SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Human Computer Interface of an I.S
Submitted By:
Group # 9 (BS I.T-Morning) Submitted To:
Asif Mahmood (1029) Inam ul Haq
Noman Nazar (1041)
Adeel Ahmed (1042)
M. Faizan Butt (1043)
Arsalan Ahmed (1044)
University of Education Okara Campus
Contents
 Introduction
 Importance and Scope of HCI in I.S and other fields
 Use of Example that will explore above concept
 How to implement HCI of an I.S in any organization
 Advantages and Disadvantages
 Conclusions
 References
Introduction
 Human
• The end-user
• The members of an organization
 Computer
• Hardware
• Software
 Interface
• A point where two objects meet.
• A point where the human can tell the computer
what to do.
• A point where the computer displays the
requested information.
Definition
“Human–computer interface involves the study,
planning, and design of the interaction
between people and computers. It is often
regarded as the intersection of computer
science, behavioural sciences, design and
several other fields of study.”
It is used in many routine fields of human life
like as Intelligent Homes/Offices, Driver
Monitoring, Intelligent Games, E-Commerce. It
is also used in information system by various
ways.
Example
Importance and Scope of HCI in I.S
and other fields
HCI of an Expert System(Biometric attendance system)
Biometric is a technology that measure and analyse human body
characteristics for identification purposes. Biometric improves
business processes because of their ability to quickly and
accurately identify an individual and grant specific privileges.
e.g.
Face-key detector, Finger print detector etc.
From the above pic it is clear that HCI is used in various
fields of human life. It is also used in many fields of
Information system.
Uses in I.S
HCI is used in different fields of information system like as
 HCI of an Expert system
 HCI of Office Automation system
 HCI of a Library Information system
 HCI of a decision support system
Face-Key Detector
Face-key delivers patented technology based on fingerprints
and face recognition for business
processes enhancing.
Implementation of face-key Detector in I.S
Face-key detector is a HCI device which is used in the I.S of any
organization for different tasks like:
 Attendance
 Entry recode
 Facial recognition
 Photography
 Marketing
Working
Requirements
We are required following features/data:
 Data base of Organization.
 ICT (Software, Hardware etc.).
 I.S (Programmer, I.S manager etc.)
 Network
A college in Fuzhou, Fujian province has introduced an electronic
face-detection system to prevent students from skipping school,
the Fujian Daily reports. “Minjiang University's Conservatory
of Music” has installed the facial recognition system in
classrooms and demanded that students arrive 10 minutes early.
The identification system saves time as teachers are no longer
required to take attendance. Students who fail to be identified at
first scan are encouraged to move in front of the camera and do
it again.
Use of face-key detector in
organizations
Advantages
 I-PHONE Apple has shown interest in building advanced,
secure facial recognition technology that would take a two-
dimensional image of a person's face and render it in 3D for
greater accuracy.
 FBI Facial Recognition (face-key detector) software to
automatically check driver's license applicants against
Criminal Database.
 Very accurate with the use of “switches”.
 Good for “expert” users - can quickly access commands.
 Time saving.
 Most accurate.
 Easier for a novice/new user to learn/use
 No training required
 Can be quicker than keyboard entry
 Hands-free
Disadvantages
 Heavy makeup could fool the system.
 It cannot work without power/voltage.
 System has no backup in case of any
damage.
 Facial recognition system uses camera
technology which is not yet present as
standard equipment in all the pcs thus it
will create problem.
 It is more expensive and complex than
other methods..
Conclusions
This system provides easier way to do a task
in any origination. It is used in many abroad
countries. It mostly used in colleges,
universities, offices, factories and agencies.
It is used in FBI. FBI uses face-key detector
software to automatically check driver's
license applicants against Criminal
Database. It is expensive but very useful,
reliable and flexible software that is
commonly used in any big organization. It is
used as a basic input device in information
systems. It is user friendly
References
 http://www.hussainaenterprise.com/fingerprint-
standalone-time-attendance.htm
 http://www.fingerpak.com/contactus.html
 http://www.ecns.cn/cns-wire/2014/03-
03/103098.shtml
 http://www.popsci.com/technology/article/2009-
10/fbi-facial-recognition-software-scan-highway-
fugitive-motorists
 http://www.mwtime.com/biometrics.pdf
 http://en.wikipedia.org/wiki/Biometrics#Biometric_fu
nctionality

Weitere ähnliche Inhalte

Was ist angesagt?

