0 ratings0% found this document useful (0 votes) 60 views6 pagesHCI Unit-5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
A= UNITS
WCL_PARADIGMS
% PARADIGMS FOR INTERACTION:
© TIME SHARING:
“centralized mainframe. systems
a\ilowing multiple users simuttantous
ACESS, -
“Divides the computer's ‘processing ~
time into small time slices for -~
tad user.“ WAS ons i i
“Resources such AS CRY time, Memory >
Tp 4 olp devices are shared among
USES oF processes. y
© PROGRAMMING TOOLKITS,
suser interfaces designed for
Software! developers, prowding tools
for Frogramming : ub
susing dhe computer to teach huMANS. ©
+ TACA. of building components. of a
Computtr systenr Anat wilt aloud 1°
rebuild g more complex systtm is
Called bodtstrappingy. -° +".
@ TE METAPHOR: '
using familiar metaphors (ex- desktop, "|
to-simplrfy intirface design’
= Make, [earning easier $+ computers -more.
accessible: : a ipa
= command line tnierf ace. of ers no
metaphors os a
files) to represen, atgital MeraLtions
© HypeRTEXt
+A textecwhi ch
other ttt - : an
“WKS can be unidirectional, bidirectional,
labeled or typed 5 can store other
\
swhen navigating new node, a new
window may open or existing one
xpands- :
+ exelvorid wide web hyperlinks -
Pains Winks. to’!
“1® wed pisPLAY ONITS? -
“saryacion anrough: viswal ateplays,
Facilitating GUIs: Miya
SENSOR -BASED $ CONTEXT- AWARE INTERACTION:
- Fensor -basedsgneerouron with, digital systems hat ts facilitaked of
sereggered by sSensors , capturing ‘data from the “physical environment .
- Ge TOULN FENSOTS ON SUCENS, Yel banpie 0 :
+ Conttxt = aware :- Interaction. that, adapts fhe” user's’ Context; considering -
Facroys \ke' location time, acevity. : imine 7
coe AMATON SUggest¥ONs. os ery ti ‘
+ syskems /dynanni can respond to - cnanges in, context | providing personalized:
A velevant experiences, 5 1 eaate elie ela 149
+ understands the, ,.wser's, Surroundidgs S adjusts interactions accordingly ~-
= Gathers real-time table. * i Pos)
‘DATA. INTEGRITY.
DATA IMMUN ;
res(stent to >
epagers tothe, Accuracy ; consistency : “pata te .protected ov
relab itty of aata throug hou external threats - (Wber attacks)...”
iks Weecycle- Ban Gee she systenny HS FEMME AO
- ensure qhat data remains unchanged incongstencita ¥ gaps in Ahevinyo-
Fe reiable, from creation to storage etavoles Creating much smarter,
retvieval. © sophisticated applications that
characher istics : 0% handles all. permutations: ycdata -
Tpatacis, coreeet ¥ free from errors - sMarnrainihg stability ine the...
= pata) remains, uniform -acrossi anges oF wage: | TT tees
SySteMs ., . sie ay / <3
— peta 1S: PEIsteNe *0 “corruption: ©3 RANDUNG MISSING DATA:
+ wipsing. data’ J. deeined: asaang values, er data 4h
variables in the given dataset - : :
* Reasons for missing data:
~ Past Agta mignt” get. corrupted - re
= Observations are not recorded for certain fields: dui
~ users have nok provided” waluts Intentionally...
“Tuo ways of handling fussing values:
i) Deletion: - Removing observations oF variables with mi
= List wsise_detehion_metnod ; you remove a %
Taher dataset cir. CONEAINS more Anan
= simple § straightforward - in : A
= Regdees “Sl2e OF, dataset.» may \ead to. piased resales:
ured value:
J amputation: Te ain the mnissing value with’ a, substi
at iS not stotéd “for some
eo some reasons.
ssing values - :
ord .er, observation in
Bor, missing values +
Sire Rstinnating & 4itting. Lothd> ya
~You need ‘to’ nave “domain Knowledge of dataset: Cath
= Preserves the sarmple sfze, maintains staristical power. ° 16
= neroduces uncertain
- Assumptions about m
jing data must be ‘made.
> DATA ENTRY 4 FUDGEABILITY: Oud
“Daca entry és the process of anpurring , recording 5
commpurtty systems or database oF. ‘ions
+ Mose Pata. enety *AsKS are ime consuming. °°’ woe pa
“Aur aeel _Keye “ata i ustd'i tor perform: analysis “$ make plans.
