SlideShare uma empresa Scribd logo
1 de 13
Human Computer Interface of an I.S
Submitted By:
Group # 9 (BS I.T-Morning) Submitted To:
Asif Mahmood (1029) Inam ul Haq
Noman Nazar (1041)
Adeel Ahmed (1042)
M. Faizan Butt (1043)
Arsalan Ahmed (1044)
University of Education Okara Campus
Contents
 Introduction
 Importance and Scope of HCI in I.S and other fields
 Use of Example that will explore above concept
 How to implement HCI of an I.S in any organization
 Advantages and Disadvantages
 Conclusions
 References
Introduction
 Human
• The end-user
• The members of an organization
 Computer
• Hardware
• Software
 Interface
• A point where two objects meet.
• A point where the human can tell the computer
what to do.
• A point where the computer displays the
requested information.
Definition
“Human–computer interface involves the study,
planning, and design of the interaction
between people and computers. It is often
regarded as the intersection of computer
science, behavioural sciences, design and
several other fields of study.”
It is used in many routine fields of human life
like as Intelligent Homes/Offices, Driver
Monitoring, Intelligent Games, E-Commerce. It
is also used in information system by various
ways.
Example
Importance and Scope of HCI in I.S
and other fields
HCI of an Expert System(Biometric attendance system)
Biometric is a technology that measure and analyse human body
characteristics for identification purposes. Biometric improves
business processes because of their ability to quickly and
accurately identify an individual and grant specific privileges.
e.g.
Face-key detector, Finger print detector etc.
From the above pic it is clear that HCI is used in various
fields of human life. It is also used in many fields of
Information system.
Uses in I.S
HCI is used in different fields of information system like as
 HCI of an Expert system
 HCI of Office Automation system
 HCI of a Library Information system
 HCI of a decision support system
Face-Key Detector
Face-key delivers patented technology based on fingerprints
and face recognition for business
processes enhancing.
Implementation of face-key Detector in I.S
Face-key detector is a HCI device which is used in the I.S of any
organization for different tasks like:
 Attendance
 Entry recode
 Facial recognition
 Photography
 Marketing
Working
Requirements
We are required following features/data:
 Data base of Organization.
 ICT (Software, Hardware etc.).
 I.S (Programmer, I.S manager etc.)
 Network
A college in Fuzhou, Fujian province has introduced an electronic
face-detection system to prevent students from skipping school,
the Fujian Daily reports. “Minjiang University's Conservatory
of Music” has installed the facial recognition system in
classrooms and demanded that students arrive 10 minutes early.
The identification system saves time as teachers are no longer
required to take attendance. Students who fail to be identified at
first scan are encouraged to move in front of the camera and do
it again.
Use of face-key detector in
organizations
Advantages
 I-PHONE Apple has shown interest in building advanced,
secure facial recognition technology that would take a two-
dimensional image of a person's face and render it in 3D for
greater accuracy.
 FBI Facial Recognition (face-key detector) software to
automatically check driver's license applicants against
Criminal Database.
 Very accurate with the use of “switches”.
 Good for “expert” users - can quickly access commands.
 Time saving.
 Most accurate.
 Easier for a novice/new user to learn/use
 No training required
 Can be quicker than keyboard entry
 Hands-free
Disadvantages
 Heavy makeup could fool the system.
 It cannot work without power/voltage.
 System has no backup in case of any
damage.
 Facial recognition system uses camera
technology which is not yet present as
standard equipment in all the pcs thus it
will create problem.
 It is more expensive and complex than
other methods..
Conclusions
This system provides easier way to do a task
in any origination. It is used in many abroad
countries. It mostly used in colleges,
universities, offices, factories and agencies.
It is used in FBI. FBI uses face-key detector
software to automatically check driver's
license applicants against Criminal
Database. It is expensive but very useful,
reliable and flexible software that is
commonly used in any big organization. It is
used as a basic input device in information
systems. It is user friendly
References
 http://www.hussainaenterprise.com/fingerprint-
standalone-time-attendance.htm
 http://www.fingerpak.com/contactus.html
 http://www.ecns.cn/cns-wire/2014/03-
03/103098.shtml
 http://www.popsci.com/technology/article/2009-
10/fbi-facial-recognition-software-scan-highway-
fugitive-motorists
 http://www.mwtime.com/biometrics.pdf
 http://en.wikipedia.org/wiki/Biometrics#Biometric_fu
nctionality

