Professional Documents
Culture Documents
WOLLEGA UNIVERSITYSCHOOLOF
GRADUATESTUDIESFACULTYOF
INFORMATICSDEPARTMENTOFCOMPUTERSCIENCE
Group Assignment
No Name IdNo
yared Mehari
Firanol Merga
Merartu Abebe
Michael Melaku
Hayimanot Mehari
Hayile Getachew
Yeshi
Lalise File
cheneka
1
Group Assignment
Contents
Unit One
o 1.1Natural processing Language.........................................................................................................................3
o 1.2 why is NLP difficult?....................................................................................................................................3
o 1.3 NLP tasks......................................................................................................................................................4
1.4 natural language processing used techniques ...............................................................................................4
o 1.5 Ambiguity.....................................................................................................................................................5
o 1.6 DisAmbiguity................................................................................................................................................5
o 1.7Some NLP applications..................................................................................................................................5
o Unit 2
o 2.1 Blockchain defined.......................................................................................................................................6
o 2.2How does blockchain technology work?.......................................................................................................6
o 2.3 some important definitions...........................................................................................................................7
o 2.4 Three types of blockchain.............................................................................................................................7
o 2.5 Benefit of
Blockchain……………………………………………………………………………………………………………...
……7
o 2.6 Blockchain IoT partnerships..........................................................................................................................8
o 2.7 Bitcoin………………………………………………………………………………………………………….
………………..……………8
o 2.8 Bitcoin’s origin ,early growth ,and evolution...............................................................................................9
o 2.9 bitcoin used for?...........................................................................................................................................10
o 2.10 Bitcoin basic features..................................................................................................................................11
o 2.11 Bitcoin’s economics feature.......................................................................................................................12
o 2.12 Who decides what Bit coin is?...................................................................................................................13
Unit three(3)
o 3.1 Web 3.0 technology......................................................................................................................................14
o 3.2 Web 3.0.........................................................................................................................................................14
o 3.3 Key features of 3.0.......................................................................................................................................15
o 3.4 Layers of web3.0..........................................................................................................................................16
o 3.5 How does web 3.0 work................................................................................................................................16
o 3.6 How will web 3.0 change our lives...............................................................................................................17
o 3.7 Key Application of Web 3.0................................................................................................................... ......17
o 3.8 Advantage and disadvantage of web3.0....................................................................................................... 18
o Unit Four
o 4.1 Augmented reality.........................................................................................................................................19
o 4.2 introduction of augmented reality..................................................................................................................19
o 4.3 What is Augmented Reality?.........................................................................................................................19
o 4.4 two Examples and Non examples of Augmented Reality..............................................................................20
o 4.5 Augmented media .........................................................................................................................................20
o 4.6 Augmented Sensor.........................................................................................................................................20
o 4.7 A type of a location trigger is matching on GPS.............................................................................................22
o 4.8 BMW Service’s app _reality _introduction.....................................................................................................22
o 4.9 augmentation aligned with reality?................................................................................................................22
2
Group Assignment
Unit one(1)
Natural processing Language
3
Group Assignment
• Comprehensively understanding the human language requires understanding both the
words and how the concepts are connected to deliver the intended message.
• While humans can easily master a language, the ambiguity and imprecise characteristics
of the natural languages are what make NLP difficult for machines to implement.
4
Group Assignment
• Speech recognition, also called speech-to-text, is the task of reliably converting voice data
into text data. Speech recognition is required for any application that follows voice commands or
answers spoken questions. What makes speech recognition especially challenging is the way people
talk quickly, slurring words together, with varying emphasis and intonation, in different accents, and
often using incorrect grammar .
• Natural language generation is sometimes described as the opposite of speech recognition
or speech-to-text; it's the task of putting structured information into human language.
• Sentiment analysis attempts to extract subjective qualities, attitudes,emotions, sarcasm, confusion,
suspicion from text.
• Co-reference resolution is the task of identifying if and when two wordsrefer to the same
entity . The most common example is determining the person or object to which a certain pronoun
refers (e.g., ‘she’ = ‘Mary’), but it can also involve identifying Anaphor or an idiom in the text.
1.5 Ambiguity
• We say some input is ambiguous if there are multiple alternative
linguistic structures that can be built for it. Example: -I made her duck.
