Vous êtes sur la page 1sur 18

5-PEN PC TECHNOLOGY 2018-19

ACKNOWLEDGEMENT

A seminar report is a golden opportunity for learning about upcoming new technologies and self-
development. I consider myself very lucky and honoured to have so many wonderful people lead
me through in completion of this report. I respect and thank Prof.P.B.Madhavanavar for giving
me an opportunity to do the seminar report. And I heartily thank, Dr.V.B.Pagi (Assistant
professor & Head of Department of Computer Science Engineering), for his guidance and
suggestions during this seminar report who took keen interest on our project work and guided us
all along, till the completion of our report work by providing all the necessary information for
developing a good system.

Page 1
5-PEN PC TECHNOLOGY 2018-19

ABSTRACT

When writing a quick note, pen and paper are still the most natural to use .The5 pen pc
technology with digital pen and paper makes it possible to get a digital copy of handwritten
information, and have it sent to digital devices via Bluetooth. P-ISM (Pen-style Personal
Networking Gadget Package), which is nothing but the new discovery which is under developing
stage by NEC Corporation. It is simply a new invention in computer and it is associated with
communication field. Surely this will have a great impact on the computer field. In this device
you will find Bluetooth as the main interconnecting device between different peripherals.
P-ISM is a gadget package including five functions: a pen-style cellular phone with a handwriting
data input function, virtual keyboard, a very small projector, camera scanner, and personal ID
key with cashless pass function. P-ISMs are connected with one another through short-range
wireless technology. The whole set is also connected to the Internet through the cellular phone
function. This personal gadget in a minimalist pen style enables the ultimate ubiquitous
computing.

Page 2
5-PEN PC TECHNOLOGY 2018-19

Index

Chapter No. Chapter Headings Page No

1 Introduction 4

2 CPU-Pen 6

3 Communication Pen 8

4 Virtual Laser Keyboard 10


5 Digital Camera 12

6 LED Projector 13
7 Battery 14

8 Remark 15

9 Conclusion 16

Page 3
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 1
Introduction

Communication technology is rapidly increasing in the modern world. Computer, as


everybody knows, is the main communication machine used. Since the time computer has been
invented scientists and engineers have been trying to making it more and more compact. As a
result we have been able to enjoy the numerous functionalities provided by the computers
whether it is Home PC’s or Laptops. Systems have still been reduced so that they are used in
Mobiles I-pods and I-phones have replaced the laptops to an extent. It is in this context that Pen
computers come into spot lights. These are computers in the shape of different pens each having
a function of its own and when combined together give us the usage of a full-blown computer
broken apart into pieces, each the size of a pen. The screen and keyboard are projector into
surfaces.
Five pen pc shortly called as P-ISM (“Pen-style Personal Networking Gadget Package”), is
nothing but the new discovery, which is under developing stage by NEC Corporation’s-ISM is a
gadget package including five functions: a CPU pen, communication pen with a cellular phone
function, virtual keyboard, a very small projector, and a camera’s-ISM’s are connected with one
another through short-range wireless technology. The whole set is also connected to the Internet
through the cellular phone function. This personal gadget in a minimalist pen style enables the
ultimate ubiquitous computing.

Page 4
5-PEN PC TECHNOLOGY 2018-19

1.1 Components name

Component Function Reliability

CPU pen Computing engine Open

Cell phone, Pressure


sensitive, Pointing
Communication pen device, Pointer and ear Near term
piece.
Communication using
Bluetooth
Display LED Projector A4 size Slightly father out then
Approx 1024x768 the phone and camera
Keyboard Projected keyboard Slightly father out then
with 3D IR Sensor the phone and camera
Camera Digital camera Near term

Based Battery charger and Open


Menu Storage

Page 5
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 2
CPU-Pen

The function of the CPU is done by one of the pen. It is also known as computing. It consists of
dual core processor embedded in it and works with WINDOWS operation system. The central
process unit (CPU) is the portion of a computers system that carries out the instructions of a
computer program and is the primary element carrying out the computer’s function. The central
processing unit carries out each instruction of the program in sequence, to perform the basic
arithmetical, logical and input/output operation of the system. This term has been in use in the
computer industry at least since the early 1960’s. The form, design and implementation of CPUs
have changed dramatically since the earliest examples, but their fundamental operation remains
much the same. Early CPUs were custom –designed as a part of a larger, sometimes one-of kind,
and computer. However, this costly method of designing custom CPUs for a particular
application has largely given way to the development of mass- produced processors that are
made for one or many purposes. This standardization trend generally began in the era of discrete
transistor mainframe computers and has rapidly accelerated with the popularization of the
integrated circuit(IC). The IC has allowed increasingly complex CPUs to be designed and
manufactured to tolerances on the order of nanometres. Both the miniaturization and
standardization of CPUs have increased the presence of these digital devices in modern life far
beyond the limited application of dedicated computing machines. Modern Microprocessors
appear in everything from automobiles to cell phones and children’s toys.

