SlideShare a Scribd company logo
Human Computer Interface of an I.S
Submitted By:
Group # 9 (BS I.T-Morning) Submitted To:
Asif Mahmood (1029) Inam ul Haq
Noman Nazar (1041)
Adeel Ahmed (1042)
M. Faizan Butt (1043)
Arsalan Ahmed (1044)
University of Education Okara Campus
Human Computer Interface of an I.S1
Contents
 Introduction
 Importance and Scope of HCI in I.S and other fields
 Use of Example that will explore above concept
 How to implement HCI of an I.S in any organization
 Advantages and Disadvantages
 Conclusions
 References
Human Computer Interface of an I.S2
Introduction
 Human
• The end-user
• The members of an organization
 Computer
• Hardware
• Software
 Interface
• A point where two objects meet.
• A point where the human can tell the computer
what to do.
• A point where the computer displays the
requested information.
Human Computer Interface of an I.S3
Definition
“Human–computer interface involves the study,
planning, and design of the interaction
between people and computers. It is often
regarded as the intersection of computer
science, behavioural sciences, design and
several other fields of study.”
It is used in many routine fields of human life
like as Intelligent Homes/Offices, Driver
Monitoring, Intelligent Games, E-Commerce. It
is also used in information system by various
ways.
Example
Human Computer Interface of an I.S4
Importance and Scope of HCI in I.S
and other fields
Human Computer Interface of an I.S5
HCI of an Expert System(Biometric attendance system)
Biometric is a technology that measure and analyse human body
characteristics for identification purposes. Biometric improves
business processes because of their ability to quickly and
accurately identify an individual and grant specific privileges.
e.g.
Face-key detector, Finger print detector etc.
From the above pic it is clear that HCI is used in various
fields of human life. It is also used in many fields of
Information system.
Uses in I.S
HCI is used in different fields of information system like as
 HCI of an Expert system
 HCI of Office Automation system
 HCI of a Library Information system
 HCI of a decision support system
Human Computer Interface of an I.S6
Face-Key Detector
Face-key delivers patented technology based on fingerprints
and face recognition for business
processes enhancing.
Implementation of face-key Detector in I.S
Face-key detector is a HCI device which is used in the I.S of any
organization for different tasks like:
 Attendance
 Entry recode
 Facial recognition
 Photography
 Marketing
Human Computer Interface of an I.S7
Working
Human Computer Interface of an I.S8
Requirements
We are required following features/data:
 Data base of Organization.
 ICT (Software, Hardware etc.).
 I.S (Programmer, I.S manager etc.)
 Network
A college in Fuzhou, Fujian province has introduced an electronic
face-detection system to prevent students from skipping school,
the Fujian Daily reports. “Minjiang University's Conservatory
of Music” has installed the facial recognition system in
classrooms and demanded that students arrive 10 minutes early.
The identification system saves time as teachers are no longer
required to take attendance. Students who fail to be identified at
first scan are encouraged to move in front of the camera and do
it again.
Use of face-key detector in
organizations
Human Computer Interface of an I.S9
Advantages
 I-PHONE Apple has shown interest in building advanced,
secure facial recognition technology that would take a two-
dimensional image of a person's face and render it in 3D for
greater accuracy.
 FBI Facial Recognition (face-key detector) software to
automatically check driver's license applicants against
Criminal Database.
 Very accurate with the use of “switches”.
 Good for “expert” users - can quickly access commands.
 Time saving.
 Most accurate.
 Easier for a novice/new user to learn/use
 No training required
 Can be quicker than keyboard entry
 Hands-freeHuman Computer Interface of an I.S10
Disadvantages
 Heavy makeup could fool the system.
 It cannot work without power/voltage.
 System has no backup in case of any
damage.
 Facial recognition system uses camera
technology which is not yet present as
standard equipment in all the pcs thus it
will create problem.
 It is more expensive and complex than
other methods..
Human Computer Interface of an I.S11
Conclusions
This system provides easier way to do a task
in any origination. It is used in many abroad
countries. It mostly used in colleges,
universities, offices, factories and agencies.
It is used in FBI. FBI uses face-key detector
software to automatically check driver's
license applicants against Criminal
Database. It is expensive but very useful,
reliable and flexible software that is
commonly used in any big organization. It is
used as a basic input device in information
systems. It is user friendly
Human Computer Interface of an I.S12
References
 http://www.hussainaenterprise.com/fingerprint-
standalone-time-attendance.htm
 http://www.fingerpak.com/contactus.html
 http://www.ecns.cn/cns-wire/2014/03-
03/103098.shtml
 http://www.popsci.com/technology/article/2009-
10/fbi-facial-recognition-software-scan-highway-
fugitive-motorists
 http://www.mwtime.com/biometrics.pdf
 http://en.wikipedia.org/wiki/Biometrics#Biometric_fu
nctionality
Human Computer Interface of an I.S13