High quality “ara entry, % crustal or atuurate anauysts:? 7
+ Fudgeability iS ane © Agree’ to" whrich dara. can. easily, be, manipulated “tt
Fadel cof Janinigntionally. f 4 manipdla ted either
sAcenouledges the Flexibility + iptalbittty“ of “Aatas 2 foo
pudgeabtity,” poses (0, risk 0 data accuracy 5 yeliability «
storing data into a”
> AUDITING, VERSUS. EDITING : at if
ptt SPITS asncqam aie nua
er ane process of zu) Ee ;
3 ‘ Fe. earning js the, process of making chang
y ts aes Eaiting Mette -aatd, wntiggrations
-emonitorin ecordjng even’ ng. is, THe,
or. changes ia an : ‘or modifications 40 q
ai ADE ONHENE. DE. ANE, LYSHEROS
st
aT
- Auditing paradigms ime Ae Hing paradigms, incwdes =
= pata logging: systems Ing Ce le NE Brenat areaiting Tools” allows
r interactions 12 create & ¢ a ent .
com ehensive * record: of -events- re 1 JQ OES OAs ,, Settings 100 0
indudes data on sensor data, user OO)” (PRCT EN A, rhclud es ext editors,
re a a maa oS pene
~ security Auditing? “Allowing syste + = custonbization: users can per
adnains to t1ack Maut hor 20d | Fant mrfacts, "by cAitig settings,
qcctss attempts, security pregcnes 52. | themes of preferenas
unusual qervines that mag °°) - - content f afin: wsers-tan, edit. content,
indicate a security threae- ot RU gust , images. oF ‘ocagnents +
Troubleshooting : using ex- word processing - applild fon
7 Debuggin'
audit logs to diagnose % svaubléshoot
esues , identity errors + understand
SEYMORE OL events Aha [ed to a |
problem- |
|
proto iting tool -* RETRIEVAL IN fHYSIGAL WoRtD: :
on.within & physic
“ Aechvely seeKing & locating object? °F inform ati
environment:
=e Seardning a book in a library. cr
“ean, be done by ernploying pan aevices £0) factor ieee fd
+The storage system is the same as ane retrieval syste u
remnemberitig location - :
L WORLD: ©
2 RETRIEVAL_IN_DIGITA :
eet it iD
» Digital retrieval’ methods include * : Kt
re
= positional Retrieval: You can gina it bY yeriem bering ere you
“ane “pile! SerUCtUr bcsFd pe 2 :
also find it by remembering. its identifying name-
~ Identity Retrieval: YOU can fim
= Associative or attribute -based reerieval! : 4 ce
~gased one the. ability 4o search for a. document based on- some inherent ©
uarity of the document - ibsele: a ’
+ Enables seers 40 tind AouumeNnts 6y aneir convents 5 meaning fal
properties «
> FIVE STAGE SEARCH FRAMEWORK: i
jp rormulation + - Expressing tne ‘search. ' ; aaa
= saentitying 4 Understanding tre info- need.» defining the “search scope
& formutating. clear search query - wis :
. - raenti€y 40e “Source oF she: infos, the Fields for lieniting -
ses, Bhe? VONTONKS «. Me :
tqrch parameters 4 framing “the
ire source « the oe ‘
- Biy_ detining: ‘Keywords » SpectFying. 5
intial quations " 3
exe The “Keyword “reach! 7 vari ane URTAES
tion of Action: “launching the searth |
acher!; teaching’, Steaches':
di
“posid on Formulated - query using i
2) Initia’
) syncing Fre actual search process
search Sais databases , eke-
~ Explicl aviNg search. button.
changes. to cormponents of stage 4 ‘immediately: produce new
~IMplie
“ “gets “esearch results -
4 Review of cegultsé reading messages F outcomes: as :
= evauuatineg ane’ initial, starch. results for actdraty , alignrne up .
. sehes se 5 nk wit) i
reviews -consisting:,oF samples (doogle are abate) Matern
vie
abstracs “or! automatically generated summaries.” y
4) gosinemeni Foren Ant AGE sttp- ae ‘
= Adjusting, the’ search: sttdtegy base ceyeeug. of tag :
= nets frhek OF search scot: A on, te reuieul og nna Feedits
LT Exploring QlitrnaHve soured “or Keyworda.-. . : Pink
Teabrellidg : aS "DI. you mean xxx’? when, Aten, is épel rispell 4
8) use: compiling or Aisseminacting insight. on eee yh
~agptying the reeritvea inké 40. FQUeil ane’ oramal “into.