Fig 2: Digital CPU PEN

Page 6
5-PEN PC TECHNOLOGY 2018-19

2.1. Operations of CPU-Pen

The first step, fetch, involves retrieving an instruction from program memory. The
location in program memory is determined by program counter (PC), which stores a number that
identifies the current position in the program. After an instruction is fetched, the PC is
incremented by the length of the length of the instruction word in terms of memory units. Often,
the instruction to be fetched must be retrieved from relatively slow memory, causing the CPU to
stall while waiting for the instruction to be returned. This issue is largely addressed in modern
processors by cache sand pipeline architectures. The instruction that the CPU fetches from
memory is used to determine what the CPU is to do.
In the decodes step, the instruction is broken up into parts that have significance to other
portions of the CPU. The way in which the numerical instruction value is interpreted is defined
by the CPU’s instruction set architecture (ISA). Often, one group of numbers in the instruction
called the opcode , indicates which operation to perform. There maiming parts of then number
usually provide information require for that instruction such as operant for an addition operation
such operant be given as a constant value (called an immediate value), or as a place to locate a
value a register or a memory address, as determine by some addressing mode. In older designs
the portions of the CPU responsible for instruction decoding were unchangeable hardware
devices. However, in more abstract and complicated CPUs and ISAs, a micro program is often
used to assist in translating instructions into Various Configuration signals for the CPU. This
micro program is sometimes rewritable so that it can be modified to change the way the CPU
decodes instructions even after it has been manufactured. After the fetch and decode steps, the
execute step is performed. During this step, various portions of the CPU are connected so they
can perform the desired operation. If, for instance, an addition operation was requested, the
arithmetic logic unit (ALU) will be connected to a set of inputs and a set of outputs. The ALU
contains the circuitry to perform simple arithmetic and logical operations on the inputs . If the
addition operation produces a result too large for the CPU to handle, an arithmetic overflow flag
in a flags register may also be set.
The final step, write back, simply “write back” the result of the execute step to some form
of memory. Very often there result is written to some internal CPU register for quick access by
sub sequent instructions. In other case result may be written to slower, but cheaper and larger,
main memory. Some type of instructions manipulates the program counter rather than directly
produce result data. These are generally called “jumps” and facilitate behaviour like loops,
conditional program execution , and functions in programs. Many instructions will also change
the state of digits in a “flags” register. These flags can be used to influence how a program
behaves, since they often indicate the outcome of various operations. For example, one type of
“compare” instruction considers two values and set a number in the flags register according to
which one is greater. This flag could then be use by a later jump instruction to determine
program flow. After the execution of the instruction and write back of the resulting data, the
entire process repeats.

Page 7
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 3
Communication Pen

P-ISM’s are connected with one another through short-range wireless technology. The whole set
is also connected to the Internet through the cellular phone function. They are connected through
Tri-wireless modes (Bluetooth, 802.11 B/G) and terabytes of data, exceeding the capacity of
today’s hard disks; this is very effective because we can able to connect whenever we need
Without having wires. They are used at the frequency band of 2.4 GHz ISM. Bluetooth
mechanism is used for exchanging signal status information between two devices. These
techniques have been developed that do not require communication between the two devices the
most efficient and comprehensive solution for the most serious problems can be accomplished by
silicon vendors. They can implement information exchange capacities with in the designs of the
Bluetooth.

FIG 3: COMMUNICATION-PEN

Page 8
5-PEN PC TECHNOLOGY 2018-19

3.1 Connectivity 802.11B/G and BLUETOOTH

 In fact, no-one expects much activity on 802.11n installation until the middle of
2008.Rolling out 802.11n would mean a big upgrade for customers who already have full
Wi-Fi coverage, and would be complex add-on to existing wired networks, for those who
haven’t. Bluetooth is widely used because we can able to transfer data. This is very
effective because we can able to connect whenever we need without having wires. They
are used at the frequency band of 2.4 GHz ISM.

 Bluetooth mechanism is used for exchanging signal status information between two
devices. This techniques have been developed that do not require communication
between the two devices, the most efficient and comprehensive solution for the most
serious problems can be implement information exchange capabilities within the design
of the Bluetooth. The circuit diagram for the 802.11B/G is shown above. It is nothing but
also type of Bluetooth, Using this connectivity we can also connect it with the internet
and can access it anywhere in the world.

Page 9
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 4
Virtual Keyboard

The Virtual Laser Keyboard (VKB) is the ULTIMATE new gadget for PC users. The VKB emits
laser on to the desk where it looks like the keyboard having QWERTY arrangement of keys i.e.
it use a laser beam to generate a full-size perfectly operating laser keyboard that smoothly
connects to of PC and most of the hand held devices. As we type on the laser Projection, it
analyses what we are typing according to the co-ordinates of the location. A virtual keyboard is a
software component that allows a user to enter characters. A virtual keyboard can usually be
operated with multiple input devices, which may include a touch screen, an actual keyboard, a
computer mouse, a head mouse and an eye mouse.

FIG 3:VIRTUAL KEYBOARD

 The Virtual Laser keyboard (VKB) is the ULTIMATE new gadget for PC users, The
VKB emits laser on to the desk where it looks like keyboard having QWERTY
arrangement of keys i.e. it uses a laser beam to generate a full size perfectly operating
laser keyboard that smoothly connects to of PC and Most of the handheld devices.

