- The touch screen panels go over the LCD screen so they are two different entities. We would need to program the images on the LCD and have the display change as the touch panel is touched. Consider adding a backlight to allow a better view of the screen
- Please note that touch screen panels are sold as components–a controller is required to provide the interface between the touchscreen and the computer (or device).
Links
- 1. Low power and cheap touch screen. Has data sheet on page as well which shows the microcontroller that it comes with to program the screen.
http://www.elotouch.com/Technologies/AT4/default.asp - 2. How to design the layers of an LCD touch screen and other factors that affect the view of the screen.
http://www.fujitsu.com/us/news/inthenews/fcai_20030701.html - 3. Describes how the touch panel converts a flat screen into a dynamic interface. Also discusses the different kinds of touch screen technologies and how they each work (has an extensive table comparing screends and their corresponding controllers!!!):
**I think the resistive is the best way to go since it seems to be the cheapest and mostly used.
http://svconline.com/mag/avinstall_lcd_touchpanel_controllers/
- 4. Touch panel product, large screen, comes with the kit.
http://www.advantech.com/products/84-LCD-Kit-MTH-450-nites-TTL-SVGA/mod_1-2JKIPU.aspx
http://www.advantech.com/products/Display-Solutions/sub_1-2JKFJN.aspx - 5. Touch screens can also be bought separately and installed to work with just about any type of computer. Discusses parameters to consider when designing a touch screen.
http://www.industrial101.com/equipment/touch-screens.aspx?ovraw=lcd+touch+screen&ovkey=lcd+touchscreens&ovmtc=advanced&ovadid=31308152011&ovkwid=231837151011 - 6. An additional site with more LCD screens
http://www.densitron.com/Displays/
---------------------------Encryption Research-------------------------------
**We need to decide a programming language so that we can focus on a particular method the encryption is done in that language.
Links
- 1. A book that teachings encryption based on public key techniques and etc. Only the person who knows the public key can decrypt the information. This is used for emails as well. People who send and receive mail can encrypt an email and only a person with the public key can decrypt it, but they will not be able to encrypt a message using the sends technique. (More research will be done to learn the different ways to encrypt and decrypt information.
http://www.amazon.com/Cryptography-Demystified-John-Hershey/dp/0071406387/ref=pd_bbs_1?ie=UTF8&s=books&qid=1219713914&sr=8-1 - 2. The standards used in data encryption:
http://en.wikipedia.org/wiki/Data_Encryption_Standard
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213893,00.html
No hay comentarios:
Publicar un comentario