SlideShare a Scribd company logo
1 of 19
PRESENTATIONPRESENTATION
ON
DIGITAL JEWELLERY
Introduction
What is DIGITAL JEWELLERY ?
DIGITAL JEWELLERY and its
components
Technical specifications
Display Technologies
Prototype of DIGITAL JEWELLERY
The Java Ring
Advantages & Disadvantages
Conclusion
Introduction
In Computer Fashion Wave, "Digital Jewellery"
looks to be the next sizzling fashion trend of the
technological wave.
 The combination of shrinking computer devices
and increasing computer power has allowed several
companies to begin producing fashion jewellery
with embedded intelligence.
By the end of the decade, we could be wearing our
computers instead of sitting in front of them.
What is DIGITAL JEWELLERY ?
 Digital jewellery is the fashion jewelry with
embedded intelligence.
 “Digital jewellery” can help you solve problems like
forgotten passwords and security badges.
 Digital jewellery, will be the evolution in digital
technology that makes computer elements entirely
compatible with the human form.
 They have the potential to be all-in-one replacements
for your driver’s license, key chain, business cards,
credit cards, health insurance card, corporate security
badge, and loose cash.
DIGITAL JEWELLERY and its components
 Soon, “cell phones” will take a totally new form,
appearing to have no form at all.
 The various components that are inside a cell phone:
Microphone, Receiver, Touch pad, Display, Circuit
board, Antenna, and Battery.
 IBM has developed a prototype of a cell phone that
consists of several pieces of digital jewellery that will
work together wirelessly, possibly with Bluetooth
wireless technology………….
EAR RINGS
• Speakers: embedded into
these earrings will be the
phone's receiver.
• These days many
manufacturers are developing
things like Bluetooth devices
in the form of pendants or
earrings that people can wear
that help enhance heir mobile
phones, computers PDAs,
basically anything that uses
similar Technology
Necklace
• Users will talk into the
necklace's embedded
microphone
• They transfer the
information in the forms of
signals
• It consist of sensors by
these it will work
• It is mainly by blue tooth
technology
Ring
• Perhaps the most
interesting piece of the
phone, this "magic
decoder ring” is
equipped with LEDs
that flash to indicate
an incoming call. It
can also be
programmed to flash
different colors to
identify a particular
caller or indicate the
importance of a call
Cell phones may one day be
comprised of digital accessories
that Work together through
wireless connections
IBM’S MAGIC DECODER RING
 The same ring that flashes for phone calls could also
inform you that e-mail is piling up in your inbox.
 This flashing alert could also indicate the urgency of
the e-mail
 The mouse-ring that IBM is developing will use the
company's Track Point technology to wirelessly move
the cursor on a computer-monitor display.
 Track Point is the little button embedded in the
keyboard of some laptops
 IBM Researchers have transferred Track Point
technology to a ring, which looks something like a
black-pearl
Bracelet
Equipped with a video graphics
array (VGA) display, this wrist
display could also be used as a
caller identifier that flashes the
name and phone number of the
caller
Bluetooth Bracelet built in
rechargeable battery, when
a call is coming the
bracelet will vibrate and
lamp flash.
Technical
specificaTionsDigital jewellery
devices consist of a
screen or display for
information, most
likely consisting of 7-
16-segment, or dot
matrix LEDs, LCDs.
 An audio visual or
other 'display' could
consist of a speaker, a
single flashing light,
a sensor of some kind
 The digital jewelry display,
for instance, every alphabet
and number system has found
representation within the
electronics realm and 'dot-
matrix'
 It is used to display Chinese
and Japanese and other
character sets, as can the
alternative display for LCDs
(liquid-crystal-displays) also
be used, as often found in
watches.
Display Technologies.
Digital Jewellery can be made in many
different sizes and shapes with a variety of
materials ranging from plastic and metal to
rubber and glass.
 This could range from LED 7-segment, 16-
segment, dot matrix, and other programmable
LEDs devices to LCDs, OLEDs, and other
displays
The Java Ring
• It seems that everything we
access today is under lock and
key. Even the devices we use are
protected by passwords. It can be
frustrating trying to keep with all
of the passwords and keys needed
to access any door or computer
program.
• Dallas semiconductor is
developing a new Java-based,
computerized ring that will
automatically unlock doors and
log on to computers
BLUE DOT RECEPTOR
• The Java Ring is snapped into a
reader, called a Blue Dot
receptor, to allow
communication between a host
system and the Java Ring. The
Java Ring is a stainless-steel
ring, 16-millimeters (0.6 inches)
in diameter, which houses a 1-
million-transistor processor,
called an iButto
1 It provides SECURITY.
For example.,
JAVA RING is used to lock or unlock doors or
computers...as we use passwords and keys to lock our
doors and computers. we don’t need to remember all
those passwords and carry all those keys. So java ring
is designed to provide security
2. As COMPUTING DEVICES are embedded it is not
necessary to carry CELLS r COMPUTERS...hence it is
easy to carry everywhere
ADVANTAGES
conclusion
 The basic idea behind the digital jewelry concept is to
have the convenience of wireless, wearable computers
while remaining fashionably sound.
 It is hoped to be marketable soon, however, several bugs
remain. Charging capabilities and cost are just a sample of
the problems that lurk
DIGITAL JEWELLERY

