Putnam, Robert F; Kincaid, Donald
2015-05-01
Horner and Sugai (2015) recently wrote a manuscript providing an overview of school-wide positive behavioral interventions and supports (PBIS) and why it is an example of applied behavior analysis at the scale of social importance. This paper will describe why school-wide PBIS is important to behavior analysts, how it helps promote applied behavior analysis in schools and other organizations, and how behavior analysts can use this framework to assist them in the promotion and implementation of applied behavior analysis at both at the school and organizational level, as well as, the classroom and individual level.
The Case for Licensure of Applied Behavior Analysts
Dorsey, Michael F; Weinberg, Michael; Zane, Thomas; Guidi, Megan M
2009-01-01
The evolution of the field of applied behavior analysis to a practice-oriented profession has created the need to ensure that the consumers of these services are adequately protected. We review the limitations of the current board certification process and present a rationale for the establishment of licensing standards for applied behavior analysts on a state-by-state basis. Recommendations for securing the passage of a licensure bill also are discussed. PMID:22477697
Team Collaboration: The Use of Behavior Principles for Serving Students with ASD
ERIC Educational Resources Information Center
Donaldson, Amy L.; Stahmer, Aubyn C.
2014-01-01
Purpose: Speech-language pathologists (SLPs) and behavior analysts are key members of school-based teams that serve children with autism spectrum disorders (ASD). Behavior analysts approach assessment and intervention through the lens of applied behavior analysis (ABA). ABA-based interventions have been found effective for targeting skills across…
Science, Skepticism, and Applied Behavior Analysis
Normand, Matthew P
2008-01-01
Pseudoscientific claims concerning medical and psychological treatments of all varieties are commonplace. As behavior analysts, a sound skeptical approach to our science and practice is essential. The present paper offers an overview of science and skepticism and discusses the relationship of skepticism to behavior analysis, with an emphasis on the types of issues concerning behavior analysts in practice. PMID:22477687
Moving Forward: Positive Behavior Support and Applied Behavior Analysis
ERIC Educational Resources Information Center
Tincani, Matt
2007-01-01
A controversy has emerged about the relationship between positive behavior support and applied behavior analysis. Some behavior analysts suggest that positive behavior support and applied behavior analysis are the same (e.g., Carr & Sidener, 2002). Others argue that positive behavior support is harmful to applied behavior analysis (e.g., Johnston,…
Don't Wag the Dog: Extending the Reach of Applied Behavior Analysis
Normand, Matthew P.; Kohn, Carolynn S.
2013-01-01
We argue that the field of behavior analysis would be best served if behavior analysts worked to extend the reach of behavioral services into a more diverse range of settings and with more varied populations, with an emphasis on the establishment of new career opportunities for graduating students. This is not a new proposal, but it is a tall order; it is not difficult to see why many would choose a surer route to gainful employment. Currently, the most fruitful career path for behavior analysts in practice is in the area of autism and developmental disabilities. For the continued growth of the field of behavior analysis, however, it is important to foster new career opportunities for those trained as behavior analysts. Toward this end, we identify several fields that seem well suited to behavior analysts and summarize the training requirements and likely professional outcomes for behavior analysts who pursue education and certification in these fields. These fields require relatively little additional formal training in the hopes of minimizing the response effort necessary for individuals who have already completed a rigorous program of graduate study in behavior analysis. PMID:25729134
Applied Behavior Analysis and Statistical Process Control?
ERIC Educational Resources Information Center
Hopkins, B. L.
1995-01-01
Incorporating statistical process control (SPC) methods into applied behavior analysis is discussed. It is claimed that SPC methods would likely reduce applied behavior analysts' intimate contacts with problems and would likely yield poor treatment and research decisions. Cases and data presented by Pfadt and Wheeler (1995) are cited as examples.…
Opportunities for Applied Behavior Analysis in the Total Quality Movement.
ERIC Educational Resources Information Center
Redmon, William K.
