SlideShare a Scribd company logo
1 of 50
UNIT –III
By
Tamizharasi A
Assistant Professor
RMDEC
Cognitive Models
Socio-organizational Issues And Stake Holder
Requirements
Cognitive Models
 Cognitive models represent users of
interactive systems.
 They model aspects of user:
◦ understanding
◦ knowledge
◦ intentions
◦ processing
Cognitive Models
 Goal and Task Hierarchies
 Linguistic Model
 The Challenge of Display-Based
Systems
 Physical and Device Models
 Cognitive Architectures
Goal and Task Hierarchies
 Many models make use of a model of
mental processing in which the user
achieves goals by solving subgoals in a
divide-and-conquer
 Example: sales report
produce report
gather data
. find book names
. . do keywords search of names database
. . . … further sub-goals
. . sift through names and abstracts by hand
. . . … further sub-goals
. search sales database - further sub-goals
layout tables and histograms - further sub-goals
write description - further sub-goals
Issues for goal hierarchies
 Granularity
◦ Where do we start?
◦ Where do we stop?
 Routine learned behaviour, not
problem solving
◦ most abstract task is referred as unit task
 Conflict
◦ More than one way to achieve a goal
Models / Techniques
1. GOMS - Goals, Operators,
Methods and Selection
2. CCT - Cognitive Complexity
Theory
GOMS
 GOMS model of Card, Moran and Newell
is an acronym for Goals, Operators,
Methods & Selection
 Elements:
Goals - user’s goals describes what the
user wants to achieve
Operators- basic actions user performs
Methods - decomposition of a goal into
subgoals /operators
Selection - means of choosing between
competing methods
Methods Example
 A selected window can be closed to an icon either by selecting
the ‘CLOSE’ option or by hitting the ‘L7’ function key.
 In GOMS these two goal decompositions are referred to as
methods
GOAL: CLOSE-WINDOW
. [select GOAL: USE-MENU-METHOD
. MOVE-MOUSE-TO-FILE-MENU
. PULL-DOWN-FILE-MENU
. CLICK-OVER-CLOSE-OPTION
GOAL: USE-CTRL-W-METHOD
. PRESS-CONTROL-W-KEYS]
For a particular user:
Rule 1: Select USE-MENU-METHOD unless another
rule applies
Rule 2: If the application is GAME,
select CTRL-W-METHOD
Selection
 choosing between competing methods
 A typical GOMS analysis consist of a single high-
level goal, which is then decomposed into a
sequence of unit tasks, all of which can be further
decomposed down to the level of basic operators.
 goal decomposition between the overall task and
the unit tasks needs detailed understanding of the
user’s problem-solving strategies and of the
application domain.
 The original GOMS model serves as the
basis for much of the cognitive modeling
research in HCI.
 good for describing how experts
perform routine tasks.
 Coupled with the physical device
models, it can be used to predict the
performance of the users in terms of
execution times.
Cognitive Complexity Theory
 Kieras and Polson
 CCT has two parallel descriptions:
1. Description of the user’s goals in
terms of production rules
2. generalized transition networks
 The production rules are a sequence of
rules:
if condition then action
 condition is a statement about the
contents of working memory.
 If the condition is true then the production
rule is said to fire.
 An action may consist of one or more
elementary actions, which may be either
changes to the working memory, or
external actions such as keystrokes.
 The production rule ‘program’ is written in
a LISP-like language.
Example
(SELECT-INSERT-SPACE
IF (AND (TEST-GOAL perform unit task)
(TEST-TEXT task is insert space)
(NOT (TEST-GOAL insert space))
(NOT (TEST-NOTE executing insert space))
)
THEN ( (ADD-GOAL insert space)
(ADD-NOTE executing insert space)
(LOOK-TEXT task is at %LINE
%COL) ))
(INSERT-SPACE-DONE
IF (AND (TEST-GOAL perform unit task)
(TEST-NOTE executing insert space)
(NOT (TEST-GOAL insert space)) )
THEN ( (DELETE-NOTE executing insert
space)
(DELETE-GOAL perform unit task)
(UNBIND %LINE %COL) ))
(INSERT-SPACE-1
IF (AND (TEST-GOAL insert space)
(NOT (TEST-GOAL move cursor))
(NOT (TEST-CURSOR %LINE
%COL)) )
THEN ( (ADD-GOAL move cursor to
%LINE %COL) ))
(INSERT-SPACE-2
IF (AND (TEST-GOAL insert space)
(TEST-CURSOR %LINE %COL) )
THEN ( (DO-KEYSTROKE ‘I’)
(DO-KEYSTROKE SPACE)
(DO-KEYSTROKE ESC)
(DELETE-GOAL insert space)
))
Editing task using the UNIX vi text editor. The task is to insert a space
where one has been missed out in the text. Say : ‘cognitivecomplexity
theory’.
 the contents of working memory (w.m.)
are
(GOAL perform unit task)
(TEXT task is insert space)
(TEXT task is at 5 23)
(CURSOR 8 7)
 four rules are defined:
1. SELECT-INSERT-SPACE
2. INSERT-SPACE-DONE
3. INSERT-SPACE-1
4. INSERT-SPACE-2
only the first can fire
 The condition for SELECT-INSERT-SPACE is:
(AND (TEST-GOAL perform unit task)
true because (GOAL perform unit task) is in
w.m.
(TEST-TEXT task is insert space)
true because (TEXT task is insert space) is in
w.m.
(NOT (TEST-GOAL insert space))
true because (GOAL insert space) is not in
w.m.
(NOT (TEST-NOTE executing insert space)) )
true because (NOTE executing insert space)
is not in w.m.
 The contents of working memory after
the firing of rule SELECT-INSERT-
SPACE are as follows:
(GOAL perform unit task)
(TEXT task is insert space)
(TEXT task is at 5 23)
(NOTE executing insert space)
(GOAL insert space)
(LINE 5)
(COL 23)
(CURSOR 8 7)
At this point since goal is changed, only rule INSERT-SPACE-1
can fire.
Problems and extensions of goal
hierarchies
 The formation of a goal hierarchy is largely a post hoc
technique and runs a very real risk of being defined by
the computer dialog rather than the user
 the conceptual framework of goal hierarchies and user
goal stacks can be used to express interface issues
 A general rule that can be applied to any goal
hierarchy from this is that no higher-level goal should
be satisfied until all subgoals have been satisfied.
 it is not always easy to predict when the user will
consider a goal to have been satisfied.
Linguistic Model
 Understanding the user's behaviour
and cognitive difficulty based on
analysis of language between user
