You are on page 1of 17

A

SEMINAR REPORT
ON
“Digital Jewellery “
Submitted in partial fulfillment of the requirements for the degree of

Bachelor of Technology
In
Information Technology

By

Riya Pawar (2154491246054)


Sanika Zende (2154491246062)
Tanvi Thakare (2154491246057)
Under the guidance
of
Prof. Ranjit Fule

DEPARTMENT OF INFORMATION TECHNOLOGY


SHRI VILE PARLE KELAWANI MANDAL'S
INSTITUTE OF TECHNOLOGY, DHULE
Survey No. 499, Plot No. 02, Behind Gurudwara, Mumbai-Agra National Highway, Dhule- 424001,
Maharashtra, India.
Academic Year 2022-23

1
SHRI VILE PARLE KELAWANI MANDAL'S
INSTITUTE OF TECHNOLOGY, DHULE
Survey No. 499, Plot No. 02, Behind Gurudwara, Mumbai-Agra National Highway, Dhule- 424001,
Maharashtra, India.
Academic Year 2022-23

CERTIFICATE
This is to certify that the SY B.TECH. Mini Seminar Report Entitled

“DIGITAL JEWELLERY”
Submitted by

Riya Pawar (2154491246054)


Sanika Zende (2154491246062)
Tanvi Thakare (2154491246057)

is a record of bonafide work carried out by him/her, under our guidance, in partial fulfillment of the
requirement for the award of Degree of Bachelors of Technology (Information Technology) at Shri Vile
Parle Kelawani Mandal's Institute Of Technology, Dhule under the Dr. Babasaheb Ambedkar
Technological University, Lonere, Maharashtra. This work is done during semester VIII of Academic
year 2022-23

Date:
Place: SVKM’s IOT, Dhule

Prof. Ranjit Fule Prof. Niteen Dhutraj Dr. Bhushan Chaudhari Dr. Nilesh Salunke
(Seminar Guide) Seminar Coordinator) (HOD) (Principal)
Dept. of IT, SVKM-IOT Dept. of IT, SVKM-IOT Dept. of IT, SVKM-IOT SVKM-IOT, Dhule

Name and Sign with date Name and Sign with date
Examiner-1 Examiner-2

2
DECLARATION

We declare that this written submission represents my ideas in our own words and where
others ideas or words have been included, we have adequately cited and referenced the sources. We
also declare that we have adhered to all principles of academic honesty and integrity and have not
misrepresented or fabricated or falsified any idea/data/fact/source in our submission. We understand
that any violation of the above will cause disciplinary action by the Institute and can also evoke penal
action from the sources which have thus not been properly cited or from whom proper permission has
not been taken when needed.

Signatures

Riya Pawar (2154491246054) ______________

Sanika Zende (2154491246062) ______________

Tanvi Thakare (2154491246057) ______________

3
ACKNOWLEDGMENTS

It gives us immense pleasure in expressing sincere sense of gratitude towards our seminar guide Prof.
Ranjit Fule for the assistance, valuable guidance and co-operation in carrying out this Seminar
successfully. It has been a privilege for us to have been associated with Dr. Bhushan Chaudhari, Head
of Department, during our seminar work. We have greatly benefited from his valuable suggestions.
Weexpress our deep sense of gratitude to him for his valuable guidance, constant encouragement and
patience throughout this work.

We are thankful to all people who have contributed in making this seminar success. Particularly, we
want to thank Prof Ranjit Fule, Seminar Coordinator for our Department for making this process
seamless for us and arrangingeverything so perfectly.

We take this opportunity to express our heartfelt gratitude towards the Department of Information
Technology of Shri Vile Parle Kelvani Mandal’s Institute of Technology, Dhule and Dr. Nilesh
Salunkhe, Principle of Shri Vile Parle Kelvani Mandal’s Institute of Technology, Dhule, that gave us
an opportunity for the presentation of our mini-seminar in theesteemed organization and for providing
the required facilities in completing this seminar. Weare greatly thankful to our parents, friends and
other faculty members for their motivation, guidance and help whenever needed.

