This document discusses human memory and learning in the context of human-computer interaction. It covers the following key points:
1. Long term memory is organized into networks, schemas, and frames to store declarative and procedural knowledge. Short term memory is limited to 7±2 chunks of information.
2. Models of declarative memory include semantic nets, schemas, and frames. Procedural memory is often modeled as production rules.
3. Important constraints on memory retrieval are the ability to recognize information with cues and the larger capacity for recognition over recall. Contextual cues can aid recall.
4. Learning follows principles like the power law of practice and can be modeled through reinforcement learning frameworks. Interface learnability depends
An Assessment of Spiritual Maturity for Men and Women concern with their Spiritual Status...done in a small independent Church for Weekly Activity
Resources coming from Professors from Philippine Missionary Institute: Ms. Miriam Aboy and Ptr. Estores. Syntesized by Ptra.Phoebe Santos
Similar to the different platforms that transmedia exploits, I am presenting my analysis of transmedia in three parts:
EPISODE 1: The Report (handed in to Professor Kozinets)
Episode 2: The Presentation (presented to MKTG 4226 R)
Episode 3: The Analysis ("co-created" with entire class following 'The Presentation')
This is the RAW and first version of the brainjam conducted at Gov20LA on February 13, 2011. Look for edits and additions to be added as more content from social media sources are pulled in to the presentation. This section will be amended to note the final version when it is uploaded.
Do you know who build the pyramids?
Well, no one knows for sure but lets study and do a little bit of story telling together with Rhett Teacher. Come study with me at www.rhett-teacher.com
Deep Learning has taken the digital world by storm. As a general purpose technology, it is now present in all walks of life. Although the fundamental developments in methodology have been slowing down in the past few years, applications are flourishing with major breakthroughs in Computer Vision, NLP and Biomedical Sciences. The primary successes can be attributed to the availability of large labelled data, powerful GPU servers and programming frameworks, and advances in neural architecture engineering. This combination enables rapid construction of large, efficient neural networks that scale to the real world. But the fundamental questions of unsupervised learning, deep reasoning, and rapid contextual adaptation remain unsolved. We shall call what we currently have Deep Learning 1.0, and the next possible breakthroughs as Deep Learning 2.0.
This is part 2 of the Tutorial delivered at IEEE SSCI 2020, Canberra, December 1st (Virtual).
An Assessment of Spiritual Maturity for Men and Women concern with their Spiritual Status...done in a small independent Church for Weekly Activity
Resources coming from Professors from Philippine Missionary Institute: Ms. Miriam Aboy and Ptr. Estores. Syntesized by Ptra.Phoebe Santos
Similar to the different platforms that transmedia exploits, I am presenting my analysis of transmedia in three parts:
EPISODE 1: The Report (handed in to Professor Kozinets)
Episode 2: The Presentation (presented to MKTG 4226 R)
Episode 3: The Analysis ("co-created" with entire class following 'The Presentation')
This is the RAW and first version of the brainjam conducted at Gov20LA on February 13, 2011. Look for edits and additions to be added as more content from social media sources are pulled in to the presentation. This section will be amended to note the final version when it is uploaded.
Do you know who build the pyramids?
Well, no one knows for sure but lets study and do a little bit of story telling together with Rhett Teacher. Come study with me at www.rhett-teacher.com
Deep Learning has taken the digital world by storm. As a general purpose technology, it is now present in all walks of life. Although the fundamental developments in methodology have been slowing down in the past few years, applications are flourishing with major breakthroughs in Computer Vision, NLP and Biomedical Sciences. The primary successes can be attributed to the availability of large labelled data, powerful GPU servers and programming frameworks, and advances in neural architecture engineering. This combination enables rapid construction of large, efficient neural networks that scale to the real world. But the fundamental questions of unsupervised learning, deep reasoning, and rapid contextual adaptation remain unsolved. We shall call what we currently have Deep Learning 1.0, and the next possible breakthroughs as Deep Learning 2.0.
