Exploring Graphical User Interfaces and Interaction Strategies in Simulations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Software User Guide
Software User Guide • For the safe use of your camera, be sure to read the “Safety Precautions” thoroughly before use. • Types of software installed on your computer varies depending on the method of installation from the Caplio Software CD-ROM. For details, see the “Camera User Guide”. Using These Manuals How to Use the The two manuals included are for your Caplio Software User Guide 500SE. Display examples: 1. Understanding How to Use Your The LCD Monitor Display examples may be Camera different from actual display screens. “Camera User Guide” (Printed manual) Terms: This guide explains the usage and functions In this guide, still images, movies, and sounds of the camera. You will also see how to install are all referred to as “images” or “files”. the provided software on your computer. Symbols: This guide uses the following symbols and conventions: Caution Caution This indicates important notices and restrictions for using this camera. 2. Downloading Images to Your Computer “Software User Guide” Note *This manual (this file) This indicates supplementary explanations and useful This guide explains how to download images tips about camera operations. from the camera to your computer using the provided software. Refer to This indicates page(s) relevant to a particular function. “P. xx” is used to refer you to pages in this manual. Term 3. Displaying Images on Your This indicates terms that are useful for understanding Computer the explanations. The provided software “ImageMixer” allows you to display and edit images on your computer. For details on how to use ImageMixer, click the [?] button on the ImageMixer window and see the displayed manual. -
Evaluating the Effect of Four Different Pointing Device Designs on Upper Extremity Posture and Muscle Activity During Mousing Tasks
Applied Ergonomics 47 (2015) 259e264 Contents lists available at ScienceDirect Applied Ergonomics journal homepage: www.elsevier.com/locate/apergo Evaluating the effect of four different pointing device designs on upper extremity posture and muscle activity during mousing tasks * Michael Y.C. Lin a, Justin G. Young b, Jack T. Dennerlein a, c, a Department of Environmental Health, Harvard School of Public Health, 665 Huntington Avenue, Boston, MA 02115, USA b Department of Industrial & Manufacturing Engineering, Kettering University, 1700 University Avenue, Flint, MI 48504, USA c Department of Physical Therapy, Movements, and Rehabilitation Sciences, Bouve College of Health Sciences, Northeastern University, 360 Huntington Avenue, Boston, MA 02115, USA article info abstract Article history: The goal of this study was to evaluate the effect of different types of computer pointing devices and Received 10 January 2014 placements on posture and muscle activity of the hand and arm. A repeated measures laboratory study Accepted 3 October 2014 with 12 adults (6 females, 6 males) was conducted. Participants completed two mouse-intensive tasks Available online while using a conventional mouse, a trackball, a stand-alone touchpad, and a rollermouse. A motion analysis system and an electromyography system monitored right upper extremity postures and muscle Keywords: activity, respectively. The rollermouse condition was associated with a more neutral hand posture (lower Pointing device inter-fingertip spread and greater finger flexion) along with significantly lower forearm extensor muscle Computer tasks fi Musculoskeletal disorders activity. The touchpad and rollermouse, which were centrally located, were associated with signi cantly more neutral shoulder postures, reduced ulnar deviation, and lower forearm extensor muscle activities than other types of pointing devices. -
End-User Computing Security Guidelines Previous Screen Ron Hale Payoff Providing Effective Security in an End-User Computing Environment Is a Challenge
86-10-10 End-User Computing Security Guidelines Previous screen Ron Hale Payoff Providing effective security in an end-user computing environment is a challenge. First, what is meant by security must be defined, and then the services that are required to meet management's expectations concerning security must be established. This article examines security within the context of an architecture based on quality. Problems Addressed This article examines security within the context of an architecture based on quality. To achieve quality, the elements of continuity, confidentiality, and integrity need to be provided. Confidentiality as it relates to quality can be defined as access control. It includes an authorization process, authentication of users, a management capability, and auditability. This last element, auditability, extends beyond a traditional definition of the term to encompass the ability of management to detect unusual or unauthorized circumstances and actions and to trace events in an historical fashion. Integrity, another element of quality, involves the usual components of validity and accuracy but also includes individual accountability. All information system security implementations need to achieve these components of quality in some fashion. In distributed and end-user computing environments, however, they may be difficult to implement. The Current Security Environment As end-user computing systems have advanced, many of the security and management issues have been addressed. A central administration capability and an effective level of access authorization and authentication generally exist for current systems that are connected to networks. In prior architectures, the network was only a transport mechanism. In many of the systems that are being designed and implemented today, however, the network is the system and provides many of the security services that had been available on the mainframe. -
