Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Augmented Reality Presentation


Published on

Published in: Technology, Design

Augmented Reality Presentation

  1. 1. Augmented Reality <ul><li>A kshay Shah </li></ul><ul><li>Va R un Bakhru </li></ul><ul><li>Vikr A m Bhat </li></ul><ul><li>Kinchit R aja </li></ul>
  2. 2. What is AR? <ul><li>Augmented Reality = Real World + Virtual Layer </li></ul><ul><li>Virtual Reality = Virtual World + Real inputs </li></ul>
  3. 3. Where is AR used? <ul><li>Unfamiliar Environments </li></ul>
  4. 4. Non-repetitive tasks
  5. 5. Types of AR <ul><li>LEVEL 0 - Physical World Hyper Linking </li></ul>
  6. 6. LEVEL 1 - Marker Based AR
  7. 7. LEVEL 2 - Markerless AR
  8. 8. LEVEL 3 - Augmented Vision
  9. 9. AR Video
  10. 10. AR chitecture <ul><li>Push vs. Pull Mechanism . </li></ul><ul><li>Consumption Layer . </li></ul><ul><li>LAYAR Service Architecture. </li></ul>
  11. 11. Push vs. Pull Mechanism Query Response Data Intent Pull Mechanism Push Mechanism Data Repository Data Repository User User
  12. 12. Consumption Layer
  13. 13. LAYAR Service Architecture
  14. 14. AR VS Others <ul><li>Barcodes as a concept </li></ul><ul><li>RFID as a concept </li></ul><ul><li>Difference between AR and RFID architectures </li></ul><ul><li>Case Study </li></ul>
  15. 15. Architecture of AR
  16. 16. Architecture of RFID
  17. 17. Case Study <ul><li>Automated Car Park System </li></ul><ul><li>How AR can be used in this scenario </li></ul><ul><li>AR decreases the hardware costs </li></ul><ul><li>Improves security </li></ul><ul><li>Tag Tampering? </li></ul><ul><li>Face Tampering? </li></ul><ul><li>Helps in Identification </li></ul>
  18. 18. Automated car park system
  19. 19. Automated car park system
  20. 20. Automated car park system
  21. 21. Advantages: <ul><li>Performance and accuracy </li></ul><ul><li>Engineering design </li></ul><ul><li>Education and Learning </li></ul>
  22. 22. Disadvantages: <ul><li>Spam and Security </li></ul><ul><li>Interoperability </li></ul><ul><li>Openness </li></ul>
  23. 23. Conclusion: <ul><li>A new approach to user interface. </li></ul><ul><li>A new way of interacting with UI. </li></ul><ul><li>Possibly will be used in our daily use and all applications. </li></ul>
  24. 24. References: <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>Images: </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  25. 25. Thank You Prof. Dan Harkey And Special Thanks To: Mr. Chirag Mehta