< 20, Tis : a\ ne
Results can’ be Merged or saved , sent by Tia Inge ‘4
. ve Ort. a> DYNAMIC QUERIES 4 FACETED SEARCH *
DYNAMIC. QUERY: -.”
= Quenes: tak are built dynamically
Yather that provided as an explicit
“FACETED SEARCH:
- pyjows agers to reduce, (EIEer) ARE
TAMMnber of search results, UreRly te
ek the acsired item(s). a
or attribute
query string. ;
sinteractive & cuser-ariven séarch + FaeerS “are ane categories
interfaces shat allow ‘asers:/to adjust * by Which “fo iS cavegoriztd- (ers price,
§ reeine “Meir. search criteria in 18 lor, skayle, brand) es
sysers will get specific 5 relevant
filter atin. yoults.
real-time.
s more flexible: 8 1)
‘ ree. tiie a] options 40
query iS compiled at runtime: eng al r-
usta to generate “reports of 40 perform | a J practical “way to search for
complex Catculations thar require 2) Pio uur or page ‘
7 ‘
Aynamic MPU cL os
nterese. that one needs, to recognite & identify
y anak: matches incoming data with info
K PATTERN RECOGNITIO!
- pattern can be’ ang entity’ oF i
+ Pattern’ eee ane technolog
Stored in database PNAI | PRI Ibe yn
*mmvolves the Taenkification , interpretation 3 orga’
“these patterns can be visual , auditory, textual ors
Those patterns are used t make decistons of pre
algorithms lo DOIIH VisaT
+ eX= Forage? recognition, qudio $ Wateo voice = “|” Fingerprint -searnning
‘|= analyzing £ taent fying
nization of patttrns with data.
ensory in nature-
ateions using computer
- security-§. surveillance... Recognition *
si storn’s across seckors. |’ Personal assistants, oo fcunigite , AMeEnS. in the
~rdentif ging parterns 5 speech #0 beet converteys.. |. ridges E vaieys Of +
objects within | visual data. Apple's s iy Alera. Fingerprints -
Sede de Tent pattems in |- yo “proteck. the Aevile...:
quate ‘signals 29°: from sun aqutnarized access.
Sit
vecogni spoxen words.
> ROLE OF MACHINE LEARNING:
e- ML ih patti recognition enable com
patterns within ~ data. ;
L as never to make ‘pert’ but to make guesses anak are
- Goal ™
pod enough to be useful:
+ ML uses algorithms +o learn
predictive analysis ,
: Apptications
purrs to automatically lear 4 ident'fy
om data £ make predictions .
NUP (natura Language processing) , ete:>> PATTERN RECOGNITION PROLESS:.°:
— Le-Gathering relevant data ov signals From various
Data, collection
Preprocessing -
Feature -Extrachon
Classification
Post processing
SOUTCES~ ie .
7@n. be in qnt form oF “ttxtS; images ; signals; et: ary
=Cleaning! § preparing Ane ¢
pattern recognition - de MUI Vek
“to, remove sree eT EVEVANE INYO = OF, CLOTS:
s¥nvolves dara cleaning , Normalization 5 feqrare
~ extractions . "SB
—e-taeniitying 5 selecting relevant ftatures oF
drarackeristics fron “tht. preprocessed: data.
~tnpur ‘data iS converted 40.4 feature vectar- «
assigning data instances +0 predefined. ‘classes oF
cate orits pased on extracted Features ‘
-Extraued Features are compared 10 &
parttrn stored in the database: .
= ReeiNIT HB VOUAAING the results obtained #rom:
‘dassifiGation: , phase ue kod fy o
7 can include ¢(treri g , aecesion “guston, error cortectron.
oltecred data tor, effective
” similar
= PATTERN RECOGNITION: at ath 596 a
- user benaviOUr analysis‘ —to analyse, how users inktrack with a sysrern, :
MEPL Yo fis poy 7 Rawigation paths» putton clUKS Gestures, eb -
- usability “testing. -by.observing.: 4. anal wine paveorns') 4 identify
yee dues 4 yin point 3p : * identify: kanal
| prov “patteens #7, For’ recovery “straxegi¢s overall. ertor. handling: i
- pesonatization® iproduck recommendatiens pasta on history -