SlideShare ist ein Scribd-Unternehmen logo
1 von 14
TEKNOLOGI AUGMENTED
REALITY SEBAGAI
TERAPAN APLIKASI
PERVASIVE COMPUTING
Oleh:
ADITYA RIZKI YUDIANTIKA
www.adityarizki.net
PERVASIVE COMPUTING
• “Teknologi yang paling canggih di abad ke-21 setelah penemuan komputer personal
adalah teknologi yang tidak lagi tampak secara fisik”, (Mark Weiser, 1991)
• Pervasive computing menyangkut 3 hal pokok:
1. cara orang memahami perangkat komputasi bergerak dan menggunakannya dalam
lingkungan sekitar untuk melakukan tugas spesifik
2. cara aplikasi dikembangkan dan disebarkan untuk mengelola tugas-tugas yang akan
dilakukan
3. bagaimana unjuk kerja lingkungan tersebut ditingkatkan melalui kemunculan informasi
baru dan fungsionalitasnya yang ada dimana-mana
APLIKASI PERVASIVE
• Aplikasi: komputer genggam; komputer yang dapat dikenakan
(wearable computer); jaringan LAN/ nirkabel; perangkat kontrol.
• Penelitian di universitas: Project Aura di Carnegie Mellon, Endeavour
di UC Berkeley, Oxygen di MIT, dan Portalano di Washington.
• Penelitian di industri: AT&T Research di Cambridge (UK) dan IBM TJ
Watson.
LINGKUNGAN PERVASIVE
TANTANGAN PERVASIVE COMPUTING
AUGMENTED REALITY
Karakteristik utama AR:
1. mengkombinasikan dunia
nyata dan dunia virtual
2. interaktif dalam waktu nyata
(real time)
3. terdaftar dalam ruang
dimensi 3 (3D)
Sumber: Azuma (1997)
PERKEMBANGAN AR
APLIKASI-APLIKASI AR
Sistem informasi
personal (Personal
Assistance and
Advertisement,
Navigation,Touring)
Militer dan industri
(design, assembly,
maintenance,
Combat and
simulation)
Hiburan (Sports
broadcasting,
Games)
Perkantoran
(kolaborasi,
pendidikan dan
pelatihan)
Medis
CONTEXT-AWARE MOBILE AUGMENTED
REALITY (CAMAR) 2.0
Smart home assistant Indoor tour guide
MOBILE AUGMENTED REALITY-BASED
VIRTUAL ASSISTANT (MARA)
MOBILE AUGMENTED REALITY BERBASIS
KOMPUTASI AWAN (CLOUD COMPUTING)
• Aspek pervasive computing adalah penghematan energi.
• Komputasi awan diciptakan sebagai salah satu infrastruktur green technology
• Komputasi awan akan menggantikan server-server konvensional ke dalam arsitektur
cloud.
• Penggunaan cloud storage sebagai database juga memudahkan pengembangan
sistem AR selanjutnya.
KESIMPULAN
• Teknologi AR di masa depan akan menjadi teknologi yang semakin
populer.
• AR menciptakan lingkungan pervasive, karena objek-objek AR
tertanam di sekitar lingkungan.
• Komputasi awan mendukung infrastruktur sistem AR yang hemat
energi dan mudah bergerak (mobile).
• Jenis perangkat pervasive masa depan: ponsel cerdas (smartphone),
tablet, kacamata pintar (Google Glass), helm pintar, dsb.
REFERENSI
1. D. Saha and A. Mukherjee, "Pervasive Computing: A Paradigm for The 21st Century," IEEE Computer Society, pp. 25-31, 2003.
2. G. Banavar, J. Beck, E. Gluzberg, J. Munson, J. Sussman and D. Zukowski, "Challenges: an application model for pervasive computing," in In
Proceedings of the 6th annual international conference on Mobile computing and networking, 2000.
3. M. Satyanarayanan, "Pervasive Computing:Vision and Challenges," IEEE Personal Communications, 2001.
4. P. Milgram and F. Kishino, "A Taxonomy Of Mixed Reality Visual Displays," in IEICE Transactions on Information Systems, 1994.
5. S. Zlatanova, "Augmented Reality Technology," TU Delft, Section GIS technology, Faculty of Civil Engineering and Geosciences, Delft, 2002.
6. R.T. Azuma, "A Survey of Augmented Reality," in In Presence:Teleoperators and Virtual Environments, 1997.
7. T. H. Höllerer and S. K. Feiner, "Mobile Augmented Reality," in Telegeoinformatics: Location-Based Computing and Services, 2004.
8. C. Ludwig and C. Reimann, "Augmented reality: Information at focus," in Cooperative Computing & Communication Laboratory (Volume 4.
No. 1), 2005.
9. F. Zhou, H. B.-L. D. Duh and M. Billinghurst, "Trends in Augmented Reality Tracking, Interaction and Display: A Review of Ten Years of ISMAR,"
in IEEE International Symposium on Mixed and Augmented Reality, Cambridge, 2008.
10. S. C.-Y.Yuen, G.Yaoyuneyong and E. Johnson, "Augmented Reality: An Overview and Five Directions for AR in Education," Journal of
Educational Technology Development and Exchange, pp. 119-140, 2011.
11. D. v. Krevelen and R. Poelman, "A Survey of Augmented Reality Technologies, Applications and Limitations," The International Journal of
Virtual Reality, pp. 1-20, 2010.
12. C. Shin,W. Lee,Y. Suh, H.Yoon,Y. Lee and W.Woo, "CAMAR 2.0: Future Direction of Context-Aware Mobile Augmented Reality," in International
Symposium on Ubiquitous Virtual Reality, 2009.
13. A. Schmeil and W. Broll, "MARA – A Mobile Augmented Reality-Based Virtual Assistant," in IEEE Virtual Reality Conference, North Carolina,
2007.
14. B.-R. Huang, C. H. Liny and C.-H. Lee, "Mobile Augmented Reality Based on Cloud Computing," in Anti-Counterfeiting, Security and
Identification (ASID), 2012 International Conference on. IEEE, 2012.
TERIMA KASIH