An Isometric Joystick As a Pointing Device for Handheld Information Terminals
An Isometric Joystick as a Pointing Device for Handheld Information Terminals Miika Silfverberg I. Scott MacKenzie Tatu Kauppinen Usability Group Department of Computer Science Usability Group Nokia Research Center, Finland York University, Canada Nokia Research Center, Finland Abstract embedded pointing device that is suitable for handheld Meeting the increasing demand for desktop-like appli- use. This work studies the applicability of the isometric cations on mobile products requires powerful interac- joystick to handheld usage. tion techniques. One candidate is GUI-style point-and- click interaction using an integrated pointing device 1.1 Isometric Joystick that supports handheld use. We tested an isometric joy- A joystick is a good candidate for handheld pointing. stick for this purpose. Two prototypes were built. They Since it is mounted in the device chassis, it cannot be were designed for thumb operation and included a sepa- lost, unlike a stylus. It is small and can be manipulated rate selection button. Twelve participants performed potentially with the same hand that holds the device. point-and-select tasks. We tested both one-handed and two-handed interaction, and selection using the separate The device studied herein is an isometric joystick. The selection button and the joystick’s integrated press-to- pointer is moved by applying force to the stick. The select feature. A notebook configuration served as a stick itself doesn't move, or moves very little – hence reference. Results for the handheld conditions, both the name "isometric". The most common input-output one-handed and two-handed, were just slightly off those mapping is known as “velocity-control”, whereby the for the notebook condition, suggesting that an isometric applied force controls the velocity of the pointer. -
Welcome to Computer Basics
Computer Basics Instructor's Guide 1 COMPUTER BASICS To the Instructor Because of time constraints and an understanding that the trainees will probably come to the course with widely varying skills levels, the focus of this component is only on the basics. Hence, the course begins with instruction on computer components and peripheral devices, and restricts further instruction to the three most widely used software areas: the windows operating system, word processing and using the Internet. The course uses lectures, interactive activities, and exercises at the computer to assure accomplishment of stated goals and objectives. Because of the complexity of the computer and the initial fear experienced by so many, instructor dedication and patience are vital to the success of the trainee in this course. It is expected that many of the trainees will begin at “ground zero,” but all should have developed a certain level of proficiency in using the computer, by the end of the course. 2 COMPUTER BASICS Overview Computers have become an essential part of today's workplace. Employees must know computer basics to accomplish their daily tasks. This mini course was developed with the beginner in mind and is designed to provide WTP trainees with basic knowledge of computer hardware, some software applications, basic knowledge of how a computer works, and to give them hands-on experience in its use. The course is designed to “answer such basic questions as what personal computers are and what they can do,” and to assist WTP trainees in mastering the basics. The PC Novice dictionary defines a computer as a machine that accepts input, processes it according to specified rules, and produces output. -
Assessing the Quality of Mobile Graphical User Interfaces Using Multi-Objective Optimization
Noname manuscript No. (will be inserted by the editor) Assessing the Quality of Mobile Graphical User Interfaces using Multi-objective Optimization Makram Soui · Mabrouka Chouchane · Mohamed Wiem Mkaouer · Marouane Kessentini · Khaled Ghedira the date of receipt and acceptance should be inserted later Abstract Aesthetic defects are a violation of quality attributes that are symp-toms of bad interface design programming decisions. They lead to deteriorating the perceived usability of mobile user interfaces and negatively impact the Users eXperience (UX) with the mobile app. Most existing studies relied on a subjective evaluation of aesthetic defects depending on end-users feedback, which makes the manual evaluation of mobile user interfaces human-centric, time-consuming, and error-prone. Therefore, recent studies have dedicated their effort to focus on the definition of mathematical formulas that each targets a specific structural quality of the interface. As the UX is tightly dependent on the user profile, the combi-nation and calibration of quality attributes, formulas, and users characteristics, when defining a defect, is not straightforward. In this context, we propose a fully automated framework which combines literature quality attributes with the users profile to identify aesthetic defects of MUI. More precisely, we consider the mobile user interface evaluation as a multi-objective optimization problem where the goal is to maximize the number of detected violations while minimizing the detection complexity of detection rules and enhancing the interfaces overall quality in means M. Soui College of Computing and Informatics Saudi Electronic University, Saudi Arabia E-mail: [email protected] Mabrouka Chouchane School of computer science of Manouba, Tunisia E-mail: [email protected] Mohamed Wiem Mkaouer Rochester Institute of Technology E-mail: [email protected] Marouane Kessentini University of Michigan E-mail: [email protected] Khaled Ghedira Honoris United Universities E-mail: [email protected] 2 Makram Soui et al. -