1992-01-01
This paper identifies critical components of recent organizational quality improvement programs and specifies how applied behavior analysis can contribute to quality technology. Statistical Process Control and Total Quality Management approaches are compared, and behavior analysts are urged to build their research base and market behavior change…
Udell, Monique A.R; Wynne, C.D.L
2008-01-01
Dogs likely were the first animals to be domesticated and as such have shared a common environment with humans for over ten thousand years. Only recently, however, has this species' behavior been subject to scientific scrutiny. Most of this work has been inspired by research in human cognitive psychology and suggests that in many ways dogs are more human-like than any other species, including nonhuman primates. Behavior analysts should add their expertise to the study of dog behavior, both to add objective behavioral analyses of experimental data and to effectively integrate this new knowledge into applied work with dogs. PMID:18422021
Holtyn, August F; Jarvis, Brantley P; Silverman, Kenneth
2017-01-01
Poverty is a pervasive risk factor underlying poor health. Many interventions that have sought to reduce health disparities associated with poverty have focused on improving health-related behaviors of low-income adults. Poverty itself could be targeted to improve health, but this approach would require programs that can consistently move poor individuals out of poverty. Governments and other organizations in the United States have tested a diverse range of antipoverty programs, generally on a large scale and in conjunction with welfare reform initiatives. This paper reviews antipoverty programs that used financial incentives to promote education and employment among welfare recipients and other low-income adults. The incentive-based, antipoverty programs had small or no effects on the target behaviors; they were implemented on large scales from the outset, without systematic development and evaluation of their components; and they did not apply principles of operant conditioning that have been shown to determine the effectiveness of incentive or reinforcement interventions. By applying basic principles of operant conditioning, behavior analysts could help address poverty and improve health through development of effective antipoverty programs. This paper describes a potential framework for a behavior-analytic antipoverty program, with the goal of illustrating that behavior analysts could be uniquely suited to make substantial contributions to the war on poverty. © 2017 Society for the Experimental Analysis of Behavior.
Birds of a Feather: Applied Behavior Analysis and Quality of Life
ERIC Educational Resources Information Center
Gambrill, Eileen
2013-01-01
Applied behavior analysts have been helping people to enhance the quality of their lives for decades. Its characteristics as described by Baer, Wolf, and Risley continue to guide efforts to help clients and their significant others. Yet, this knowledge often languishes unused and unappreciated. Distortions and misrepresentations of applied…
The Licensing of Behavior Analysts: Protecting the Profession and the Public
ERIC Educational Resources Information Center
Hassert, Derrick L.; Kelly, Amanda N.; Pritchard, Joshua K.; Cautilli, Joseph D.
2008-01-01
Applied behavior analysis is a hybrid tradition with roots in many mental health disciplines. Even with these diverse origins, the professional practice of behavior analysis remains distinct and identifiable. Given these factors the professional practice special interest group (SIG) for the Association for Behavior Analysis International has…
ERIC Educational Resources Information Center
Cihon, Traci M.; Cihon, Joseph H.; Bedient, Guy M.
2016-01-01
The technical language of behavior analysis is arguably necessary to share ideas and research with precision among each other. However, it can hinder effective implementation of behavior analytic techniques when it prevents clear communication between the supervising behavior analyst and behavior technicians. The present paper provides a case…
ABA and PBS: The Dangers in Creating Artificial Dichotomies in Behavioral Intervention
ERIC Educational Resources Information Center
Weiss, Mary Jane; DelPizzo-Cheng, Eliza; LaRue, Robert H.; Sloman, Kimberly
2009-01-01
In recent years, there has been a great deal of controversy regarding the definition and independence of Positive Behavioral Supports (PBS) within the context of behavioral intervention. Specifically, behavior analysts have argued over whether PBS is subsumed within Applied Behavior Analysis (ABA) or whether it can be considered a separate…
Holburn, Steve
1997-01-01
