Seminarsonly.com

>>

 

Are you interested in this topic.Then mail to us immediately to get the full report.

email :- contactv2@gmail.com

 

Custom Search
 

 

 

 

 

 

 

 

 
5 Pen PC Technology

  

Definition

P-ISM ("Pen-style Personal Networking Gadget Package"), which is nothing but the new discovery, which is under developing, stage by NEC Corporation. P-ISM is a gadget package including five functions: a pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function. P-ISMs are connected with one another through short-range wireless technology. The whole set is also connected to the Internet through the cellular phone function. This personal gadget in a minimalist pen style enables the ultimate ubiquitous computing.

In fact, no-one expects much activity on 802.11n installations until the middle of 2008. "Rolling out 802.11n would mean a big upgrade for customers who already have full Wi-Fi coverage, and would be a complex add-on to existing wired networks, for those who haven't. Bluetooth is widely used because we can able to transfer data or make connections without wires. This is very effective because we can able to connect whenever we need without having wires. They are used at the frequency band of 2.4 GHz ISM (although they use different access mechanisms). Blue tooth mechanism is used for exchanging signal status information between two devices. This techniques have been developed that do not require communication between the two devices (such as Blue tooth's Adaptive Frequency Hopping), the most efficient and comprehensive solution for the most serious problems can be accomplished by silicon vendors. They can implement information exchange capabilities within the designs of the Blue tooth. The circuit diagram for the 802.11B/G is given below. It is nothing but also type of Blue tooth. Using this connectivity we can also connect it with the internet and can access it anywhere in the world.

LED Projector:

The role of monitor is taken by LED Projector which projects on the screen. The size of the projector is of A4 size. It has the approximate resolution capacity of 1024 X 768. Thus it is gives more clarity and good picture.

http://2.bp.blogspot.com/_aLo580BGJNs/SAAM1UXalRI/AAAAAAAAAC4/1ujzWSY1CXo/s400/monitor.jpg

Virtual Keyboard:

The Virtual Laser Keyboard (VKB) is the ULTIMATE new gadget for PC users. The VKB emits laser on to the desk where it looks like the keyboard having QWERTY arrangement of keys i.e., it uses a laser beam to generate a full-size perfectly operating laser keyboard that smoothly connects to of PC and Most of the handheld devices (PDA's, tablet PC's). The I-Tech laser keyboard acts exactly like any other "ordinary" keyboard:

Features of virtual keyboards are:

1.VKB settings can be changed by Sound:
2.Controllable Virtual Keyboard sound effects (key clicks)
3.Connection: Connection to the appropriate Laptop/PC port
4.Intensity: Intensity of the projected Virtual Keyboard
5.Timeouts: coordinated timeouts to conserve the Virtual Keyboard's battery life
6.Sensitivity: adjustable sensitivity of the Virtual Keyboard
7.Auto-repeat: Allows the VKB to automatically repeat a key based on prescribed parameters.


http://4.bp.blogspot.com/_aLo580BGJNs/SAANI0XalSI/AAAAAAAAADA/7B6YM_fFtaM/s400/keybd.jpg

To Download Full Seminar Report of 5 Pen PC Technology Click Here

To Download PPT of 5 Pen PC Technology Click Here  

You may also like this : Sniffer for detecting lost mobiles, Mobile Phone Cloning, Nano Cars Into The Robotics , Mind-Reading Computer, Intelligent Speed Adaptation , Global Wireless E-Voting , E-Cash Payment System , Cyborgs, Brain Fingerprinting , Biometrics in SECURE e-transaction , X- Internet , Surface Computer, Green Cloud , Digital Jewelry , Brain Gate , Palm Vein Technology , 5 Pen PC Technology , iDEN , Hi-Fi, Packet Sniffers, Brain Chips , Phishing , Pill Camera, Blue Brain , Biometric Voting System , 3D Television , 3D password, Gi-Fi , Graphical Password Authentication, 4G Broadband , Finger Tracking , Eye Movement-Based Human Computer Interaction Techniques , Ethical Hacking, Secure ATM by Image Processing , Dynamic Languages ,In-Vehicle Networking , Plastic Memory , Protein Memory , Setting up a LAN using Linux , UMTS , Money Pad, The Future Wallet , Low Power UART Design , SPECT , Buffer overflow attack , Hurd , Intel Centrino Mobile Technology , MPEG Video Compression , Survivable Networks Systems , Self Organizing Maps , Mobile IP,IT Seminar Reports, PPT and PDF.

<<back


copyright © 2006 V2 Computers E-mail :- contactv2@gmail.com