Professional Documents
Culture Documents
Mobile computing is beginning to break the chains that tie us to our desks, but
many of today's mobile devices can still be a bit awkward to carry around. In the next age
of computing, there will be an explosion of computer parts across our bodies, rather than
across our desktops.
Basically, jewellery adorns the body, and has very little practical purpose.
However, researchers are looking to change the way we think about the beads and
bobbles we wear. The combination of microcomputer devices and increasing computer
power has allowed several companies to begin producing fashion jewellery with
embedded intelligence i.e., Digital jewellery. Digital jewellery can best be defined as
wireless, wearable computers that allow you to communicate by ways of e-mail,
voicemail, and voice communication. This paper enlightens on how various computerized
jewellery (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded
intelligence.
It seems that everything we access today is under lock and key. Even the devices
we use are protected by passwords. It can be frustrating trying to keep with all of the
passwords and keys needed to access any door or computer program. This paper
discusses about a new Java-based, computerized ring that will automatically unlock doors
and log on to computers.
CONTENTS
1.
INTRODUCTION
2.
2.1
2.2.
2.3.
2.4.
5
5
6
8
8
3.
ELECTROMAGNETIC BEADS
10
4.
4.1
4.2
4.3
11
11
11
12
5.
5.1
5.2
5.3
JAVA RING
Introduction
Features
Working
13
13
13
14
6.
6.1
6.2
6.3
6.4
6.5
6.6
16
16
16
17
17
18
18
7.
CONCLUSION
20
8.
REFERENCES
21
1. INTRODUCTION
Recent technological advancements have resulted in a climate where technology is
too intrusive the increased miniaturisation and mobility of digital technologies has led to
a number of proposals for digital objects which use jewellery as a way to locate
communication and information devices on the body. However, these developments are
emerging from outside the field of contemporary jewellery. Consequently digital
jewellery is significantly under-explored within contemporary jewellery practice and the
emerging developments from other fields present a narrow interpretation of both
jewellery and digital technologies. In terms of aesthetics there is a distinct naivety
regarding the form, material, connection with the body and scope of interaction of a
digital jewellery object. Moreover there is a paucity of approaches that consider
emotional and intimate attachments people form with and around objects. These
limitations are evident in both physical and conceptual constraints. Beyond this, the
qualities that we have come to associate with the digital are born from a predominantly
consumer electronics field and are both narrow and hindering if we wish to consider
digital technologies having wider, more emotional scope in our lives. Therefore an
exploration of digital jewellery that addresses these issues and seeks to escape the
limiting assumptions we have of the digital is needed.
The latest computer craze has been to be able to wear wireless computers. The
Computer Fashion Wave, "Digital Jewellery" looks to be the next sizzling fashion trend
of the technological wave. The combination of shrinking computer devices and
increasing computer power has allowed several companies to begin producing fashion
jewellery with embedded intelligence. Todays, manufacturers place millions of
transistors on a microchip, which can be used to make small devices that store tons of
digital data.. The whole concept behind this is to be able to communicate to others by
means of wireless appliances. The other key factor of this concept market is to stay
fashionable at the same time. Researchers have already created an array of digitaljewellery prototypes.
3
2.1. OVERVIEW
The phenomenon of the wearable computer has arisen from the desire to create a
mobile, personal computer system. The makers of wearables aim to house the personal
computer on the body maintaining the convention of screen, keyboard and mouse.
Wearables have been worn (by their originators) despite their bulky size and weight, and
it is readily apparent that considerations of the aesthetic possibilities or the intimate
nature of the relationship between the body and the object remains under-explored.
Technological innovation has to date been the dominant concern for wearables research.
Thad Starner (2001) outlined the challenges facing the development of wearables as
power use, heat dissipation, networking, interface design and privacy; with no mention of
the users emotional experiences of such devices.
4
Bubblebadge (Fig 2.1.1) and Body Coupled FingeRing (Fig 2.1.2) are examples of
early human-computer interaction outputs. Each example posits jewellery as a vehicle for
digital communication, and the body as a mobile location for such devices.
The Bubblebadge houses a digital display, to display text generated by the wearer, by a
specific environment or by the viewer. In one scenario the brooch could show the viewer
if they had received any new emails, at which point the viewer may end the conversation
with the wearer and go and check her or his emails. FingeRing similarly focuses on
usability and treats the body as a convenient location to situate an electronic device.
