5 Pen Technology
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in most professions to be able to use computer software. The first computer invented was the ENIAC in 1943 which was the same size of a large room, consuming as much power as several hundred modern PCs. Modern computers which are based on integrated circuits are small enough to fit into mobile devices. One of the most compacted computers out right now are table computers with the most popular being the IPad, but even that is 9.1inch and weighing about 700grams. But imagine having a computer that will fit into your pencil case. The P-ISM (Pen-style Personal Networking Gadget Package) consists of a package of 5 pens that all have unique functions, combining together to create a virtual computing experience. This is only a prototype under developing stage by NEC Corporation. In 2003, Geneva held the ITU telecom Word exhibition which exhibited a conceptual $30,000 prototype of a P-ISM designed by the Tokyo-based NEC Corporation.
Authors and Affiliations
Ms. Shweta A. Mohabe
A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion
Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve anoma...
Mobility Management Schemes for WMNS Using Pointer Forwarding Techniques
Abstract: The efficient mobility management schemes based on pointer forwarding for wireless mesh networks (WMNs) with the objective to reduce the overall network traffic incurred by mobility management and packet delive...
Improved LEACH Protocol for Efficient Transmission of Data inWireless Sensor Networks using Ant Colony OptimizationAlgorithm
Abstract: Energy Efficiency is one of an indispensible concern in Wireless Sensor Networks (WSNs) whichminimizes their efficiency and also shortens the lifetime of network. Many efficient routing as well asalgorithmic sc...
Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT
Conventional personal identification techniques for instance passwords, tokens, ID card and PIN codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing &...
Survey and Analysis on Migration of Legacy System to Service Oriented Architecture
A number of new generation languages have been evolved for the past few years and have been adapted by the industries. As a result of which the project done under 3GL are becoming Legacy and also the informat...