and system.
 Similar in emphasis to dialogue
models
 Backus–Naur Form (BNF)
 Task–Action Grammar (TAG)
Backus-Naur Form (BNF)
 To describe the dialog grammar
 A purely syntactic view of the dialogue
 Widely used to specify the syntax of computer
programming languages
 many system dialogs can be described easily using
BNF rules
 Terminals
◦ lowest level of user behaviour
◦ e.g. CLICK-MOUSE, MOVE-MOUSE
 Nonterminals
◦ ordering of terminals
◦ higher level of abstraction
◦ e.g. select-menu, position-mouse
Example of BNF
 Basic syntax:
◦ nonterminal ::= expression
 An expression
◦ contains terminals and nonterminals
◦ Use (+) for sequence and ( | ) choices
◦ ‘::=’ symbol is read as ‘is defined as’
draw line ::= select line + choose points + last point
select line ::= pos mouse + CLICK MOUSE
choose points ::= choose one | choose one + choose points
choose one ::= pos mouse + CLICK MOUSE
last point ::= pos mouse + DBL CLICK MOUSE
pos mouse ::= NULL | MOVE MOUSE+ pos mouse
 The BNF description can be analyzed in
various ways.
1. Count the number of rules. (The more rules an interface
requires to use it, the more complicated it is.)
Eg: Choosepoints and choose-one with the single definition
choose-points ::= position-mouse + CLICK-MOUSE |
position-mouse + CLICK-MOUSE + choose-points
2. Counts the number of ‘+’ and ‘|’ operators
Note:
BNF ignore the advantages of consistency
both in the language’s structure and in its
use of command names and letters.
Task–Action Grammar
 Uses parametrized grammar rules to
emphasize consistency and encoding the
user’s world knowledge
 Eg:
3 UNIX commands:
cp (for copying files),
mv (for moving files) and
ln (for linking files).
Each of these has two possible forms. They
either have two arguments, a source and
destination filename, or have any number
of source filenames followed by a
destination directory:
Consistency in TAG
 In BNF, three UNIX commands would be described as:
copy ::= cp + filename + filename | cp + filenames + directory
move ::= mv + filename + filename | mv + filenames + directory
link ::= ln + filename + filename | ln + filenames + directory
 No BNF measure could distinguish between this and a less
consistent grammar in which
link ::= ln + filename + filename | ln + directory + filenames
Consistency in TAG (cont'd)
 consistency of argument order made explicit using
a parameter, or semantic feature for file operations
 Feature Possible values
Op = copy; move; link
 Rules
file-op[Op] ::= command[Op] + filename + filename
| command[Op] + filenames + directory
command[Op = copy] ::= cp
command[Op = move] ::= mv
command[Op = link] ::= ln
 TAG has features for talking about ‘world knowledge’.
 For example, imagine we have two command line
interfaces for moving a mechanical turtle around the
floor
 command ‘go 395’ refers to the address of a
machine-code routine, which performs the
appropriate movement.
 second interface is preferable to the first.
 TAG includes a special form known-item, which is
TAG rules for second interface
Other uses of TAG
 User’s existing knowledge
 Congruence between features and
commands
 These are modelled as derived rules
Physical and device models
 The Keystroke Level Model (KLM)
 Buxton's 3-state model
The Keystroke Level Model
(KLM)
 Uses human motor system understanding as a basis
for detailed predictions about user performance.
 aimed at unit tasks within interaction – the execution
of simple command sequences, typically taking no
more than 20 seconds
 Eg:
search and replace feature, or changing the font of a word
 more complex tasks would be split into subtasks before the user
attempts to map them into physical actions.
 The task is split into two phases:
1. acquisition of the task, when the user builds a mental
representation of the task;
2. execution of the task using the system’s facilities.
 During the acquisition phase, the user will have decided
how to accomplish the task using the primitives of the
system
 So during the execution phase, there is no high-level
mental activity – the user is effectively expert.
 The model decomposes the execution phase into five
different physical motor operators, a mental operator and
a system response operator:
 K Keystroking, actually striking keys, including shifts and
other modifier keys.
 B Pressing a mouse button.
 P Pointing, moving the mouse (or similar device) at a
target.
 H Homing, switching the hand between mouse and
keyboard.
 D Drawing lines using the mouse.
 M Mentally preparing for a physical action.
 The execution of a task will involve interleaved
occurrences of the various operators.
 Eg: using a mouse-based editor. If we notice a single
character error we will point at the error, delete the
character and retype it, and then return to our previous
typing point.
 This is decomposed as follows:
1. Move hand to mouse H[mouse]
2. Position mouse after bad character PB[LEFT]
3. Return to keyboard H[keyboard]
4. Delete character MK[DELETE]
5. Type correction K[char]
 The model predicts the total time taken during the execution
phase by adding the component times for each of the above
activities.
 Eg: if the time taken for one keystroke is tK, then the total time
doing keystrokes is
TK = 2tK
 Similar calculations for the rest of the operators give a total time of
Texecute = TK + TB + TP + TH + TD + TM + TR
 The keying time depends on
the typing skill of the user
 Pressing a mouse is usually
quicker
 pointing time is calculated
using Fitts’ law (depends on
the size and position of the
target)
 Drawing time depends on the
number and length of the lines
drawn
 homing time and mental
preparation time are assumed
constant.
 The physical operator times all depend
on the skills of the user.
 Also, the mental operator depends on
the level of chunking, and hence the
expertise of the user
 predictions made by KLM are only
meant to be an approximation
 But capable of giving accurate
quantitative predictions about
performance.
KLM example
GOAL: ICONISE-WINDOW
[select
GOAL: USE-CLOSE-METHOD
. MOVE-MOUSE-TO- FILE-MENU
