SlideShare una empresa de Scribd logo
1 de 13
Human Computer Interface of an I.S
Submitted By:
Group # 9 (BS I.T-Morning) Submitted To:
Asif Mahmood (1029) Inam ul Haq
Noman Nazar (1041)
Adeel Ahmed (1042)
M. Faizan Butt (1043)
Arsalan Ahmed (1044)
University of Education Okara Campus
Contents
 Introduction
 Importance and Scope of HCI in I.S and other fields
 Use of Example that will explore above concept
 How to implement HCI of an I.S in any organization
 Advantages and Disadvantages
 Conclusions
 References
Introduction
 Human
• The end-user
• The members of an organization
 Computer
• Hardware
• Software
 Interface
• A point where two objects meet.
• A point where the human can tell the computer
what to do.
• A point where the computer displays the
requested information.
Definition
“Human–computer interface involves the study,
planning, and design of the interaction
between people and computers. It is often
regarded as the intersection of computer
science, behavioural sciences, design and
several other fields of study.”
It is used in many routine fields of human life
like as Intelligent Homes/Offices, Driver
Monitoring, Intelligent Games, E-Commerce. It
is also used in information system by various
ways.
Example
Importance and Scope of HCI in I.S
and other fields
HCI of an Expert System(Biometric attendance system)
Biometric is a technology that measure and analyse human body
characteristics for identification purposes. Biometric improves
business processes because of their ability to quickly and
accurately identify an individual and grant specific privileges.
e.g.
Face-key detector, Finger print detector etc.
From the above pic it is clear that HCI is used in various
fields of human life. It is also used in many fields of
Information system.
Uses in I.S
HCI is used in different fields of information system like as
 HCI of an Expert system
 HCI of Office Automation system
 HCI of a Library Information system
 HCI of a decision support system
Face-Key Detector
Face-key delivers patented technology based on fingerprints
and face recognition for business
processes enhancing.
Implementation of face-key Detector in I.S
Face-key detector is a HCI device which is used in the I.S of any
organization for different tasks like:
 Attendance
 Entry recode
 Facial recognition
 Photography
 Marketing
Working
Requirements
We are required following features/data:
 Data base of Organization.
 ICT (Software, Hardware etc.).
 I.S (Programmer, I.S manager etc.)
 Network
A college in Fuzhou, Fujian province has introduced an electronic
face-detection system to prevent students from skipping school,
the Fujian Daily reports. “Minjiang University's Conservatory
of Music” has installed the facial recognition system in
classrooms and demanded that students arrive 10 minutes early.
The identification system saves time as teachers are no longer
required to take attendance. Students who fail to be identified at
first scan are encouraged to move in front of the camera and do
it again.
Use of face-key detector in
organizations
Advantages
 I-PHONE Apple has shown interest in building advanced,
secure facial recognition technology that would take a two-
dimensional image of a person's face and render it in 3D for
greater accuracy.
 FBI Facial Recognition (face-key detector) software to
automatically check driver's license applicants against
Criminal Database.
 Very accurate with the use of “switches”.
 Good for “expert” users - can quickly access commands.
 Time saving.
 Most accurate.
 Easier for a novice/new user to learn/use
 No training required
 Can be quicker than keyboard entry
 Hands-free
Disadvantages
 Heavy makeup could fool the system.
 It cannot work without power/voltage.
 System has no backup in case of any
damage.
 Facial recognition system uses camera
technology which is not yet present as
standard equipment in all the pcs thus it
will create problem.
 It is more expensive and complex than
other methods..
Conclusions
This system provides easier way to do a task
in any origination. It is used in many abroad
countries. It mostly used in colleges,
universities, offices, factories and agencies.
It is used in FBI. FBI uses face-key detector
software to automatically check driver's
license applicants against Criminal
Database. It is expensive but very useful,
reliable and flexible software that is
commonly used in any big organization. It is
used as a basic input device in information
systems. It is user friendly
References
 http://www.hussainaenterprise.com/fingerprint-
standalone-time-attendance.htm
 http://www.fingerpak.com/contactus.html
 http://www.ecns.cn/cns-wire/2014/03-
03/103098.shtml
 http://www.popsci.com/technology/article/2009-
10/fbi-facial-recognition-software-scan-highway-
fugitive-motorists
 http://www.mwtime.com/biometrics.pdf
 http://en.wikipedia.org/wiki/Biometrics#Biometric_fu
nctionality

Más contenido relacionado

La actualidad más candente

Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
Deskala
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
Jitu Choudhary
 
human computer interface
human computer interfacehuman computer interface
human computer interface
Santosh Kumar
 
Models of Interaction
Models of InteractionModels of Interaction
Models of Interaction
jbellWCT
 

La actualidad más candente (20)

Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
 
Introduction to Human Computer Interaction
Introduction to Human Computer InteractionIntroduction to Human Computer Interaction
Introduction to Human Computer Interaction
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basics
 
Human computer interaction 3 4(revised)
Human computer interaction 3 4(revised)Human computer interaction 3 4(revised)
Human computer interaction 3 4(revised)
 
What is Human Computer Interraction
What is Human Computer InterractionWhat is Human Computer Interraction
What is Human Computer Interraction
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Interaction Paradigms
Interaction ParadigmsInteraction Paradigms
Interaction Paradigms
 
Models of Interaction
Models of InteractionModels of Interaction
Models of Interaction
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Human Computer Interaction-Basics
Human Computer Interaction-BasicsHuman Computer Interaction-Basics
Human Computer Interaction-Basics
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI) Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction Design
 