After a slow start, the popularity of applied behavior analysis for people with severe behavior problems peaked in the 1970s and was then battered down by the effects of methodological behaviorism, the aversives controversy, overregulation, and the inherent limitations of congregate living. Despite the ethical, technical, and conceptual advancements in behavior analysis, many people with challenging behavior live in futile environments in which the behavior analyst can only tinker. A radically behavioristic approach has become available that has the power to change these conditions, to restore the reciprocity necessary for new learning, and to bring residential behavior analysts more in contact with the contingencies of helping and teaching. The approach is consistent with alternatives that behaviorists have suggested for years to improve the image and effectiveness of applied behavior analysis, although it will take the behaviorist far from the usual patterns of practice. Finally, the approach promotes its own survival by promoting access to interlocking organizational contingencies, but its antithetical nature presents many conceptual and practical challenges to agency adoption. PMID:22478282
Holtyn, August F.; Jarvis, Brantley P.; Silverman, Kenneth
2017-01-01
Poverty is a pervasive risk factor underlying poor health. Many interventions that have sought to reduce health disparities associated with poverty have focused on improving health-related behaviors of low-income adults. Poverty itself could be targeted to improve health, but this approach would require programs that can consistently move poor individuals out of poverty. Governments and other organizations in the United States have tested a diverse range of antipoverty programs, generally on a large scale and in conjunction with welfare reform initiatives. This paper reviews antipoverty programs that used financial incentives to promote education and employment among welfare recipients and other low-income adults. The incentive-based, antipoverty programs had small or no effects on the target behaviors; they were implemented on large scales from the outset, without systematic development and evaluation of their components; and they did not apply principles of operant conditioning that have been shown to determine the effectiveness of incentive or reinforcement interventions. By applying basic principles of operant conditioning, behavior analysts could help address poverty and improve health through development of effective antipoverty programs. This paper describes a potential framework for a behavior-analytic antipoverty program, with the goal of illustrating that behavior analysts could be uniquely suited to make substantial contributions to the war on poverty. PMID:28078664
A Survey of Functional Behavior Assessment Methods Used by Behavior Analysts in Practice
ERIC Educational Resources Information Center
Oliver, Anthony C.; Pratt, Leigh A.; Normand, Matthew P.
2015-01-01
To gather information about the functional behavior assessment (FBA) methods behavior analysts use in practice, we sent a web-based survey to 12,431 behavior analysts certified by the Behavior Analyst Certification Board. Ultimately, 724 surveys were returned, with the results suggesting that most respondents regularly use FBA methods, especially…
Improving Generalization of Academic Skills: Commentary on the Special Issue
ERIC Educational Resources Information Center
Skinner, Christopher H.; Daly, Edward J., III
2010-01-01
Behavior analysts have long been interested in developing and promoting the use of effective generalization strategies for behavioral interventions. Perhaps because research on academic performance has lagged behind in the field of applied behavior analysis, far less research on this topic has been conducted for academic performance problems. The…
Trends in Women's Participation at the Meetings of the Association for Behavior Analysis: 1975–2005
Simon, Jennifer L; Morris, Edward K; Smith, Nathaniel G
2007-01-01
We examined women's participation, relative to men's, at the annual meetings of the Association for Behavior Analysis (ABA) between 1975 and 2005. Among our findings are upward trends in female presenters across formats (e.g., posters), types of authorship (e.g., first authors), and specialty areas (e.g., autism). Where women have attained parity, however, they are still often underrepresented, given their percentage of membership. Women also participate less than men as sole and invited authors and discussants and in the domains of basic research and conceptual analysis, but participate more than men in the applied domain. Data from the Journal of the Experimental Analysis of Behavior and the Journal of Applied Behavior Analysis show parallel but delayed trends toward parity in basic and applied research, whereas data from The Behavior Analyst show only modest gains in the conceptual domain. We discuss the gender disparities in ABA's more prestigious categories of participation (e.g., invited addresses) and across its content domains, as well as in science in general, and the role of social and cultural factors in producing the disparities and how behavior analysts might aid in correcting them. PMID:22478496
Adlerian psychology as an intuitive operant system.
Pratt, A B
1985-01-01
Traditional accounts of the Individual Psychology of Alfred Adler tend to sentimentalize his system and obscure its functional flavor. Six basic Adlerian positions on human behavior, including Rudolf Dreikurs' "four goals of misbehavior," are interpreted as a primitive statement of operant principles. Applied techniques long used by Individual Psychology practitioners strongly resemble interventions that applied behavior analysts have developed by more systematic means.