More Related Content

What's hot

Human computerinterface
Human computerinterfaceHuman computerinterface
Human computerinterface
Kumar Aryan
 
HCI : Activity 1
HCI : Activity 1 HCI : Activity 1
HCI : Activity 1
autamata4
 
Real time human-computer interaction
Real time human-computer interactionReal time human-computer interaction
Real time human-computer interaction
ijfcstjournal
 
Introduction to HCI
Introduction to HCIIntroduction to HCI
Introduction to HCI
Salauddin Rubel
 
What is Human Computer Interraction
What is Human Computer InterractionWhat is Human Computer Interraction
What is Human Computer Interraction
praeeth palliyaguru
 
HUMAN COMPUTER INTERACTION
HUMAN COMPUTER INTERACTIONHUMAN COMPUTER INTERACTION
HUMAN COMPUTER INTERACTIONJaved Ahmed Samo
 
Human computer interaction by Atheer
Human computer interaction by Atheer Human computer interaction by Atheer
Human computer interaction by Atheer Self employed
 
Introduction To HCI
Introduction To HCIIntroduction To HCI
Introduction To HCI
Kshitiz Anand
 
Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
university of education,Lahore
 
Human Computer Interaction-Basics
Human Computer Interaction-BasicsHuman Computer Interaction-Basics
Human Computer Interaction-Basics
Muhammad Asif
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction Design
Vrushali Dhanokar
 
Introduction to Human Computer Interaction
Introduction to Human Computer InteractionIntroduction to Human Computer Interaction
Introduction to Human Computer Interaction
Syira Azhari
 
Human computer interaction Semester 1
Human computer interaction Semester 1Human computer interaction Semester 1
Human computer interaction Semester 1
HARISA MARDIANA
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
university of education,Lahore
 
Challenges in HCI for Mobile Devices
Challenges in HCI for Mobile DevicesChallenges in HCI for Mobile Devices
Challenges in HCI for Mobile DevicesAmol Kamble
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI) Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
Sachith Perera
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer InteractionJitu Choudhary
 
Introducing Human Computer Interaction
Introducing Human Computer InteractionIntroducing Human Computer Interaction
Introducing Human Computer Interaction
hcicourse
 
HCI
HCIHCI

What's hot (20)

Human computerinterface
Human computerinterfaceHuman computerinterface
Human computerinterface
 
HCI : Activity 1
HCI : Activity 1 HCI : Activity 1
HCI : Activity 1
 
Real time human-computer interaction
Real time human-computer interactionReal time human-computer interaction
Real time human-computer interaction
 
Introduction to HCI
Introduction to HCIIntroduction to HCI
Introduction to HCI
 
Hci Overview
Hci OverviewHci Overview
Hci Overview
 
What is Human Computer Interraction
What is Human Computer InterractionWhat is Human Computer Interraction
What is Human Computer Interraction
 
HUMAN COMPUTER INTERACTION
HUMAN COMPUTER INTERACTIONHUMAN COMPUTER INTERACTION
HUMAN COMPUTER INTERACTION
 
Human computer interaction by Atheer
Human computer interaction by Atheer Human computer interaction by Atheer
Human computer interaction by Atheer
 
Introduction To HCI
Introduction To HCIIntroduction To HCI
Introduction To HCI
 
Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
 
Human Computer Interaction-Basics
Human Computer Interaction-BasicsHuman Computer Interaction-Basics
Human Computer Interaction-Basics
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction Design
 
Introduction to Human Computer Interaction
Introduction to Human Computer InteractionIntroduction to Human Computer Interaction
Introduction to Human Computer Interaction
 
Human computer interaction Semester 1
Human computer interaction Semester 1Human computer interaction Semester 1
Human computer interaction Semester 1
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 
Challenges in HCI for Mobile Devices
Challenges in HCI for Mobile DevicesChallenges in HCI for Mobile Devices
Challenges in HCI for Mobile Devices
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI) Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 
Introducing Human Computer Interaction
Introducing Human Computer InteractionIntroducing Human Computer Interaction
Introducing Human Computer Interaction
 
