Anda di halaman 1dari 27

TECHNICAL SEMINAR

ON

DEPARTMENT OF ECE

TECHNICAL SEMINAR CO-ORDINATOR BY


MR.C.VEERANJANEYULU GURRAM VENKATESH
(ASSISTANT PROFESSOR) (14H51A0417)

CMR COLLEGE OF ENGINEERING & TECHNOLOGY


(Autonomous)
(NAAC Accredited with ‘A’ Grade & NBA Accredited)
(Approved by AICTE, Permanently Affiliated to JNTU Hyderabad)
KANDLAKOYA, MEDCHAL ROAD, HYDERABAD-501401
TECHNICAL SEMINAR
ON

DEPARTMENT OF ECE

TECHNICAL SEMINAR CO-ORDINATOR BY


MR.C.VEERANJANEYULU GURRAM VENKATESH
(ASSISTANT PROFESSOR) (14H51A0417)

CMR COLLEGE OF ENGINEERING & TECHNOLOGY


(Autonomous)
(NAAC Accredited with ‘A’ Grade & NBA Accredited)
(Approved by AICTE, Permanently Affiliated to JNTU Hyderabad)
KANDLAKOYA, MEDCHAL ROAD, HYDERABAD-501401
CONTENTS
History
Introduction

Objective

5 functions

Block Diagram

Merits

Demerits

Security

Applications

Conclusion

References
Introduction
P-ISM (“Pen Style Personal
Networking Gadget Package ”)

Connected with A wireless


technology

Whole set is Connected To


Internet Through Cellular
Phone Function

Its
based on Electronic
Perception Technology
Electronic Perception technology

.
Objective
A Product that could be
touched and felt

Create a Product with


minimal Size.

Further , the intend is to


allow for ‘an Office
anywhere’.
P-ISM Package Including Five Gadget

 The design concept uses five pens to make a computer.

Included Gadgets are:-


Virtual
Keyboard
1. CPU pen Projector pen

Communication
2. Communication pen pen

3. Projector pen

4. Virtual Keyboard
Camera pen
5. Camera pen
Block Diagram of P-ISM
Function of P-ISM Package
Concept
Function Reliability
component
CPU Pen Computing Engine Open
Communicatio Cell Phone, Pointer and ear piece.
n Pen Comm. using Bluetooth, 802.11 B/G Near Term

LED Projector, A4 Size Slightly Farther


Display Out Than the
Appx. 1024 X 768
Phone and Camera
Slightly Farther
Keyboard Projected keyboard with 3D Sensor Out Than the
Phone and Camera
Camera Digital camera Near Term
Battery Battery Charger and mass Storage Open
CPU Pen
Dual core processor is used

Functionality of the CPU is


done by one of the pen .

It is also known as computing


Engine

Works with windows operating


system
Communication Pen
Wireless Bluetooth technology

Exchange information with


wireless connection.

Connected to internet through


cellular phone function.

Uses Wi-Fi technology.


Connectivity and Bluetooth

Bluetooth is widely used because we can


able to transfer data or make connections
without wires.

They are used at the frequency band of


2.4GHz

Bluetooth mechanism is used for


exchanging signal status information
between two devices.
Projector Pen
Monitor is LED Projector.

Size is A4 or adjustable.

Resolutioncapacity is
1024*768 approx.

Itgives more clarity and good


picture.
Virtual Keyword

 Virtual laser keyboard is a new


gadget.

 It emits laser on the desk .

 Uses laser beam to generate


full size perfect keyboard.

 Adjustable Sensitivity
Camera Pen
Uses the ‘Electronic image sensor’ technology.

Useful in video recording, video conferencing.


 Also called as web cam


.
It is a 360 degrees visual communication
device.

Record moving videos, sound as well as still


photograph.
Battery
Portable

Small in size and work for


longer time

Battery life of 6+ (i.e. 6


days)
Working Diagram of P-ISM

The P-ISM (Pen-style Personal Networking Gadget


Package) consists of a package of 5 pens that all
have unique functions, combining together to create
virtual computing experience by producing both
monitor and keyboard on any flat surfaces from
where you can carry out functions that you would
normally do on your desktop computer.
Why it is works with windows only?

It consists of dual core processor


embedded in it and that is why it
works only with WINDOWS
operation system.
Merits

 Portable

 Feasible

 Ubiquitous computing

 Wireless communication
Demerits
 Currently Unclear

 Cost is very high

 Keyboard concept is not new

 Positioning is main
Security

 Virtual keyboards are


used to reduce the
risk of keystroke
logging.

 The use of on screen


keyboard can
increase the risk of
password disclosure.
Applications
Many researches has been made but there is
no clear result so far.
Only One that uses it is E-fingerprinting the
gadget will be more secure, which allows only
owner to activate the PC. So even if we loose
it, no one else can access the gadget
Future Scope
The 5 Pen Pc Technology project started in the year
2003.However, the information about its release is not
yet made public. Whether it will be available for the
public use is still a question, because of its excessive
price of 30,000$. The prototype developed by the
company proves that the creation of such complex
technology is feasible, but because of lack of
information about its recent developments, it is unclear
what the company’s intentions are about this
technology.
Conclusion
We have visualised the connection between
the latest technology and the human, in the
form of pen. We can say that communicating
devices are getting smaller day by day. This
was just an example and we expect more
enhancement in this technology in coming
years.
References
 [1] http://www.computinghistory.org.uk/history.html
 [2] http://en.wikipidia.org/wiki/pen_computing
 [3] http://www.softwaretoolbar.com/virtual_keboard.html
 [4] http://www.compinfo_center.com/ledprojector.html
 [5] http://users.erols.com/rwseries/biblio.html
 [6]
http://rwservices.no._ip.info:81/pens/biblio70html#gray1888
b
 [7]
www.scribed.com/doc/67990223/report_on_5_pen_pct_ech
nology
 [8] http://www.rockinglearners.blogspot.in/p/virtual_ke
ANY
QUERIES

Anda mungkin juga menyukai