. PULL-DOWN-FILE-MENU
. CLICK-OVER-CLOSE-OPTION
GOAL: USE-CTRL-W-METHOD
PRESS-CONTROL-W-KEY]
 compare alternatives:
• USE-CTRL-W-METHOD vs.
• USE-CLOSE-METHOD
 assume hand starts on mouse
USE-CLOSE-METHOD
P[to menu] 1.1
B[LEFT down] 0.1
M 1.35
P[to option] 1.1
B[LEFT up] 0.1
Total 3.75 s
USE-CTRL-W-METHOD
H[to kbd] 0.40
M 1.35
K[ctrlW key] 0.28
Total 2.03 s
Three-state model
 captures the crucial distinctions among the various
pointing devices like mouse, light pen etc.
 Moving the mouse with no buttons pushed, normally moves the
mouse cursor about.
 This tracking behavior is termed state 1.
 Depressing a button over an icon and then moving the mouse
will often result in an object being dragged about.
 This is termed state 2
 consider a light pen with a button, it behaves just like
a mouse when it is touching the screen.
 When its button is not depressed, it is in state 1
 When its button is down, state 2.
 light pen has a third state, when the light pen is not
touching the screen. In this state the system cannot
track the light pen’s position. This is called state 0
 Fitts’ law has different timing constants for different
devices.
 Recall that Fitts’ law says that the time taken to move
to a target of size S at a distance D is:
 a + b log2(D/S + 1)
 The constants a and b depend on the particular
pointing device used and the skill of the user with that
device. also depend on the device state
KLM prediction for the CLOSE-METHOD using these data.
 Recall that the method had two pointing operators, one to point to the
window’s title bar (with a distance to target size ratio of 10:1), the
second to drag the selection down to ‘CLOSE’ on the pop-up menu
(4:1).
 Thus the first pointing operator is state 1 and the second is state 2.
 The times are thus
 Mouse
◦ P[to menu bar] = −107 + 223 log2(11) = 664 ms
◦ P[to option] = 135 + 249 log2(5) = 713 ms
 Trackball
◦ P[to menu bar] = 75 + 300 log2(11) = 1113 ms
◦ P[to option] = −349 + 688 log2(5) = 1248 ms
COGNITIVE ARCHITECTURES
 for the architectural models the
prediction and understanding of error is
central to their analyses.
2 Architectural Models:
 The problem space model
 Interacting cognitive subsystems
The problem space model
 In computer science, it is common to
describe a problem as the search
through a set of possible states, from
some initial state to a desired state.
 The search proceeds by moving from
one state to another possible state by
means of operations or actions, the
ultimate goal of which is to arrive at
one of the desired states.
 The architecture of the machine only allows
the definition of the search or problem space
and the actions that can occur to traverse that
space.
 Termination is also assumed to happen once
the desired state is reached.
 machine does not have the ability to
formulate the problem space and its solution,
because it has no idea of the goal.
 It is the job of the programmer to understand
 problem space model, based on the problem-
solving work of Newell and Simon at Carnegie–
Mellon University
 A problem space consists of a set of states and
a set of operations that can be performed on the
states.
 Behavior in a problem space is a two-step
process.
1. the current operator is chosen based on the current
 The problem space must represent rational behavior
i.e achieve the goal
 A problem space represents a goal by defining the
desired states as a subset of all possible states.
 Once the initial state is set, the task within the
problem space is to find a sequence of operations
that form a path within the state space from the
initial state to one of the desired states, whereupon
successful termination occurs.
 four different activities that occur within a
problem space:
1. goal formulation
2. operation selection,
3. operation application
4. goal completion.
Goal Formulation
 creates the initial state based on observations of the
external environment.
 Operations are the actions at the knowledge level in
the problem space
Operation selection
 selects the appropriate operation at a given point in
time.
 Suggests an operation that can act on that state
and transform it ‘closer’ to a desired state.
Operation application
 executes the operation, changing the current state
and surrounding environment.
Goal Completion
 If the new state is a desired state, then the goal has
been achieved and the goal completion process
reverts the agent to inactive.
 The real power of the problem space architecture is
in recursion
Problem space model is the basis for SOAR
cognitive architecture
Interacting cognitive subsystems
 ICS provides a model of perception, cognition and
action
 It is not intended to produce a description of the
user in terms of sequences of actions that he
performs.
 ICS provides a more holistic view of the user as an
information-processing machine.
 The emphasis is on determining how easy
particular procedures of action sequences become
 incorporate two separate psychological
traditions within one cognitive
architecture.
1. the architectural and general-purpose
information-processing approach of
short-term memory research.
2. computational and representational
approach characteristic of
psycholinguistic research and AI
problem-solving literature.
 architecture of ICS is the coordinated
activity of nine smaller subsystems:
 five peripheral subsystems are in contact with
the physical world
 four are central, dealing with mental
processes.
 Each subsystem has the same generic
structure.
 A subsystem is described in terms of its
typed inputs and outputs along with a
memory store for holding typed
information.
 Each of the nine subsystems is specialized for handling
some aspect of external or internal processing
 Eg:
 Visual system for describing what is seen in the
world.
 processing of propositional information, capturing
the attributes and identities of entities and their
relationships with each other
 ability to explain how a user proceduralizes action
 ICS has been suggested as a design tool that can act
as an expert system to advise a designer in developing
an interface.