HCI
HCIHCI
HCI
 

Similar to Human Computer Interaction of an Information System

Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal
 
Amel Mohamed cv2
Amel Mohamed  cv2Amel Mohamed  cv2
Amel Mohamed cv2amel aman
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
jasaniurvi
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
Mohamed EL Zayat
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
slidecell212100
 
Human Computer Interface.pptx
Human Computer Interface.pptxHuman Computer Interface.pptx
Human Computer Interface.pptx
AishwaryaSwaminathan4
 
Input to computer ( introduction to computer )
Input to computer ( introduction to computer )Input to computer ( introduction to computer )
Input to computer ( introduction to computer )
Saleem Abbas
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
Heidi Maestas
 
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfIntelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
marwa27147
 
Can body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdfCan body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdf
manjan6
 
His human identification schemes on web
His human identification schemes on webHis human identification schemes on web
His human identification schemes on webIAEME Publication
 
Introduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONIntroduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTION
carljamess2700
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha Maheshwari
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it applicationKumar
 
ARTIFICIAL_INTELLIGENCE_PPT.pptx
ARTIFICIAL_INTELLIGENCE_PPT.pptxARTIFICIAL_INTELLIGENCE_PPT.pptx
ARTIFICIAL_INTELLIGENCE_PPT.pptx
AhmedNURHUSIEN
 
Area's of Artificial Inteligence .pptx
Area's of Artificial Inteligence .pptxArea's of Artificial Inteligence .pptx
Area's of Artificial Inteligence .pptx
JIMSVKII
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
SouravMazumdar5
 
ICT-Lecture_1(Introduction).pptx
ICT-Lecture_1(Introduction).pptxICT-Lecture_1(Introduction).pptx
ICT-Lecture_1(Introduction).pptx
syed rafi
 

Similar to Human Computer Interaction of an Information System (20)

Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Amel Mohamed cv2
Amel Mohamed  cv2Amel Mohamed  cv2
Amel Mohamed cv2
 
hardcopy
hardcopyhardcopy
hardcopy
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Human Computer Interface.pptx
Human Computer Interface.pptxHuman Computer Interface.pptx
Human Computer Interface.pptx
 
Input to computer ( introduction to computer )
Input to computer ( introduction to computer )Input to computer ( introduction to computer )
Input to computer ( introduction to computer )
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
 
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfIntelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
 
Can body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdfCan body write an essay for me on dream job in Computer Engineerin.pdf
Can body write an essay for me on dream job in Computer Engineerin.pdf
 
His human identification schemes on web
His human identification schemes on webHis human identification schemes on web
His human identification schemes on web
 
Introduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONIntroduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTION
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
ARTIFICIAL_INTELLIGENCE_PPT.pptx
ARTIFICIAL_INTELLIGENCE_PPT.pptxARTIFICIAL_INTELLIGENCE_PPT.pptx
ARTIFICIAL_INTELLIGENCE_PPT.pptx
 
Area's of Artificial Inteligence .pptx
Area's of Artificial Inteligence .pptxArea's of Artificial Inteligence .pptx
Area's of Artificial Inteligence .pptx
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
ICT-Lecture_1(Introduction).pptx
ICT-Lecture_1(Introduction).pptxICT-Lecture_1(Introduction).pptx
ICT-Lecture_1(Introduction).pptx
 

More from university of education,Lahore

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
university of education,Lahore
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
university of education,Lahore
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
university of education,Lahore
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
university of education,Lahore
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
university of education,Lahore
 
ePayment Methods
ePayment MethodsePayment Methods
A Star Search
A Star SearchA Star Search
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
university of education,Lahore
 
Uml Diagrams
Uml DiagramsUml Diagrams
eDras Max
eDras MaxeDras Max
RAD Model
RAD ModelRAD Model
Microsoft Project
Microsoft ProjectMicrosoft Project
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
university of education,Lahore
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
university of education,Lahore
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
university of education,Lahore
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
university of education,Lahore
 

