SlideShare ist ein Scribd-Unternehmen logo
1 von 14
TEKNOLOGI AUGMENTED
REALITY SEBAGAI
TERAPAN APLIKASI
PERVASIVE COMPUTING
Oleh:
ADITYA RIZKI YUDIANTIKA
www.adityarizki.net
PERVASIVE COMPUTING
• “Teknologi yang paling canggih di abad ke-21 setelah penemuan komputer personal
adalah teknologi yang tidak lagi tampak secara fisik”, (Mark Weiser, 1991)
• Pervasive computing menyangkut 3 hal pokok:
1. cara orang memahami perangkat komputasi bergerak dan menggunakannya dalam
lingkungan sekitar untuk melakukan tugas spesifik
2. cara aplikasi dikembangkan dan disebarkan untuk mengelola tugas-tugas yang akan
dilakukan
3. bagaimana unjuk kerja lingkungan tersebut ditingkatkan melalui kemunculan informasi
baru dan fungsionalitasnya yang ada dimana-mana
APLIKASI PERVASIVE
• Aplikasi: komputer genggam; komputer yang dapat dikenakan
(wearable computer); jaringan LAN/ nirkabel; perangkat kontrol.
• Penelitian di universitas: Project Aura di Carnegie Mellon, Endeavour
di UC Berkeley, Oxygen di MIT, dan Portalano di Washington.
• Penelitian di industri: AT&T Research di Cambridge (UK) dan IBM TJ
Watson.
LINGKUNGAN PERVASIVE
TANTANGAN PERVASIVE COMPUTING
AUGMENTED REALITY
Karakteristik utama AR:
1. mengkombinasikan dunia
nyata dan dunia virtual
2. interaktif dalam waktu nyata
(real time)
3. terdaftar dalam ruang
dimensi 3 (3D)
Sumber: Azuma (1997)
PERKEMBANGAN AR
APLIKASI-APLIKASI AR
Sistem informasi
personal (Personal
Assistance and
Advertisement,
Navigation,Touring)
Militer dan industri
(design, assembly,
maintenance,
Combat and
simulation)
Hiburan (Sports
broadcasting,
Games)
Perkantoran
(kolaborasi,
pendidikan dan
pelatihan)
Medis
CONTEXT-AWARE MOBILE AUGMENTED
REALITY (CAMAR) 2.0
Smart home assistant Indoor tour guide
MOBILE AUGMENTED REALITY-BASED
VIRTUAL ASSISTANT (MARA)
MOBILE AUGMENTED REALITY BERBASIS
KOMPUTASI AWAN (CLOUD COMPUTING)
• Aspek pervasive computing adalah penghematan energi.
• Komputasi awan diciptakan sebagai salah satu infrastruktur green technology
• Komputasi awan akan menggantikan server-server konvensional ke dalam arsitektur
cloud.
• Penggunaan cloud storage sebagai database juga memudahkan pengembangan
sistem AR selanjutnya.
KESIMPULAN
• Teknologi AR di masa depan akan menjadi teknologi yang semakin
populer.
• AR menciptakan lingkungan pervasive, karena objek-objek AR
tertanam di sekitar lingkungan.
• Komputasi awan mendukung infrastruktur sistem AR yang hemat
energi dan mudah bergerak (mobile).
• Jenis perangkat pervasive masa depan: ponsel cerdas (smartphone),
tablet, kacamata pintar (Google Glass), helm pintar, dsb.
REFERENSI
1. D. Saha and A. Mukherjee, "Pervasive Computing: A Paradigm for The 21st Century," IEEE Computer Society, pp. 25-31, 2003.
2. G. Banavar, J. Beck, E. Gluzberg, J. Munson, J. Sussman and D. Zukowski, "Challenges: an application model for pervasive computing," in In
Proceedings of the 6th annual international conference on Mobile computing and networking, 2000.
3. M. Satyanarayanan, "Pervasive Computing:Vision and Challenges," IEEE Personal Communications, 2001.
4. P. Milgram and F. Kishino, "A Taxonomy Of Mixed Reality Visual Displays," in IEICE Transactions on Information Systems, 1994.
5. S. Zlatanova, "Augmented Reality Technology," TU Delft, Section GIS technology, Faculty of Civil Engineering and Geosciences, Delft, 2002.
6. R.T. Azuma, "A Survey of Augmented Reality," in In Presence:Teleoperators and Virtual Environments, 1997.
7. T. H. Höllerer and S. K. Feiner, "Mobile Augmented Reality," in Telegeoinformatics: Location-Based Computing and Services, 2004.
8. C. Ludwig and C. Reimann, "Augmented reality: Information at focus," in Cooperative Computing & Communication Laboratory (Volume 4.
No. 1), 2005.
9. F. Zhou, H. B.-L. D. Duh and M. Billinghurst, "Trends in Augmented Reality Tracking, Interaction and Display: A Review of Ten Years of ISMAR,"
in IEEE International Symposium on Mixed and Augmented Reality, Cambridge, 2008.
10. S. C.-Y.Yuen, G.Yaoyuneyong and E. Johnson, "Augmented Reality: An Overview and Five Directions for AR in Education," Journal of
Educational Technology Development and Exchange, pp. 119-140, 2011.
11. D. v. Krevelen and R. Poelman, "A Survey of Augmented Reality Technologies, Applications and Limitations," The International Journal of
Virtual Reality, pp. 1-20, 2010.
12. C. Shin,W. Lee,Y. Suh, H.Yoon,Y. Lee and W.Woo, "CAMAR 2.0: Future Direction of Context-Aware Mobile Augmented Reality," in International
Symposium on Ubiquitous Virtual Reality, 2009.
13. A. Schmeil and W. Broll, "MARA – A Mobile Augmented Reality-Based Virtual Assistant," in IEEE Virtual Reality Conference, North Carolina,
2007.
14. B.-R. Huang, C. H. Liny and C.-H. Lee, "Mobile Augmented Reality Based on Cloud Computing," in Anti-Counterfeiting, Security and
Identification (ASID), 2012 International Conference on. IEEE, 2012.
TERIMA KASIH