More Related Content

What's hot

INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE ...
INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE ...INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE ...
INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE ...cscpconf
 
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSSEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSsolved_assignments
 
Ooad lab manual(original)
Ooad lab manual(original)Ooad lab manual(original)
Ooad lab manual(original)dipenpatelpatel
 
session on pattern oriented software architecture
session on pattern oriented software architecturesession on pattern oriented software architecture
session on pattern oriented software architectureSUJOY SETT
 
Interactive Design Coursework (ID Coursework)
Interactive Design Coursework (ID Coursework)Interactive Design Coursework (ID Coursework)
Interactive Design Coursework (ID Coursework)Aung Hein Htet
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringAmr E. Mohamed
 
Lecture note05 slides
Lecture note05 slidesLecture note05 slides
Lecture note05 slidesSten99String
 
A&D - Use Case Diagram
A&D - Use Case DiagramA&D - Use Case Diagram
A&D - Use Case Diagramvinay arora
 
Chap5 oodm-uml-part1
Chap5 oodm-uml-part1Chap5 oodm-uml-part1
Chap5 oodm-uml-part1SJC
 
Chapter 5 design patterns for mas
Chapter 5 design patterns for masChapter 5 design patterns for mas
Chapter 5 design patterns for masfarshad33
 
System Models in Software Engineering SE7
System Models in Software Engineering SE7System Models in Software Engineering SE7
System Models in Software Engineering SE7koolkampus
 

What's hot (20)

C++ Unit_01
C++ Unit_01C++ Unit_01
C++ Unit_01
 
INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE ...
INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE ...INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE ...
INCREASING THE ARCHITECTURES DESIGN QUALITY FOR MAS: AN APPROACH TO MINIMIZE ...
 
Recommender-technology-ReColl08
Recommender-technology-ReColl08Recommender-technology-ReColl08
Recommender-technology-ReColl08
 
Elangovan Arumugayya
Elangovan ArumugayyaElangovan Arumugayya
Elangovan Arumugayya
 
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSSEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
 
Ooad lab manual(original)
Ooad lab manual(original)Ooad lab manual(original)
Ooad lab manual(original)
 
Ey36927936
Ey36927936Ey36927936
Ey36927936
 
session on pattern oriented software architecture
session on pattern oriented software architecturesession on pattern oriented software architecture
session on pattern oriented software architecture
 
Interactive Design Coursework (ID Coursework)
Interactive Design Coursework (ID Coursework)Interactive Design Coursework (ID Coursework)
Interactive Design Coursework (ID Coursework)
 
SE UNIT-3.pdf
SE UNIT-3.pdfSE UNIT-3.pdf
SE UNIT-3.pdf
 
Ch16
Ch16Ch16
Ch16
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software Enginerring
 
Lecture note05 slides
Lecture note05 slidesLecture note05 slides
Lecture note05 slides
 
A&D - Use Case Diagram
A&D - Use Case DiagramA&D - Use Case Diagram
A&D - Use Case Diagram
 
Chap5 oodm-uml-part1
Chap5 oodm-uml-part1Chap5 oodm-uml-part1
Chap5 oodm-uml-part1
 
Chapter06
Chapter06Chapter06
Chapter06
 
Crc cards
Crc cardsCrc cards
Crc cards
 
Chapter 5 design patterns for mas
Chapter 5 design patterns for masChapter 5 design patterns for mas
Chapter 5 design patterns for mas
 
System Models in Software Engineering SE7
System Models in Software Engineering SE7System Models in Software Engineering SE7
System Models in Software Engineering SE7
 
Ch5 system modeling
Ch5 system modelingCh5 system modeling
Ch5 system modeling
 

Similar to Unit iii ppt

human computer Interaction cognitive models.ppt
human computer Interaction cognitive models.ppthuman computer Interaction cognitive models.ppt
human computer Interaction cognitive models.pptJayaprasanna4
 
human computer Interaction cognitive models.ppt
human computer Interaction cognitive models.ppthuman computer Interaction cognitive models.ppt
human computer Interaction cognitive models.pptJayaprasanna4
 
HCI 3e - Ch 12: Cognitive models
HCI 3e - Ch 12:  Cognitive modelsHCI 3e - Ch 12:  Cognitive models
HCI 3e - Ch 12: Cognitive modelsAlan Dix
 
clean architecture uncle bob AnalysisAndDesign.el.en.pptx
clean architecture uncle bob AnalysisAndDesign.el.en.pptxclean architecture uncle bob AnalysisAndDesign.el.en.pptx
clean architecture uncle bob AnalysisAndDesign.el.en.pptxsaber tabatabaee
 
What is algorithm
What is algorithmWhat is algorithm
What is algorithmmshoaib15
 
GE3151 PSPP _Unit 1 notes and Question bank.pdf
GE3151 PSPP _Unit 1 notes and Question bank.pdfGE3151 PSPP _Unit 1 notes and Question bank.pdf
GE3151 PSPP _Unit 1 notes and Question bank.pdfAsst.prof M.Gokilavani
 