A critique of the usefulness of inferential statistics in applied behavior analysis
Hopkins, B. L.; Cole, Brian L.; Mason, Tina L.
1998-01-01
Researchers continue to recommend that applied behavior analysts use inferential statistics in making decisions about effects of independent variables on dependent variables. In many other approaches to behavioral science, inferential statistics are the primary means for deciding the importance of effects. Several possible uses of inferential statistics are considered. Rather than being an objective means for making decisions about effects, as is often claimed, inferential statistics are shown to be subjective. It is argued that the use of inferential statistics adds nothing to the complex and admittedly subjective nonstatistical methods that are often employed in applied behavior analysis. Attacks on inferential statistics that are being made, perhaps with increasing frequency, by those who are not behavior analysts, are discussed. These attackers are calling for banning the use of inferential statistics in research publications and commonly recommend that behavioral scientists should switch to using statistics aimed at interval estimation or the method of confidence intervals. Interval estimation is shown to be contrary to the fundamental assumption of behavior analysis that only individuals behave. It is recommended that authors who wish to publish the results of inferential statistics be asked to justify them as a means for helping us to identify any ways in which they may be useful. PMID:22478304
Niileksela, Christopher R.; Kaplan, Brent A.
2013-01-01
In recent years, behavioral economics has gained much attention in psychology and public policy. Despite increased interest and continued basic experimental studies, the application of behavioral economics to therapeutic settings remains relatively sparse. Using examples from both basic and applied studies, we provide an overview of the principles comprising behavioral economic perspectives and discuss implications for behavior analysts in practice. A call for further translational research is provided. PMID:25729506
ERIC Educational Resources Information Center
Behavior Analyst Today, 2010
2010-01-01
The use of Skinner's Verbal Behavior (VB) classification system has been increasingly applied to learners with autism. In this interview, several of the best known behavior analysts were asked to answer some key questions regarding this practice, the state of research regarding the advantages of this approach, and the confusion that exists…
Bring It to the Pitch: Combining Video and Movement Data to Enhance Team Sport Analysis.
Stein, Manuel; Janetzko, Halldor; Lamprecht, Andreas; Breitkreutz, Thorsten; Zimmermann, Philipp; Goldlucke, Bastian; Schreck, Tobias; Andrienko, Gennady; Grossniklaus, Michael; Keim, Daniel A
2018-01-01
Analysts in professional team sport regularly perform analysis to gain strategic and tactical insights into player and team behavior. Goals of team sport analysis regularly include identification of weaknesses of opposing teams, or assessing performance and improvement potential of a coached team. Current analysis workflows are typically based on the analysis of team videos. Also, analysts can rely on techniques from Information Visualization, to depict e.g., player or ball trajectories. However, video analysis is typically a time-consuming process, where the analyst needs to memorize and annotate scenes. In contrast, visualization typically relies on an abstract data model, often using abstract visual mappings, and is not directly linked to the observed movement context anymore. We propose a visual analytics system that tightly integrates team sport video recordings with abstract visualization of underlying trajectory data. We apply appropriate computer vision techniques to extract trajectory data from video input. Furthermore, we apply advanced trajectory and movement analysis techniques to derive relevant team sport analytic measures for region, event and player analysis in the case of soccer analysis. Our system seamlessly integrates video and visualization modalities, enabling analysts to draw on the advantages of both analysis forms. Several expert studies conducted with team sport analysts indicate the effectiveness of our integrated approach.
Case Studies in Applied Behavior Analysis for Students and Adults with Disabilities
ERIC Educational Resources Information Center
Storey, Keith; Haymes, Linda
2016-01-01
This book responds to a critical need for highly qualified personnel who will become exemplary professionals because of their advanced knowledge, skills, and experiences in working with students and adults that have varying disabilities, including Autism Spectrum Disorders (ASD). Since Board Certification for behavior analysts was introduced,…
The Token Economy for Children with Intellectual Disability and/or Autism: A Review
ERIC Educational Resources Information Center
Matson, Johnny L.; Boisjoli, Jessica A.