This is part 2 of the Tutorial delivered at IEEE SSCI 2020, Canberra, December 1st (Virtual).
John Laird, University of Michigan, presentation at Cognitive Systems Institute Speaker Series on "A Cognitive Architecture Approach to Interactive Task Learning"
Deep learning, enabled by powerful compute, and fuelled by massive data, has delivered unprecedented data analytics capabilities. However, major limitations remain. Chiefly among those is that deep neural networks tend to exploit the surface statistics in the data, creating short-cuts from the input to the output, without really deeply understanding of the data. As a result, these networks fail miserably to generalize to novel combinations. This is because the networks perform shallow pattern matching but not deliberate reasoning – the capacity to deliberately deduce new knowledge out of the contextualized data. Second, machine learning is often trained to do just one task at a time, making it impossible to re-define tasks on the fly as needed in a complex operating environment. This talk presents our recent developments to extend the capacity of neural networks to remove these limitations. Our main focus is on learning to reason from data, that is, learning to determine if the data entails a conclusion. This capacity opens up new ways to generate insights from data through arbitrary querying using natural languages without the need of predefining a narrow set of tasks.
Document with the most important design principles in the field of HCI.
It lists HCI principles in a quick way with examples of the real world, and links to research for further information. Use it to guide and base your decision rationale, wether you're designing software apps, websites, physical objects, marketing, etc.
#1 Berlin Students in AI, Machine Learning & NLP presentationparlamind
For the first ever Meetup of Berlin Students in AI, Machine Learning & NLP Dr. Tina Klüwer (CTO at parlamind.com and Nuria Bertomeu Castello (CSO) gave and introductory presentation on conversational intelligence.
memory model is part of Cognitive Processes that are used in interface design.information process model consist of sensory,working and long term memory.these memories must be considered while designing interfaces.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Elevating Tactical DDD Patterns Through Object Calisthenics
Chapter 3 memory and learning
1. HUMAN COMPUTER INTERACTION
Subject Code : DCM 214
Chapter 3:
MEMORY AND LEARNING
1 Prepared By : NURAINI MOHD GHANI
2. Key points:
Long term memory
• organised as networks schemas frames
networks, schemas,
Short term memory
• what are the limits?
Learning rates
Learnability
2 Prepared By : NURAINI MOHD GHANI
3. Human constraints
Model Human Processor
(MHP)
#Perceptual, Motor and
Cognitive sub-systems
sub systems
characterised by:
– St
Storage capacity U
it
– Decay time D
– Processor cycle time T
#We will focus today on
the memory stores
3 Prepared By : NURAINI MOHD GHANI
4. Long term memory
Long Term Memory (LTM)
Infinite capacity and decay time?
p y y
*Not everything is stored (what is filtering process?)
* Not everything stored can be retrieved (what is recall process?)
* Not everything recalled is correct (what is interference process?)
Different kinds of memory may be distinguished:
Declarative, knowledge of facts:
* Episodic: what happened, where and when
*Semantic: factual information, general knowledge independent
of context
Procedural: how-to-do-it knowledge
*Usually implicit, hard to put in words (hence ‘non-declarative’)
e.g. how to ride a bicycle
4 Prepared By : NURAINI MOHD GHANI
5. Declarative memory models
Semantic nets: memory is organised by links expressing strength
or type of relationships between nodes
May be hierarchical
Can generate representation of people s knowledge by asking them to rank
people’s
relatedness of item pairs, then generate and prune network (e.g. Pathfinder
algorithm)
5 Prepared By : NURAINI MOHD GHANI
7. Declarative memory models
Schemas:
pre-exisiting knowledge structures that shape our memory of new
inputs
#Can improve recall but also cause memory biases
# The schema concept has been formalised as:
# Frames: knowledge is organised into data structures with fixed,
default and variable slots or attributes (c.f. OOP)
# Scripts: stereotypical knowledge about situations that allows
interpretation of partial descriptions or cues
• E.g. “We went to that restaurant you recommended. The food
arrived quickly. We left about nine.” Did they eat the food? Did they pay? Were
there tables in the restaurant?