Page 10
5-PEN PC TECHNOLOGY 2018-19

 The I-Tech laser keyboard acts exactly like any other “ordinary” keyboard: A direction
technology based on an optimal recognition mechanism enables the user to tap on the
projected key images, While producing real tapping sounds.

 It is more compatible and it did not require any practice to operate but must have strong
fingers to tap.

 The I-Tech Virtual Keyboard uses a light projection of a full-sized computer keyboard
on almost any surface.

Page 11
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 5
Digital Camera

The digital camera is the shape of pen. It is useful in video recording, video conferencing, simply
it called as webcam. It is also connected with other devices through Bluetooth. It is a 360 degrees
visual communication device. This terminal will enable us to know about the surrounding
atmosphere and group communication with around display and a central super wide angle
camera. A digital camera is a camera that takes video or still photographs, or both, digitally by
recording images via an electronic image sensor. In this century cameras are digital. Front and
back of Canon Powers shot A95 Digital cameras can do things film cameras cannot displaying
images on a screen immediately after they are recorded, storing thousands of images to free
storage space. The majority, including most compact cameras, can record moving video with
sound as well as still photographs. Some can crop and stitch pictures and performs other
elementary image editing. Some have a GPS receiver built in and can produce Geo tagged
photographs. The optical system works the same as in film cameras, typically using a lens
With a variable diaphragm to focus light onto an image pick up device. The diaphragm and
shutter admit the correct amount of light to the imager, just as with film but the image pick up
device is electronic rather than chemical. Most digital cameras, a part from camera phones and a
few specialized types, have a standard screw. Digital cameras are incorporated in too many
devices ranging from PDAs and mobile phones (called camera phones) to vehicles. The Hubble
Space Telescope and other astronomical devices are essentially specialized digital cameras.

FIG 4: DIGITAL CAMERA

Page 12
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 5
LED Projector

The role of monitor is taken by LED Projector which projects in the screen. The size of the
projector is of A4 size. It has the approximate resolution capacity of 1024 X 768. Thus it is gives
more clarity and good picture. A video projector is a device that receives a video signal and
projector the corresponding image on projection screen using a less system. All video projectors
use a very bright light to project the image, and most modern one scan correct any
Curves, blurriness, and other inconsistencies through manual settings. Video projectors are
widely used for conference room presentations, class room training, home theatre and live events
applications. Projectors are widely used in many schools and other educational settings,
connected to an interactive while board to interactively teach pupils.

FIG 5: LED PROJECTOR

Page 13
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 6
Battery

The most important part in portable type of computer is battery and storage capacity. Usually
batteries must be small in size and work for longer time. For normal use is can be used for 2
weeks. The type of battery used here us lithium ion battery. The storage device is of the type
tubular holographic which is capable of storing. The use of lithium ion battery in this gadget will
reduce energy density, durability and cost factor. By making Five Pen PC feasible, it will enable
ubiquitous computing therefore it is easier for people to use. Many applications can be imagined
with this new technology. As it make use of E-finger printing the gadget will be more secure,
Which allows only owner to activate the Pc? So even if we lose it, no one else can access the
gadget. All PC’s communicate each other with the help of Bluetooth technology and the entire
gadget is connected to internet (Wi-Fi). This technology is very portable, feasible and efficient.
Everybody can use this technology in very efficient manner. Some prototypes have been already
developed in 2003 which are very feasible, but currently unclear. The enhancement in this
technology can be expected in coming years.

Page 14
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 7
Remark

7.1. Advantages

 Portable
 Feasible
 Ubiquitous
 Makes use of Wi-Fi technology

7.2. Disadvantages

 Currently unclear
 Cost
 Keyboard concept is not new easily misplaced
 As the gadget is very costly the consumer cannot afford to purchase them. The Virtual
keyboards are already present in various companies like Lumio and Virtual Devices Inc.

Page 15
5-PEN PC TECHNOLOGY 2018-19

CHAPTER 8
CONCLUSION

The communication devices are becoming smaller and compact. This is only a example for the
start of this new technology. We can expect more such developments in the future, It seems that
information terminals are infinitely getting smaller. However, we will continue to manipulate
them with our hands for now. We have visualized the connection between the latest technology
and the human, in a form of a pen. P-ISM is a gadget package including five functions: a pen-
style cellular phone with a handwriting data input function, virtual keyboard, a very small
projector, camera scanner, and personal ID key with cashless pass function. P-ISMs are
Connected with one another through short-range wireless technology. The whole set is also
connected to the Internet through the cellular phone function. This personal gadget in a
minimalistic pen style enables the ultimate ubiquitous computing. “The design concept uses five
different pens to make a computer. One pen is a CPU, another camera, one creates a virtual
keyboard, another projects the visual output and thus the display and another communicator (a
phone). All five pens can rest in a holding block which recharges the batteries and holds the mass
storage. Each pen communicates wireless, possibly Bluetooth.

Page 16
5-PEN PC TECHNOLOGY 2018-19

Page 17
5-PEN PC TECHNOLOGY 2018-19

Page 18

Vous aimerez peut-être aussi