SlideShare a Scribd company logo
1 of 13
Human Computer Interface of an I.S
Submitted By:
Group # 9 (BS I.T-Morning) Submitted To:
Asif Mahmood (1029) Inam ul Haq
Noman Nazar (1041)
Adeel Ahmed (1042)
M. Faizan Butt (1043)
Arsalan Ahmed (1044)
University of Education Okara Campus
Contents
 Introduction
 Importance and Scope of HCI in I.S and other fields
 Use of Example that will explore above concept
 How to implement HCI of an I.S in any organization
 Advantages and Disadvantages
 Conclusions
 References
Introduction
 Human
• The end-user
• The members of an organization
 Computer
• Hardware
• Software
 Interface
• A point where two objects meet.
• A point where the human can tell the computer
what to do.
• A point where the computer displays the
requested information.
Definition
“Human–computer interface involves the study,
planning, and design of the interaction
between people and computers. It is often
regarded as the intersection of computer
science, behavioural sciences, design and
several other fields of study.”
It is used in many routine fields of human life
like as Intelligent Homes/Offices, Driver
Monitoring, Intelligent Games, E-Commerce. It
is also used in information system by various
ways.
Example
Importance and Scope of HCI in I.S
and other fields
HCI of an Expert System(Biometric attendance system)
Biometric is a technology that measure and analyse human body
characteristics for identification purposes. Biometric improves
business processes because of their ability to quickly and
accurately identify an individual and grant specific privileges.
e.g.
Face-key detector, Finger print detector etc.
From the above pic it is clear that HCI is used in various
fields of human life. It is also used in many fields of
Information system.
Uses in I.S
HCI is used in different fields of information system like as
 HCI of an Expert system
 HCI of Office Automation system
 HCI of a Library Information system
 HCI of a decision support system
Face-Key Detector
Face-key delivers patented technology based on fingerprints
and face recognition for business
processes enhancing.
Implementation of face-key Detector in I.S
Face-key detector is a HCI device which is used in the I.S of any
organization for different tasks like:
 Attendance
 Entry recode
 Facial recognition
 Photography
 Marketing
Working
Requirements
We are required following features/data:
 Data base of Organization.
 ICT (Software, Hardware etc.).
 I.S (Programmer, I.S manager etc.)
 Network
A college in Fuzhou, Fujian province has introduced an electronic
face-detection system to prevent students from skipping school,
the Fujian Daily reports. “Minjiang University's Conservatory
of Music” has installed the facial recognition system in
classrooms and demanded that students arrive 10 minutes early.
The identification system saves time as teachers are no longer
required to take attendance. Students who fail to be identified at
first scan are encouraged to move in front of the camera and do
it again.
Use of face-key detector in
organizations
Advantages
 I-PHONE Apple has shown interest in building advanced,
secure facial recognition technology that would take a two-
dimensional image of a person's face and render it in 3D for
greater accuracy.
 FBI Facial Recognition (face-key detector) software to
automatically check driver's license applicants against
Criminal Database.
 Very accurate with the use of “switches”.
 Good for “expert” users - can quickly access commands.
 Time saving.
 Most accurate.
 Easier for a novice/new user to learn/use
 No training required
 Can be quicker than keyboard entry
 Hands-free
Disadvantages
 Heavy makeup could fool the system.
 It cannot work without power/voltage.
 System has no backup in case of any
damage.
 Facial recognition system uses camera
technology which is not yet present as
standard equipment in all the pcs thus it
will create problem.
 It is more expensive and complex than
other methods..
Conclusions
This system provides easier way to do a task
in any origination. It is used in many abroad
countries. It mostly used in colleges,
universities, offices, factories and agencies.
It is used in FBI. FBI uses face-key detector
software to automatically check driver's
license applicants against Criminal
Database. It is expensive but very useful,
reliable and flexible software that is
commonly used in any big organization. It is
used as a basic input device in information
systems. It is user friendly
References
 http://www.hussainaenterprise.com/fingerprint-
standalone-time-attendance.htm
 http://www.fingerpak.com/contactus.html
 http://www.ecns.cn/cns-wire/2014/03-
03/103098.shtml
 http://www.popsci.com/technology/article/2009-
10/fbi-facial-recognition-software-scan-highway-
fugitive-motorists
 http://www.mwtime.com/biometrics.pdf
 http://en.wikipedia.org/wiki/Biometrics#Biometric_fu
nctionality

More Related Content

What's hot

USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTvicci4041
 
HUMAN COMPUTER INTERACTION
HUMAN COMPUTER INTERACTIONHUMAN COMPUTER INTERACTION
HUMAN COMPUTER INTERACTIONJaved Ahmed Samo
 