Mais conteúdo relacionado

Mais procurados

User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
koolkampus
 

Mais procurados (20)

Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Introduction to Human Computer Interaction
Introduction to Human Computer InteractionIntroduction to Human Computer Interaction
Introduction to Human Computer Interaction
 
Hci activity#1
Hci activity#1Hci activity#1
Hci activity#1
 
Human computer interaction by gazegaze
Human computer interaction by gazegazeHuman computer interaction by gazegaze
Human computer interaction by gazegaze
 
Human Computer Interface (HCI)
Human Computer Interface (HCI)Human Computer Interface (HCI)
Human Computer Interface (HCI)
 
Human Computer Interaction-Basics
Human Computer Interaction-BasicsHuman Computer Interaction-Basics
Human Computer Interaction-Basics
 
HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basics
 
What is Human Computer Interraction
What is Human Computer InterractionWhat is Human Computer Interraction
What is Human Computer Interraction
 
User interfaces for mobile applications
User interfaces for mobile applicationsUser interfaces for mobile applications
User interfaces for mobile applications
 
E3 chap-08
E3 chap-08E3 chap-08
E3 chap-08
 
HCI - Chapter 1
HCI - Chapter 1HCI - Chapter 1
HCI - Chapter 1
 
Introduction To HCI
Introduction To HCIIntroduction To HCI
Introduction To HCI
 
HCI - Chapter 2
HCI - Chapter 2HCI - Chapter 2
HCI - Chapter 2
 
Constraints of designing for mobile devices
Constraints of designing for mobile devicesConstraints of designing for mobile devices
Constraints of designing for mobile devices
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI)Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
 
HCI 3e - Ch 14: Communication and collaboration models
HCI 3e - Ch 14:  Communication and collaboration modelsHCI 3e - Ch 14:  Communication and collaboration models
HCI 3e - Ch 14: Communication and collaboration models
 
Lecture 3: Human-Computer Interaction: HCI Design (2014)
Lecture 3: Human-Computer Interaction: HCI Design (2014)Lecture 3: Human-Computer Interaction: HCI Design (2014)
Lecture 3: Human-Computer Interaction: HCI Design (2014)
 
Introduction to HCI (UCC)
Introduction to HCI (UCC)Introduction to HCI (UCC)
Introduction to HCI (UCC)
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
 

Semelhante a Human Computer Interaction of an Information System

Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
Associate Professor in VSB Coimbatore
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
slidecell212100
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
Jill Lyons
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
Heidi Maestas
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....
Jitin Francis
 

Semelhante a Human Computer Interaction of an Information System (20)

Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Billing project
Billing projectBilling project
Billing project
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Introduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONIntroduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTION
 
Chapter1
Chapter1Chapter1
Chapter1
 
hardcopy
hardcopyhardcopy
hardcopy
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
 
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.EWEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
 
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfIntelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
 
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
 
Entitlements and balancing information system
Entitlements and balancing information systemEntitlements and balancing information system
Entitlements and balancing information system
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Available Research Topics in Machine Learning
Available Research Topics in Machine LearningAvailable Research Topics in Machine Learning
Available Research Topics in Machine Learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....
 