Names of Team Members:

1) Riya Pawar
2) Sanika Zende
3) Tanvi Thakare

4
ABSTRACT

Abstract: Mobile computing is beginning to break the chains that tie us to our desks, but many of today's
mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an
explosion of computer parts across our bodies, rather than across our desktops. Basically, jewelry adorns
the body, and has very little practical purpose. However, researchers are looking to change the way we
think about the beads and bobbles we wear. The combination of microcomputer devices and increasing
computer power has allowed several companies to begin producing fashion jewelry with embedded
intelligence i.e., Digital jewelry. Digital jewelry can best be defined as wireless, wearable computers that
allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens
on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile
embedded intelligence. It seems that everything we access today is under lock and key. Even the devices
we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys
needed to access any door or computer program. This paper discusses about a new Java-based,
computerized ring that will automatically unlock doors and log on to computers.

5
INDEX

Certificate II

Declaration III

Acknowledgment IV

Abstract V

Chapter Chapter Name


No
1 Introduction
1.1 Introduction of Seminar
1.2 What is Digital Jewellery

2 Proposed System
2.1 Digital Jewellery Components
2.2 Technical Specification of Digital Jewellery
2.3 Prototype of Digital Jewellery

4 Advantages And Disadvantages


4.1 Advantage

4.2 Disadvantage

5 Conclusion

6 References:

6
INTRODUCTION

The latest computer craze has been to be able to wear wireless computers. The
Computer Fashion Wave, "Digital Jewelry" looks to be the next sizzling fashion trend of the
technological wave. The combination of shrinking computer devices and increasing computer power
has allowed several companies to begin producing fashion jewelry with embedded intelligence.
Today’s, manufacturers place millions of transistors on a microchip, which can be used to make small
devices that store tons of digital data.. The whole concept behind this is to be able to communicate to
others by means of wireless appliances. The other key factor of this concept market is to stay
fashionable at the same time. Digital jewellery looks to be the next sizzling fashion trend of the
technological wave.  Its basically small devices that stores tons of data  Concept behind this is to be
able to communicate to others by means of wireless appliances  Digital jewellery helps to solve
problems like forgotten passwords and security badges.

Digital jewelry‚ can help you solve problems like forgotten passwords and security
badges. These devices have a tiny processor and unique identifiers that interact with local sensors. Digital
jewelry‚ is a nascent catchphrase for wearable ID devices that contain personal information like
passwords, identification, and account information. They have the potential to be all-in-one replacements
for your drivers’ license, key chain, business cards, credit cards, health insurance card, corporate security
badge, and loose cash. They can also solve a common dilemma of today’s wired world the forgotten
password. In addition to changing the way we make phone calls, digital jewelry will also affect how we
deal with the ever-increasing bombardment of e-mails. Imagine that the same ring that flashes for phone
calls could also inform you that e-mail is piling up in your inbox. This flashing alert could also indicate
the urgency of the e-mail. Two of the most identifiable components of a personal computer are the mouse
and monitor. These devices are as familiar to us today as a television set.
Digital adornments has been proposed as a methodology that could conquer the
issue of surrender and increment the drawn out acknowledgement of wearable gadgets.Advanced
Jewellery has been acquiring a solid premium among likely clients and economic analysts: "Wear-capable
innovation will be progressively taken cover behind classy plans that will have a more extensive allure
than the innovation forward gadgets in the market today." Hardly any examination attempted to infer
general rules for the plan of wearable gadgets. Notwithstanding, the necessities supportive of presented
so far are fanned out between different specific assessment and rule reports and along these lines barely
to follow. It stays muddled, which necessities to address for which structure factor, client, or use case,
and which prerequisites are the most significant and ought to be tended to first.

7
What is Digital Jewellery
Digital jewelry is the fashion jewelry with embedded intelligence. “Digital jewelry” can help you solve
problems like forgotten passwords and security badges. “Digital jewelry” is a nascent catchphrase for
wearable ID devices that contain personal information like passwords, identification, and account
information. They have the potential to be all-in-one replacements for your driver’s license, key chain,
business cards, credit cards, health insurance card, corporate security badge, and loose cash. They can
also solve a common dilemma of today’s wired world – the forgotten password. Digital jewellery is the
fashion jewellery with embedded intelligence  Digital jewellery can help you solve problem like
forgotten passwords  These devices have a tiny processor and unique identifiers that interact with local
sensor  Digital jewellery will be the evolution in digital tecgnology that makes computer elements
entirely compatible with the human form  Its nothing but dividing a communication device into parts
and embedding them into jewellery  Best examples are Red Tacton technology, wearable biosensors,
smart watches etc.