Weitere ähnliche Inhalte

Was ist angesagt?

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKamran Ashraf
 
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van Lier
Presentatie The Internet of Things   iBestuur Congres 2013 door Ben van LierPresentatie The Internet of Things   iBestuur Congres 2013 door Ben van Lier
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van LierCentric
 
Looking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthLooking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthThe Innovation Group
 
Future of nanotechnology (star trek fiction)
Future of nanotechnology (star trek fiction)Future of nanotechnology (star trek fiction)
Future of nanotechnology (star trek fiction)Sessi Adeyemisi
 
Four Disruptive Trends for the Next Decade
Four Disruptive Trends for the Next DecadeFour Disruptive Trends for the Next Decade
Four Disruptive Trends for the Next DecadeLarry Smarr
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsJosephHowerton
 
Tangible & Embodied Interaction @RSE11
Tangible & Embodied Interaction @RSE11Tangible & Embodied Interaction @RSE11
Tangible & Embodied Interaction @RSE11Matthias Mueller-Prove
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 

Was ist angesagt? (20)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van Lier
Presentatie The Internet of Things   iBestuur Congres 2013 door Ben van LierPresentatie The Internet of Things   iBestuur Congres 2013 door Ben van Lier
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van Lier
 
Looking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthLooking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart Earth
 
Learning Environments
Learning EnvironmentsLearning Environments
Learning Environments
 
Future of nanotechnology (star trek fiction)
Future of nanotechnology (star trek fiction)Future of nanotechnology (star trek fiction)
Future of nanotechnology (star trek fiction)
 