APP_Unit 1_updated.pptx
APP_Unit 1_updated.pptxAPP_Unit 1_updated.pptx
APP_Unit 1_updated.pptxgogulram2
 
OORPT Dynamic Analysis
OORPT Dynamic AnalysisOORPT Dynamic Analysis
OORPT Dynamic Analysislienhard
 
Software development effort reduction with Co-op
Software development effort reduction with Co-opSoftware development effort reduction with Co-op
Software development effort reduction with Co-oplbergmans
 
Patterns in Python
Patterns in PythonPatterns in Python
Patterns in Pythondn
 
17512 2017 winter model answer paper
17512 2017 winter model answer paper 17512 2017 winter model answer paper
17512 2017 winter model answer paper Ankit Dubey
 
Book management system
Book management systemBook management system
Book management systemSHARDA SHARAN
 
Functional Patterns for C++ Multithreading (C++ Dev Meetup Iasi)
Functional Patterns for C++ Multithreading (C++ Dev Meetup Iasi)Functional Patterns for C++ Multithreading (C++ Dev Meetup Iasi)
Functional Patterns for C++ Multithreading (C++ Dev Meetup Iasi)Ovidiu Farauanu
 
Successfully Implement Responsive Design Behavior with Adobe Experience Manager
Successfully Implement Responsive Design Behavior with Adobe Experience ManagerSuccessfully Implement Responsive Design Behavior with Adobe Experience Manager
Successfully Implement Responsive Design Behavior with Adobe Experience ManagerPerficient, Inc.
 
2-Algorithms and Complexit data structurey.pdf
2-Algorithms and Complexit data structurey.pdf2-Algorithms and Complexit data structurey.pdf
2-Algorithms and Complexit data structurey.pdfishan743441
 

Similar to Unit iii ppt (20)

human computer Interaction cognitive models.ppt
human computer Interaction cognitive models.ppthuman computer Interaction cognitive models.ppt
human computer Interaction cognitive models.ppt
 
human computer Interaction cognitive models.ppt
human computer Interaction cognitive models.ppthuman computer Interaction cognitive models.ppt
human computer Interaction cognitive models.ppt
 
Cognitive Models
Cognitive ModelsCognitive Models
Cognitive Models
 
HCI 3e - Ch 12: Cognitive models
HCI 3e - Ch 12:  Cognitive modelsHCI 3e - Ch 12:  Cognitive models
HCI 3e - Ch 12: Cognitive models
 
E3 chap-12
E3 chap-12E3 chap-12
E3 chap-12
 
ProgrammingPrimerAndOOPS
ProgrammingPrimerAndOOPSProgrammingPrimerAndOOPS
ProgrammingPrimerAndOOPS
 
clean architecture uncle bob AnalysisAndDesign.el.en.pptx
clean architecture uncle bob AnalysisAndDesign.el.en.pptxclean architecture uncle bob AnalysisAndDesign.el.en.pptx
clean architecture uncle bob AnalysisAndDesign.el.en.pptx
 
What is algorithm
What is algorithmWhat is algorithm
What is algorithm
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
GE3151 PSPP _Unit 1 notes and Question bank.pdf
GE3151 PSPP _Unit 1 notes and Question bank.pdfGE3151 PSPP _Unit 1 notes and Question bank.pdf
GE3151 PSPP _Unit 1 notes and Question bank.pdf
 
APP_Unit 1_updated.pptx
APP_Unit 1_updated.pptxAPP_Unit 1_updated.pptx
APP_Unit 1_updated.pptx
 
OORPT Dynamic Analysis
OORPT Dynamic AnalysisOORPT Dynamic Analysis
OORPT Dynamic Analysis
 
Software development effort reduction with Co-op
Software development effort reduction with Co-opSoftware development effort reduction with Co-op
Software development effort reduction with Co-op
 
Patterns in Python
Patterns in PythonPatterns in Python
Patterns in Python
 
17512 2017 winter model answer paper
17512 2017 winter model answer paper 17512 2017 winter model answer paper
17512 2017 winter model answer paper
 
Book management system
Book management systemBook management system
Book management system
 
Functional Patterns for C++ Multithreading (C++ Dev Meetup Iasi)
Functional Patterns for C++ Multithreading (C++ Dev Meetup Iasi)Functional Patterns for C++ Multithreading (C++ Dev Meetup Iasi)
Functional Patterns for C++ Multithreading (C++ Dev Meetup Iasi)
 
Successfully Implement Responsive Design Behavior with Adobe Experience Manager
Successfully Implement Responsive Design Behavior with Adobe Experience ManagerSuccessfully Implement Responsive Design Behavior with Adobe Experience Manager
Successfully Implement Responsive Design Behavior with Adobe Experience Manager
 
Unit 1
Unit  1Unit  1
Unit 1
 
2-Algorithms and Complexit data structurey.pdf
2-Algorithms and Complexit data structurey.pdf2-Algorithms and Complexit data structurey.pdf
2-Algorithms and Complexit data structurey.pdf
 

More from tamizh arthanari

More from tamizh arthanari (6)

Unit ii
Unit   iiUnit   ii
Unit ii
 
Unit ii design process
Unit ii design processUnit ii design process
Unit ii design process
 
HCI Fundamentals - Part 2 : Human memory and thinking
HCI Fundamentals - Part 2 : Human memory and thinkingHCI Fundamentals - Part 2 : Human memory and thinking
HCI Fundamentals - Part 2 : Human memory and thinking
 
Hci fundamentals
Hci fundamentalsHci fundamentals
Hci fundamentals
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Standard IO Interface
Standard IO InterfaceStandard IO Interface
Standard IO Interface
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Unit iii ppt

