Chapter 8: Implementation support
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Chapter 2: The computer
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Chapter 8: Implementation support
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Chapter 2: The computer
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Chapter 7: Design rules
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
additional slides for Chapter 4: Paradigms
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Saliency Detection via Divergence Analysis: A Unified Perspective ICPR 2012Jia-Bin Huang
A number of bottom-up saliency detection algorithms have been proposed in the literature. Since these have been developed from intuition and principles inspired by psychophysical studies of human vision, the theoretical relations among them are unclear. In this paper, we present a unifying perspective. Saliency of an image area is defined in terms of divergence between certain feature distributions estimated from the
central part and its surround. We show that various, seemingly different saliency estimation algorithms are in fact closely related. We also discuss some commonly
used center-surround selection strategies. Experiments with two datasets are presented to quantify the relative advantages of these algorithms.
Best student paper award in Computer Vision and Robotics Track
Machine Learning (ML) in Wireless Sensor Networks (WSNs)mabualsh
Wireless sensor networks (WSNs) and the Internet of Things (IoT) monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. WSNs and IoT often adopt machine learning to eliminate the need for unnecessary redesign. Machine learning inspires many practical solutions that maximize resource utilization and prolong the network's lifespan. These slides present an extensive literature review of machine learning methods to address common issues in WSNs and IoT.
Multimodal interaction provides the user with multiple modes of interacting with a system. A multimodal interface provides several distinct tools for input and output of data.
Chapter 7: Design rules
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
additional slides for Chapter 4: Paradigms
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Saliency Detection via Divergence Analysis: A Unified Perspective ICPR 2012Jia-Bin Huang
A number of bottom-up saliency detection algorithms have been proposed in the literature. Since these have been developed from intuition and principles inspired by psychophysical studies of human vision, the theoretical relations among them are unclear. In this paper, we present a unifying perspective. Saliency of an image area is defined in terms of divergence between certain feature distributions estimated from the
central part and its surround. We show that various, seemingly different saliency estimation algorithms are in fact closely related. We also discuss some commonly
used center-surround selection strategies. Experiments with two datasets are presented to quantify the relative advantages of these algorithms.
Best student paper award in Computer Vision and Robotics Track
Machine Learning (ML) in Wireless Sensor Networks (WSNs)mabualsh
Wireless sensor networks (WSNs) and the Internet of Things (IoT) monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. WSNs and IoT often adopt machine learning to eliminate the need for unnecessary redesign. Machine learning inspires many practical solutions that maximize resource utilization and prolong the network's lifespan. These slides present an extensive literature review of machine learning methods to address common issues in WSNs and IoT.
Multimodal interaction provides the user with multiple modes of interacting with a system. A multimodal interface provides several distinct tools for input and output of data.
An Assessment of Spiritual Maturity for Men and Women concern with their Spiritual Status...done in a small independent Church for Weekly Activity
Resources coming from Professors from Philippine Missionary Institute: Ms. Miriam Aboy and Ptr. Estores. Syntesized by Ptra.Phoebe Santos
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Chapter 2 human capabilities, input output systems
1. HUMAN COMPUTER
INTERACTION
SUBJECT CODE : DCM 214
Prepared by : NURAINI MOHD GHANI
p R
1
Chapter 2
HUMAN CAPABILITIES :
INPUT OUTPUT SYSTEMS
2. KEY POINT
Human have processing constraints
p g
Motor limitations, e.g. Fitts’ law for pointing
Prepare by : NURAI MOHD GHANI
Visual range for motion, shape, colour, detail and
their consequences for design decisions
ed
Visual attention models
Alternative sensory channels
Alt ti h l
INI H
2
3. HUMAN CONSTRAINTS
What do we know about human capabilities that could or
should constrain interface design?
Prepare by : NURAI MOHD GH
Limits on perceptual capability – e.g. contrast, resolution
p p p y g ,
ed
Limits on motor capability – e.g. reach, speed, precision
Limits on attention capacity
Limits on memory
INI
Rates of learning and forgetting
Causes of error
Mental
M t l models & biases
d l bi
HANI
Individual differences (the average size fits few people)
Variable state (e.g. stress, fatigue)
Special needs & age … 3
4. HUMAN CONSTRAINTS
Model Human Processor
(MHP)
Prepare by : NURAI MOHD GH
*One way to subdivide
y
ed
the main constraints
*Perceptual, Motor and
Cognitive sub-systems
sub systems
INI
characterised by:
– Storage capacity U
– Decay time D
HANI
– Processor cycle time T
*We will focus today on
the perceptual and 4
motor processes
6. MOTOR CONSTRAINTS
Example: Fitts’ law (1954)
p ( )
Prepare by : NURAI MOHD GH
ed
Justification?
