate an
incoming call.
• It can also be programmed to flash different
colors to identify a particular caller or indicate
the importance of a call.
• The same ring that flashes for phone calls could
also inform you that e-mail is piling up in your
magic decoder rings will flash when you get a
inbox. This flashing alert could also indicate the call.
urgency of the e-mail.
Bracelet :
• Equipped with a video graphics array (VGA)
display, this wrist display could also be used as a
caller identifier that flashes the name and phone
number of the caller.
• The keypad and dialing function could be
integrated into the bracelet.
Charmed Communicator’s Eyepiece:

• The eyepiece is the display component of the


company's Charmed Communicator, a wearable,
wireless, broadband-Internet device that can be
controlled by voice, pen or handheld keypad.
• The Communicator can be used as an MP3
player, video player and cell phone.
• The Communicator runs on the company's
Linux-based operating system.
JAVA RING

• It seems that everything we access today is under


lock and key.
• Even the devices we use are protected by
passwords. It can be frustrating trying to keep with
all of the passwords and keys needed to access any
door or computer program.
• Dallas Semiconductor is developing a new Java-
based, computerized ring that will automatically
unlock doors and log on to computers.
COMPONENTS OF JAVA RING
The Java Ring is a stainless-steel ring, 16-millimeters (0.6
inches) in diameter, which houses a 1-million-transistor
processor, called an iButton. The ring has 134 KB of RAM, 32
KB of ROM, a real-time clock and a Java virtual machine,
which is a piece of software that recognizes the Java language
and translates it for the user's computer system.

Highlights of Java Ring


• Runs Java better (plus portions enhance Java Card 2.0)
• Careful attention to physical security (rapid zeroization)
Durability to stand up to everyday use
• High memory capacity (up to 134K bytes NV SRAM)
• Retail connectivity to 250 million existing computers (less if
designed-in before manufacturing)
WORKING OF JAVA RING
Since java ring is programmed with the applets and the
programming is done according to our application and
this will specific for the specific user. All information of
the user is stored in the java ring. Figure shows how java
ring is used to open the door. User simply has to press the
signet of the java ring against and the system connected to
the receptor performs the function that the applets instruct
it to.Java ring has the user profile and the same profile is
present in the door embedded. system also, when the user
press the signet of the java ring against the java ring
reader which is embedded at the handle of the door the
data is transferred from the ring to door system. if the
profile is authentic means user is authentic to open the
door the applets president in the ring instruct the door to
open.
Applications of Java Ring
• Access control to buildings and equipment
• Secure network login using challenge/response
authentication Storage vault for user names and
passwords
• User profile for rapid Internet form-filling
• Digital signatures for e-commerce
• United States Postal Service Postal Security
Device for PC Postage downloadable over the
Internet.
• Digital photo ID and fingerprint biometrics
Advantages
• Java ring is wearable.
• Completely controlled by the user.
• Provides authentication to users which is
crucial for many applications.
• Easier for administrator to maintain the
security infrastructure. More secure than
using passwords.
• Portable.
• Provides real memory, more power, and a
capacity for dynamic programming.
ADVANTAGES OF DIGITAL
JEWELLERY
• It provides SECURITY.
For example, JAVA RING is used to lock or unlock
doors or computers. As we use passwords and keys to
lock our doors and computers. We don’t need to
remember all those passwords and carry all those
keys. So java ring is designed to provide security.
• It is easy to carry everywhere.
As COMPUTING DEVICES are embedded, it is not
necessary to carry CELLS or COMPUTERS.
DISADVANTAGES
• Charging capabilities and cost are the sample of
problems.
• Display is very small
• Rays may be harmful
CONCLUSION
The basic idea behind the digital jewelry concept is to have the
convenience of wireless, wearable computers while remaining
fashionably sound. The combination of shrinking computer
devices and increasing computer power has allowed several
companies to begin producing fashion jewelry with embedded
intelligence. Today, manufacturers can place millions of
transistors on a microchip, which can be used to make small
devices that store tons of digital data. Researchers have already
created an array of digital-jewelry prototypes. "We've made one
of almost everything except tongue rings," says Dan Russell,
senior manager of IBM's Almaden Research Lab, where IBM is
developing digital-jewelry technology. The purpose of having
digital jewelry is to use the different technologies provided in
computers or other devices in a smaller easy to carry device.
REFERENCES
[1] Ansoff I. Strategies for diversification. Harvard Business Review,
1957:35(5):113-124
[2] Sarasvathy SD. Effectuation: Elements of Entrepreneurial fixpertise.
1848445725 Edward Elgar Publishing: 2009 ISBN-10:
[3] Galenson D. Old Masters and Young Geniuses: The Two Life Cycles
of Artistic Creativity. Princeton University Press: 2007. ISBN-10:
0691133808
[4] Sims P. Little Bets: How Breakthrough Ideas Emerge from Small
Discoveries. Free Press: 2011. ISBN: 9781439170427
[5] Chesbrough H. Open Business Models: How to Thrive in the New
Innovation HBS 2006. ISBN-10:
[6] Palvelumuotoilu: Uusia käyttäjätiedon menetelmiä hankintaan ja
hyö-dyntämiseen. Teknologiainfo Teknova; ISBN: 9789522380777
2011. [7] Hyysalo S. Käyttäjätieto ja käyttäjätutkimuksen menetelmät,
Edita: 2006. 1SBN: 95137 46402
[8] Storbacka K. Nenonen S. Learning Facilitating the market
Industrial Marketing Management. 2015:440anuary):73-82 with market:
innovation. Tikka V. Gavert N. Arvonluonnin nalto. uusi tuman
arvokkaimmat Nritykset. Naim vuosisadan Tekes ISBN. rakennetaan
katsaus 309 9789524575805 2014.

You might also like