Weitere ähnliche Inhalte

Was ist angesagt?

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKamran Ashraf
 
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van Lier
Presentatie The Internet of Things   iBestuur Congres 2013 door Ben van LierPresentatie The Internet of Things   iBestuur Congres 2013 door Ben van Lier
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van LierCentric
 
Looking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthLooking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthThe Innovation Group
 
Future of nanotechnology (star trek fiction)
Future of nanotechnology (star trek fiction)Future of nanotechnology (star trek fiction)
Future of nanotechnology (star trek fiction)Sessi Adeyemisi
 
Four Disruptive Trends for the Next Decade
Four Disruptive Trends for the Next DecadeFour Disruptive Trends for the Next Decade
Four Disruptive Trends for the Next DecadeLarry Smarr
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsJosephHowerton
 
Tangible & Embodied Interaction @RSE11
Tangible & Embodied Interaction @RSE11Tangible & Embodied Interaction @RSE11
Tangible & Embodied Interaction @RSE11Matthias Mueller-Prove
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 

Was ist angesagt? (20)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van Lier
Presentatie The Internet of Things   iBestuur Congres 2013 door Ben van LierPresentatie The Internet of Things   iBestuur Congres 2013 door Ben van Lier
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van Lier
 
Looking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthLooking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart Earth
 
Learning Environments
Learning EnvironmentsLearning Environments
Learning Environments
 
Future of nanotechnology (star trek fiction)
Future of nanotechnology (star trek fiction)Future of nanotechnology (star trek fiction)
Future of nanotechnology (star trek fiction)
 