• Possible interpretations:
1. I cooked waterfowl for her
2. I cooked waterfowl belonging to her
3. I created (plaster?) duck she owns.
4. I caused her to quickly lower her head or body.
5. I waived my magic want and turned her into undifferentiated waterfowl.
1.6 Disambiguation
• The models and algorithms as ways to resolve ordisambiguate these ambiguities.
• For example:
deciding whether duck is a verb or a noun can be solved by part-of-speech tagging. deciding whether
make means “create” or “cook” can be solved by word sense disambiguation.
• Resolution of part-of-speech and word sense ambiguities are two important kinds of lexical
disambiguation. A wide variety of tasks can be framed as lexical disambiguation problems.
For example,
• A text-to-speech synthesis system reading the word lead needs to decide whether it should be
pronounced as in lead pipe or as in lead me on.
5
Group Assignment
• Exam marking • Report generation •
Machine translation • Email understanding •
Dialogue systems
Unit 2
Blockchain and BitCoin Technology
What is Blockchain?
Trust, accountability, transparency, and security are forged into the chain. This enables many
types of organizations and trading partners to access and share data, a phenomenon known as
third-party, consensus-based trust.
6
Group Assignment
All participants maintain an encrypted record of every transaction within a decentralized, highly
scalable, and resilient recording mechanism that cannot be repudiated. Blockchain does not
require any additional overhead or intermediaries. Having a decentralized, single source of truth
reduces the cost of executing trusted business interactions among parties that may not fully trust
each other. In a permissioned blockchain, used by most enterprises, participants are authorized to
participate in the network, and each participant maintains an encrypted record of every
transaction.
Any company or group of companies that needs a secure, real-time, shareable record of
transactions can benefit from this unique technology. There is no single location where
everything is stored, leading to better security and availability, with no central point of
vulnerability.
To learn more about blockchain, its underlying technology, and use cases, here are
2.3some important definitions.:-
Decentralized trust:-The key reason that organizations use blockchain technology, instead of
other data stores, is to provide a guarantee of data integrity without relying on a central authority.
This is called decentralized trust through reliable data.
Blockchain blocks:-The name blockchain comes from the fact that the data is stored in blocks,
and each block is connected to the previous block, making up a chainlike structure. With
blockchain technology, you can only add (append) new blocks to a blockchain. You can’t modify
or delete any block after it gets added to the blockchain.
Consensus algorithms:-Algorithms that enforce the rules within a blockchain system. Once the
participating parties set up rules for the blockchain, the consensus algorithm ensures that those
rules are followed.
Blockchain nodes:-Blockchain blocks of data are stored on nodes—the storage units that keep
the data in sync or up to date. Any node can quickly determine if any block has changed since it
was added. When a new, full node joins the blockchain network, it downloads a copy of all the
blocks currently on the chain. After the new node synchronizes with the other nodes and has the
latest blockchain version, it can receive any new blocks, just like other nodes.
There are two main types of blockchain nodes:
Full nodes store a complete copy of the blockchain.
Lightweight nodes only store the most recent blocks, and can request older blocks when users
need them.
2.4 Three types of blockchain
Public blockchain.
A public, or permission-less, blockchain network is one where anyone can participate without
restrictions. Most types of cryptocurrencies run on a public blockchain that is governed by rules
or consensus algorithms.
Permissioned or private blockchain.A private, or permissioned, blockchain allows
organizations to set controls on who can access blockchain data. Only users who are granted
permissions can access specific sets of data. Oracle Blockchain Platform is a permissioned
blockchain.
7
Group Assignment
Federated or consortium blockchain.A blockchain network where the consensus process
(mining process) is closely controlled by a preselected set of nodes or by a preselected number of
stakeholders.