HCI - Chapter 2
HCI - Chapter 2HCI - Chapter 2
HCI - Chapter 2Alan Dix
 
HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basicsAlan Dix
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignVrushali Dhanokar
 
Human Computer Interaction-Basics
Human Computer Interaction-BasicsHuman Computer Interaction-Basics
Human Computer Interaction-BasicsMuhammad Asif
 
7 Stages of User Action Theory
7 Stages of User Action Theory7 Stages of User Action Theory
7 Stages of User Action Theoryhacrombie
 
User interface design: definitions, processes and principles
User interface design: definitions, processes and principlesUser interface design: definitions, processes and principles
User interface design: definitions, processes and principlesDavid Little
 
User Experience 3: User Experience, Usability and Accessibility
User Experience 3: User Experience, Usability and AccessibilityUser Experience 3: User Experience, Usability and Accessibility
User Experience 3: User Experience, Usability and AccessibilityMarc Miquel
 
HCI 3e - Ch 12: Cognitive models
HCI 3e - Ch 12:  Cognitive modelsHCI 3e - Ch 12:  Cognitive models
HCI 3e - Ch 12: Cognitive modelsAlan Dix
 
Models of Interaction
Models of InteractionModels of Interaction
Models of InteractionjbellWCT
 
HCI 3e - Ch 8: Implementation support
HCI 3e - Ch 8:  Implementation supportHCI 3e - Ch 8:  Implementation support
HCI 3e - Ch 8: Implementation supportAlan Dix
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI Deskala
 

What's hot (20)

User interface design
User interface designUser interface design
User interface design
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPT
 
HUMAN COMPUTER INTERACTION
HUMAN COMPUTER INTERACTIONHUMAN COMPUTER INTERACTION
HUMAN COMPUTER INTERACTION
 
HCI - Chapter 2
HCI - Chapter 2HCI - Chapter 2
HCI - Chapter 2
 
HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basics
 
HCI Basics
HCI BasicsHCI Basics
HCI Basics
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction Design
 
Human Computer Interaction-Basics
Human Computer Interaction-BasicsHuman Computer Interaction-Basics
Human Computer Interaction-Basics
 
7 Stages of User Action Theory
7 Stages of User Action Theory7 Stages of User Action Theory
7 Stages of User Action Theory
 
User interface design: definitions, processes and principles
User interface design: definitions, processes and principlesUser interface design: definitions, processes and principles
User interface design: definitions, processes and principles
 
User Experience 3: User Experience, Usability and Accessibility
User Experience 3: User Experience, Usability and AccessibilityUser Experience 3: User Experience, Usability and Accessibility
User Experience 3: User Experience, Usability and Accessibility
 
Direct manipulation - ppt
Direct manipulation - pptDirect manipulation - ppt
Direct manipulation - ppt
 
HCI
HCI HCI
HCI
 
HCI 3e - Ch 12: Cognitive models
HCI 3e - Ch 12:  Cognitive modelsHCI 3e - Ch 12:  Cognitive models
HCI 3e - Ch 12: Cognitive models
 
Models of Interaction
Models of InteractionModels of Interaction
Models of Interaction
 
HCI Presentation
HCI PresentationHCI Presentation
HCI Presentation
 
HCI 3e - Ch 8: Implementation support
HCI 3e - Ch 8:  Implementation supportHCI 3e - Ch 8:  Implementation support
HCI 3e - Ch 8: Implementation support
 
E3 chap-08
E3 chap-08E3 chap-08
E3 chap-08
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
 
Hci
HciHci
Hci
 

Similar to Human Computer Interface of an Information System

A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptxslidecell212100
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,Jill Lyons
 
Introduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONIntroduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONcarljamess2700
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software EngineeringHeidi Maestas
 
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.EWEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.EIRJET Journal
 
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfIntelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfmarwa27147
 
Entitlements and balancing information system
Entitlements and balancing information systemEntitlements and balancing information system
Entitlements and balancing information systemِAbdulla AlShourbagy
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognitionIAESIJAI
 
Available Research Topics in Machine Learning
Available Research Topics in Machine LearningAvailable Research Topics in Machine Learning
Available Research Topics in Machine LearningTechsparks
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....Jitin Francis
 

Similar to Human Computer Interface of an Information System (20)

Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Billing project
Billing projectBilling project
Billing project
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Introduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONIntroduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTION
 
Chapter1
Chapter1Chapter1
Chapter1
 
hardcopy
hardcopyhardcopy
hardcopy
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
 
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.EWEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
 
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfIntelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
 
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
 
Entitlements and balancing information system
Entitlements and balancing information systemEntitlements and balancing information system
Entitlements and balancing information system
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Available Research Topics in Machine Learning
Available Research Topics in Machine LearningAvailable Research Topics in Machine Learning
Available Research Topics in Machine Learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....
 