Four Disruptive Trends for the Next Decade
Four Disruptive Trends for the Next DecadeFour Disruptive Trends for the Next Decade
Four Disruptive Trends for the Next Decade
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Xxie cv
Xxie cvXxie cv
Xxie cv
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart Environments
 
Tangible & Embodied Interaction @RSE11
Tangible & Embodied Interaction @RSE11Tangible & Embodied Interaction @RSE11
Tangible & Embodied Interaction @RSE11
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ict convergence dr nana k annan
Ict convergence dr nana k annanIct convergence dr nana k annan
Ict convergence dr nana k annan
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Andere mochten auch

Augmented Reality: Reality Gets Better
Augmented Reality: Reality Gets BetterAugmented Reality: Reality Gets Better
Augmented Reality: Reality Gets BetterAditya Yudiantika
 
An Augmented Reality Museum Guide
An Augmented Reality Museum GuideAn Augmented Reality Museum Guide
An Augmented Reality Museum GuideAditya Yudiantika
 
Teknik Search Engine Optimization
Teknik Search Engine OptimizationTeknik Search Engine Optimization
Teknik Search Engine OptimizationAditya Yudiantika
 
Presentasi fallacies (kelas f1)
Presentasi fallacies (kelas f1)Presentasi fallacies (kelas f1)
Presentasi fallacies (kelas f1)Junika Kasih
 
IT投資のオペレーション・マネジメントの価値
IT投資のオペレーション・マネジメントの価値IT投資のオペレーション・マネジメントの価値
IT投資のオペレーション・マネジメントの価値Tetsu Kawata
 
Тест вашей спине
Тест вашей спинеТест вашей спине
Тест вашей спинеSerega Artamonov
 
презентация здоровые рабочие места
презентация здоровые рабочие местапрезентация здоровые рабочие места
презентация здоровые рабочие местаSerega Artamonov
 
Презентация и продукт
Презентация и продуктПрезентация и продукт
Презентация и продуктSerega Artamonov
 
Running a Social Media Department of One
Running a Social Media Department of OneRunning a Social Media Department of One
Running a Social Media Department of Onejenna_withrow
 
коррекционное питание для спины
коррекционное питание для спиныкоррекционное питание для спины
коррекционное питание для спиныSerega Artamonov
 
Cuando los trabajadores acosan a sus jefes
Cuando los trabajadores acosan a sus jefesCuando los trabajadores acosan a sus jefes
Cuando los trabajadores acosan a sus jefesDuglas Yanes Reyes
 

Andere mochten auch (20)

Augmented Reality: Reality Gets Better
Augmented Reality: Reality Gets BetterAugmented Reality: Reality Gets Better
Augmented Reality: Reality Gets Better
 
Lab intro
Lab introLab intro
Lab intro
 
An Augmented Reality Museum Guide
An Augmented Reality Museum GuideAn Augmented Reality Museum Guide
An Augmented Reality Museum Guide
 
MQ Messaging
MQ MessagingMQ Messaging
MQ Messaging
 
Teknik Search Engine Optimization
Teknik Search Engine OptimizationTeknik Search Engine Optimization
Teknik Search Engine Optimization
 
Presentation1
Presentation1Presentation1
Presentation1
 
книга
книгакнига
книга
 
Presentasi fallacies (kelas f1)
Presentasi fallacies (kelas f1)Presentasi fallacies (kelas f1)
Presentasi fallacies (kelas f1)
 
IT投資のオペレーション・マネジメントの価値
IT投資のオペレーション・マネジメントの価値IT投資のオペレーション・マネジメントの価値
IT投資のオペレーション・マネジメントの価値
 
Morfo
MorfoMorfo
Morfo
 
Bioquimica expo
Bioquimica expoBioquimica expo
Bioquimica expo
 
Тест вашей спине
Тест вашей спинеТест вашей спине
Тест вашей спине
 
Salud oral
Salud oralSalud oral
Salud oral
 
Presentation1
Presentation1Presentation1
Presentation1
 
презентация здоровые рабочие места
презентация здоровые рабочие местапрезентация здоровые рабочие места
презентация здоровые рабочие места
 