An INTRODUCTION to Preconstruction (Webt)
WELCOME to an INTRODUCTION TO Preconstruction (webT) Welcome to the Preconstruction (webT) User Guide. When development of the Preconstruction application is complete, it will be a self-contained, electronic database application that will deal with everything currently handled by CES, PES, LAS, Designer Interface, Expedite, Bid Express, DSS and Sitemanager. The purpose of this series of documents is to provide a simple and easy explanation dealing with navigating and working in the new web Preconstruction environment. It should answer the “WHO, WHAT, WHEN, WHERE, WHY and HOW” of webT. It is designed to provide easy-to-follow steps to enhance the accomplishment of your tasks whether your job deals with contract administration, project design, estimation, contract awarding or contract management, to mention just a few. The instructions and directions are arranged logically and sequentially. The goal of this User Guide is to reduce the frustration frequently associated with learning a new application. The guide should be a handy reference that is quick and easy. If you find it doesn’t provide enough information, please call the HELP DESK or even reference the “Online Help” available throughout the application The Guide is intended to be a quick reference on how to accomplish certain tasks without a lot of technical jargon. It is not intended to be a technical treatise that defines the coding and programming challenges handled by the application. Part of the beauty of a web application is the ease in which tasks are accomplished without requiring the user to remember special keys or to enter special codes. With the aid of drop-down menus and mouse clicks on buttons or hyperlinks, processes can be activated and run without the user doing anything more complicated than a point and click. -
Using Microsoft Visual Studio to Create a Graphical User Interface ECE 480: Design Team 11
Using Microsoft Visual Studio to Create a Graphical User Interface ECE 480: Design Team 11 Application Note Joshua Folks April 3, 2015 Abstract: Software Application programming involves the concept of human-computer interaction and in this area of the program, a graphical user interface is very important. Visual widgets such as checkboxes and buttons are used to manipulate information to simulate interactions with the program. A well-designed GUI gives a flexible structure where the interface is independent from, but directly connected to the application functionality. This quality is directly proportional to the user friendliness of the application. This note will briefly explain how to properly create a Graphical User Interface (GUI) while ensuring that the user friendliness and the functionality of the application are maintained at a high standard. 1 | P a g e Table of Contents Abstract…………..…………………………………………………………………………………………………………………………1 Introduction….……………………………………………………………………………………………………………………………3 Operation….………………………………………………….……………………………………………………………………………3 Operation….………………………………………………….……………………………………………………………………………3 Visual Studio Methods.…..…………………………….……………………………………………………………………………4 Interface Types………….…..…………………………….……………………………………………………………………………6 Understanding Variables..…………………………….……………………………………………………………………………7 Final Forms…………………....…………………………….……………………………………………………………………………7 Conclusion.…………………....…………………………….……………………………………………………………………………8 2 | P a g e Key Words: Interface, GUI, IDE Introduction: Establishing a connection between -
How to Use the Graphical User Interface TCS Technical Bulletin
How to Use the Graphical User Interface TCS Technical Bulletin A. Create/Edit the Graphical Interface (Build Mode) Accessing the site using the Graphical Interface requires that you first build a layout (one or more layers/tabs depending on your site). This is done using the setup wizard to upload images/backgrounds and place controllers in appropriate locations on those images/backgrounds. When finished and saved, the User accesses the site using the Graphical Interface. 1. Click the “+” button to add a layer/tab for the site. (Skip to step 7 to edit an existing layer.) 2. Name the layer/tab by clicking in the field and entering the desired name. 3. Click the Choose File button to select the desired background image from your computer’s drive and click the Save button. 4. The Place View will open showing you the layer/tab title, a Save Positions button, the background image, and a bin of available controllers along the right-hand edge of the Graphical Interface which can be placed onto the layer/ tab. 5. Drag/drop controller icons from the icon bin to the desired location on the background image. Moving your mouse over each icon will show that controller’s name. The arrows at the top and bottom of scroll bar or the scroll bar itself allow you to scroll through the available controllers. NOTE: If you have placed controller icons too close to the icon bin and you would like to move them, you may need to scroll the available controllers up or down to clear the area around an icon to allow it to be dragged/dropped again. -