Human Computer Interaction Notes 176.pdf
Human Computer Interaction Notes 176.pdfHuman Computer Interaction Notes 176.pdf
Human Computer Interaction Notes 176.pdfvijaykumarK44
 
HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basicsAlan Dix
 
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirementsHCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirementsAlan Dix
 
Design process interaction design basics
Design process interaction design basicsDesign process interaction design basics
Design process interaction design basicsPreeti Mishra
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer InteractionJitu Choudhary
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI)Human Computer Interaction (HCI)
Human Computer Interaction (HCI)Lahiru Danushka
 
HCI - Chapter 2
HCI - Chapter 2HCI - Chapter 2
HCI - Chapter 2Alan Dix
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignVrushali Dhanokar
 
HCI 3e - Ch 2: The computer
HCI 3e - Ch 2:  The computerHCI 3e - Ch 2:  The computer
HCI 3e - Ch 2: The computerAlan Dix
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interactionsai anjaneya
 
Human computerinterface
Human computerinterfaceHuman computerinterface
Human computerinterfaceKumar Aryan
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interactionemaan waseem
 
HCI 3e - Ch 3: The interaction
HCI 3e - Ch 3:  The interactionHCI 3e - Ch 3:  The interaction
HCI 3e - Ch 3: The interactionAlan Dix
 
Exploring GOMs
Exploring GOMsExploring GOMs
Exploring GOMsjbellWCT
 

Was ist angesagt? (20)

Human Computer Interaction Notes 176.pdf
Human Computer Interaction Notes 176.pdfHuman Computer Interaction Notes 176.pdf
Human Computer Interaction Notes 176.pdf
 
HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basics
 
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirementsHCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
 
Hci activity#3
Hci activity#3Hci activity#3
Hci activity#3
 
Design process interaction design basics
Design process interaction design basicsDesign process interaction design basics
Design process interaction design basics
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI)Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
 
HCI - Chapter 2
HCI - Chapter 2HCI - Chapter 2
HCI - Chapter 2
 
Human Computer Interaction unit 1
Human Computer Interaction unit 1Human Computer Interaction unit 1
Human Computer Interaction unit 1
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Hypertext, multimedia and www
Hypertext, multimedia and wwwHypertext, multimedia and www
Hypertext, multimedia and www
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction Design
 
HCI 3e - Ch 2: The computer
HCI 3e - Ch 2:  The computerHCI 3e - Ch 2:  The computer
HCI 3e - Ch 2: The computer
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Hci activity#2
Hci activity#2Hci activity#2
Hci activity#2
 
Human computerinterface
Human computerinterfaceHuman computerinterface
Human computerinterface
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Computer vision
Computer visionComputer vision
Computer vision
 
HCI 3e - Ch 3: The interaction
HCI 3e - Ch 3:  The interactionHCI 3e - Ch 3:  The interaction
HCI 3e - Ch 3: The interaction
 
Exploring GOMs
Exploring GOMsExploring GOMs
Exploring GOMs
 

Ähnlich wie Human Computer Interface of an Information System

A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptxslidecell212100
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,Jill Lyons
 
Introduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONIntroduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONcarljamess2700
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software EngineeringHeidi Maestas
 
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.EWEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.EIRJET Journal
 
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfIntelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfmarwa27147
 
Entitlements and balancing information system
Entitlements and balancing information systemEntitlements and balancing information system
Entitlements and balancing information systemِAbdulla AlShourbagy
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognitionIAESIJAI
 
Available Research Topics in Machine Learning
Available Research Topics in Machine LearningAvailable Research Topics in Machine Learning
Available Research Topics in Machine LearningTechsparks
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....Jitin Francis
 

Ähnlich wie Human Computer Interface of an Information System (20)

Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Billing project
Billing projectBilling project
Billing project
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Introduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTIONIntroduction to HUMAN COMPUTER INTERACTION
Introduction to HUMAN COMPUTER INTERACTION
 
Chapter1
Chapter1Chapter1
Chapter1
 
hardcopy
hardcopyhardcopy
hardcopy
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
 
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.EWEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
 
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdfIntelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
Intelligent_Process_Automation_The_Future_of_Digital_Transformation (2).pdf
 
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
 
Entitlements and balancing information system
Entitlements and balancing information systemEntitlements and balancing information system
Entitlements and balancing information system
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Available Research Topics in Machine Learning
Available Research Topics in Machine LearningAvailable Research Topics in Machine Learning
Available Research Topics in Machine Learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....
 

