REVIEW PAPER ON WEARABLE COMPUTING ITS APPLICATIONS AND RESEARCH CHALLENGES
Journal Title: Acta Electronica Malaysia (AEM) - Year 2019, Vol 3, Issue 2
Abstract
Wearable technology provides number of opportunities in today’s world that trigged all the imaginations for the people. In today’s era we are more and more dependent on computers and to be compatible with the technology we have to be omnipresent and embrace new developments. Our daily use material is imposed by factor such as battery life, processor power, display brightness, network coverage and form factor have led to the delay in the widespread introduction of wearable computers. In this paper we will review wearable early design that was merely used for aircraft and military purpose and compare that with its today’s application that how nowadays they are used for personal activities. It also highlights the scope and market of wearable computers and how it is emerging day by day.
Authors and Affiliations
Sheeza Ishtiaq, Ahthasham Sajid, Raja Asif Wagan
FPGA SYNTHESIS AND VALIDATION OF PARALLEL PREFIX ADDERS
The main objective of this paper is to attain the best achievable time delay reduction with better performance (i.e. frequency) running on FPGA platforms and prove their applicability in high performance reconfigurable c...
Design of Smart Car Control System Based on Camera
Based on the microprocessor K60 as the core control unit,an smart car was designed,which can track the road automatically,and using the camera as the orientation module sensor to collect the image information of the r...
ROLE OF TAGUCHI AND GREY RELATIONAL METHOD IN OPTIMIZATION OF MACHINING PARAMETERS OF DIFFERENT MATERIALS: A REVIEW
Now a day’s quality of the product is highly concerned with production for the competition point of view. So, for enhancing the quantity and quality of the products with different machining like drilling, milling, grindi...
AN IMAGE-BASED CAPTCHA SYSTEM USING CLICK
CAPTCHA stand for “Completely Automated Public Turing test to tell Computers and Humans Apart”. It is a technique of testing where only human can solve it and computer-generated system (bots) could not get through it. In...
NETWORK MONITORING SYSTEM TO DETECT UNAUTHORIZED CONNECTION
The Network Monitoring System to Detect Unauthorized Connection is a network analytic tool that use to review local area network usage. The main purpose of the application is monitoring the internet protocol traffic betw...