More Related Content

What's hot (20)

Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Digital jewellery by SH
Digital jewellery by SHDigital jewellery by SH
Digital jewellery by SH
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
Digital Jewellery ppt
Digital Jewellery  pptDigital Jewellery  ppt
Digital Jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Smart dust
Smart dustSmart dust
Smart dust
 
DIGITAL JEWELERY
DIGITAL JEWELERYDIGITAL JEWELERY
DIGITAL JEWELERY
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless Touchscreen
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 

Viewers also liked

Digital jewellery
Digital jewelleryDigital jewellery
Digital jewelleryManu Priya
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewelleryNIT TRICHY
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hintsYoga Kkg
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamAnshika Nigam
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelryEshu Bujji
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery harish kumar
 

Viewers also liked (13)

Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
 
Brain chips
Brain chipsBrain chips
Brain chips
 
Rain technology
Rain technologyRain technology
Rain technology
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Insight
InsightInsight
Insight
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery
 

Similar to DIGITAL JEWELLERY

Similar to DIGITAL JEWELLERY (18)

Vankam ppt.ppt
Vankam ppt.pptVankam ppt.ppt
Vankam ppt.ppt
 
Digital Jewellery ppt.pptx is about the elctronic devices
Digital Jewellery  ppt.pptx is about the elctronic devicesDigital Jewellery  ppt.pptx is about the elctronic devices
Digital Jewellery ppt.pptx is about the elctronic devices
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
Digital Jewellery ppt 0.pptx
Digital Jewellery  ppt 0.pptxDigital Jewellery  ppt 0.pptx
Digital Jewellery ppt 0.pptx
 
Alternate metal-jewelry Inox Jewelry
Alternate metal-jewelry Inox JewelryAlternate metal-jewelry Inox Jewelry
Alternate metal-jewelry Inox Jewelry
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERY
 
Digital Jewellery.pptx
Digital Jewellery.pptxDigital Jewellery.pptx
Digital Jewellery.pptx
 
vishala.pptx
vishala.pptxvishala.pptx
vishala.pptx
 
digitaljewelry.vaishu.pdf
digitaljewelry.vaishu.pdfdigitaljewelry.vaishu.pdf
digitaljewelry.vaishu.pdf
 
Dj ppt
Dj pptDj ppt
Dj ppt
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
AKSHITHA Digital jewellery ppt.pptx
AKSHITHA Digital jewellery ppt.pptxAKSHITHA Digital jewellery ppt.pptx
AKSHITHA Digital jewellery ppt.pptx
 
Bhavana
BhavanaBhavana
Bhavana
 
Digital jewellery-report
Digital jewellery-reportDigital jewellery-report
Digital jewellery-report
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

