Optimizing the Keyboard PSY/ORF 322 Final Project Jessica Blankshain, James Ma, and Robert J. Moore.

Slides:



Advertisements
Similar presentations
Collecting data Chapter 6. What is data? Data is raw facts and figures. In order to process data it has to be collected. The method of collecting data.
Advertisements

Parts of a Computer.
INTRO TO TOUCH TYPING  Open the Typing Lesson Template file from the Public Folder  Replace the header with your information  Save the file to your.
1 Automated Testing & Test Tools Apirada Thadadech.
1 Size-Based Scheduling Policies with Inaccurate Scheduling Information Dong Lu *, Huanyuan Sheng +, Peter A. Dinda * * Prescience Lab, Dept. of Computer.
Computer Science: A Structured Programming Approach Using C Converting File Type A rather common but somewhat trivial problem is to convert a text.
SIGCOMM 2003 Making Intra-Domain Routing Robust to Changing and Uncertain Traffic Demands: Understanding Fundamental Tradeoffs David Applegate Edith Cohen.
ProCognis SOX 404 & COSO Implementation Presentation
1 Optimal Character Arrangement for Ambiguous Keyboards Reporter: En-ping Su
1 Network Effect The old industrial economy: Economies of scale. Declining average cost The new information economy: Economics of networks. The value of.
Evolving a Faster Keyboard Christopher P Walker. Overview Motivation Algorithm Considerations Design of the EA The nonexistent preliminary results Future.
The Calibration Process
Typewriter Keyboards via Simulated Annealing Reporter: En-ping Su Date:
Optimizing the Placement of Chemical and Biological Agent Sensors Daniel L. Schafer Thomas Jefferson High School for Science and Technology Defense Threat.
Computer Hardware. Microcomputer Systems Handheld Computers – PDA, Information Appliances Notebook Computers Desktop Computers.
Lesson 4 — Keyboarding Unit 1 — Computer Basics. Lesson 4 – Keyboarding 2 Objectives Define keyboarding. Identify the parts of the standard keyboard.
CHAPTER 11: Sampling Distributions
Review for 1 st Quiz. How to listen properly Stop what you are doing.
Discovering TYPEWRITER HISTORY! Press the space bar to continue.
A Genetic Algorithm-Based Approach for Building Accurate Decision Trees by Z. Fu, Fannie Mae Bruce Golden, University of Maryland S. Lele, University of.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
TERMS TO KNOW. Desktop This does not mean a computer desktop vs. a laptop. You probably keep a number of commonly used items on your desk at home such.
Keyboarding Review.
KEYBOARDING The Penmanship of the Computer Age IS…..
Lesson 8 Keyboarding Unit 2—Using the Computer. Computer Concepts BASICS - 2 Objectives Define keyboarding. Identify the parts of the standard keyboard.
Chapter 7. Statistical Intervals Based on a Single Sample Weiqi Luo ( 骆伟祺 ) School of Software Sun Yat-Sen University : Office.
Cristian Urs and Ben Riveira. Introduction The article we chose focuses on improving the performance of Genetic Algorithms by: Use of predictive models.
Generic Approaches to Model Validation Presented at Growth Model User’s Group August 10, 2005 David K. Walters.
Productivity Programs Common Features and Commands.
IS201 Agenda: 10/15/2013 Do form and report exercise. Identify general guidelines for form and report design. Discuss a few key points about reports in.
Massive Stochastic Testing of SQL Don Slutz Microsoft Research Presented By Manan Shah.
CHAPTER 11: Sampling Distributions ESSENTIAL STATISTICS Second Edition David S. Moore, William I. Notz, and Michael A. Fligner Lecture Presentation.
Creating Documents From typewriter to the 21st century.
Modeling Visual Search Time for Soft Keyboards Lecture #14.
Genetic algorithms (GA) for clustering Pasi Fränti Clustering Methods: Part 2e Speech and Image Processing Unit School of Computing University of Eastern.
Project Report An investigation on data entry effectiveness & efficiency.
1 Human Computer Interaction Week 5 Interaction Devices and Input-Output.
System design : files. Data Design Concepts  Data Structures  A file or table contains data about people, places or events that interact with the system.
A Repetition Based Measure for Verification of Text Collections and for Text Categorization Dmitry V.Khmelev Department of Mathematics, University of Toronto.
Touch Typing the Home Row
DHUHA KHALID ALSHMMERI The Keyboard. Is a unit of the input data to the computer, When a key is pressed the Keyboard generate code called Survey (determining.
Software - A set of instructions, stored digitally within the computer's memory, which tells the computer system what to do.  System Software  Application.
OBJECTIVE 3.01 Keyboarding Keyboard Layout Arrangement of Keyboard Touch Typing Technique Line Spacing Review Ergonomics.
How do typewriters work? Typewriters explained. By Callum Lilley.
MRS. SEALY | THOMPSON MIDDLE SCHOOL Touch Typing Introduction & Techniques.
A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and Applications software. Systems.
Olympia College Sugedan – Pyae Nyein Chan - M Hardware And Software Components.
Intellectual Property Law Unit Four. Patent Right Unit Four.
EXPLORING THE WINDOWS SECTION PART 1 MOAC Lesson 1.
Genetic Algorithms for clustering problem Pasi Fränti
Braille Music Production at DZB Leipzig Matthias Leopold DaCapo.
Word Processing Strand 4. What is Word Processing? Using Keyboarding skills to produce documents such as: Letters Reports Manuals Newsletters A tool to.
Print the sample banner slides or customize with your own message. Click on the letter and type your own text. Use one character per slide. Cut along dotted.
Computer Essentials Brainard Keyboarding. Q W E R T Y Most modern keyboards use the "qwerty" layout. This name comes from the first five letters on the.
Keyboard Finger Placement Exercise
Print the sample banner slides or customize with your own message. Click on the letter and type your own text. Use one character per slide. C.
Information and Information Technology 1. Information and employment 2.
History of typewriter & Keyboard
Sports & Entertainment Marketing II
Computer Skills and Applications
The dvorak keyboard History The dvorak layout Testing it
Using ICT Software . Database Spreadsheet.
Presenter: Randy Hunt Presenter: Vitaliy Krestnikov
Qualitative Research.
Objective of This Course
Keyboarding Techniques
Keyboarding Review.
Subscript and Summation Notation
Year 9 Entry Level Computing
What is the QWERTY Keyboard?
Presentation transcript:

Optimizing the Keyboard PSY/ORF 322 Final Project Jessica Blankshain, James Ma, and Robert J. Moore

Purpose Develop a keyboard optimization algorithm. –Utilize Fitts’s Law and other aspects of the Card-Moran-Newell (CMN) model of the human processor. Demonstrate that neither the QWERTY nor the Dvorak keyboard layout is an optimal configuration of the keys on the three-row keyboard. –These layouts can be improved upon using quantitative methods.

History: QWERTY Old typewriters used typebars and had an “invisible” printing point, leading to frequent jams. There is speculation that they intentionally placed all the letters of the word “typewriter” in the top row for quick and easy demonstration.

History: Dvorak In the 1930’s, August Dvorak and William Dealey developed and patented a new layout, known as the Dvorak Simplified Keyboard (DSK). Designed to improve typing efficiency and user comfort. Reasoning for layout was strictly qualitative.

Methods: Scale Issues Why Not Examine Every Possible Permutation? At one keyboard per second, that’s 8.41*10 24 years. The sun will burn out after 5*10 9 of them.

Methods: Keyboard Population Rather than look at entire keyboards, examine the influence of specific keys in specific locations. There are only 30*30 = 900 key-position pairs. We can randomly populate a large number of keyboards, then see how certain keys in certain positions influence their performance.

Methods: Scoring Keyboards First, need a figure of merit for keyboard performance: –Compile a large text file and calculate how long it would take an average human to type that entire file using that keyboard. –These figures are derived from the CMN model and Fitts’s Law.

Methods: Applying CMN Used Fitts’s Law to determine how long it would take a typist to move a finger from one key to another. Determined inter-row and inter-finger transition times. From this data, could determine the time to transition from any finger in any position to any other. See paper for quantitative details.

Methods: Compiling a Text Sample ~500KB of raw text 80,720 Characters Sources: –Popular Novels –Famous Speeches –TV Transcripts –Rap Lyrics

Methods: Algorithmic Flow Simulate 90,000 keyboards. Expect to see each key- position combination 3,000 times. Enough data to determine the best possible key-position combination. “Lock-In” that key. Repeat, simulating only the remaining 29 keys. Continue until entire keyboard populated.

Results Outperformed QWERTY by 33.3%. Outperformed Dvorak by 6.2%.

Conclusions Our method was successful. While DSK is a quantifiable improvement over QWERTY, our model is more efficient than both. Extensions: Software’s robustness allows for keyboards customized to users or industries.

Naming MNT RSH = Mt. Rushmore