Презентация и продукт
Презентация и продуктПрезентация и продукт
Презентация и продукт
 
Running a Social Media Department of One
Running a Social Media Department of OneRunning a Social Media Department of One
Running a Social Media Department of One
 
коррекционное питание для спины
коррекционное питание для спиныкоррекционное питание для спины
коррекционное питание для спины
 
Cuando los trabajadores acosan a sus jefes
Cuando los trabajadores acosan a sus jefesCuando los trabajadores acosan a sus jefes
Cuando los trabajadores acosan a sus jefes
 
Mengenal Karakter Situsweb
Mengenal Karakter SituswebMengenal Karakter Situsweb
Mengenal Karakter Situsweb
 

Ähnlich wie Augmented Reality as A Pervasive Technology: Context-Aware Approach

Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
SEMINAR REPORT (1)
SEMINAR REPORT (1)SEMINAR REPORT (1)
SEMINAR REPORT (1)AISWARYA T
 
ICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
ICC tutorial: Wireless Communication with Unmanned Aerial VehiclesICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
ICC tutorial: Wireless Communication with Unmanned Aerial VehiclesEvgenii (Genia) Vinogradov
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paperEman Kanjo
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...FIA2010
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Ähnlich wie Augmented Reality as A Pervasive Technology: Context-Aware Approach (20)

Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
SEMINAR REPORT (1)
SEMINAR REPORT (1)SEMINAR REPORT (1)
SEMINAR REPORT (1)
 
ICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
ICC tutorial: Wireless Communication with Unmanned Aerial VehiclesICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
ICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
 
Event Based Social Networks
Event Based Social NetworksEvent Based Social Networks
Event Based Social Networks
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paper
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Augmented Reality as A Pervasive Technology: Context-Aware Approach