2.5 Benefits of blockchain—The use of blockchain technology is expected to significantly
increase over the next few years. This game-changing technology is considered both innovative
and disruptive because blockchain will change existing business processes with streamlined
efficiency, reliability, and security.Blockchain technology delivers specific business benefits that
help companies in the following ways:
a) Establishes trust among parties doing business together by offering reliable, shared data
b) Eliminates siloed data by integrating data into one system through a distributed ledger
shared within a network that permissioned parties can access
c) Offers a high level of security for data
d) Reduces the need for third-party intermediaries
e) Creates real-time, tamper-evident records that can be shared among all participants
f) Allows participants to ensure the authenticity and integrity of products placed into the
stream of commerce
g) Enables seamless tracking and tracing of goods and services across the supply chain
h) Provides food safety with Oracle Blockchain Platform
8
Group Assignment
Practically speaking, Bitcoin is a form of digital money that (1) exists independently of
anygovernment, state, or financial institution, (2) can be transferred globally without the need
for a centralized intermediary, and (3) has a known monetary policy that arguably cannot be
altered. At a deeper level, Bitcoin can be described as a political, philosophical, and economic
system. This is thanks to the combination of the technical features it integrates, the wide array
of participants and stakeholders it involves, and the process for making changes to the
protocol. Bitcoin can refer to the Bitcoin software protocol as well as to the monetary unit,
which goes by the ticker symbol BTC. Launched anonymously in January 2009 to a niche group
oftechnologists, Bitcoin is now a globally traded financial asset with daily settled volume
measured in the tens of billions of dollars. Although its regulatory status varies by region and
and is legal to use (with varying levels of restrictions) in all major economies. In June 2021, El
9
Group Assignment
2.8 Bitcoin's origin, early growth, and evolution Bitcoin is based on the ideas laid out
in a 2008 whitepaper titled
The paper detailed methods for "allowing any two willing parties to transact directly with each
other without the need for a trusted third party." The technologies deployed solved the 'double
spend' problem, enabling scarcity in the digital environment for the first time.
The listed author of the paper is Satoshi Nakamoto, a presumed pseudonym for a person or
group whose true identity remains a mystery. Nakamoto released the first open-source Bitcoin
software client on January 9th, 2009, and anyone who installed the client could begin using
Bitcoin.Initial growth of the Bitcoin network was driven primarily by its utility as a novel method
for transacting value in the digital world. Early proponents were, by and large, 'cypherpunks' -
individuals who advocated the use of strong cryptography and privacy-enhancing technologies
as a route to social and political change. However, speculation as to the future value of Bitcoin
soon became a significant driver of adoption.The price of bitcoin and the number of Bitcoin
users rose in waves over the following decade. As regulators in major economies provided
clarity on the legality of Bitcoin and other cryptocurrencies, a large number of Bitcoin
exchanges established banking connections, making it easy to convert local currency to and
from bitcoin. Other businesses established robust custodial services, making it easier for
system. People use Bitcoin to, for example, make international payments that are settled faster,
more securely, and at lower transactional fees than through legacy settlement methods such as
10
Group Assignment
In the early years, when network adoption was sparse, Bitcoin could be used to settle even
small-value transactions, and do so competitively with payment networks like Visa and
became more widely used, scaling issues made it less competitive as a medium of exchange for
small-value items.
throughput on the ledger and the lack of availability of second-layer solutions. This supported
the narrative that Bitcoin's primary value is less as a payment network and more as an
alternative to gold, or 'digital gold.' Here, the argument is that Bitcoin derives value from a
combination of the technological breakthroughs it integrates, its capped supply with 'built-into-
the-code' monetary policy, and its powerful network effects. In this regard, the investment
thesis is that Bitcoin could replace gold and potentially become a form of 'pristine collateral' for
Another popular narrative is that Bitcoin supports economic freedom. It is said to do this by
providing, on an opt-in basis, an alternative form of money that integrates strong protection
against (1) monetary confiscation, (2) censorship, and (3) devaluation through uncapped
inflation. Note that this narrative is not mutually exclusive from the 'digital gold' narrative.
Decentralized: Nobody controls or owns the Bitcoin network, and there is no CEO. Instead,
the network consists of willing participants who agree to the rules of a protocol (which takes
the form of an open-source software client). Changes to the protocol must be made by the
consensus of its users and there is a wide array of contributing voices including 'nodes,' end
users, developers, 'miners,' and adjacent industry participants like exchanges, wallet providers,
11
Group Assignment
considered to strengthen its position as pristine collateral for the global economy.
Distributed: All Bitcoin transactions are recorded on a public ledger that has come to be
known as the 'blockchain.' The network relies on people voluntarily storing copies of the ledger
and running the Bitcoin protocol software. These 'nodes' contribute to the correct propagation
of transactions across the network by following the rules of the protocol as defined by the
software client. There are currently more than 80,000 nodes distributed globally, making it next
Transparent: The addition of new transactions to the blockchain ledger and the state of the
Bitcoin network at any given time (in other words, the 'truth' of who owns how much bitcoin) is
arrived upon by consensus and in a transparent manner according to the rules of the protocol.
