Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
60 views6 pages

HCI Unit-5

sppu hci notes

Uploaded by

aryangunaware7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
60 views6 pages

HCI Unit-5

sppu hci notes

Uploaded by

aryangunaware7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
A= UNITS WCL_PARADIGMS % PARADIGMS FOR INTERACTION: © TIME SHARING: “centralized mainframe. systems a\ilowing multiple users simuttantous ACESS, - “Divides the computer's ‘processing ~ time into small time slices for -~ tad user.“ WAS ons i i “Resources such AS CRY time, Memory > Tp 4 olp devices are shared among USES oF processes. y © PROGRAMMING TOOLKITS, suser interfaces designed for Software! developers, prowding tools for Frogramming : ub susing dhe computer to teach huMANS. © + TACA. of building components. of a Computtr systenr Anat wilt aloud 1° rebuild g more complex systtm is Called bodtstrappingy. -° +". @ TE METAPHOR: ' using familiar metaphors (ex- desktop, "| to-simplrfy intirface design’ = Make, [earning easier $+ computers -more. accessible: : a ipa = command line tnierf ace. of ers no metaphors os a files) to represen, atgital MeraLtions © HypeRTEXt +A textecwhi ch other ttt - : an “WKS can be unidirectional, bidirectional, labeled or typed 5 can store other \ swhen navigating new node, a new window may open or existing one xpands- : + exelvorid wide web hyperlinks - Pains Winks. to’! “1® wed pisPLAY ONITS? - “saryacion anrough: viswal ateplays, Facilitating GUIs: Miya SENSOR -BASED $ CONTEXT- AWARE INTERACTION: - Fensor -basedsgneerouron with, digital systems hat ts facilitaked of sereggered by sSensors , capturing ‘data from the “physical environment . - Ge TOULN FENSOTS ON SUCENS, Yel banpie 0 : + Conttxt = aware :- Interaction. that, adapts fhe” user's’ Context; considering - Facroys \ke' location time, acevity. : imine 7 coe AMATON SUggest¥ONs. os ery ti ‘ + syskems /dynanni can respond to - cnanges in, context | providing personalized: A velevant experiences, 5 1 eaate elie ela 149 + understands the, ,.wser's, Surroundidgs S adjusts interactions accordingly ~- = Gathers real-time table. * i Pos) ‘DATA. INTEGRITY. DATA IMMUN ; res(stent to > epagers tothe, Accuracy ; consistency : “pata te .protected ov relab itty of aata throug hou external threats - (Wber attacks)...” iks Weecycle- Ban Gee she systenny HS FEMME AO - ensure qhat data remains unchanged incongstencita ¥ gaps in Ahevinyo- Fe reiable, from creation to storage etavoles Creating much smarter, retvieval. © sophisticated applications that characher istics : 0% handles all. permutations: ycdata - Tpatacis, coreeet ¥ free from errors - sMarnrainihg stability ine the... = pata) remains, uniform -acrossi anges oF wage: | TT tees SySteMs ., . sie ay / <3 — peta 1S: PEIsteNe *0 “corruption: © 3 RANDUNG MISSING DATA: + wipsing. data’ J. deeined: asaang values, er data 4h variables in the given dataset - : : * Reasons for missing data: ~ Past Agta mignt” get. corrupted - re = Observations are not recorded for certain fields: dui ~ users have nok provided” waluts Intentionally... “Tuo ways of handling fussing values: i) Deletion: - Removing observations oF variables with mi = List wsise_detehion_metnod ; you remove a % Taher dataset cir. CONEAINS more Anan = simple § straightforward - in : A = Regdees “Sl2e OF, dataset.» may \ead to. piased resales: ured value: J amputation: Te ain the mnissing value with’ a, substi at iS not stotéd “for some eo some reasons. ssing values - : ord .er, observation in Bor, missing values + Sire Rstinnating & 4itting. Lothd> ya ~You need ‘to’ nave “domain Knowledge of dataset: Cath = Preserves the sarmple sfze, maintains staristical power. ° 16 = neroduces uncertain - Assumptions about m jing data must be ‘made. > DATA ENTRY 4 FUDGEABILITY: Oud “Daca entry és the process of anpurring , recording 5 commpurtty systems or database oF. ‘ions + Mose Pata. enety *AsKS are ime consuming. °°’ woe pa “Aur aeel _Keye “ata i ustd'i tor perform: analysis “$ make plans. High quality “ara entry, % crustal or atuurate anauysts:? 