Four Disruptive Trends for the Next Decade
Four Disruptive Trends for the Next DecadeFour Disruptive Trends for the Next Decade
Four Disruptive Trends for the Next Decade
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Xxie cv
Xxie cvXxie cv
Xxie cv
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart Environments
 
Tangible & Embodied Interaction @RSE11
Tangible & Embodied Interaction @RSE11Tangible & Embodied Interaction @RSE11
Tangible & Embodied Interaction @RSE11
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ict convergence dr nana k annan
Ict convergence dr nana k annanIct convergence dr nana k annan
Ict convergence dr nana k annan
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Andere mochten auch

Augmented Reality: Reality Gets Better
Augmented Reality: Reality Gets BetterAugmented Reality: Reality Gets Better
Augmented Reality: Reality Gets BetterAditya Yudiantika
 
An Augmented Reality Museum Guide
An Augmented Reality Museum GuideAn Augmented Reality Museum Guide
An Augmented Reality Museum GuideAditya Yudiantika
 
Teknik Search Engine Optimization
Teknik Search Engine OptimizationTeknik Search Engine Optimization
Teknik Search Engine OptimizationAditya Yudiantika
 
Presentasi fallacies (kelas f1)
Presentasi fallacies (kelas f1)Presentasi fallacies (kelas f1)
Presentasi fallacies (kelas f1)Junika Kasih
 
IT投資のオペレーション・マネジメントの価値
IT投資のオペレーション・マネジメントの価値IT投資のオペレーション・マネジメントの価値
IT投資のオペレーション・マネジメントの価値Tetsu Kawata
 
Тест вашей спине
Тест вашей спинеТест вашей спине
Тест вашей спинеSerega Artamonov
 
презентация здоровые рабочие места
презентация здоровые рабочие местапрезентация здоровые рабочие места
презентация здоровые рабочие местаSerega Artamonov
 
Презентация и продукт
Презентация и продуктПрезентация и продукт
Презентация и продуктSerega Artamonov
 
Running a Social Media Department of One
Running a Social Media Department of OneRunning a Social Media Department of One
Running a Social Media Department of Onejenna_withrow
 
коррекционное питание для спины
коррекционное питание для спиныкоррекционное питание для спины
коррекционное питание для спиныSerega Artamonov
 
Cuando los trabajadores acosan a sus jefes
Cuando los trabajadores acosan a sus jefesCuando los trabajadores acosan a sus jefes
Cuando los trabajadores acosan a sus jefesDuglas Yanes Reyes
 

Andere mochten auch (20)

Augmented Reality: Reality Gets Better
Augmented Reality: Reality Gets BetterAugmented Reality: Reality Gets Better
Augmented Reality: Reality Gets Better
 
Lab intro
Lab introLab intro
Lab intro
 
An Augmented Reality Museum Guide
An Augmented Reality Museum GuideAn Augmented Reality Museum Guide
An Augmented Reality Museum Guide
 
MQ Messaging
MQ MessagingMQ Messaging
MQ Messaging
 
Teknik Search Engine Optimization
Teknik Search Engine OptimizationTeknik Search Engine Optimization
Teknik Search Engine Optimization
 
Presentation1
Presentation1Presentation1
Presentation1
 
книга
книгакнига
книга
 
Presentasi fallacies (kelas f1)
Presentasi fallacies (kelas f1)Presentasi fallacies (kelas f1)
Presentasi fallacies (kelas f1)
 
IT投資のオペレーション・マネジメントの価値
IT投資のオペレーション・マネジメントの価値IT投資のオペレーション・マネジメントの価値
IT投資のオペレーション・マネジメントの価値
 
Morfo
MorfoMorfo
Morfo
 
Bioquimica expo
Bioquimica expoBioquimica expo
Bioquimica expo
 
Тест вашей спине
Тест вашей спинеТест вашей спине
Тест вашей спине
 
Salud oral
Salud oralSalud oral
Salud oral
 
Presentation1
Presentation1Presentation1
Presentation1
 
презентация здоровые рабочие места
презентация здоровые рабочие местапрезентация здоровые рабочие места
презентация здоровые рабочие места
 