8
Digital Jewellery Components
Soon, cell phones will take a totally new form, appearing to have no form at all. Instead of one single
device, cell phones will be broken up into their basic components and packaged as various pieces of
digital jewelry. Each piece of jewelry will contain a fraction of the components found in a conventional
mobile phone. Together, the digital-jewelry cell phone should work just like a conventional cell phone.
The various components that are inside a cell phone: Microphone, Receiver, Touch pad, Display, Circuit
board, Antenna, and Battery. IBM has developed a prototype of a cell phone that consists of several pieces
of digital jewelry that will work together wirelessly, possibly with Blue tooth wireless technology, to
perform the functions of the above components

.
Fig.1

Cell phones may one day be comprised of digital accessories that Work together through wireless
connections.

Here are the pieces of computerized-jewelry phone and their functions:


• Earrings - Speakers embedded into these earrings will be the phone's receiver.
• Necklace - Users will talk into the necklace's embedded microphone.
• Ring - Perhaps the most interesting piece of the phone, this "magic decoder ring” is equipped with
light-emitting diodes (LEDs) that flash to indicate an incoming call. It can also be programmed to flash
different colors to identify a particular caller or indicate the importance of a call.
• Bracelet - Equipped with a video graphics array (VGA) display, this wrist display could also be used as
a caller identifier that flashes the name and phone number of the caller. With a jewelry phone, the keypad
and dialing function could be integrated into the bracelet, or else dumped altogether -- it's likely that
voice-recognition software will be used to make calls, a capability that is already commonplace in many
of today's cell phones. Simply say the name of the person you want to call and the phone will dial that
person. IBM is also working on a miniature rechargeable battery to power these components.

9
Fig.2

BM's magic decoder rings will flash when you get a call.

The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly
move the cursor on a computer-monitor display. (Track Point is the little button embedded in the keyboard
of some laptops). IBM Researchers have transferred TrackPoint technology to a ring, which looks
something like a black-pearl ring. On top of the ring is a little black ball that users will swivel to move
the cursor, in the same way that the TrackPoint button on a laptop is used. This Track Point ring will be
very valuable when monitors shrink to the size of watch face. In the coming age of ubiquitous computing,
displays will no longer be tied to desktops or wall screens. Instead, you'll wear the display like a pair of
sunglasses or a bracelet. Researchers are overcoming several obstacles facing these new wearable
displays, the most important of which is the readability of information displayed on these tiny devices.

Fig.3

Prototype bracelet display developed by IBM

Charmed Technology is already marketing its digital jewelry, including a futuristic-looking eyepiece
display. The eyepiece is the display component of the company's Charmed Communicator, a wearable,
wireless, broadband-Internet device that can be controlled by voice, pen or handheld keypad. The
Communicator can be used as an MP3 player, video player and cell phone. The Communicator runs on
the company's Linux-based Nanix operating system.

10
Technical Specification of Digital Jewellery
Digital jewelry devices consist of a screen or display for information, most likely consisting of 7- 16-
segment, or dot matrix LEDs, LCDs, or other technologies such as electroluminescent material (EL) or
others, which could become an optional display. So too, an audiovisual or other 'display' could consist of
a speaker, a single flashing light, a sensor of some kind (such as a temperature driven EL display), or
other informational aesthetic. The display layer sits on a face of the device, which is enclosed in some
material such as plastic, metal, crystal, or other material. It has external switches and buttons on its side
and a data-port for accessing the programmable electronic circuit inside. A micro controller that is a
surface mounted device (SMD) on a printed circuit board (PCB) with resistors (R) and capacitors (C) are
the internal 'guts' of the jewelry.

Digital Display
The digital jewelry display, for instance, every alphabet and number system has found representation
within the electronics realm and 'dot-matrix' (a matrix of single LEDs) is used to display Chinese and
Japanese and other character sets, as can the alternative display for LCDs (liquid-crystal-displays) also
be used, as often found in watches.