DIGITAL JEWELLERY

  • 2. Introduction What is DIGITAL JEWELLERY ? DIGITAL JEWELLERY and its components Technical specifications Display Technologies Prototype of DIGITAL JEWELLERY The Java Ring Advantages & Disadvantages Conclusion
  • 3. Introduction In Computer Fashion Wave, "Digital Jewellery" looks to be the next sizzling fashion trend of the technological wave.  The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence. By the end of the decade, we could be wearing our computers instead of sitting in front of them.
  • 4. What is DIGITAL JEWELLERY ?  Digital jewellery is the fashion jewelry with embedded intelligence.  “Digital jewellery” can help you solve problems like forgotten passwords and security badges.  Digital jewellery, will be the evolution in digital technology that makes computer elements entirely compatible with the human form.  They have the potential to be all-in-one replacements for your driver’s license, key chain, business cards, credit cards, health insurance card, corporate security badge, and loose cash.
  • 5. DIGITAL JEWELLERY and its components  Soon, “cell phones” will take a totally new form, appearing to have no form at all.  The various components that are inside a cell phone: Microphone, Receiver, Touch pad, Display, Circuit board, Antenna, and Battery.  IBM has developed a prototype of a cell phone that consists of several pieces of digital jewellery that will work together wirelessly, possibly with Bluetooth wireless technology………….
  • 6. EAR RINGS • Speakers: embedded into these earrings will be the phone's receiver. • These days many manufacturers are developing things like Bluetooth devices in the form of pendants or earrings that people can wear that help enhance heir mobile phones, computers PDAs, basically anything that uses similar Technology
  • 7. Necklace • Users will talk into the necklace's embedded microphone • They transfer the information in the forms of signals • It consist of sensors by these it will work • It is mainly by blue tooth technology
  • 8. Ring • Perhaps the most interesting piece of the phone, this "magic decoder ring” is equipped with LEDs that flash to indicate an incoming call. It can also be programmed to flash different colors to identify a particular caller or indicate the importance of a call
  • 9. Cell phones may one day be comprised of digital accessories that Work together through wireless connections
  • 10. IBM’S MAGIC DECODER RING  The same ring that flashes for phone calls could also inform you that e-mail is piling up in your inbox.  This flashing alert could also indicate the urgency of the e-mail  The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display.  Track Point is the little button embedded in the keyboard of some laptops  IBM Researchers have transferred Track Point technology to a ring, which looks something like a black-pearl
  • 11. Bracelet Equipped with a video graphics array (VGA) display, this wrist display could also be used as a caller identifier that flashes the name and phone number of the caller Bluetooth Bracelet built in rechargeable battery, when a call is coming the bracelet will vibrate and lamp flash.
  • 12. Technical specificaTionsDigital jewellery devices consist of a screen or display for information, most likely consisting of 7- 16-segment, or dot matrix LEDs, LCDs.  An audio visual or other 'display' could consist of a speaker, a single flashing light, a sensor of some kind
  • 13.  The digital jewelry display, for instance, every alphabet and number system has found representation within the electronics realm and 'dot- matrix'  It is used to display Chinese and Japanese and other character sets, as can the alternative display for LCDs (liquid-crystal-displays) also be used, as often found in watches. Display Technologies.
  • 14. Digital Jewellery can be made in many different sizes and shapes with a variety of materials ranging from plastic and metal to rubber and glass.  This could range from LED 7-segment, 16- segment, dot matrix, and other programmable LEDs devices to LCDs, OLEDs, and other displays
  • 15. The Java Ring • It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. • Dallas semiconductor is developing a new Java-based, computerized ring that will automatically unlock doors and log on to computers
  • 16. BLUE DOT RECEPTOR • The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring. The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, which houses a 1- million-transistor processor, called an iButto
  • 17. 1 It provides SECURITY. For example., JAVA RING is used to lock or unlock doors or computers...as we use passwords and keys to lock our doors and computers. we don’t need to remember all those passwords and carry all those keys. So java ring is designed to provide security 2. As COMPUTING DEVICES are embedded it is not necessary to carry CELLS r COMPUTERS...hence it is easy to carry everywhere ADVANTAGES
  • 18. conclusion  The basic idea behind the digital jewelry concept is to have the convenience of wireless, wearable computers while remaining fashionably sound.  It is hoped to be marketable soon, however, several bugs remain. Charging capabilities and cost are just a sample of the problems that lurk