HCI - Human Computer Interaction Lecture 2 PDF
Document Details
Dr. Nermeen Kashief
Tags
Summary
This document is a lecture presentation on Human Computer Interaction (HCI). It covers topics including the human user, various input devices such as keyboards, mice and scanners, along with the fundamental concepts of human memory.
Full Transcript
lecture 2: Human and Computer Dr. Nermeen Kashief 1 A. Human (users) The user who interact with computer The golden principle in HCI is that “people should come first”. Problem Users have different abilities?...
lecture 2: Human and Computer Dr. Nermeen Kashief 1 A. Human (users) The user who interact with computer The golden principle in HCI is that “people should come first”. Problem Users have different abilities? 4 Users have different abilities: Culture environments Cognitive abilities Experience Physically Age, hand size, height, strength, Disabilities 5 Why do we need to understand Humans in HCI? Humans are limited in their capacity to process information This has important implication for design Interacting with technology is cognitive Information processing model in human 1- perceptual: (input-output) – handling sensory from outside world 2- memorization: (memory) – which control action Human Vision Edge Detection through Contrast Intensification Simultaneous contrast 13 Write Clear Text and Messages The concept of – Legibility (clear) – Readability ( simple). Legibility To make text legible, it must be clear enough to read. There are many factors to take into account when it comes to legibility: Size Contrast Clear typeface Spacing size Use a reasonably large default font size and allow users to change the font size. Contrast typeface Space Readability Readability is another aspect of creating user- friendly writing on the web. Readability refers to the complexity of the content as a whole. The guidelines for readable writing are simply to keep it: – Simple – Short Simplicity Short Human Memory It is the ability to store and retrieve the information – How does memory works? – How do we remember some arbitrary list? – Why do some people remember more easily than others? Miller’s law of STM Short term memory load Magic Number 7 +/- 2 Most people can hold approximately seven pieces of information in short term memory at once. More information can be stored by chunking information into meaningful groups. Also, to hold information in memory, you must focus on rehearsing it. Chunking Chunking breaks up long strings of information into units or chunks. The resulting chunks are easier to commit to working memory than a longer and uninterrupted string of information. the simplest example of chunking is a phone number. Example Example Example B. Computer Computers are not just computers anymore (Embedded machines)- specific task – mobile phone – Camera – Car – Washing machine, dish washer – Alarm clock – ATM – Copy machine a computer system is made up of various elements each of these elements affects the interaction – input devices – text entry and pointing – output devices – screen (small&large), digital paper 45 1) Keyboard – Types Gaming Keyboards – Designed with gamers in consideration, these keyboards frequently have extra macro keys, backlighting, and configurable keys. Given their responsiveness and physical feel, mechanical switches frequently appear in gaming keyboards. Virtual Keyboards – Software-based virtual keyboards show up on a device’s screen. The simulated keys can be tapped or clicked by users to interact with them. These are frequently found on touchscreen gadgets like tablets and smartphones Projection Keyboards – A virtual keyboard can be projected onto a flat surface using projection keyboards, which use infrared or laser technology. 46 2) Mouse- types Mechanical Mouse: – It has a system of a ball and several rollers to track its movement. It is a corded type of mouse. A mechanical mouse can be used for high performance Optical Mouse: – uses optical electronics to track its movement. Wireless Mouse: – uses wireless technology such as IrDA (infrared) or radio (Bluetooth or Wi-Fi) to control the movement of the cursor. It is used to improve the experience of using a mouse. It uses batteries for its power supply. 47 Five-Finger Input Device 48 3) Scanner – Types Flatbed Scanner: – It has a glass pane and a moving optical CIS or CCD array. The light illuminates the pane, and then the image is placed on the glass pane. The light moves across the glass pane and scans the document and thus produces its digital copy. You will need a transparency adapter while scanning transparent slides. Handheld Scanner: – It is a small manual scanning device which is held by hand and is rolled over a flat image that is to be scanned. The drawback in using this device is that the hand should be steady while scanning; otherwise, it may distort the image. One of the commonly used handheld scanners is the barcode scanner which you would have seen in shopping stores. Photo Scanner: – It is designed to scan photographs. It has high resolution and color depth, which are required for scanning photographs. Some photo scanners come with in-built software for cleaning and restoring old photographs. 