#Note interaction with episodic memory
# Schemas may develop as abstractions of specific experiences
#Our memory of specific experiences may be shaped by schema
y p p y p y
7 Prepared By : NURAINI MOHD GHANI
8. Procedural memory
How to do it’
*Often modelled in HCI as production rules:
* Set of rules in the form: if condition then action
* Conditions: e.g. user goals (and subgoals) and current STM contents Actions: what
to do (and update to goals)
* Condition Action
GOAL: DELETE [POSITION CURSOR] [PRESS DELETE]* A more realistic example:
DELETE]
8 Prepared By : NURAINI MOHD GHANI
9. Procedural memory
Using production rule description:
Complexity of interaction task can be estimated from number
of
production rules needed to describe it.
p
Time to learn a task can be estimated by how many
production
rules transfer to it from previous tas s
u st a s t o p v ous tasks
Cognitive load can be estimated by how much working
memory the
conditions assume
Note this does not imply these rules are consciously
understood
9 Prepared By : NURAINI MOHD GHANI
10. Long term memory
Important constraint is ability to retrieve information
Semantic nets imply easier if have cues that are near links to the
target
Schemas imply easier if target is part of coherent structure
Have a much larger capacity for recognition than recall
Hence menus vs. command interfaces
But scanning also takes time, or may have many more items than
can be realistically scanned
• Need to recall where to look for the item to recognise
• Important to support partial recall (e.g. part of file name)
• Important to support contextual recall (e.g. when file
created)
10 Prepared By : NURAINI MOHD GHANI
11. Short term memory (STM)
Capacity of STM 7±2 chunks of information.
cf. Working Memory
`Registers’ of the Cognitive Processor
•D f
Data from perceptualsub-systems
l b
• Activated ‘chunks’ of LTM
‘Cognitive load of task is
Cognitive load’
how much we have to
keep “in mind”
Attention bottleneck
Limited capacity – but
what is the limit?
11 Prepared By : NURAINI MOHD GHANI
12. Learning
Power law of Practice:
Reaction time: Tn = T1n-a a = 0.4[0.2 -- 0.6]
I.e. improvement is rapid at first, and slows later
Has been found in a wide variety of tasks (pressing button
sequences, reading inverted text, mental arithmetic, manufacturing,
writing books…)
However Heathcote et al. (2000)
( )
show individual data in a variety
of tasks is actually better
described as exponential:
Tn = T1e-an
Implies constant relative
learning rate
12 Prepared By : NURAINI MOHD GHANI
13. Learning
An alternative framework to the acquisition of ‘production rules’ is
the reinforcement learning approach
Assume an agent is interacting with a world that can be described
as a Markov Decision Process
World contains set of states S
In each state s the agent can take one of a set of actions A(s)
Given action a in state s, will have transition to state s’ with
probability P(s s’,a)
P(s,s a)
Also have expected reward on the transition R(s,s’,a)
The problem for the agent is to find a policy π for taking the right
action in a given state to maximise the expected future reward
Ignoring (for now) the various AI algorithms for solving this
problem, we can use it as a framework for understanding what
makes interfaces more or less learnable
13 Prepared By : NURAINI MOHD GHANI
14. Learnability (Dix #1)
Predictability — determinism and operation visibility
System behaviour is observably deterministic:
Easier to learn if P(s,s’,a)=1, i.e. the same action in the same state has the same consequence
Also important that user can see that the state has changed as a result of the action (within
reasonable delay)
Markov property: transition does not depend on history (how current state was reached);
hence reduced memory load?
operation visibility:
user knows the available actions (e.g. use logical constraints)
14
Prepared By : NURAINI MOHD GHANI
15. Learnability (Dix #2)
Synthesisability: the user can assess effect of past
actions
Specifically, they can assess if the outcome is better or
worse
than expected (are they making progress towards the goal?)