Peer-to-peer: Although nodes store and propagate the state of the network (the 'truth'),
payments effectively go directly from one person or business to another. This means there’s no
Permissionless: Anyone can use Bitcoin, there are no gatekeepers, and there is no need to
create a 'Bitcoin account.' Any and all transactions that follow the rules of the protocol will be
strings.
Censorship resistant: Since all Bitcoin transactions that follow the rules of the protocol are
valid, since transactions are pseudo-anonymous, and since users themselves possess the 'key' to
their bitcoin holdings, it is difficult for authorities to ban individuals from using it or to seize their
12
Group Assignment
assets. This carries important implications for economic freedom, and may even act as a
Public: All Bitcoin transactions are recorded and publicly available for anyone to see. While this
virtually eliminates the possibility of fraudulent transactions, it also makes it possible to, in some
cases, tie by deduction individual identities to specific Bitcoin addresses. A number of efforts to
enhance Bitcoin's privacy are underway, but their integration into the protocol is ultimately subject
'hard asset,' one of several characteristics that has contributed to its perceived value from an
investment perspective.
Disinflationary: The rate that new bitcoins are added to the circulating supply gradually
decreases along a defined schedule that is built into the code. Starting at 50 bitcoins per block (a
new block is added approximately every 10 minutes), the issuance rate is cut in half
approximately every four years. In May 2020, the third halving reduced the issuance rate from
12.5 to 6.25 bitcoins per block. At that point 18,375,000 of the 21 million coins (87.5% of the
total) had been 'mined.' The fourth halving, in 2024, will reduce the issuance to 3.125 BTC, and
so on until approximately the year 2136, when the final halving will decrease the block reward
Incentive driven: A core set of participants, known as miners, are driven by profit to
contribute the resources needed to maintain and secure the network. Through a process known
as Proof-of-Work (PoW), miners compete to add new blocks to the chain that constitutes the
ledger (the blockchain). The hardware and energy costs associated with PoW mining contribute
to the security of the network in a decentralized fashion along game-theory driven principles.
13
Group Assignment
The profit motive is considered important in this regard. Further, since miners tend to sell their
earned bitcoin to cover their significant mining-related costs, the mining process is seen as a fair
will continue to evolve. While there are a number of formalized procedures for upgrading
Bitcoin (see "How does Bitcoin governance work?"), governance of the protocol is ultimately
based on deliberation, persuasion, and volition. In other words, people decide what Bitcoin is.
In several instances, there have been significant disagreements amongst the community as to
the direction that Bitcoin should take. When such disagreements cannot be resolved through
deliberation and persuasion, a portion of users may - of their own volition - choose to
The alternative version of Bitcoin with the greatest number of adherents has come to be known
as Bitcoin Cash (BCH). It arose out of a proposal aiming to solve scaling problems that had
resulted in rising transaction costs and increasing transaction confirmation times. This version
Unit 3
14
Group Assignment
It is anticipated that Web 3.0 will be:- Open - Open-source software will be used to build
content platforms.
Trustless - Everyone will use Zero Trust, and network protection will reach the edge.
Distributed - Interaction between devices, users, and services will be possible without a
centralized authority's approval. The following are further Web 3 forecasts: All transactions will
be tracked on a distributed ledger that uses blockchain technology, and data transfers will be
decentralized. Smart contracts that are open to everyone will relieve people of the need to rely
on a centralized organization (like a bank) to maintain data integrity. The entertainment sector
will significantly increase its revenue from the metaverse. ` Blockchain
technologywill make it possible for consumers to instantly produce digital goods and non-
fungible tokens (NFTs), which will protect intellectual property and personally identifiable
information (PII).Users' data will be able to be profited from. 3.2 What Is
Web 3.0? Tim Berners-Lee, a
developer who created the WWW or World Wide Web, originally referred to Web 3.0 as the
Semantic Web and saw an intelligent, self-sufficient, and open Internet that employed AI and
machine learning to function as a "global brain" and interpret content conceptually and
contextually.Due to technological constraints, such as how expensive and challenging it is to
translate human language into machine understandable language, this idealized version didn't
quite work out. Following is a
list of typical Web 3.0 traits:The semantic web is a development in online technology that
enables people to produce, share, and connect material through search and analysis. Instead of
using numbers and keywords, it is centered on word understanding.
It uses machine learning and artificial intelligence. The final result is the formation of Web 3.0 to
grow smarter and more receptive to user demands. If these ideas are paired with Natural
Language Processing (NLP), the result is a computer that uses NLP.