Презентация и продукт
Презентация и продуктПрезентация и продукт
Презентация и продукт
 
Running a Social Media Department of One
Running a Social Media Department of OneRunning a Social Media Department of One
Running a Social Media Department of One
 
коррекционное питание для спины
коррекционное питание для спиныкоррекционное питание для спины
коррекционное питание для спины
 
Cuando los trabajadores acosan a sus jefes
Cuando los trabajadores acosan a sus jefesCuando los trabajadores acosan a sus jefes
Cuando los trabajadores acosan a sus jefes
 
Mengenal Karakter Situsweb
Mengenal Karakter SituswebMengenal Karakter Situsweb
Mengenal Karakter Situsweb
 

Ähnlich wie Augmented Reality as A Pervasive Technology: Context-Aware Approach

Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
SEMINAR REPORT (1)
SEMINAR REPORT (1)SEMINAR REPORT (1)
SEMINAR REPORT (1)AISWARYA T
 
ICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
ICC tutorial: Wireless Communication with Unmanned Aerial VehiclesICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
ICC tutorial: Wireless Communication with Unmanned Aerial VehiclesEvgenii (Genia) Vinogradov
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paperEman Kanjo
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...FIA2010
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Ähnlich wie Augmented Reality as A Pervasive Technology: Context-Aware Approach (20)

Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
SEMINAR REPORT (1)
SEMINAR REPORT (1)SEMINAR REPORT (1)
SEMINAR REPORT (1)
 
ICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
ICC tutorial: Wireless Communication with Unmanned Aerial VehiclesICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
ICC tutorial: Wireless Communication with Unmanned Aerial Vehicles
 
Event Based Social Networks
Event Based Social NetworksEvent Based Social Networks
Event Based Social Networks
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paper
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
Real World Internet, Smart Cities and Linked Data: Mirko Presser (Alexandrea ...
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Augmented Reality as A Pervasive Technology: Context-Aware Approach