HCI 3e - Ch 20: Ubiquitous computing and augmented realities
HCI 3e - Ch 20:  Ubiquitous computing and augmented realitiesHCI 3e - Ch 20:  Ubiquitous computing and augmented realities
HCI 3e - Ch 20: Ubiquitous computing and augmented realities
 
HCI Basics
HCI BasicsHCI Basics
HCI Basics
 
Universal design HCI
Universal design HCIUniversal design HCI
Universal design HCI
 
HCI : Activity 1
HCI : Activity 1 HCI : Activity 1
HCI : Activity 1
 
Human computer interaction Semester 1
Human computer interaction Semester 1Human computer interaction Semester 1
Human computer interaction Semester 1
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI)Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
 

Similar a Human Computer Interaction of an Information System

Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
Associate Professor in VSB Coimbatore
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
slidecell212100
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
Jill Lyons
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
Heidi Maestas
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....
Jitin Francis
 

Similar a Human Computer Interaction of an Information System (20)

Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Billing project
Billing projectBilling project
Billing project
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Introduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONIntroduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTION
 
Chapter1
Chapter1Chapter1
Chapter1
 
hardcopy
hardcopyhardcopy
hardcopy
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
 
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.EWEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
 
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfIntelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
 
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
 
Entitlements and balancing information system
Entitlements and balancing information systemEntitlements and balancing information system
Entitlements and balancing information system
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Available Research Topics in Machine Learning
Available Research Topics in Machine LearningAvailable Research Topics in Machine Learning
Available Research Topics in Machine Learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....
 

Más de university of education,Lahore

Más de university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Human Computer Interaction of an Information System

  • 1. Human Computer Interface of an I.S Submitted By: Group # 9 (BS I.T-Morning) Submitted To: Asif Mahmood (1029) Inam ul Haq Noman Nazar (1041) Adeel Ahmed (1042) M. Faizan Butt (1043) Arsalan Ahmed (1044) University of Education Okara Campus
  • 2. Contents  Introduction  Importance and Scope of HCI in I.S and other fields  Use of Example that will explore above concept  How to implement HCI of an I.S in any organization  Advantages and Disadvantages  Conclusions  References
  • 3. Introduction  Human • The end-user • The members of an organization  Computer • Hardware • Software  Interface • A point where two objects meet. • A point where the human can tell the computer what to do. • A point where the computer displays the requested information.
  • 4. Definition “Human–computer interface involves the study, planning, and design of the interaction between people and computers. It is often regarded as the intersection of computer science, behavioural sciences, design and several other fields of study.” It is used in many routine fields of human life like as Intelligent Homes/Offices, Driver Monitoring, Intelligent Games, E-Commerce. It is also used in information system by various ways. Example
  • 5. Importance and Scope of HCI in I.S and other fields
  • 6. HCI of an Expert System(Biometric attendance system) Biometric is a technology that measure and analyse human body characteristics for identification purposes. Biometric improves business processes because of their ability to quickly and accurately identify an individual and grant specific privileges. e.g. Face-key detector, Finger print detector etc. From the above pic it is clear that HCI is used in various fields of human life. It is also used in many fields of Information system. Uses in I.S HCI is used in different fields of information system like as  HCI of an Expert system  HCI of Office Automation system  HCI of a Library Information system  HCI of a decision support system
  • 7. Face-Key Detector Face-key delivers patented technology based on fingerprints and face recognition for business processes enhancing. Implementation of face-key Detector in I.S Face-key detector is a HCI device which is used in the I.S of any organization for different tasks like:  Attendance  Entry recode  Facial recognition  Photography  Marketing
  • 9. Requirements We are required following features/data:  Data base of Organization.  ICT (Software, Hardware etc.).  I.S (Programmer, I.S manager etc.)  Network A college in Fuzhou, Fujian province has introduced an electronic face-detection system to prevent students from skipping school, the Fujian Daily reports. “Minjiang University's Conservatory of Music” has installed the facial recognition system in classrooms and demanded that students arrive 10 minutes early. The identification system saves time as teachers are no longer required to take attendance. Students who fail to be identified at first scan are encouraged to move in front of the camera and do it again. Use of face-key detector in organizations
  • 10. Advantages  I-PHONE Apple has shown interest in building advanced, secure facial recognition technology that would take a two- dimensional image of a person's face and render it in 3D for greater accuracy.  FBI Facial Recognition (face-key detector) software to automatically check driver's license applicants against Criminal Database.  Very accurate with the use of “switches”.  Good for “expert” users - can quickly access commands.  Time saving.  Most accurate.  Easier for a novice/new user to learn/use  No training required  Can be quicker than keyboard entry  Hands-free
  • 11. Disadvantages  Heavy makeup could fool the system.  It cannot work without power/voltage.  System has no backup in case of any damage.  Facial recognition system uses camera technology which is not yet present as standard equipment in all the pcs thus it will create problem.  It is more expensive and complex than other methods..
  • 12. Conclusions This system provides easier way to do a task in any origination. It is used in many abroad countries. It mostly used in colleges, universities, offices, factories and agencies. It is used in FBI. FBI uses face-key detector software to automatically check driver's license applicants against Criminal Database. It is expensive but very useful, reliable and flexible software that is commonly used in any big organization. It is used as a basic input device in information systems. It is user friendly
  • 13. References  http://www.hussainaenterprise.com/fingerprint- standalone-time-attendance.htm  http://www.fingerpak.com/contactus.html  http://www.ecns.cn/cns-wire/2014/03- 03/103098.shtml  http://www.popsci.com/technology/article/2009- 10/fbi-facial-recognition-software-scan-highway- fugitive-motorists  http://www.mwtime.com/biometrics.pdf  http://en.wikipedia.org/wiki/Biometrics#Biometric_fu nctionality