It illustrates how the Internet of Things connects various devices and applications (IoT). This
procedure is made possible by semantic metadata, allowing for the efficient exploitation of all
15
Group Assignment
available data. In addition, anyone can access the internet from anywhere at any time without a
computer or other smart device.It gives users a choice to interact in public or in private without
exposing them to dangers through a third party, providing "trustless" data.3-D graphics are
used. In fact, this is already evident in e-commerce, virtual tours, and computer gaming.It makes
participation easier without requiring consent from a ruling entity. It's without authorization. It
is applicable to:
16
Group Assignment
generators can sell or share their data without losing ownership or relying on intermediaries
using decentralized data networks. Artificial Intelligence and Machine Learning - Artificial
intelligence and machine learning algorithms have advanced to the level that they can now make
useful and occasionally life-saving predictions and acts.
Data ownership: When you use a platform like Facebook or YouTube, these businesses gather,
own, and recoup your data. Your data is stored on your cryptocurrency wallet in web3. On web3,
you'll interact with apps and communities through your wallet, and when you log off, you'll take
your data with you. Since you are the owner of the data, you may theoretically choose whether to
monetize
Pseudonymity: Privacy is a feature of your wallet, just as data ownership. Your wallet serves as
your identification on web3, which makes it difficult to connect it to your actual identity.
Therefore, even if someone can observe the activity of a wallet, they won't be able to identify
your wallet. "My personal information is hidden, but my behavior is visible." It was quoted by
Neuroth. There are services that help customers connect to their cryptocurrency wallets used for
illegal behavior. However, your identity is concealed for daily use.
Although wallets increase the level of privacy for bitcoin transactions, privacy coins like Z cash
and Monera give transactions total anonymity. Blockchains for privacy coins allow observers to
track transactions, but they are unable to view the wallets involved.
Web3 will feature decentralized autonomous entities running apps (DAOs). As a result,
decisions are no longer made by a centralized authority but rather by users who own governance
tokens, which may be acquired by taking part in the maintenance of these decentralized
programmers or by purchasing them.In a typical corporation, the CEO is responsible for
implementing changes approved by the shareholders. Token holders in a DAO can vote on
modifications that, if approved, are immediately incorporated into the DAO's code via a smart
contract. Everyone gets access to the source code of a DAO since they are democratized.
Due to its decentralized nature, which is made possible by distributed ledger technology and
smart contracts, Web 3.0 is intended to produce sustainable results. It also lowers costs by
doing away with middlemen, manual mediation, and arbitration.For everybody, Web 3.0 offers a
much more individualized surfing experience. Websites will be able to automatically adjust to
17
Group Assignment
our device, location, and any accessibility needs we may have, and web apps will become far
more receptive to our usage patterns.We believe that the emergence of Web 3.0 will improve
our lives for the following three reasons, which we believe are fairly appropriate:
1. A More Customized Browsing Process
There is no denying the ease of being able to quickly click through to a particular offer
for something you actually need or desire and that you would have missed otherwise,
regardless of how intrusive those advertisements may occasionally feel.
2. Improved search
The multidimensional Web 3.0 will help more than just websites; it will also enable web apps to
provide users with far richer experiences. Consider a mapping service like Google, which can
now include route planning, lodging suggestions, and real-time traffic updates in addition to the
fundamentals of location search. Simply put, in the Web 2.0 age, this was not feasible.
3.7 Key Applications of Web 3.0
With blockchain at its core, Web 3.0 makes it possible for an expanding range of new apps and
services, such as the following:
NFT: Non-fungible Tokens (NFTs) are tokens that are individually unique and are kept in
a blockchain with a cryptographic hash.
DeFi: Decentralized blockchain technology is being utilized as the foundation for
decentralized finance (DeFi), a new use case for Web 3.0 that allows for the provision of
financial services beyond the constraints of conventional centralized banking infrastructure.
Cryptocurrency: A new universe of money that strives to be distinct from the traditional
world of fiat cash is being created through Web 3.0 apps like cryptocurrencies like Bitcoin.
dApp: Decentralized applications (dApps) are programmers that run programmatically
and are logged in an immutable ledger. They are built on top of the blockchain and use smart
contracts to facilitate service delivery.
Chain-crossing bridges: In the Web 3.0 age, there are numerous blockchains, and cross-chain
bridges provide some kind of connectivity between them. :
DAOs are poised to potentially take on the role of Web 3.0's governing bodies, offering
some structure and decentralized governance.