More from university of education,Lahore

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Human Computer Interface of an Information System

  • 1. Human Computer Interface of an I.S Submitted By: Group # 9 (BS I.T-Morning) Submitted To: Asif Mahmood (1029) Inam ul Haq Noman Nazar (1041) Adeel Ahmed (1042) M. Faizan Butt (1043) Arsalan Ahmed (1044) University of Education Okara Campus
  • 2. Contents  Introduction  Importance and Scope of HCI in I.S and other fields  Use of Example that will explore above concept  How to implement HCI of an I.S in any organization  Advantages and Disadvantages  Conclusions  References
  • 3. Introduction  Human • The end-user • The members of an organization  Computer • Hardware • Software  Interface • A point where two objects meet. • A point where the human can tell the computer what to do. • A point where the computer displays the requested information.
  • 4. Definition “Human–computer interface involves the study, planning, and design of the interaction between people and computers. It is often regarded as the intersection of computer science, behavioural sciences, design and several other fields of study.” It is used in many routine fields of human life like as Intelligent Homes/Offices, Driver Monitoring, Intelligent Games, E-Commerce. It is also used in information system by various ways. Example
  • 5. Importance and Scope of HCI in I.S and other fields
  • 6. HCI of an Expert System(Biometric attendance system) Biometric is a technology that measure and analyse human body characteristics for identification purposes. Biometric improves business processes because of their ability to quickly and accurately identify an individual and grant specific privileges. e.g. Face-key detector, Finger print detector etc. From the above pic it is clear that HCI is used in various fields of human life. It is also used in many fields of Information system. Uses in I.S HCI is used in different fields of information system like as  HCI of an Expert system  HCI of Office Automation system  HCI of a Library Information system  HCI of a decision support system
  • 7. Face-Key Detector Face-key delivers patented technology based on fingerprints and face recognition for business processes enhancing. Implementation of face-key Detector in I.S Face-key detector is a HCI device which is used in the I.S of any organization for different tasks like:  Attendance  Entry recode  Facial recognition  Photography  Marketing
  • 9. Requirements We are required following features/data:  Data base of Organization.  ICT (Software, Hardware etc.).  I.S (Programmer, I.S manager etc.)  Network A college in Fuzhou, Fujian province has introduced an electronic face-detection system to prevent students from skipping school, the Fujian Daily reports. “Minjiang University's Conservatory of Music” has installed the facial recognition system in classrooms and demanded that students arrive 10 minutes early. The identification system saves time as teachers are no longer required to take attendance. Students who fail to be identified at first scan are encouraged to move in front of the camera and do it again. Use of face-key detector in organizations
  • 10. Advantages  I-PHONE Apple has shown interest in building advanced, secure facial recognition technology that would take a two- dimensional image of a person's face and render it in 3D for greater accuracy.  FBI Facial Recognition (face-key detector) software to automatically check driver's license applicants against Criminal Database.  Very accurate with the use of “switches”.  Good for “expert” users - can quickly access commands.  Time saving.  Most accurate.  Easier for a novice/new user to learn/use  No training required  Can be quicker than keyboard entry  Hands-free
  • 11. Disadvantages  Heavy makeup could fool the system.  It cannot work without power/voltage.  System has no backup in case of any damage.  Facial recognition system uses camera technology which is not yet present as standard equipment in all the pcs thus it will create problem.  It is more expensive and complex than other methods..
  • 12. Conclusions This system provides easier way to do a task in any origination. It is used in many abroad countries. It mostly used in colleges, universities, offices, factories and agencies. It is used in FBI. FBI uses face-key detector software to automatically check driver's license applicants against Criminal Database. It is expensive but very useful, reliable and flexible software that is commonly used in any big organization. It is used as a basic input device in information systems. It is user friendly
  • 13. References  http://www.hussainaenterprise.com/fingerprint- standalone-time-attendance.htm  http://www.fingerpak.com/contactus.html  http://www.ecns.cn/cns-wire/2014/03- 03/103098.shtml  http://www.popsci.com/technology/article/2009- 10/fbi-facial-recognition-software-scan-highway- fugitive-motorists  http://www.mwtime.com/biometrics.pdf  http://en.wikipedia.org/wiki/Biometrics#Biometric_fu nctionality