Spelling suggestions: "subject:"keyboards"" "subject:"keyboard’s""
1 |
Improved text entry for mobile devices alternate keypad designs and novel predictive disambiguation methods : a dissertation /Gong, Jun. January 2007 (has links)
Thesis (Ph. D.)--Northeastern University, 2007. / Graduate School of Computer and Information Science. Includes bibliographical references (p. 106-113).
|
2 |
Improved text entry for mobile devices : alternate keypad designs and novel predictive disambiguation methods : a dissertation /Gong, Jun. January 2007 (has links)
Thesis (Ph. D.)--Northeastern University, 2007. / Graduate School of Computer and Information Science. Also available electronically. Includes bibliographical references (p. 106-113).
|
3 |
An experimental comparison of a ternary chord keyboard with the QWERTY keyboardFathallah, Fadi A. 08 July 2010 (has links)
Chord keyboards use the concept of simultaneous activation of keys to produce single characters. Some chord keyboards have been suggested as potential devices to replace the standard QWERTY keyboard which is now considered the major human-computer interface tool.
This study focused on evaluating a new chord keyboard that uses a set of eight ternary (3 state) keys. An experimental comparison of the ternary chord keyboard (TCK) with the QWERTY keyboard was conducted. Two groups of subjects were selected to participate in the study. One group was assigned to the QWERTY keyboard and the other to the TCK. The two groups learned to input a set of 17 characters. Training of each group was similar and the stimuli were identical. The study investigated how the two groups compared in attaining certain performance criteria (speed and accuracy), and how performances compared on both keyboards after fulfilling the criteria.
For each group, the number of sessions to reach the criteria was recorded along with speed and accuracy of typing. At the end of the experimental session, subjects rated some features of their respective keyboard. Performances on both keyboards were comparable in all stages with no significant differences revealed. However, executing chords on the TCK was rated significantly more difficult than activating keys on the QWERTY keyboard. / Master of Science
|
4 |
The utility of a technique for testing the difference in ease of chords on the Ternary Chord KeyboardCallaghan, Thomas F. January 1989 (has links)
In a pilot study, response times of 64 possible chords on the Ternary Chord Keyboard (TCK) were compared in order to establish a basis for assigning characters to chords. It was found that subjects had faster response times for some chords than others. Upon close inspection of the experimental procedure, it appeared that the way in which the chords were cued caused part of the differences in response time, which had been expected to depend only on chord motor differences.
The present study was designed to examine the hypotheses that chord cueing caused part of the differences in chord response times, and that this effect of cueing is consistent over practice; and also the hypothesis that the results of the pilot study reflected the motor (movement time) difference between chords, and that the difference itself is consistent over practice. This was done in the framework of Sternbcrg's Additive Factors Method.
lt was found that the cueing scheme used in the pilot study did not cause the differences in chord response times. However, the differences in chord movement time was not reflected by the use of the pilot study paradigm. This technique should therefore not be used in ordering chords according to chord case. / Master of Science
|
5 |
Keyboard design deficiencies of mobile bar code scannersLong, Myra D. 24 March 2006 (has links)
The use of mobile bar code scanners is expanding to markets beyond popular
manufacturing uses, such as healthcare, environmental testing and professional
services. The successful interaction of users with mobile bar code scanners is of great
importance from a business and technology perspective as well as from the user
standpoint. Interaction problems associated with these devices may cause errors in
data collection and affect job performance due to frustration, resulting in a potential
impact on internal costs.
The primary objective of this research was to develop design guidelines for the
reengineering of keyboard designs for mobile bar code scanners. A secondary
objective was to determine the effectiveness of current bar code scanner designs and
how they can be related to other mobile technologies to develop a link across research
areas. To accomplish these objectives, three different mobile bar code scanner
keyboard designs were investigated: multiple-alphabetical, single-alphabetical and
single split-Qwerty. A total of 42 subjects (18 females and 24 males) were recruited to
participate in the experiment that was conducted to validate the research hypotheses.
Time and accuracy data were recorded during the experiment and workload/subjective
questionnaires were given to each participant following interaction with the different
mobile bar code scanners.
The following conclusions were reached based on the experimental results and
are considered the major contributions of this research. First, an alphabetically laid
out keyboard with multiple keys results in more time to find a character, a higher
percentage of time spent typing incorrect lines, and a higher error rate than an
alphabetically laid out keyboard with single keys. Perceived workload was also higher
for a keyboard with multiple keys versus one with single keys. Second, no significant
differences were found in the time to find a character, the percentage of time spent
typing incorrect lines, and the error rate between keyboards with single keys, whether
they are laid out alphabetically or in a split-Qwerty design. Finally, training a user on
how to use a specific mobile bar code scanner keyboard layout often results in higher
character rates, less time spent typing incorrect lines, and a lower error rate. / Graduation date: 2006
|
6 |
A touch operated input device for multifunction machinesBahm, Raymond John, 1938- January 1968 (has links)
No description available.
|
7 |
Mobile text entry using ambiguous keypads : new metrics in a new toolkit /Castellucci, Steven John. January 2007 (has links)
Thesis (M.Sc.)--York University, 2007. Graduate Programme in Computer Science and Engineering. / Typescript. Includes bibliographical references (leaves 83-88). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:MR29276
|
8 |
Observation, description, and prediction of long-term learning on a keyboarding task /McMulkin, Mark L., January 1992 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1992. / Vita. Abstract. Includes bibliographical references (leaves 132-136). Also available via the Internet.
|
9 |
Risk factors for piano-related pain among college students and piano teachers solutions for reducing pain by using the ergonomically modified keyboard /Yoshimura, Eri, January 2009 (has links)
System requirements: Adobe Acrobat Reader. Accompanied by 4 recitals, recorded Jan. 12, 2004, Nov. 22, 2004, Apr. 14, 2006, and June 10, 2009. Includes bibliographical references (p. 65-66).
|
10 |
CredProxy: A Password Manager for Online Authentication EnvironmentsGolrang, Mohammad Saleh 20 December 2012 (has links)
Internet users are increasingly required to sign up for online services and establish accounts before receiving service from websites. On the one hand, generation of strong usernames and passwords is a difficult task for the user. On the other hand, memorization of strong passwords is by far more problematic for the average user. Thus, the average user has a tendency to use weak passwords, and also reuse his passwords for more than one website, which makes several attacks feasible. Under the aforementioned circumstances, the use of password managers is beneficial, since they unburden the user from the task of memorizing user credentials. However, password managers have a number of weaknesses. This thesis is mainly aimed at alleviating some of the intrinsic weaknesses of password managers. We propose three cryptographic protocols which can improve the security of password managers while enhancing user convenience. We also present the design of a phishing and Man-in-the-Browser resistant password manger which best fits into our scheme. Furthermore, we present our novel virtual on-screen keyboard and keypad which are designed to provide strong protection mechanisms against threats such as keylogging and shoulder surfing.
|
Page generated in 0.0195 seconds