Immediate vs. eventual honesty
vs
Supervised learning provides explicit feedback at each
step
• Advantages of WYSIWYG
Difficult learning situations involve long chains of states
and actions before any reward is received
15 Prepared By : NURAINI MOHD GHANI
16. Learnability (Dix #3)
Familiarity: match the interface to users’ expectations:
Facilitate guessing:
Suggested that users when guessing will generally pick the
action that (superficially) most resembles the goal Hence
goal.
should:
1. Make the possible actions salient and distinct, keep number small
2. Use identity cues between actions and goals as much as possible
3. Don’t require long sequences of choices
4. Have one or less obscure actions
5. Enable undo.
Users learn better from exploring, but may be reluctant to
p
explore
16 Prepared By : NURAINI MOHD GHANI
17. Learnability (Dix #3)
Familiarity: match the interface to users’
expectations:
Use terms consistent with everyday usage?
y y g
Problem that agreement can be low, e.g. Furnas et al:
find only 10-20% of users generate same command
y g
name as an ‘armchair’ designer.
User-preferred names overlap by only 15-35%.
Up to 15 aliases still covers only 60-80%.
Exploit natural affordances
17 Prepared By : NURAINI MOHD GHANI
18. Affordances
Affordance: a relation between agent, object and task
We don’t normally see the world in terms of coloured
surfaces in space
We directly perceive the potential for interaction "If a
terrestrial surface is nearly horizontal (instead of slanted), nearly flat
(instead of convex or concave), and sufficiently extended (relative to
the size of the animal) and if its substance is rigid (relative to the
weight of the animal), then the surface affords support…”
J.J. Gibson (1979) The Ecological Approach to Perception
“If a door handle needs a sign, then its design is faulty”
D. Norman, The Psychology of Everyday Things
18 Prepared By : NURAINI MOHD GHANI
19. Affordances & HCI
Doors are ‘surface artifacts’: what you can perceive is all that exists
(though bad design might confuse these properties)
E.g. physical file – can see if open, size, type of content
Computers are `internal artifacts’: they have complex internal
states that determine their function but are not visible
This information needs to be transformed into a surface
representation for the user:
Opportunity: can choose the representation best suited to the user
without the physical constraints of surface artifacts
Problem: it is up to the designer to decide what will be visible; and
this
thi requires expert knowledge of b th th artifact and the user
i tk l d f both the tif t d th
E.g. what might the user need or want to know about the
computer file?
19 Prepared By : NURAINI MOHD GHANI
20. Learnability (Dix #4)
Consistency — likeness in input/output behaviour arising from similar
situations or task objectives
Make the state s recognisable to facilitate choice of correct action based on previous
experience
challenge (and danger):
consistency i not self-contained
it is t lf t i d
consistency within screens
consistency within applications
consistency within desktop
..
Examples: consistent patterns in layout; same short-cut keys for similar action; same
placement for recurrent menu options
Always place the Q command as the llast item in the lleftmost menu
Al l h Quit d h h f
Well-learnt actions can become ‘habits’: the state evokes a particular action even
when it is not appropriate for the goal
E.g. confirmation dialogues
g g
20 Prepared By : NURAINI MOHD GHANI
21. Learnability (Dix #5)
Generalizability — extending specific interaction
knowledge to new situations
g
Implies learning capability that abstracts from specific states
and actions to recognise similarities and consistent patterns
UI standards and guidelines can assist/enforce generalizability
applications should offer the Cut/Copy/Paste operations whenever
possible
Users should generalise from cutting text cutting images etc to
text, images, etc.
cutting files
21 Prepared By : NURAINI MOHD GHANI
22. Learning in the computer
Learning algorithms are increasingly being used to allow the Computer to adapt to us, rather
than vice versa
E.g. applying reinforcement learning for spoken dialogue managers to learn optimal action for
every situation
See http://homepages.inf.ed.ac.uk/olemon/
p p g
22 Prepared By : NURAINI MOHD GHANI
23. THANK YOU
SEE YOU NEXT CLASS
AND
DON’T FORGET TO FINISH
YOUR HOMEWORK
23 Prepared By : NURAINI MOHD GHANI