2009-01-01
One of the most important technologies of behavior modifiers and applied behavior analysts over the last 40 years has been the token economy. These procedures are useful in that they help provide a structured therapeutic environment, and mimic other naturally occurring reinforcement systems such as the use of money. Token economies, at least from…
TRICARE Applied Behavior Analysis (ABA) Benefit
Maglione, Margaret; Kadiyala, Srikanth; Kress, Amii; Hastings, Jaime L.; O'Hanlon, Claire E.
2017-01-01
Abstract This study compared the Applied Behavior Analysis (ABA) benefit provided by TRICARE as an early intervention for autism spectrum disorder with similar benefits in Medicaid and commercial health insurance plans. The sponsor, the Office of the Under Secretary of Defense for Personnel and Readiness, was particularly interested in how a proposed TRICARE reimbursement rate decrease from $125 per hour to $68 per hour for ABA services performed by a Board Certified Behavior Analyst compared with reimbursement rates (defined as third-party payment to the service provider) in Medicaid and commercial health insurance plans. Information on ABA coverage in state Medicaid programs was collected from Medicaid state waiver databases; subsequently, Medicaid provider reimbursement data were collected from state Medicaid fee schedules. Applied Behavior Analysis provider reimbursement in the commercial health insurance system was estimated using Truven Health MarketScan® data. A weighted mean U.S. reimbursement rate was calculated for several services using cross-state information on the number of children diagnosed with autism spectrum disorder. Locations of potential provider shortages were also identified. Medicaid and commercial insurance reimbursement rates varied considerably across the United States. This project concluded that the proposed $68-per-hour reimbursement rate for services provided by a board certified analyst was more than 25 percent below the U.S. mean. PMID:28845348
ERIC Educational Resources Information Center
Forte, Solandy
2017-01-01
It is often necessary for the behavior analyst practitioner to work across a variety of settings, including home, school, and community, in which it is common practice for those practitioners to provide training to caregivers and direct-care staff, who may have limited knowledge and experience within the field of applied behavior analysis. A…
Kirby, K C; Bickel, W K
1995-01-01
We review four articles from JEAB's March 1994 issue celebrating the contributions of Joseph V. Brady. These articles have implications for studying private events and for studying multiple operants. We suggest that regularly including self-reports about private events in behavioral pharmacological research has resulted in an accumulated knowledge that has facilitated examination of interesting relations among self-reports, environmental factors, and other observable behaviors. Methodological lessons that behavioral pharmacologists have learned regarding the study of multiple operants are also relayed. We provide examples of how these lessons could be useful to applied behavior analysts studying nonpharmacological issues. PMID:7706145
Examining Effects of Technology Level and Reinforcer Arrangements on Preference and Efficacy
ERIC Educational Resources Information Center
Hoffmann, Audrey N.
2017-01-01
Understanding dimensions that influence reinforcement is important for applied behavior analysts. Preference, and reinforcer effectiveness, may change depending upon several dimensions of reinforcement. Two influential dimensions that may influence preference and reinforcer efficacy are response-reinforcer arrangements and stimulus type. Many…
Artman-Meeker, Kathleen; Rosenberg, Nancy; Badgett, Natalie; Yang, Xueyan; Penney, Ashley
2017-09-01
Behavior analysts play an important role in supporting the behavior and learning of young children with disabilities in natural settings. However, there is very little research related specifically to developing the skills and competencies needed by pre-service behavior analysts. This study examined the effects of "bug-in-ear" (BIE) coaching on pre-service behavior analysts' implementation of functional communication training with pre-school children with autism in their classrooms. BIE coaching was associated with increases in the rate of functional communication training trials each intern initiated per session and in the fidelity with which interns implemented functional communication training. Adults created more intentional opportunities for children to communicate, and adults provided more systematic instruction around those opportunities.
A survey of functional behavior assessment methods used by behavior analysts in practice.