INI
#By “analogy” to Shannon information
capacity = bandwidthxlog2((signal+noise)/noise)
HANI
#If move fraction 1-r to target each timestep,
then reach target when rnD = W/2; so n is
proportional to log22D/W
6
# Empirically find good fit with log2(D/W + 0.5)
7. MOTOR CONSTRAINTS
Example: Fitts’ law (1954)
p ( )
Prepared by : NURAI MOHD GH
e
Application?
INI
*Time will increase with distance – can we
keep everything close?
HANI
*Time will decrease with width – can we
make width infinite?
7
8. Prepared by : NURAINI MOHD GHANI
e I H
8
PERCEPTION
What can we see?
9. PERCEPTION
Some consequences of what we can see:
q
#Motion – will be visible (and distracting)
Prepare by : NURAI MOHD GH
anywhere in visual field
# Colour – main advantage is “pop-out”:
ed
But many disadvantages:
# Sh
Shape iimportant i t t recognition: SO
t t in text iti
INI
ALL CAPS BAD
# Limits on resolution – recommend
HANI
minimum font size; ideally individual can adjust
# High resolution only in tiny area of fixation
9
10. EYE TRACKING
Fixation pattern is a g
p good indicator of attention
Prepare by : NURAI MOHD GHANI
#Where do people look, how often, for how
long, in what order?
ed
#Recent technology is making this a
standard tool for HCI
INI
#Also used as input device.
H
10
11. PERCEPTION
Importance of eye movements
Prepare by : NURAI MOHD GH
Must shift the tiny high
resolution area around
ed
Constantly
Movements called saccades
INI
occur > 2 per second all day Long
How does visual system decide
where to move next?
HANI
Models of attention
e.g. Itti et.al. 1998
11
12. ATTENTION
Simple statistical model of saliency Rosenholtz et al (2005)
*Provides definition of ‘clutter’: size of
Prepare by : NURAI MOHD GH
local covariance ellipsoid
ed
* To measure:
* Compute local feature covariance at
multiple scales
* Take maximum across scales
INI
* Average for different features
* Pool over space
*P d
Produces good correlation with human
d l ti ith h
HANI
estimates of clutter
* Can also use to determine what
feature added where would best draw 12
attention
13. ATTENTION
#So what went wrong here?
#Task: find current population of U.S.
k fi d l i f S
Prepared by : NURAINI MOHD GH
e I HANI
86% of users failed…
http://www.useit.com/alertbox/fancy-formatting.html 13
14. PERCEPTUAL CONSTRAINTS
Bottom up visual processing sets some constraints on
optimal layouts, but must also consider top down
ti l l t b t t l id t d
issues:
Prepare by : NURAI MOHD GH
#Cultural and l
#C lt l d learned f t
d factors – f ili it
familiarity
ed
#Underlying domain knowledge of user
# Need to reflect logical structure, e.g., placement and
grouping
INI
according to function, sequence, frequency of use
# Dependence on task to be carried out, e.g. getting an
overview
HANI
vs. seeking specific information
# Note that layout and visualisation are already widely
explored fields with conclusions that carry over to
fields, 14
HCI
15. ALTERNATIVE SENSORY CHANNELS
Different sensors provide parallel channel capacity
Sound:
Prepare by : NURAI MOHD GH
#Not so easy to localise but can detect from any direction
y y
ed
# Grabs attention – warning mechanisms
# Good signal of causal relation – use as confirmatory
feedback
INI
# Monitoring state, ‘background information’
# Disk, printer noise etc.
# Example of user improvisation in use of ‘data’
data
HANI
# Interface sound design is typically arbitrary and synthetic
Touch
To ch and haptics: 15
# Exploit our natural ability to ‘handle’ objects
16. THANK YOU
SEE YOU NEXT CLASS
Prepare by : NURAI MOHD GH
ed
AND
INI
DON T
DON’T FORGET TO
HANI
FINISH YOUR
HOMEWORK
16