Fig.4

Digital Jewelry can be made in many different sizes and shapes with a variety of materials ranging from
plastic and metal to rubber and glass. They utilize electromagnetic properties and electronics to display
information through a screen or display of some kind. This could range from LED 7-segment, 16-segment,
dot matrix, and other programmable LEDs devices to LCDs, OLEDs, and other displays, which are all
driven by the self-contained jewelry devices themselves.

11
Electromagnetic Beads
The closest comparison to this model is that of 'beads' which are strung together to make a custom
necklace or bracelet, with interchangeable electromagnetic component systems or devices. One bead may
be a capacitor on the inside, and a solar panel on the outside. Another bead may have an internal resistor
which feed power into a programmed microcontroller bead which drives an external screen, with other
options available in a variety of bead configurations which compose a circuit, including beads with a
piezo element, voltage regulator, crystal, or rechargeable battery as part of the modular jewel circuit. The
number of data pins on the microcontroller needs to be enough to easily program the display layer plus
the switches without overly complex and advanced coding methods The key to the device's ability to
work effectively is a balancing of electronic components within the circuit with a light-duty processing
and limited power consumption required for the display.

Fig.5
The Java Ring
It seems that everything we access today is under lock and key. Even the devices we use are protected by
passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any
door or computer program. Dallas Semiconductor is developing a new Java-based, computerized ring that
will automatically unlock doors and log on to computers.

Fig.6
The Java Ring can be programmed to give you access to every door and device.

12
Blue Dot receptor
Fig.7

The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a
host system and the Java Ring. The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in
diameter, which houses a 1- million-transistor processor, called an iButton. The ring has 134 KB of RAM,
32 KB of ROM, a real-time clock and a Java virtual machine, which is a piece of software that recognizes
the Java language and translates it for the user's computer system. Digital jewelry, (designed to
supplement the personal computer,) will be the evolution in digital technology that makes computer
elements entirely compatible with the human form. Highlights of Java Ring • Runs Java better (plus
portions enhance Java Card 2.0) • Careful attention to physical security (rapid zeroization) • Durability
to stand up to everyday use • High memory capacity (up to 134K bytes NV SRAM) • Retail connectivity
to 250 million existing computers (less if designed-in before manufacturing)

Highlights of Java Ring


• Runs Java better (plus portions enhance Java Card 2.0)
• Careful attention to physical security
• Durability to stand up to everyday use
• High memory capacity (up to 134K bytes NV SRAM)  Retail connectivity to 250 million existing
computers

13
Prototype of Digital Jewellery

Fig.8

Complete HIOX necklace showing all 26 letters of the Roman alphabet extended in 4-dimensional
space-time. Metal with leather cord.

Fig.9

Programmable HIOX ring with 16-segment LED display.

14
Advantages And Disadvantage
Advantage :
• It provides SECURITY. For example JAVA RING is used to lock or unlock doors or
computers…. As we use passwords and keys to lock our doors and computer . We don’t need to
remember all those passwords and carry all those keys . So java ring is designed to provide
security.

• As COMPUTING DEVICES are embedded it is not necessary to carry CELL


COMPUTERS…..hence it is easy to carry everywhere.

• Sizzling outlook to the user

• Natural interaction between the user

Disadvantage:
• Charging capabilities & cost are just a sample of problems

• Display is very small

• No waterproof care should be taken

• Very expensive to afford

15
Conclusion
• The basic idea behind the digital jewellery concept is to have the convenience of wireless,
wearable computers while remaining fashionably sound.
• It is hoped to be marketable soon, however, several bugs remain. Charging capabilities and cost
are just a sample.
• The basic idea behind the digital jewelry concept is to have the convenience of wireless, wearable
computers while remaining fashionably sound. It is hoped to be marketable soon, however, several
bugs remain. Charging capabilities and cost are just a sample of the problems that lurk.

16
References
List all the material used from various sources for making this project

[1] International Conference on Mobile and Ubiquitos Multimedia


Published Year:- 2019 by Pradthana Jaruscriboonchai

[2] Tangible apps bracelet : - ACM Conference on Designing Interactive Systems


Published Year:- 2016 by Jutta Fortmann, Erika Root, Susanne Boll, Wilko Heuten

[3] New directions in jewellery : - International Symposium on Wearable Computers


Published Year : - 2015 by Yulia Silina, Hamed Haddadi

17

You might also like