Mehr von university of education,Lahore

Mehr von university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Kürzlich hochgeladen

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Kürzlich hochgeladen (20)

YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 

Human Computer Interface of an Information System

  • 1. Human Computer Interface of an I.S Submitted By: Group # 9 (BS I.T-Morning) Submitted To: Asif Mahmood (1029) Inam ul Haq Noman Nazar (1041) Adeel Ahmed (1042) M. Faizan Butt (1043) Arsalan Ahmed (1044) University of Education Okara Campus
  • 2. Contents  Introduction  Importance and Scope of HCI in I.S and other fields  Use of Example that will explore above concept  How to implement HCI of an I.S in any organization  Advantages and Disadvantages  Conclusions  References
  • 3. Introduction  Human • The end-user • The members of an organization  Computer • Hardware • Software  Interface • A point where two objects meet. • A point where the human can tell the computer what to do. • A point where the computer displays the requested information.
  • 4. Definition “Human–computer interface involves the study, planning, and design of the interaction between people and computers. It is often regarded as the intersection of computer science, behavioural sciences, design and several other fields of study.” It is used in many routine fields of human life like as Intelligent Homes/Offices, Driver Monitoring, Intelligent Games, E-Commerce. It is also used in information system by various ways. Example
  • 5. Importance and Scope of HCI in I.S and other fields
  • 6. HCI of an Expert System(Biometric attendance system) Biometric is a technology that measure and analyse human body characteristics for identification purposes. Biometric improves business processes because of their ability to quickly and accurately identify an individual and grant specific privileges. e.g. Face-key detector, Finger print detector etc. From the above pic it is clear that HCI is used in various fields of human life. It is also used in many fields of Information system. Uses in I.S HCI is used in different fields of information system like as  HCI of an Expert system  HCI of Office Automation system  HCI of a Library Information system  HCI of a decision support system
  • 7. Face-Key Detector Face-key delivers patented technology based on fingerprints and face recognition for business processes enhancing. Implementation of face-key Detector in I.S Face-key detector is a HCI device which is used in the I.S of any organization for different tasks like:  Attendance  Entry recode  Facial recognition  Photography  Marketing
  • 9. Requirements We are required following features/data:  Data base of Organization.  ICT (Software, Hardware etc.).  I.S (Programmer, I.S manager etc.)  Network A college in Fuzhou, Fujian province has introduced an electronic face-detection system to prevent students from skipping school, the Fujian Daily reports. “Minjiang University's Conservatory of Music” has installed the facial recognition system in classrooms and demanded that students arrive 10 minutes early. The identification system saves time as teachers are no longer required to take attendance. Students who fail to be identified at first scan are encouraged to move in front of the camera and do it again. Use of face-key detector in organizations
  • 10. Advantages  I-PHONE Apple has shown interest in building advanced, secure facial recognition technology that would take a two- dimensional image of a person's face and render it in 3D for greater accuracy.  FBI Facial Recognition (face-key detector) software to automatically check driver's license applicants against Criminal Database.  Very accurate with the use of “switches”.  Good for “expert” users - can quickly access commands.  Time saving.  Most accurate.  Easier for a novice/new user to learn/use  No training required  Can be quicker than keyboard entry  Hands-free
  • 11. Disadvantages  Heavy makeup could fool the system.  It cannot work without power/voltage.  System has no backup in case of any damage.  Facial recognition system uses camera technology which is not yet present as standard equipment in all the pcs thus it will create problem.  It is more expensive and complex than other methods..
  • 12. Conclusions This system provides easier way to do a task in any origination. It is used in many abroad countries. It mostly used in colleges, universities, offices, factories and agencies. It is used in FBI. FBI uses face-key detector software to automatically check driver's license applicants against Criminal Database. It is expensive but very useful, reliable and flexible software that is commonly used in any big organization. It is used as a basic input device in information systems. It is user friendly
  • 13. References  http://www.hussainaenterprise.com/fingerprint- standalone-time-attendance.htm  http://www.fingerpak.com/contactus.html  http://www.ecns.cn/cns-wire/2014/03- 03/103098.shtml  http://www.popsci.com/technology/article/2009- 10/fbi-facial-recognition-software-scan-highway- fugitive-motorists  http://www.mwtime.com/biometrics.pdf  http://en.wikipedia.org/wiki/Biometrics#Biometric_fu nctionality