Student Computer User Agreement
STUDENT COMPUTER USER AGREEMENT GUIDING PRINCIPLE OF THIS AGREEMENT: Lakeside’s technological resources are dedicated to further the school’s mission and to serve the educational pursuits of its students. Students using Lakeside’s technology services are expected to behave in accordance with the Community Expectations documented in the family handbook. Students are expected to act in ways that show consideration and respect for other people and enhance an open atmosphere of trust, both offline and online. TECHNOLOGY SERVICES The use of Lakeside’s technology services – tech support, network access, email accounts, storage services, software subscriptions and all other school-owned computer resources – is a privilege, not a right. This privilege may be revoked at any time for abusive conduct, or failure to abide by the school’s expectations and/or responsible usage listed below. GENERAL EXPECTATIONS ▪ Lakeside email accounts, software and services, and onsite network access are provided primarily for school-related work. ▪ Any user of Lakeside’s electronic communications resources is expected to respect the person and privacy of others. ▪ The configuration of school-issued computers (operating system, security settings and software applications) may not be altered. ▪ Using the Lakeside computer network to exchange or store pirated software, unlawful information, or other unauthorized copyright-protected material (i.e. music, multimedia) in any file format is strictly prohibited. ▪ Students are expected to maintain the integrity of their computing devices so as not to bring viruses, malware or spyware to school. Unprotected and infected devices are forbidden to connect to the school network and, when detected, will be disconnected from the network until resolved. -
Introduction to GREET1 2011 Graphical User Interface
Introduction To GREET1_2011 Graphical User Interface Jeongwoo Han Systems Assessment Group Center for Transportation Research Argonne National Laboratory The GREET Training Workshop Washington, DC, Jan. 31, 2012 Outline . Purpose of GREET GUI . Structure and Operation of GREET GUI . Outputs of GREET GUI . Installation and Compatibility Issues with GREET GUI . Help with GREET GUI 2 Outline . Purpose of GREET GUI . Structure and Operation of GREET GUI . Outputs of GREET GUI . Installation and Compatibility Issues with GREET GUI . Help with GREET GUI 3 GREET GUI Development GREET 1 Excel Model Fuel Cycle (or WTW) Modeling for Light Duty Vehicles 4 GREET GUI Development Receives GREET GUI Communicate Display GREET 1 Excel Model Fuel Cycle (or WTW) Modeling for Light Duty Vehicles Run 5 Outline . Purpose of GREET GUI . Structure and Operation of GREET GUI . Outputs of GREET GUI . Installation and Compatibility Issues with GREET GUI . Help with GREET GUI 6 Steps of a Typical GREET GUI Session Copyright and information screens Load GREET Model User selects/specifies fuel blending options (in the background) User reviews/modifies key assumptions for User selects simulation year(s), fuel types, fuel production, fuel transportation and vehiclevehicle type type and and other other simulation key options options distribution, and vehicle operation Run GREET Model User selects/specifies feedstock, production (in the background) and fuel market shares Generate output file for energy use and UserUser selects/specifies selects/specifies fuel fuel pathways pathways and and emission rates and input log file for a record vehiclevehicle technologiestechnologies of inputs made during the concluded session 7 Outline . Purpose of GREET GUI . -
The Management of End User Computing a Research Perspective
HD2 8 .M414 Oe>NeV THE MANAGEMENT OF END USER COMPUTING A RESEARCH PERSPECTIVE John F. Rockart Lauren S. Flannery February 1983 CISR WP #100 Sloan WP // 1410-83 Centerfor Information Systems Research Massachusetts Institute of Technology Sloan School of Management 77 Massachusetts Avenue Cambridge, Massachusetts, 02139 THE MANAGEMENT OF END USER COMPUTING A RESEARCH PERSPECTIVE John F. Rockart Lauren S . Flannery February 1983 CISR WP #100 Sloan WP // 1410-83 Rockart - Flannery 1983 Center for Information Systems Research Sloan School of Management Massachusetts Institute of Technology MAY 3 1 1983 RECe;v£d 1- ABSTRACT Based on interviews with 200 end users and 50 information systems managers concerned with end user computing, end users can be classified into six distinct types. Each of them needs differentiated education, support and control from the Information Systems function. End users exist primarily in staff functions. They develop and use a wide spectrum of computing applications ranging from "operational systems" of the type usually developed by information systems professionals to complex analytical programs. To support a large number of their applications a new computing environment, "the third environment" (in addition to the traditional COBOL and timesharing environments) must be developed by Information Systems (I/S) management. Close attention must also be paid by I/S management to the need to involve "functional support personnel" (end users in each functional area who spend most of their time programming and aiding other end users) in the I/S end user management process. An end user strategy is needed in each organization. In addition, users cite increasing needs for support from I/S management.