  • 1. TEKNOLOGI AUGMENTED REALITY SEBAGAI TERAPAN APLIKASI PERVASIVE COMPUTING Oleh: ADITYA RIZKI YUDIANTIKA www.adityarizki.net
  • 2. PERVASIVE COMPUTING • “Teknologi yang paling canggih di abad ke-21 setelah penemuan komputer personal adalah teknologi yang tidak lagi tampak secara fisik”, (Mark Weiser, 1991) • Pervasive computing menyangkut 3 hal pokok: 1. cara orang memahami perangkat komputasi bergerak dan menggunakannya dalam lingkungan sekitar untuk melakukan tugas spesifik 2. cara aplikasi dikembangkan dan disebarkan untuk mengelola tugas-tugas yang akan dilakukan 3. bagaimana unjuk kerja lingkungan tersebut ditingkatkan melalui kemunculan informasi baru dan fungsionalitasnya yang ada dimana-mana
  • 3. APLIKASI PERVASIVE • Aplikasi: komputer genggam; komputer yang dapat dikenakan (wearable computer); jaringan LAN/ nirkabel; perangkat kontrol. • Penelitian di universitas: Project Aura di Carnegie Mellon, Endeavour di UC Berkeley, Oxygen di MIT, dan Portalano di Washington. • Penelitian di industri: AT&T Research di Cambridge (UK) dan IBM TJ Watson.
  • 6. AUGMENTED REALITY Karakteristik utama AR: 1. mengkombinasikan dunia nyata dan dunia virtual 2. interaktif dalam waktu nyata (real time) 3. terdaftar dalam ruang dimensi 3 (3D) Sumber: Azuma (1997)
  • 8. APLIKASI-APLIKASI AR Sistem informasi personal (Personal Assistance and Advertisement, Navigation,Touring) Militer dan industri (design, assembly, maintenance, Combat and simulation) Hiburan (Sports broadcasting, Games) Perkantoran (kolaborasi, pendidikan dan pelatihan) Medis
  • 9. CONTEXT-AWARE MOBILE AUGMENTED REALITY (CAMAR) 2.0 Smart home assistant Indoor tour guide
  • 11. MOBILE AUGMENTED REALITY BERBASIS KOMPUTASI AWAN (CLOUD COMPUTING) • Aspek pervasive computing adalah penghematan energi. • Komputasi awan diciptakan sebagai salah satu infrastruktur green technology • Komputasi awan akan menggantikan server-server konvensional ke dalam arsitektur cloud. • Penggunaan cloud storage sebagai database juga memudahkan pengembangan sistem AR selanjutnya.
  • 12. KESIMPULAN • Teknologi AR di masa depan akan menjadi teknologi yang semakin populer. • AR menciptakan lingkungan pervasive, karena objek-objek AR tertanam di sekitar lingkungan. • Komputasi awan mendukung infrastruktur sistem AR yang hemat energi dan mudah bergerak (mobile). • Jenis perangkat pervasive masa depan: ponsel cerdas (smartphone), tablet, kacamata pintar (Google Glass), helm pintar, dsb.
  • 13. REFERENSI 1. D. Saha and A. Mukherjee, "Pervasive Computing: A Paradigm for The 21st Century," IEEE Computer Society, pp. 25-31, 2003. 2. G. Banavar, J. Beck, E. Gluzberg, J. Munson, J. Sussman and D. Zukowski, "Challenges: an application model for pervasive computing," in In Proceedings of the 6th annual international conference on Mobile computing and networking, 2000. 3. M. Satyanarayanan, "Pervasive Computing:Vision and Challenges," IEEE Personal Communications, 2001. 4. P. Milgram and F. Kishino, "A Taxonomy Of Mixed Reality Visual Displays," in IEICE Transactions on Information Systems, 1994. 5. S. Zlatanova, "Augmented Reality Technology," TU Delft, Section GIS technology, Faculty of Civil Engineering and Geosciences, Delft, 2002. 6. R.T. Azuma, "A Survey of Augmented Reality," in In Presence:Teleoperators and Virtual Environments, 1997. 7. T. H. Höllerer and S. K. Feiner, "Mobile Augmented Reality," in Telegeoinformatics: Location-Based Computing and Services, 2004. 8. C. Ludwig and C. Reimann, "Augmented reality: Information at focus," in Cooperative Computing & Communication Laboratory (Volume 4. No. 1), 2005. 9. F. Zhou, H. B.-L. D. Duh and M. Billinghurst, "Trends in Augmented Reality Tracking, Interaction and Display: A Review of Ten Years of ISMAR," in IEEE International Symposium on Mixed and Augmented Reality, Cambridge, 2008. 10. S. C.-Y.Yuen, G.Yaoyuneyong and E. Johnson, "Augmented Reality: An Overview and Five Directions for AR in Education," Journal of Educational Technology Development and Exchange, pp. 119-140, 2011. 11. D. v. Krevelen and R. Poelman, "A Survey of Augmented Reality Technologies, Applications and Limitations," The International Journal of Virtual Reality, pp. 1-20, 2010. 12. C. Shin,W. Lee,Y. Suh, H.Yoon,Y. Lee and W.Woo, "CAMAR 2.0: Future Direction of Context-Aware Mobile Augmented Reality," in International Symposium on Ubiquitous Virtual Reality, 2009. 13. A. Schmeil and W. Broll, "MARA – A Mobile Augmented Reality-Based Virtual Assistant," in IEEE Virtual Reality Conference, North Carolina, 2007. 14. B.-R. Huang, C. H. Liny and C.-H. Lee, "Mobile Augmented Reality Based on Cloud Computing," in Anti-Counterfeiting, Security and Identification (ASID), 2012 International Conference on. IEEE, 2012.