Oliver, Anthony C; Pratt, Leigh A; Normand, Matthew P
2015-12-01
To gather information about the functional behavior assessment (FBA) methods behavior analysts use in practice, we sent a web-based survey to 12,431 behavior analysts certified by the Behavior Analyst Certification Board. Ultimately, 724 surveys were returned, with the results suggesting that most respondents regularly use FBA methods, especially descriptive assessments. Moreover, the data suggest that the majority of students are being formally taught about the various FBA methods and that educators are emphasizing the range of FBA methods in their teaching. However, less than half of the respondents reported using functional analyses in practice, although many considered descriptive assessments and functional analyses to be the most useful FBA methods. Most respondents reported using informant and descriptive assessments more frequently than functional analyses, and a majority of respondents indicated that they "never" or "almost never" used functional analyses to identify the function of behavior. © Society for the Experimental Analysis of Behavior.
Allen, K D; Warzak, W J
2000-01-01
Applied behavior analysts have developed many effective interventions for common childhood problems and have repeatedly demonstrated that childhood behavior responds to properly managed contingencies. The success of these interventions is dependent upon their basic effectiveness, as demonstrated in the literature, their precise delivery by the clinician to the parent, and adherence to or consistent implementation of the intervention. Unfortunately, arranging the consistent implementation of effective parenting strategies is a significant challenge for behavior analysts who work in homes, schools, and outpatient or primary care clinics. Much has been done to address issues of adherence or implementation in the clinic, but relatively little has been done to increase our understanding of the contingencies that affect parental adherence beyond the supervised clinic environment. An analysis of the contingencies that strengthen or weaken adherence might suggest strategies to improve implementation outside the clinic setting. What follows is an analysis of the variables associated with adherence by parents to recommendations designed to solve common childhood problems. PMID:11051583
ERIC Educational Resources Information Center
Carr, James E.; Briggs, Adam M.
2011-01-01
An annotated bibliography that summarizes the "On Terms" articles on behavior-analytic terminology from "The Behavior Analyst" is provided. Thirty-five articles published between 1979 and 2010 were identified, annotated, and classified using common behavior analysis course content frameworks. (Contains 1 table.)
Austin, Jennifer L; Marshall, Jason A
2008-01-01
The field of applied behavior analysis has suffered from a relative dearth of user-friendly books appropriate to a lay audience. Bailey and Burch's book fills this niche with a work that is both entertaining and informative. The book is reviewed in terms of the strengths and limitations of its content, as well as in the context of the importance of effective marketing of behavior analysis.
ERIC Educational Resources Information Center
Smith, Tristram
2012-01-01
The extraordinary success of behavior-analytic interventions for individuals with autism spectrum disorder (ASD) has fueled the rapid growth of behavior analysis as a profession. One reason for this success is that for many years behavior analysts were virtually alone in conducting programmatic ASD intervention research. However, that era has…
The discounting model selector: Statistical software for delay discounting applications.
Gilroy, Shawn P; Franck, Christopher T; Hantula, Donald A
2017-05-01
Original, open-source computer software was developed and validated against established delay discounting methods in the literature. The software executed approximate Bayesian model selection methods from user-supplied temporal discounting data and computed the effective delay 50 (ED50) from the best performing model. Software was custom-designed to enable behavior analysts to conveniently apply recent statistical methods to temporal discounting data with the aid of a graphical user interface (GUI). The results of independent validation of the approximate Bayesian model selection methods indicated that the program provided results identical to that of the original source paper and its methods. Monte Carlo simulation (n = 50,000) confirmed that true model was selected most often in each setting. Simulation code and data for this study were posted to an online repository for use by other researchers. The model selection approach was applied to three existing delay discounting data sets from the literature in addition to the data from the source paper. Comparisons of model selected ED50 were consistent with traditional indices of discounting. Conceptual issues related to the development and use of computer software by behavior analysts and the opportunities afforded by free and open-sourced software are discussed and a review of possible expansions of this software are provided. © 2017 Society for the Experimental Analysis of Behavior.
What Is Evidence-Based Behavior Analysis?