7 + Fudgeability iS ane © Agree’ to" whrich dara. can. easily, be, manipulated “tt Fadel cof Janinigntionally. f 4 manipdla ted either sAcenouledges the Flexibility + iptalbittty“ of “Aatas 2 foo pudgeabtity,” poses (0, risk 0 data accuracy 5 yeliability « storing data into a” > AUDITING, VERSUS. EDITING : at if ptt SPITS asncqam aie nua er ane process of zu) Ee ; 3 ‘ Fe. earning js the, process of making chang y ts aes Eaiting Mette -aatd, wntiggrations -emonitorin ecordjng even’ ng. is, THe, or. changes ia an : ‘or modifications 40 q ai ADE ONHENE. DE. ANE, LYSHEROS st aT - Auditing paradigms ime Ae Hing paradigms, incwdes = = pata logging: systems Ing Ce le NE Brenat areaiting Tools” allows r interactions 12 create & ¢ a ent . com ehensive * record: of -events- re 1 JQ OES OAs ,, Settings 100 0 indudes data on sensor data, user OO)” (PRCT EN A, rhclud es ext editors, re a a maa oS pene ~ security Auditing? “Allowing syste + = custonbization: users can per adnains to t1ack Maut hor 20d | Fant mrfacts, "by cAitig settings, qcctss attempts, security pregcnes 52. | themes of preferenas unusual qervines that mag °°) - - content f afin: wsers-tan, edit. content, indicate a security threae- ot RU gust , images. oF ‘ocagnents + Troubleshooting : using ex- word processing - applild fon 7 Debuggin' audit logs to diagnose % svaubléshoot esues , identity errors + understand SEYMORE OL events Aha [ed to a | problem- | | proto iting tool - * RETRIEVAL IN fHYSIGAL WoRtD: : on.within & physic “ Aechvely seeKing & locating object? °F inform ati environment: =e Seardning a book in a library. cr “ean, be done by ernploying pan aevices £0) factor ieee fd +The storage system is the same as ane retrieval syste u remnemberitig location - : L WORLD: © 2 RETRIEVAL_IN_DIGITA : eet it iD » Digital retrieval’ methods include * : Kt re = positional Retrieval: You can gina it bY yeriem bering ere you “ane “pile! SerUCtUr bcsFd pe 2 : also find it by remembering. its identifying name- ~ Identity Retrieval: YOU can fim = Associative or attribute -based reerieval! : 4 ce ~gased one the. ability 4o search for a. document based on- some inherent © uarity of the document - ibsele: a ’ + Enables seers 40 tind AouumeNnts 6y aneir convents 5 meaning fal properties « > FIVE STAGE SEARCH FRAMEWORK: i jp rormulation + - Expressing tne ‘search. ' ; aaa = saentitying 4 Understanding tre info- need.» defining the “search scope & formutating. clear search query - wis : . - raenti€y 40e “Source oF she: infos, the Fields for lieniting - ses, Bhe? VONTONKS «. Me : tqrch parameters 4 framing “the ire source « the oe ‘ - Biy_ detining: ‘Keywords » SpectFying. 5 intial quations " 3 exe The “Keyword “reach! 7 vari ane URTAES tion of Action: “launching the searth | acher!; teaching’, Steaches': di “posid on Formulated - query using i 2) Initia’ ) syncing Fre actual search process search Sais databases , eke- ~ Explicl aviNg search. button. changes. to cormponents of stage 4 ‘immediately: produce new ~IMplie “ “gets “esearch results - 4 Review of cegultsé reading messages F outcomes: as : = evauuatineg ane’ initial, starch. results for actdraty , alignrne up . . sehes se 5 nk wit) i reviews -consisting:,oF samples (doogle are abate) Matern vie abstracs “or! automatically generated summaries.” y 4) gosinemeni Foren Ant AGE sttp- ae ‘ = Adjusting, the’ search: sttdtegy base ceyeeug. of tag : = nets frhek OF search scot: A on, te reuieul og nna Feedits LT Exploring QlitrnaHve soured “or Keyworda.