5 Pen Technology
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in most professions to be able to use computer software. The first computer invented was the ENIAC in 1943 which was the same size of a large room, consuming as much power as several hundred modern PCs. Modern computers which are based on integrated circuits are small enough to fit into mobile devices. One of the most compacted computers out right now are table computers with the most popular being the IPad, but even that is 9.1inch and weighing about 700grams. But imagine having a computer that will fit into your pencil case. The P-ISM (Pen-style Personal Networking Gadget Package) consists of a package of 5 pens that all have unique functions, combining together to create a virtual computing experience. This is only a prototype under developing stage by NEC Corporation. In 2003, Geneva held the ITU telecom Word exhibition which exhibited a conceptual $30,000 prototype of a P-ISM designed by the Tokyo-based NEC Corporation.
Authors and Affiliations
Ms. Shweta A. Mohabe
Immersive Energy Network Operation System for Renewable Resources
Abstract: with the proliferation of scattered new energy sources, there becomes a need to manage this growingphenomenon. The tracking gives a comprehensive view of the availability of the energy sources and aids in the u...
Face Recognition using Face Alignment and PCA Techniques: ALiterature Survey
Abstract: The face is our key of attention in social communication, playing a main role in transmission identityand sentiment. Hence, Face recognition has become an important issue in many applications such as securitysy...
A Study on Clustering High Dimensional Data Using Hubness Phenomenon
Abstract: Data mining is the non-trivial process of extracting information from the very large database. In recent years, data repository has a high dimensional data, which makes a complete search in most of the da...
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Features
We present a visual dictionary based method for content based image retrieval in cervical microscopy images using texture features. The nucleus region in each image is identified by a simple and reliable se...
Overview of Hacking
Abstract: Hacking and hacker are terms that generally tend to have negative effect on people. These days, largely due to popular media most people wrongly think of hackers as computer criminal and the person who doing so...