3.8 Advantages and Disadvantages of Web 3.0
Advantages -Interms of data security, end-users will benefit the most from data encryption.
Due to decentralized data storage, users will be able to access data in any situation. Users will
receive multiple backups that will aid them if the server crashes.Most blockchain systems are
18
Group Assignment
developed by non-profits, which provides an open-source blockchain platform that allows for
collaborative design and development.The data will be provided from any location and on any
device. Web 3.0 is useful for problem-solving and heavy knowledge-generation tasks.
-
Disadvantages To make the technology accessible to more people worldwide, the devices'
capabilities and qualities will need to be expanded. Any websites built on web 1.0 technology
will become obsolete once web 3.0 is fully implemented on the Internet. Web 3.0 technology is
more intelligent, efficient, and accessible than in previous generations. However, the technology
isn't quite ready for general use. With easier access to a user's information and reduced privacy
thanks to web 3.0, reputation management will be more important than ever.
Unit 4
4.1 Agumented reality
19
Group Assignment
4.2 Introduction
Augmented Reality Interfaces Mona Singh and Munindar P. Singh Abstract A confluence of
technological advances (in handheld and wearable sensing, computing and communications), exploding
amounts of information, and user receptiveness is fueling the rapid expansion of augmented reality from a
novelty concept to potentially the default interface modality in coming years. This article provides a brief
overview of AR from the perspective of its application in natural web interfaces, including a discussion of
the key concepts involved and the technical and social challenges that remain.
20
Group Assignment
scene augmented with metadata associated with scene or its salient parts. For example, a user may point a
camera at a remote mountain peak and see its name, height, and current weather. Or, the app may identify
landmarks in a city, or provide category descriptions (e.g., “restaurant” or “museum”) of various buildings.
Additional examples involve presenting art, education, gaming, and fashion. An example in fashion is
showing how the user would appear when wearing specified apparel. Although our definition of AR is broad,
it excludes certain applications even though they may sometimes be described as AR. Immersive virtual
reality (IVR). AR exposes the real world to a user though with virtual information embedded in it whereas
IVR places a user in a virtual world (http://www.kinecthacks.com/augmented-reality-telepresence-via-
kinect/). Photo editing. An example is Mattel’s “digital mirror” (http://mashable.com/2013/02/11/barbie-
makeup-mirror/) wherein a user can edit a picture of herself with lipstick or glitter. Another is the Snaps
iPhone app There is no augmentation of reality in these cases. Were the edited pictures used in place of the
original faces in a real scene, we could consider such editing as a form of authoring for an AR app.
4.6 AR sensers
A Reality Sensor (camera) observes a part of the reality. It passes the image it obtains along with metadata
such as geolocation tags to the Trigger Matcher. The Trigger Matcher checks if its input matches the relevant
app-specific trigger, such as the geolocation being near a specific landmark or the image showing the
landmark. It produces matched metadata, such as its semantic category and outline. The Augmentation
Selector takes the matched metadata from the Trigger Matcher and retrieves relevant information, such as the
year the landmark was built. It constructs an augmenting image, such as a text bubble or a map pin placed
relative to the original image, and passes it to the Reality Augmenter. The Reality Augmenter combines the
21
Group Assignment
images, potentially as simply as overlaying a map pin on the original image, and causes the combined image
to be rendered for the user. Realizing Augmented Reality Enabling Technologies The above architecture
highlights the necessary enabling technologies. First, AR needs suitable sensors in the environment and on
the user’s person, including finegrained geolocation and image recognition in order to obtain a sufficiently
accurate representation of the reality. 5 Second, trigger matching and image augmentation require ways to
understand the scene in order to determine the relevant components and display augmentations. These
include techniques such as image processing (with face recognition an important subcategory). Third, trigger
matching and subsequent user interaction presume ways to determine the user’s attention and immediate
context, e.g., via technologies for input modalities including gaze tracking, touch, and gesture and speech
recognition. Fourth, AR presupposes a substantial information infrastructure, e.g., accessible via cloud
services, for obtaining pertinent components of the user’s longer term context, including intent and activities
and determining what components of the real-world to augment, with what, and when. Additionally, AR
requires significant computing and communications infrastructure undergirding the above. User Platforms
The above technologies are realized on three main types of end-user platforms, each against a backdrop of
cloud services. Mobile phones are the most prevalent of these platforms today with vehicles and wearable
computers to follow soon. Modern phones include high-quality cameras, geolocation capabilities, numerous
other sensors, and sufficient computing and communications capabilities. A driver in vehicle has a need for
accessing information of nearby and upcoming locations. The windshield of a vehicle provides an intuitive
venue for rendering augmented information. Vehicles have practically unlimited (electric) power and can
support powerful computing and communications. Wearable computers, of which Google Glass is a well-
known example, are becoming viable. Like smart phones and vehicles, wearable computers provide
numerous sensors and close access to a user’s current environment and the user’s immediate context and
attention. Wearable sensors, including on the user’s skin, clothing, or shoes, offer access to a user’s biometric
and environmental data and can thus enable smart apps. Today’s wearable computers are, however, are
limited in power, computing, and communications. Toward a Taxonomy of AR Apps The following are the
essential ingredients of an AR app: Their possible ranges of varieties suggest a classification of AR apps.
