You are on page 1of 40

Chapter Five

Advanced Interface Design


For Modern Us
1
Chapter Overview
 In this section, we will start off with database
interface design.
 Our focus is on the advanced interface for
information search and retrieval where we will
compare between text-based and multimedia
database interfaces. We will examine the Intelligent
User Interface (IUI) and virtual reality (VR).
 We will end the unit with a discussion on the
security through biometrics.

2
Unit Objectives

By the end of the chapter, you should be able to:


1. Gain knowledge of information search and retrieval
for multimedia elements.
2. Discuss the HCI in virtual world.

3. Discuss security issues through biometrics


implementation.

3
Information Search and Retrieval
 The text-based search method will only be effective
if you can give an exact word for what you are
searching.
 With the growing complexity of data types and data
volume, we have multimedia data such as images,
sound, video and animation.

4
Examples
 Let’s look at an example for text search
which is the Amazon.com.
 Most probably, if you want to search for a
“Human Computer Interaction” book, all you
have to do is to type the keywords in the
search column. The query will be sent to the
database and it will return a set of results
that matches the keywords.
5
Digital library
 We can build a digital library to store all these data.
A digital library is simply a collection of digital
documents; hence the documents can be journal
articles, images, sound or video files.
 It is also known as an electronic or virtual library.
 The following are the advantages of a digital
library. Digital library can provide a valuable
advantage in this competitive era, provided you can
retrieve the information that you want.
6
Advantages of a digital library
 Widely available: Digital information can be easily
transmitted over the Internet or burnt into CD and
sent by post.
 Reduce cost: Digital information does not require
large storage space as compared to other medium
such as book, journal or video tapes.
 Easy access: The information is available 24 hours
per day as long as the server that hosts the
information is up and running.
7
Compares
 The highlight on this section is that we will
compare and contrast two types of
databases. We will look into:
1. How they store the data?
2. How they retrieve the data?
3. How they display the data?

8
Dynamic and Static display
 The display of the data can be static or
dynamic. One of the examples of static
display is the Help system in Microsoft Word.
 Dynamic display, the display of the result
can be different depending on the algorithm
of retrieving the information. Hence, the
data will be changed dynamically based on
the action from the users.
9
Four Ways Of Finding
Information
 Specific information finding: Searches for information of a
single identifiable outcome, example Amoud University.
 Extended information finding: Searches for information of an
uncertain but replicable outcome. Example, modules are
offered by AU.
 Open-ended browsing: Searches for information based on
known collections. Example, Are there any new modules
offered by AU.
 Exploration of availability: Searches for information based on
availability of facts.HCI Modules.

10
Text document
 When I ask you to picture a cat, you will picture it as an
animal with a tail, four legs and with paws. Hence, we all
share a common knowledge on the things that surround us.
 By sharing this common knowledge, we are able to give it a
word to describe it.
 Text-based search requires people to index (tag) the
content with text.
 Therefore, when it comes to storing data from a database,
we will index it with a word. With a proper indexing, it will
help us to retrieve the data easily.

11
Example
 For instance, we need to know the keyword
on the index to access to the information
that we want. Any mistake in indexing the
word will lead to future problems.
 For example, if we index wrongly in the
database for cat pictures as catz instead of
cats, we might not be able to retrieve those
data.
12
Multimedia documents
 You have to label every single image with proper
keywords; otherwise, it will be difficult to retrieve
it. Nevertheless, not all images can be indexed with
a keyword.
 The above result returned a list of images
containing the word “bird”.
 Hence, you have to label every single image with
proper keywords; otherwise, it will be difficult to
retrieve it.
13
Intelligent user interface
 You need to understand where the intelligent lies,
is it on the system or the interface or both? To
answer this, we need to look at what it means by
“intelligent” in the context of computer science.
 In computer science field, the term “intelligent
system” includes a system that can show an
explicit human knowledge such as learning through
time.

14
Conti……..
 the term “intelligent user interface” is referring to
the interface itself that can respond flexibly to a
circumstance in a purposeful way.
 An intelligent system can help you in taking the
best option during a decision making session,
especially when the decision making involves a lot
of condition and statistical data.

15
Security issues and biometrics
implementation
 Personal identification is the process of
associating an individual with an identity.
 For illustration, when you are visiting other
countries, you need a passport to identify who
you are and where you are from. During your
visit, your passport can be stolen.
 A breach of identity security takes place when
people forge a stolen passport.
16
Types of personal identification
 There are two types of personal identification, that is:
 Token-based: Token-based identification uses a
physical thing to make a personal identification. This
includes passport, Identity Card, member cards or
even a house key.
 Knowledge-based: Knowledge-based identification
uses something you know to make your claims. This
includes password, ATM pin number or a code word
among friends.
17
Conti……..
 The problem with personal identification is that all
these things can be stolen or forgotten. For
example, you can forget your ATM pin number;
your email password can be hijacked; and your
member card can be stolen.
 We need something that is more reliable to identify
someone who claims who they are. Hence,
biometric identification was born due to the
limitation of personal identification.
18
Definition
 Biometric identification is the process of identifying
an individual based on his/her unique physical or
behavioral characteristics.
 For example, using fingerprint scan to access to
your office or activate your laptop. You might forget
to bring you office key but you cannot forget to
bring your finger along.
 Besides that, the fingerprint system can scan a dead
finger and prevents its access.
19
Categories of Biometric system
 Biometric system can be categorized into
two groups
 Physiological  face, face thermogram,
fingerprint, hand geometry, iris and voice.
 Behaviour  Keystroke, signature, voice.