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 

Human Computer Interaction of an Information System

  • 1. Human Computer Interface of an I.S Submitted By: Group # 9 (BS I.T-Morning) Submitted To: Asif Mahmood (1029) Inam ul Haq Noman Nazar (1041) Adeel Ahmed (1042) M. Faizan Butt (1043) Arsalan Ahmed (1044) University of Education Okara Campus Human Computer Interface of an I.S1
  • 2. Contents  Introduction  Importance and Scope of HCI in I.S and other fields  Use of Example that will explore above concept  How to implement HCI of an I.S in any organization  Advantages and Disadvantages  Conclusions  References Human Computer Interface of an I.S2
  • 3. Introduction  Human • The end-user • The members of an organization  Computer • Hardware • Software  Interface • A point where two objects meet. • A point where the human can tell the computer what to do. • A point where the computer displays the requested information. Human Computer Interface of an I.S3
  • 4. Definition “Human–computer interface involves the study, planning, and design of the interaction between people and computers. It is often regarded as the intersection of computer science, behavioural sciences, design and several other fields of study.” It is used in many routine fields of human life like as Intelligent Homes/Offices, Driver Monitoring, Intelligent Games, E-Commerce. It is also used in information system by various ways. Example Human Computer Interface of an I.S4
  • 5. Importance and Scope of HCI in I.S and other fields Human Computer Interface of an I.S5
  • 6. HCI of an Expert System(Biometric attendance system) Biometric is a technology that measure and analyse human body characteristics for identification purposes. Biometric improves business processes because of their ability to quickly and accurately identify an individual and grant specific privileges. e.g. Face-key detector, Finger print detector etc. From the above pic it is clear that HCI is used in various fields of human life. It is also used in many fields of Information system. Uses in I.S HCI is used in different fields of information system like as  HCI of an Expert system  HCI of Office Automation system  HCI of a Library Information system  HCI of a decision support system Human Computer Interface of an I.S6
  • 7. Face-Key Detector Face-key delivers patented technology based on fingerprints and face recognition for business processes enhancing. Implementation of face-key Detector in I.S Face-key detector is a HCI device which is used in the I.S of any organization for different tasks like:  Attendance  Entry recode  Facial recognition  Photography  Marketing Human Computer Interface of an I.S7
  • 9. Requirements We are required following features/data:  Data base of Organization.  ICT (Software, Hardware etc.).  I.S (Programmer, I.S manager etc.)  Network A college in Fuzhou, Fujian province has introduced an electronic face-detection system to prevent students from skipping school, the Fujian Daily reports. “Minjiang University's Conservatory of Music” has installed the facial recognition system in classrooms and demanded that students arrive 10 minutes early. The identification system saves time as teachers are no longer required to take attendance. Students who fail to be identified at first scan are encouraged to move in front of the camera and do it again. Use of face-key detector in organizations Human Computer Interface of an I.S9
  • 10. Advantages  I-PHONE Apple has shown interest in building advanced, secure facial recognition technology that would take a two- dimensional image of a person's face and render it in 3D for greater accuracy.  FBI Facial Recognition (face-key detector) software to automatically check driver's license applicants against Criminal Database.  Very accurate with the use of “switches”.  Good for “expert” users - can quickly access commands.  Time saving.  Most accurate.  Easier for a novice/new user to learn/use  No training required  Can be quicker than keyboard entry  Hands-freeHuman Computer Interface of an I.S10
  • 11. Disadvantages  Heavy makeup could fool the system.  It cannot work without power/voltage.  System has no backup in case of any damage.  Facial recognition system uses camera technology which is not yet present as standard equipment in all the pcs thus it will create problem.  It is more expensive and complex than other methods.. Human Computer Interface of an I.S11
  • 12. Conclusions This system provides easier way to do a task in any origination. It is used in many abroad countries. It mostly used in colleges, universities, offices, factories and agencies. It is used in FBI. FBI uses face-key detector software to automatically check driver's license applicants against Criminal Database. It is expensive but very useful, reliable and flexible software that is commonly used in any big organization. It is used as a basic input device in information systems. It is user friendly Human Computer Interface of an I.S12
  • 13. References  http://www.hussainaenterprise.com/fingerprint- standalone-time-attendance.htm  http://www.fingerpak.com/contactus.html  http://www.ecns.cn/cns-wire/2014/03- 03/103098.shtml  http://www.popsci.com/technology/article/2009- 10/fbi-facial-recognition-software-scan-highway- fugitive-motorists  http://www.mwtime.com/biometrics.pdf  http://en.wikipedia.org/wiki/Biometrics#Biometric_fu nctionality Human Computer Interface of an I.S13