Sensors are attached to each finger in the form of rings to facilitate the input of data into a
portable or wearable personal digital assistant (PDA).
IBM Research has been exploring digital jewellery through the work of Denise
Chan, a mechanical engineering graduate . Chans concept was a set of jewellery objects,
which together functioned as a wearable mobile phone.
The various components that are inside a cell phone: Microphone, Receiver, Touch
pad, Display, Circuit board, Antenna, and Battery. IBM has developed a prototype of a
cell phone that consists of several pieces of digital jewellery that will work together
wirelessly, possibly with Blue tooth wireless technology, to perform the functions of the
above components.
Fig 2.2: Cell phones may one day be comprised of digital accessories that
work together through wireless connections.
Here are the pieces of computerized-jewellery phone (Fig 2.2) and their functions:
Earrings : Speakers embedded into these earrings will be the phone's receiver.
Ring : Perhaps the most interesting piece of the phone, this "magic decoder ring is
equipped with light-emitting diodes (LEDs) that flash to indicate an incoming call. It
can also be programmed to flash different colors to identify a particular caller or
indicate the importance of a call.
Bracelet : Equipped with a video graphics array (VGA) display, this wrist display
could also be used as a caller identifier that flashes the name and phone number of the
caller.
With a jewellery phone, the keypad and dialing function could be integrated into
the bracelet, or else dumped altogether ; it's likely that voice-recognition software will be
used to make calls, a capability that is already commonplace in many of today's cell
6
phones. Simply say the name of the person you want to call and the phone will dial that
person. IBM is also working on a miniature rechargeable battery to power these
components.
Digital Jewellery can be made in many different sizes and shapes with a variety of
materials ranging from plastic and metal to rubber and glass. They utilize electromagnetic
properties and electronics to display information through a screen or display of some
kind. This could range from LED 7-segment, 16-segment, dot matrix, and other
programmable LEDs devices to LCDs, OLEDs, and other displays (Fig 2.3 ), which are
all driven by the self-contained jewellery devices themselves.
3. ELECTROMAGNETIC BEADS
The closest comparison to Electromagnetic Beads (Fig 3) is that of 'beads' which
are strung together to make a custom necklace or bracelet, with interchangeable
electromagnetic component systems or devices. One bead may be a capacitor on the
inside, and a solar panel on the outside. Another bead may have an internal resistor which
feed power into a programmed microcontroller bead which drives an external screen,
with other options available in a variety of bead configurations which compose a circuit,
including beads with a piezo element, voltage regulator, crystal, or rechargeable battery
as part of the modular jewel circuit. The number of data pins on the microcontroller needs
to be enough to easily program the display layer plus the switches without overly
complex and advanced coding methods
This could be the shape of designer glasses to come. These intelligent spectacles
(Fig 6.2) let you surf the web or check your e-mail, whenever and wherever you want.
10
Your eye would serve as a mouse, with menu items selected by focusing your attention on
an item on screen.
Having the power of a computer on your wrist may sound like science fiction. But
this is the idea behind the wristwatch PDA (Fig 6.3). It would have a widescreen display
to watch video, and voice recognition technology so that you can use it by simply talking
to your wrist. And of course, it also tells you the time.
Fig 6.4: IBM's magic decoder rings will flash when you get a call.
11
IBMs magic decoder ring (Fig 6.4) that flashes for phone calls could also inform you
that e-mail is piling up in your inbox. This flashing alert could also indicate the urgency
of the e-mail.
6.5. Charmed Communicator Eyepiece
12
This Track Point ring will be very valuable when monitors shrink to the size of
watch face. In the coming age of ubiquitous computing, displays will no longer be tied to
desktops or wall screens. Instead, you'll wear the display like a pair of sunglasses or a
bracelet. Researchers are overcoming several obstacles facing these new wearable
displays, the most important of which is the readability of information displayed on these
tiny devices.
13
7. CONCLUSION
The basic idea behind the digital jewellery concept is to have the convenience of
wireless, wearable computers while remaining fashionably sound. It is hoped to be
marketable soon, however, several bugs remain such as charging capabilities and cost.
By the end of the decade, we could be wearing our computers instead of sitting in
front of them.
14
8. REFERENCES
[1]. www.IBM.com
[2]. www.howstuffworks.com
[3]. www.infoworld.com
[4]. www.ibutton.com
15