  • 1. TEKNOLOGI AUGMENTED REALITY SEBAGAI TERAPAN APLIKASI PERVASIVE COMPUTING Oleh: ADITYA RIZKI YUDIANTIKA www.adityarizki.net
  • 2. PERVASIVE COMPUTING • “Teknologi yang paling canggih di abad ke-21 setelah penemuan komputer personal adalah teknologi yang tidak lagi tampak secara fisik”, (Mark Weiser, 1991) • Pervasive computing menyangkut 3 hal pokok: 1. cara orang memahami perangkat komputasi bergerak dan menggunakannya dalam lingkungan sekitar untuk melakukan tugas spesifik 2. cara aplikasi dikembangkan dan disebarkan untuk mengelola tugas-tugas yang akan dilakukan 3. bagaimana unjuk kerja lingkungan tersebut ditingkatkan melalui kemunculan informasi baru dan fungsionalitasnya yang ada dimana-mana
  • 3. APLIKASI PERVASIVE • Aplikasi: komputer genggam; komputer yang dapat dikenakan (wearable computer); jaringan LAN/ nirkabel; perangkat kontrol. • Penelitian di universitas: Project Aura di Carnegie Mellon, Endeavour di UC Berkeley, Oxygen di MIT, dan Portalano di Washington. • Penelitian di industri: AT&T Research di Cambridge (UK) dan IBM TJ Watson.
  • 6. AUGMENTED REALITY Karakteristik utama AR: 1. mengkombinasikan dunia nyata dan dunia virtual 2. interaktif dalam waktu nyata (real time) 3. terdaftar dalam ruang dimensi 3 (3D) Sumber: Azuma (1997)
  • 8. APLIKASI-APLIKASI AR Sistem informasi personal (Personal Assistance and Advertisement, Navigation,Touring) Militer dan industri (design, assembly, maintenance, Combat and simulation) Hiburan (Sports broadcasting, Games) Perkantoran (kolaborasi, pendidikan dan pelatihan) Medis
  • 9. CONTEXT-AWARE MOBILE AUGMENTED REALITY (CAMAR) 2.0 Smart home assistant Indoor tour guide
  • 11. MOBILE AUGMENTED REALITY BERBASIS KOMPUTASI AWAN (CLOUD COMPUTING) • Aspek pervasive computing adalah penghematan energi. • Komputasi awan diciptakan sebagai salah satu infrastruktur green technology • Komputasi awan akan menggantikan server-server konvensional ke dalam arsitektur cloud. • Penggunaan cloud storage sebagai database juga memudahkan pengembangan sistem AR selanjutnya.
  • 12. KESIMPULAN • Teknologi AR di masa depan akan menjadi teknologi yang semakin populer. • AR menciptakan lingkungan pervasive, karena objek-objek AR tertanam di sekitar lingkungan. • Komputasi awan mendukung infrastruktur sistem AR yang hemat energi dan mudah bergerak (mobile). • Jenis perangkat pervasive masa depan: ponsel cerdas (smartphone), tablet, kacamata pintar (Google Glass), helm pintar, dsb.
  • 13. REFERENSI 1. D. Saha and A. Mukherjee, "Pervasive Computing: A Paradigm for The 21st Century," IEEE Computer Society, pp. 25-31, 2003. 2. G. Banavar, J. Beck, E. Gluzberg, J. Munson, J. Sussman and D. Zukowski, "Challenges: an application model for pervasive computing," in In Proceedings of the 6th annual international conference on Mobile computing and networking, 2000. 3. M. Satyanarayanan, "Pervasive Computing:Vision and Challenges," IEEE Personal Communications, 2001. 4. P. Milgram and F. Kishino, "A Taxonomy Of Mixed Reality Visual Displays," in IEICE Transactions on Information Systems, 1994. 5. S. Zlatanova, "Augmented Reality Technology," TU Delft, Section GIS technology, Faculty of Civil Engineering and Geosciences, Delft, 2002. 6. R.T. Azuma, "A Survey of Augmented Reality," in In Presence:Teleoperators and Virtual Environments, 1997. 7. T. H. Höllerer and S. K. Feiner, "Mobile Augmented Reality," in Telegeoinformatics: Location-Based Computing and Services, 2004. 8. C. Ludwig and C. Reimann, "Augmented reality: Information at focus," in Cooperative Computing & Communication Laboratory (Volume 4. No. 1), 2005. 9. F. Zhou, H. B.-L. D. Duh and M. Billinghurst, "Trends in Augmented Reality Tracking, Interaction and Display: A Review of Ten Years of ISMAR," in IEEE International Symposium on Mixed and Augmented Reality, Cambridge, 2008. 10. S. C.-Y.Yuen, G.Yaoyuneyong and E. Johnson, "Augmented Reality: An Overview and Five Directions for AR in Education," Journal of Educational Technology Development and Exchange, pp. 119-140, 2011. 11. D. v. Krevelen and R. Poelman, "A Survey of Augmented Reality Technologies, Applications and Limitations," The International Journal of Virtual Reality, pp. 1-20, 2010. 12. C. Shin,W. Lee,Y. Suh, H.Yoon,Y. Lee and W.Woo, "CAMAR 2.0: Future Direction of Context-Aware Mobile Augmented Reality," in International Symposium on Ubiquitous Virtual Reality, 2009. 13. A. Schmeil and W. Broll, "MARA – A Mobile Augmented Reality-Based Virtual Assistant," in IEEE Virtual Reality Conference, North Carolina, 2007. 14. B.-R. Huang, C. H. Liny and C.-H. Lee, "Mobile Augmented Reality Based on Cloud Computing," in Anti-Counterfeiting, Security and Identification (ASID), 2012 International Conference on. IEEE, 2012.