  • 1. UNIT –III By Tamizharasi A Assistant Professor RMDEC Cognitive Models Socio-organizational Issues And Stake Holder Requirements
  • 2. Cognitive Models  Cognitive models represent users of interactive systems.  They model aspects of user: ◦ understanding ◦ knowledge ◦ intentions ◦ processing
  • 3. Cognitive Models  Goal and Task Hierarchies  Linguistic Model  The Challenge of Display-Based Systems  Physical and Device Models  Cognitive Architectures
  • 4. Goal and Task Hierarchies  Many models make use of a model of mental processing in which the user achieves goals by solving subgoals in a divide-and-conquer  Example: sales report produce report gather data . find book names . . do keywords search of names database . . . … further sub-goals . . sift through names and abstracts by hand . . . … further sub-goals . search sales database - further sub-goals layout tables and histograms - further sub-goals write description - further sub-goals
  • 5. Issues for goal hierarchies  Granularity ◦ Where do we start? ◦ Where do we stop?  Routine learned behaviour, not problem solving ◦ most abstract task is referred as unit task  Conflict ◦ More than one way to achieve a goal
  • 6. Models / Techniques 1. GOMS - Goals, Operators, Methods and Selection 2. CCT - Cognitive Complexity Theory
  • 7. GOMS  GOMS model of Card, Moran and Newell is an acronym for Goals, Operators, Methods & Selection  Elements: Goals - user’s goals describes what the user wants to achieve Operators- basic actions user performs Methods - decomposition of a goal into subgoals /operators Selection - means of choosing between competing methods
  • 8. Methods Example  A selected window can be closed to an icon either by selecting the ‘CLOSE’ option or by hitting the ‘L7’ function key.  In GOMS these two goal decompositions are referred to as methods GOAL: CLOSE-WINDOW . [select GOAL: USE-MENU-METHOD . MOVE-MOUSE-TO-FILE-MENU . PULL-DOWN-FILE-MENU . CLICK-OVER-CLOSE-OPTION GOAL: USE-CTRL-W-METHOD . PRESS-CONTROL-W-KEYS] For a particular user: Rule 1: Select USE-MENU-METHOD unless another rule applies Rule 2: If the application is GAME, select CTRL-W-METHOD
  • 9. Selection  choosing between competing methods  A typical GOMS analysis consist of a single high- level goal, which is then decomposed into a sequence of unit tasks, all of which can be further decomposed down to the level of basic operators.  goal decomposition between the overall task and the unit tasks needs detailed understanding of the user’s problem-solving strategies and of the application domain.
  • 10.  The original GOMS model serves as the basis for much of the cognitive modeling research in HCI.  good for describing how experts perform routine tasks.  Coupled with the physical device models, it can be used to predict the performance of the users in terms of execution times.
  • 11. Cognitive Complexity Theory  Kieras and Polson  CCT has two parallel descriptions: 1. Description of the user’s goals in terms of production rules 2. generalized transition networks
  • 12.  The production rules are a sequence of rules: if condition then action  condition is a statement about the contents of working memory.  If the condition is true then the production rule is said to fire.  An action may consist of one or more elementary actions, which may be either changes to the working memory, or external actions such as keystrokes.  The production rule ‘program’ is written in a LISP-like language.
  • 13. Example (SELECT-INSERT-SPACE IF (AND (TEST-GOAL perform unit task) (TEST-TEXT task is insert space) (NOT (TEST-GOAL insert space)) (NOT (TEST-NOTE executing insert space)) ) THEN ( (ADD-GOAL insert space) (ADD-NOTE executing insert space) (LOOK-TEXT task is at %LINE %COL) )) (INSERT-SPACE-DONE IF (AND (TEST-GOAL perform unit task) (TEST-NOTE executing insert space) (NOT (TEST-GOAL insert space)) ) THEN ( (DELETE-NOTE executing insert space) (DELETE-GOAL perform unit task) (UNBIND %LINE %COL) )) (INSERT-SPACE-1 IF (AND (TEST-GOAL insert space) (NOT (TEST-GOAL move cursor)) (NOT (TEST-CURSOR %LINE %COL)) ) THEN ( (ADD-GOAL move cursor to %LINE %COL) )) (INSERT-SPACE-2 IF (AND (TEST-GOAL insert space) (TEST-CURSOR %LINE %COL) ) THEN ( (DO-KEYSTROKE ‘I’) (DO-KEYSTROKE SPACE) (DO-KEYSTROKE ESC) (DELETE-GOAL insert space) )) Editing task using the UNIX vi text editor. The task is to insert a space where one has been missed out in the text. Say : ‘cognitivecomplexity theory’.
  • 14.  the contents of working memory (w.m.) are (GOAL perform unit task) (TEXT task is insert space) (TEXT task is at 5 23) (CURSOR 8 7)  four rules are defined: 1. SELECT-INSERT-SPACE 2. INSERT-SPACE-DONE 3. INSERT-SPACE-1 4. INSERT-SPACE-2 only the first can fire
  • 15.  The condition for SELECT-INSERT-SPACE is: (AND (TEST-GOAL perform unit task) true because (GOAL perform unit task) is in w.m. (TEST-TEXT task is insert space) true because (TEXT task is insert space) is in w.m. (NOT (TEST-GOAL insert space)) true because (GOAL insert space) is not in w.m. (NOT (TEST-NOTE executing insert space)) ) true because (NOTE executing insert space) is not in w.m.
  • 16.  The contents of working memory after the firing of rule SELECT-INSERT- SPACE are as follows: (GOAL perform unit task) (TEXT task is insert space) (TEXT task is at 5 23) (NOTE executing insert space) (GOAL insert space) (LINE 5) (COL 23) (CURSOR 8 7) At this point since goal is changed, only rule INSERT-SPACE-1 can fire.
  • 17. Problems and extensions of goal hierarchies  The formation of a goal hierarchy is largely a post hoc technique and runs a very real risk of being defined by the computer dialog rather than the user  the conceptual framework of goal hierarchies and user goal stacks can be used to express interface issues  A general rule that can be applied to any goal hierarchy from this is that no higher-level goal should be satisfied until all subgoals have been satisfied.  it is not always easy to predict when the user will consider a goal to have been satisfied.
  • 18. Linguistic Model  Understanding the user's behaviour and cognitive difficulty based on analysis of language between user and system.  Similar in emphasis to dialogue models  Backus–Naur Form (BNF)  Task–Action Grammar (TAG)