49 Future input mechanisms : Future input mechanisms may continue this trend toward naturalness by allowing users to perform ''natural'' gestures or operations and transducing them for computer input. Computer vision – Computer vision focuses on enabling computers to identify and understand objects and people in images and videos. computer vision seeks to perform and automate tasks that replicate human capabilities. Neural language processing – Natural language processing (NLP) is a subfield of computer science and artificial intelligence (AI) that uses machine learning to enable computers to understand and communicate with human language. Sensor control – Sensor technology is important because it allows for the detection, measurement, and monitoring of physical, chemical, and biological phenomena in various industries such as healthcare, manufacturing, automotive, and aerospace. The Internet of Things (IoT) – It describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. 51 Computer vision Eye gaze Retina or Iris Scanner Sign recognition such device that observes the movement of a player's body and interprets these movements as inputs to video games. This feature is also available in certain tablets and smartphones where you can perform certain tasks such as taking pictures using finger gestures such as swiping, pinching, etc. Fingerprint Scanner/Reader: 52 Sensor 53 NLP Voice Scanner: The voiceprints are stored in the database, and are used to verify the voice of a person to confirm his or her identity. The person is required to speak in the normal or same voice that was used to create a voice template. It is not much reliable as it can be misused using a tape recording. 54 VR – VR stands for virtual reality. It is an artificial or virtual environment which is generated by computers. A person can interact with virtual objects of this artificial environment using some input devices such as headsets, gloves, headphones, etc. For example, he or she can find himself or herself walking on a beach, watching a football match, walking in the sky, etc., without actually doing all this. Marketing - Game - Home 55 Biometric Devices: Biometrics refers to a process in which a person is identified through his or her biological features such as fingerprints, eye cornea, face structure, etc. It is done by using biometric devices, which can be of different types based on their scanning features and abilities, such as: i) Face Scanner ii)Retina or Iris Scanner: III) Voice Scanner: 56 Face Scanner It is designed to identify a person by scanning his or her face. It takes the face measurements of a person. For example, the distance between eyes, nose, and mouth, etc., accordingly, it confirms the identity of a person. Besides this, it is smart enough to differentiate between a person's picture and the real person. 57 Input interaction fields: Security Fingerprint recognition. Iris recognition. Face recognition. Search By image By voice Disable people Sign language recognition for deaf people. Speech recognition (blind people) Feet mouse. (hand disable) Eye mouse 58 Input/output interaction: Smart phone camera 59 Categories of Output Devices Visual Output Devices: These devices display processed data as text, images, or video. Examples include monitors and projectors, which allow users to view information on screens or project it onto larger surfaces. Data Output Devices: These devices provide machine-readable output for further processing or storage. Plotters and 3D printers fall into this category, allowing users to create physical representations of data or objects. Print Output Devices: Printers produce hard copies of processed data, such as documents, images, or graphics. They allow for physical documentation and distribution of information. Sound Output Devices: These devices deliver audio output for listening or communication purposes. Speakers and headphones/earphones enable users to hear the sound, whether 60 Applications of Monitor Personal Computing: Monitors are commonly used in personal computers for everyday operations such as online surfing, document editing, video viewing, and gameplay. Workstations: Monitors are necessary in professional settings such as workplaces since they serve as the primary display for employees' workstations. Users may view and edit documents, spreadsheets, presentations, and other work-related apps with them. 61 3D printer 62 Q: What are some typical examples of input devices? Common examples of input devices encompass keyboards, mouse, touchscreens, web cameras, graphic tools, scanners, microphones, and game controllers. Each device serves a specific purpose and caters to amazing kinds of interactions. 63 Q: How do biometric input devices enhance safety? Biometric input devices use unique physiological tendencies, consisting of fingerprints, patterns, or facial characteristics, for a man or woman's identity and authentication. These traits function as steady alternatives to conventional passwords, supplying handy and reliable entry to control and, at the same time, decreasing the danger of unauthorized access. 64