Trigger. The event or the observation upon which the augmentation occurs. Typical values are location or
object recognition (which could occur at multiple levels of granularity, ranging from types of objects to faces
of specific people).
4.7 A type of a location trigger is matching on GPS
coordinates. For example, Nokia City Lens provides information about places of interest nearby.
It enables a user to search for restaurants, hotels, and shops, and obtain more information about them.
Blip parexemplifies object recognition. Having a phone provide relevant information from a barcode is
22
Group Assignment
quite common. The Amazon Mobile app enables users to obtain the product description from Amazon for
any UPC symbol captured in a camera. Similar apps are available from Google Shopper and eBay’s
RedLaser. An example of face recognition is Recognizr, a now-defunct augmented ID, which identifies a
person and displays their online profile and contact details. Interactivity. The extent to which the user
can interact with the augmented information through the app. In general, in apps where the reality is
shown in a direct view there may be occasion for the user to interact only with the augmented
information, not the reality. An example of no interactivity is road names augmented on a satellite image;
an example of medium interactivity is Blippar wherein a user can request a recipe or video by selecting
the appropriate marker.
4.8 BMW Service’s app _reality_introduction
exhibits medium interactivity: it displays servicing instructions and advances the instructions whenever
its user asks for the next step. An example of high interactivity is advertisement icons that open up
automatically to reveal discounts when approached. User interface modalities. A user may interact with
the augmented information through gesture, gaze, speech, and touch in addition to traditional modalities
such as joysticks. Touch and speech are common these days. Google Glass provides a speech interface.
Naturalness of view. The AR app could be triggered based on natural reality (Recognizr) or require
specific features embedded in the environment or physical objects (Amazon). Opportunities and
Prospects Modeling and applying user context remains the key challenge of realizing high-quality user
experience. AR promises a way to present information and support user actions in ways that are sensitive
to a user’s current context. Usability Challenges AR faces the same core usability challenges as
traditional interfaces, such as the potential for overwhelming a user with too much information and
making it difficult for the user to determine a relevant action. However, AR exacerbates some of these
challenges because there may be 7 many kinds of augmentation possible at once and apps that are to be
proactive run the risk of overwhelming the user. Can the user tell the difference between reality and the
augmentation? Confusion may lead to user errors by conveying an erroneous impression of the world.
23
Group Assignment
group related products in a way that is coherent with the user’s intent. An AR app that presents all the
information at once may serve only to mislead the user. Social Challenges AR is strikingly different from
previous computing technologies both in terms of what it accomplishes and in terms of its physical trappings.
Just as for other new technologies, it might take years before people begin to widely adopt it except in
settings where there is a pressing need or a significant immediate benefit. Because AR is useful when the
augmentations are salient given the user’s context, including attributes and prior experiences, the violation of
privacy of the user or those present nearby is a potential risk. For example, an advertisement would be most
useful if it were for something the user wanted. However, a user upon receiving such an effective
advertisement might wonder about how his or her personal information has propagated across the value
chain. Business Models From the standpoint of business models, we anticipate that AR apps would function
like traditional apps in many respects. A key difference would be in terms of who owns, i.e., controls, the AR
space. Presumably, the current app (or the entity that controls it) would control the display. For example,
instead of advertisements being displayed for keywords as in today’s web, in AR, advertisements may be
displayed for appropriate triggers, such as particular locations or patterns. However, just that apparently
technical change from keywords to locations or patterns may lead to the emergence of new entities in the
business ecosystem, such as those who would tackle maintaining the augmented information
24