  • 19. Backus-Naur Form (BNF)  To describe the dialog grammar  A purely syntactic view of the dialogue  Widely used to specify the syntax of computer programming languages  many system dialogs can be described easily using BNF rules  Terminals ◦ lowest level of user behaviour ◦ e.g. CLICK-MOUSE, MOVE-MOUSE  Nonterminals ◦ ordering of terminals ◦ higher level of abstraction ◦ e.g. select-menu, position-mouse
  • 20. Example of BNF  Basic syntax: ◦ nonterminal ::= expression  An expression ◦ contains terminals and nonterminals ◦ Use (+) for sequence and ( | ) choices ◦ ‘::=’ symbol is read as ‘is defined as’ draw line ::= select line + choose points + last point select line ::= pos mouse + CLICK MOUSE choose points ::= choose one | choose one + choose points choose one ::= pos mouse + CLICK MOUSE last point ::= pos mouse + DBL CLICK MOUSE pos mouse ::= NULL | MOVE MOUSE+ pos mouse
  • 21.  The BNF description can be analyzed in various ways. 1. Count the number of rules. (The more rules an interface requires to use it, the more complicated it is.) Eg: Choosepoints and choose-one with the single definition choose-points ::= position-mouse + CLICK-MOUSE | position-mouse + CLICK-MOUSE + choose-points 2. Counts the number of ‘+’ and ‘|’ operators Note: BNF ignore the advantages of consistency both in the language’s structure and in its use of command names and letters.
  • 22. Task–Action Grammar  Uses parametrized grammar rules to emphasize consistency and encoding the user’s world knowledge  Eg: 3 UNIX commands: cp (for copying files), mv (for moving files) and ln (for linking files). Each of these has two possible forms. They either have two arguments, a source and destination filename, or have any number of source filenames followed by a destination directory:
  • 23. Consistency in TAG  In BNF, three UNIX commands would be described as: copy ::= cp + filename + filename | cp + filenames + directory move ::= mv + filename + filename | mv + filenames + directory link ::= ln + filename + filename | ln + filenames + directory  No BNF measure could distinguish between this and a less consistent grammar in which link ::= ln + filename + filename | ln + directory + filenames
  • 24. Consistency in TAG (cont'd)  consistency of argument order made explicit using a parameter, or semantic feature for file operations  Feature Possible values Op = copy; move; link  Rules file-op[Op] ::= command[Op] + filename + filename | command[Op] + filenames + directory command[Op = copy] ::= cp command[Op = move] ::= mv command[Op = link] ::= ln
  • 25.  TAG has features for talking about ‘world knowledge’.  For example, imagine we have two command line interfaces for moving a mechanical turtle around the floor  command ‘go 395’ refers to the address of a machine-code routine, which performs the appropriate movement.  second interface is preferable to the first.  TAG includes a special form known-item, which is
  • 26. TAG rules for second interface
  • 27. Other uses of TAG  User’s existing knowledge  Congruence between features and commands  These are modelled as derived rules
  • 28. Physical and device models  The Keystroke Level Model (KLM)  Buxton's 3-state model
  • 29. The Keystroke Level Model (KLM)  Uses human motor system understanding as a basis for detailed predictions about user performance.  aimed at unit tasks within interaction – the execution of simple command sequences, typically taking no more than 20 seconds  Eg: search and replace feature, or changing the font of a word  more complex tasks would be split into subtasks before the user attempts to map them into physical actions.  The task is split into two phases: 1. acquisition of the task, when the user builds a mental representation of the task; 2. execution of the task using the system’s facilities.
  • 30.  During the acquisition phase, the user will have decided how to accomplish the task using the primitives of the system  So during the execution phase, there is no high-level mental activity – the user is effectively expert.  The model decomposes the execution phase into five different physical motor operators, a mental operator and a system response operator:  K Keystroking, actually striking keys, including shifts and other modifier keys.  B Pressing a mouse button.  P Pointing, moving the mouse (or similar device) at a target.  H Homing, switching the hand between mouse and keyboard.  D Drawing lines using the mouse.  M Mentally preparing for a physical action.
  • 31.  The execution of a task will involve interleaved occurrences of the various operators.  Eg: using a mouse-based editor. If we notice a single character error we will point at the error, delete the character and retype it, and then return to our previous typing point.  This is decomposed as follows: 1. Move hand to mouse H[mouse] 2. Position mouse after bad character PB[LEFT] 3. Return to keyboard H[keyboard] 4. Delete character MK[DELETE] 5. Type correction K[char]
  • 32.  The model predicts the total time taken during the execution phase by adding the component times for each of the above activities.  Eg: if the time taken for one keystroke is tK, then the total time doing keystrokes is TK = 2tK  Similar calculations for the rest of the operators give a total time of Texecute = TK + TB + TP + TH + TD + TM + TR
  • 33.  The keying time depends on the typing skill of the user  Pressing a mouse is usually quicker  pointing time is calculated using Fitts’ law (depends on the size and position of the target)  Drawing time depends on the number and length of the lines drawn  homing time and mental preparation time are assumed constant.
  • 34.  The physical operator times all depend on the skills of the user.  Also, the mental operator depends on the level of chunking, and hence the expertise of the user  predictions made by KLM are only meant to be an approximation  But capable of giving accurate quantitative predictions about performance.