-. . : Pink Teabrellidg : aS "DI. you mean xxx’? when, Aten, is épel rispell 4 8) use: compiling or Aisseminacting insight. on eee yh ~agptying the reeritvea inké 40. FQUeil ane’ oramal “into. < 20, Tis : a\ ne Results can’ be Merged or saved , sent by Tia Inge ‘4 . ve Ort. a > DYNAMIC QUERIES 4 FACETED SEARCH * DYNAMIC. QUERY: -.” = Quenes: tak are built dynamically Yather that provided as an explicit “FACETED SEARCH: - pyjows agers to reduce, (EIEer) ARE TAMMnber of search results, UreRly te ek the acsired item(s). a or attribute query string. ; sinteractive & cuser-ariven séarch + FaeerS “are ane categories interfaces shat allow ‘asers:/to adjust * by Which “fo iS cavegoriztd- (ers price, § reeine “Meir. search criteria in 18 lor, skayle, brand) es sysers will get specific 5 relevant filter atin. yoults. real-time. s more flexible: 8 1) ‘ ree. tiie a] options 40 query iS compiled at runtime: eng al r- usta to generate “reports of 40 perform | a J practical “way to search for complex Catculations thar require 2) Pio uur or page ‘ 7 ‘ Aynamic MPU cL os nterese. that one needs, to recognite & identify y anak: matches incoming data with info K PATTERN RECOGNITIO! - pattern can be’ ang entity’ oF i + Pattern’ eee ane technolog Stored in database PNAI | PRI Ibe yn *mmvolves the Taenkification , interpretation 3 orga’ “these patterns can be visual , auditory, textual ors Those patterns are used t make decistons of pre algorithms lo DOIIH VisaT + eX= Forage? recognition, qudio $ Wateo voice = “|” Fingerprint -searnning ‘|= analyzing £ taent fying nization of patttrns with data. ensory in nature- ateions using computer - security-§. surveillance... Recognition * si storn’s across seckors. |’ Personal assistants, oo fcunigite , AMeEnS. in the ~rdentif ging parterns 5 speech #0 beet converteys.. |. ridges E vaieys Of + objects within | visual data. Apple's s iy Alera. Fingerprints - Sede de Tent pattems in |- yo “proteck. the Aevile...: quate ‘signals 29°: from sun aqutnarized access. Sit vecogni spoxen words. > ROLE OF MACHINE LEARNING: e- ML ih patti recognition enable com patterns within ~ data. ; L as never to make ‘pert’ but to make guesses anak are - Goal ™ pod enough to be useful: + ML uses algorithms +o learn predictive analysis , : Apptications purrs to automatically lear 4 ident'fy om data £ make predictions . NUP (natura Language processing) , ete: >> PATTERN RECOGNITION PROLESS:.°: — Le-Gathering relevant data ov signals From various Data, collection Preprocessing - Feature -Extrachon Classification Post processing SOUTCES~ ie . 7@n. be in qnt form oF “ttxtS; images ; signals; et: ary =Cleaning! § preparing Ane ¢ pattern recognition - de MUI Vek “to, remove sree eT EVEVANE INYO = OF, CLOTS: s¥nvolves dara cleaning , Normalization 5 feqrare ~ extractions . "SB —e-taeniitying 5 selecting relevant ftatures oF drarackeristics fron “tht. preprocessed: data. ~tnpur ‘data iS converted 40.4 feature vectar- « assigning data instances +0 predefined. ‘classes oF cate orits pased on extracted Features ‘ -Extraued Features are compared 10 & parttrn stored in the database: . = ReeiNIT HB VOUAAING the results obtained #rom: ‘dassifiGation: , phase ue kod fy o 7 can include ¢(treri g , aecesion “guston, error cortectron. oltecred data tor, effective ” similar = PATTERN RECOGNITION: at ath 596 a - user benaviOUr analysis‘ —to analyse, how users inktrack with a sysrern, : MEPL Yo fis poy 7 Rawigation paths» putton clUKS Gestures, eb - - usability “testing. -by.observing.: 4. anal wine paveorns') 4 identify yee dues 4 yin point 3p : * identify: kanal | prov “patteens #7, For’ recovery “straxegi¢s overall. ertor. handling: i - pesonatization® iproduck recommendatiens pasta on history -

You might also like