20
Security through biometrics
 Verification(“Is this person really you?”): Biometric system
can verify the user with higher accuracy as compared to the
password system. The system can either accept or reject the claims
after comparing the input patterns against the enrolled pattern.
 Identification/Authentication (“Is this person in the
database?”): Biometric system can help the process of
identification, provided that we have enrolled to the associated
system. For illustration, we can retrieve the record of the criminals
through scanning their biodata. Such applications include criminal
investigation, parenthood determination and missing child
identification.

21
Conti…….
 Screening (“Is this person wanted by the
police?”): Biometric system can help in the
process of screening people who are on the watch
list of identities for security measure.
 Such application includes airport security.

22
Types of biometrics
 Face
 Fingerprint
 Retina and iris
 Hand geometry
 Keystrokes
 Signature
 Voice
23
Face
 The face recognition method can recognize your face through
matching the pattern of your face against the data on the
database. There are two approaches for face recognition
system:
1. Approach based on the shape of the person’s facial attributes.
This includes the shape of the eyebrows, distance between
the eyes, nose, mouth, chin and jar edges.
2. Approach based on the overall analysis of the face image.
You will be required to smile and blink to enable the system
to capture more information about your face.

24
Figure

(1)
Scanner starts reading (2)
Points are transferred (3) Comparisons
Once a matchcan
is
geometry of face, plotting to a database as an features on a grid be madeanquickly
found, identitybycan
a computer
be 25
algorithm of numbers program
verified
Face thermogram
 The face thermogram recognition system can verify
your identity through your facial heat pattern.
 This facial heat can be captured by using the
infrared camera.
 It is believed that each person has a unique face
thermogram.
 Even though you go for plastic surgery, the face
thermogram will remain the same because surgery
cannot reroute the flow of blood through the vein.
26
Fingerprint
 The fingerprint recognition system
recognizes the pattern on your fingerprint.
The accuracy of using this system is very
high because everyone has different
fingerprint.
 Even for an identical twin, their fingerprints
are generally similar but they are no
identical.
27
Figure

The pattern matching process is somehow the same as the facial recognition system.
However, the forming of the pattern on the fingerprint is different. First, when the
system scans your finger, it will find out the distinctions on your finger.

Secondly, a unique biometric pattern will be formed based on the plot as shown on the
above fingerprint. This pattern will be compared against a set of patterns on the
database. If there is a matching pattern, then we have found a match. Hence, the system
has identified you.

28
Retina and iris
 Retina recognition system uses infrared red lights to scan the
layer of blood vessels at the back of your eyes.
 This system is secure because there is no way to reproduce
the same retina. However, it can cause discomfort as some
people have problems exposing their eyes to the infrared light.
 The second method is the iris recognition system that
recognizes you through your visual texture on your iris. This
system does not require the infrared lights. Each iris is
distinctively different for everyone, even twins do not have the
same texture of the iris.

29
Figure

Iris recognition system places the plot on the grid


when the system scans your iris. Then, the system will
compare the plot against a set of patterns on the
computer system. The system can verify you, once a
match is found. In addition, the retina and iris
recognition system allows you to wear your glasses
during the scanning process.
30
Hand geometry
 The hand geometry recognition system can
recognize you through your hand’s property
such as the size of your palm, shape, length
and width of your fingers.

31
Figure

32
Conti…….
 The problem with hand geometry recognition system
includes:
 Human hand can change over a period of time.
 The hand geometry recognition system is large and it
is difficult to be embedded on a portable system.
Attempts to reduce the size have been carried out.
 However, the size of the equipment is still larger as
compared to fingerprint, voice and face recognition
devices.
33
Keystrokes
 The keystrokes recognition system confirms
your authentication through your way of
typing. Hence, this system is based on the
assumption that each of us types in a different
way.
 In some cases, there is a possibility of
overlapping but the system itself is sufficient in
differentiating individuals for authentication.

34
Figure

Key Down
DwellKey Up
Time Flight Time

35
Signature
 The signature recognition system can verify
you through the way you sign your name.
 Hence, it is assumed that each of us signs
our name in our own way and it is unique.
 Signature has been accepted by the law as
a method of authentication.

36
Figure

37
Voice
 The voice recognition system can recognize you
through your voice. First of all, you need to create
a phrase that must be passed by the system. By
referring to Figure 5.31, when you are creating the
phrase, the system will record the data as shown in
the diagram below. During the verification process,
you need to speak the phrase through a
microphone. The system will validate the pattern
against the pattern that you have created earlier.

38
Figure

39
Assignment
 Advantages of Biometric technology

40

You might also like