  • 35. KLM example GOAL: ICONISE-WINDOW [select GOAL: USE-CLOSE-METHOD . MOVE-MOUSE-TO- FILE-MENU . PULL-DOWN-FILE-MENU . CLICK-OVER-CLOSE-OPTION GOAL: USE-CTRL-W-METHOD PRESS-CONTROL-W-KEY]  compare alternatives: • USE-CTRL-W-METHOD vs. • USE-CLOSE-METHOD  assume hand starts on mouse USE-CLOSE-METHOD P[to menu] 1.1 B[LEFT down] 0.1 M 1.35 P[to option] 1.1 B[LEFT up] 0.1 Total 3.75 s USE-CTRL-W-METHOD H[to kbd] 0.40 M 1.35 K[ctrlW key] 0.28 Total 2.03 s
  • 36. Three-state model  captures the crucial distinctions among the various pointing devices like mouse, light pen etc.  Moving the mouse with no buttons pushed, normally moves the mouse cursor about.  This tracking behavior is termed state 1.  Depressing a button over an icon and then moving the mouse will often result in an object being dragged about.  This is termed state 2
  • 37.  consider a light pen with a button, it behaves just like a mouse when it is touching the screen.  When its button is not depressed, it is in state 1  When its button is down, state 2.  light pen has a third state, when the light pen is not touching the screen. In this state the system cannot track the light pen’s position. This is called state 0
  • 38.  Fitts’ law has different timing constants for different devices.  Recall that Fitts’ law says that the time taken to move to a target of size S at a distance D is:  a + b log2(D/S + 1)  The constants a and b depend on the particular pointing device used and the skill of the user with that device. also depend on the device state
  • 39. KLM prediction for the CLOSE-METHOD using these data.  Recall that the method had two pointing operators, one to point to the window’s title bar (with a distance to target size ratio of 10:1), the second to drag the selection down to ‘CLOSE’ on the pop-up menu (4:1).  Thus the first pointing operator is state 1 and the second is state 2.  The times are thus  Mouse ◦ P[to menu bar] = −107 + 223 log2(11) = 664 ms ◦ P[to option] = 135 + 249 log2(5) = 713 ms  Trackball ◦ P[to menu bar] = 75 + 300 log2(11) = 1113 ms ◦ P[to option] = −349 + 688 log2(5) = 1248 ms
  • 40. COGNITIVE ARCHITECTURES  for the architectural models the prediction and understanding of error is central to their analyses. 2 Architectural Models:  The problem space model  Interacting cognitive subsystems
  • 41. The problem space model  In computer science, it is common to describe a problem as the search through a set of possible states, from some initial state to a desired state.  The search proceeds by moving from one state to another possible state by means of operations or actions, the ultimate goal of which is to arrive at one of the desired states.
  • 42.  The architecture of the machine only allows the definition of the search or problem space and the actions that can occur to traverse that space.  Termination is also assumed to happen once the desired state is reached.  machine does not have the ability to formulate the problem space and its solution, because it has no idea of the goal.  It is the job of the programmer to understand
  • 43.  problem space model, based on the problem- solving work of Newell and Simon at Carnegie– Mellon University  A problem space consists of a set of states and a set of operations that can be performed on the states.  Behavior in a problem space is a two-step process. 1. the current operator is chosen based on the current
  • 44.  The problem space must represent rational behavior i.e achieve the goal  A problem space represents a goal by defining the desired states as a subset of all possible states.  Once the initial state is set, the task within the problem space is to find a sequence of operations that form a path within the state space from the initial state to one of the desired states, whereupon successful termination occurs.
  • 45.  four different activities that occur within a problem space: 1. goal formulation 2. operation selection, 3. operation application 4. goal completion. Goal Formulation  creates the initial state based on observations of the external environment.  Operations are the actions at the knowledge level in the problem space Operation selection  selects the appropriate operation at a given point in time.  Suggests an operation that can act on that state and transform it ‘closer’ to a desired state.
  • 46. Operation application  executes the operation, changing the current state and surrounding environment. Goal Completion  If the new state is a desired state, then the goal has been achieved and the goal completion process reverts the agent to inactive.  The real power of the problem space architecture is in recursion Problem space model is the basis for SOAR cognitive architecture
  • 47. Interacting cognitive subsystems  ICS provides a model of perception, cognition and action  It is not intended to produce a description of the user in terms of sequences of actions that he performs.  ICS provides a more holistic view of the user as an information-processing machine.  The emphasis is on determining how easy particular procedures of action sequences become
  • 48.  incorporate two separate psychological traditions within one cognitive architecture. 1. the architectural and general-purpose information-processing approach of short-term memory research. 2. computational and representational approach characteristic of psycholinguistic research and AI problem-solving literature.
  • 49.  architecture of ICS is the coordinated activity of nine smaller subsystems:  five peripheral subsystems are in contact with the physical world  four are central, dealing with mental processes.  Each subsystem has the same generic structure.  A subsystem is described in terms of its typed inputs and outputs along with a memory store for holding typed information.
  • 50.  Each of the nine subsystems is specialized for handling some aspect of external or internal processing  Eg:  Visual system for describing what is seen in the world.  processing of propositional information, capturing the attributes and identities of entities and their relationships with each other  ability to explain how a user proceduralizes action  ICS has been suggested as a design tool that can act as an expert system to advise a designer in developing an interface.