Mais de university of education,Lahore

Mais de university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Human Computer Interaction of an Information System

  • 1. Human Computer Interface of an I.S Submitted By: Group # 9 (BS I.T-Morning) Submitted To: Asif Mahmood (1029) Inam ul Haq Noman Nazar (1041) Adeel Ahmed (1042) M. Faizan Butt (1043) Arsalan Ahmed (1044) University of Education Okara Campus
  • 2. Contents  Introduction  Importance and Scope of HCI in I.S and other fields  Use of Example that will explore above concept  How to implement HCI of an I.S in any organization  Advantages and Disadvantages  Conclusions  References
  • 3. Introduction  Human • The end-user • The members of an organization  Computer • Hardware • Software  Interface • A point where two objects meet. • A point where the human can tell the computer what to do. • A point where the computer displays the requested information.
  • 4. Definition “Human–computer interface involves the study, planning, and design of the interaction between people and computers. It is often regarded as the intersection of computer science, behavioural sciences, design and several other fields of study.” It is used in many routine fields of human life like as Intelligent Homes/Offices, Driver Monitoring, Intelligent Games, E-Commerce. It is also used in information system by various ways. Example
  • 5. Importance and Scope of HCI in I.S and other fields
  • 6. HCI of an Expert System(Biometric attendance system) Biometric is a technology that measure and analyse human body characteristics for identification purposes. Biometric improves business processes because of their ability to quickly and accurately identify an individual and grant specific privileges. e.g. Face-key detector, Finger print detector etc. From the above pic it is clear that HCI is used in various fields of human life. It is also used in many fields of Information system. Uses in I.S HCI is used in different fields of information system like as  HCI of an Expert system  HCI of Office Automation system  HCI of a Library Information system  HCI of a decision support system
  • 7. Face-Key Detector Face-key delivers patented technology based on fingerprints and face recognition for business processes enhancing. Implementation of face-key Detector in I.S Face-key detector is a HCI device which is used in the I.S of any organization for different tasks like:  Attendance  Entry recode  Facial recognition  Photography  Marketing
  • 9. Requirements We are required following features/data:  Data base of Organization.  ICT (Software, Hardware etc.).  I.S (Programmer, I.S manager etc.)  Network A college in Fuzhou, Fujian province has introduced an electronic face-detection system to prevent students from skipping school, the Fujian Daily reports. “Minjiang University's Conservatory of Music” has installed the facial recognition system in classrooms and demanded that students arrive 10 minutes early. The identification system saves time as teachers are no longer required to take attendance. Students who fail to be identified at first scan are encouraged to move in front of the camera and do it again. Use of face-key detector in organizations
  • 10. Advantages  I-PHONE Apple has shown interest in building advanced, secure facial recognition technology that would take a two- dimensional image of a person's face and render it in 3D for greater accuracy.  FBI Facial Recognition (face-key detector) software to automatically check driver's license applicants against Criminal Database.  Very accurate with the use of “switches”.  Good for “expert” users - can quickly access commands.  Time saving.  Most accurate.  Easier for a novice/new user to learn/use  No training required  Can be quicker than keyboard entry  Hands-free
  • 11. Disadvantages  Heavy makeup could fool the system.  It cannot work without power/voltage.  System has no backup in case of any damage.  Facial recognition system uses camera technology which is not yet present as standard equipment in all the pcs thus it will create problem.  It is more expensive and complex than other methods..
  • 12. Conclusions This system provides easier way to do a task in any origination. It is used in many abroad countries. It mostly used in colleges, universities, offices, factories and agencies. It is used in FBI. FBI uses face-key detector software to automatically check driver's license applicants against Criminal Database. It is expensive but very useful, reliable and flexible software that is commonly used in any big organization. It is used as a basic input device in information systems. It is user friendly
  • 13. References  http://www.hussainaenterprise.com/fingerprint- standalone-time-attendance.htm  http://www.fingerpak.com/contactus.html  http://www.ecns.cn/cns-wire/2014/03- 03/103098.shtml  http://www.popsci.com/technology/article/2009- 10/fbi-facial-recognition-software-scan-highway- fugitive-motorists  http://www.mwtime.com/biometrics.pdf  http://en.wikipedia.org/wiki/Biometrics#Biometric_fu nctionality