Smith, Tristram
2013-01-01
Although applied behavior analysts often say they engage in evidence-based practice, they express differing views on what constitutes “evidence” and “practice.” This article describes a practice as a service offered by a provider to help solve a problem presented by a consumer. Solving most problems (e.g., increasing or decreasing a behavior and maintaining this change) requires multiple intervention procedures (i.e., a package). Single-subject studies are invaluable in investigating individual procedures, but researchers still need to integrate the procedures into a package. The package must be standardized enough for independent providers to replicate yet flexible enough to allow individualization; intervention manuals are the primary technology for achieving this balance. To test whether the package is effective in solving consumers' problems, researchers must evaluate outcomes of the package as a whole, usually in group studies such as randomized controlled trials. From this perspective, establishing an evidence-based practice involves more than analyzing the effects of discrete intervention procedures on behavior; it requires synthesizing information so as to offer thorough solutions to problems. Recognizing the need for synthesis offers behavior analysts many promising opportunities to build on their existing research to increase the quality and quantity of evidence-based practices. PMID:25729130
The Divergent Paths of Behavior Analysis and Psychology: Vive la Différence!
Thyer, Bruce A
2015-05-01
Twenty years ago I suggested that behavior analysts could effect a quiet and covert takeover of the American Psychological Association (APA). I gave as precedents the operation of similar initiatives in the nineteenth and twentieth centuries, the Darwinian-inspired X-Club, and the psychoanalytically-oriented Secret Ring. Though a conscientious program of working within established APA bylaws and rules, behavior analysts could ensure that behavior analysts were nominated for every significant elective position within the APA, and move to get their colleagues placed in appointive positions, such as journal editorships, review boards, and major committees. This would be one approach to remake psychology along behavioral lines, which was an early ambition of B. F. Skinner. The community of behavior analysts ignored my suggestion, and instead pursued the path of creating an independent discipline of practitioners, one with its own degree-granting programs, conventions, journals, and legal regulation. This effort has been immensely successful, although much critical work remains to be done. In retrospect, I was wrong to suggest changing psychology from within, and I have been delighted to witness the emergence of our new and independent field.
Tuomisto, Martti T; Parkkinen, Lauri
2012-05-01
Verbal behavior, as in the use of terms, is an important part of scientific activity in general and behavior analysis in particular. Many glossaries and dictionaries of behavior analysis have been published in English, but few in any other language. Here we review the area of behavior analytic terminology, its translations, and development in languages other than English. As an example, we use our own mother tongue, Finnish, which provides a suitable example of the process of translation and development of behavior analytic terminology, because it differs from Indo-European languages and entails specific advantages and challenges in the translation process. We have published three editions of a general dictionary of behavior analysis including 801 terms relevant to the experimental analysis of behavior and applied behavior analysis and one edition of a dictionary of applied and clinical behavior analysis containing 280 terms. Because this work has been important to us, we hope this review will encourage similar work by behavior analysts in other countries whose native language is not English. Behavior analysis as an advanced science deserves widespread international dissemination and proper translations are essential to that goal.
Tuomisto, Martti T; Parkkinen, Lauri
2012-01-01
Verbal behavior, as in the use of terms, is an important part of scientific activity in general and behavior analysis in particular. Many glossaries and dictionaries of behavior analysis have been published in English, but few in any other language. Here we review the area of behavior analytic terminology, its translations, and development in languages other than English. As an example, we use our own mother tongue, Finnish, which provides a suitable example of the process of translation and development of behavior analytic terminology, because it differs from Indo-European languages and entails specific advantages and challenges in the translation process. We have published three editions of a general dictionary of behavior analysis including 801 terms relevant to the experimental analysis of behavior and applied behavior analysis and one edition of a dictionary of applied and clinical behavior analysis containing 280 terms. Because this work has been important to us, we hope this review will encourage similar work by behavior analysts in other countries whose native language is not English. Behavior analysis as an advanced science deserves widespread international dissemination and proper translations are essential to that goal. PMID:22693363
Public information, dissemination, and behavior analysis
Morris, Edward K.
1985-01-01
Behavior analysts have become increasingly concerned about inaccuracies and misconceptions in the public, educational, and professional information portraying their activities, but have done little to correct these views. The present paper has two purposes in this regard. First, the paper describes some of the conditions that have given rise to these concerns. Second, and more important, the paper surveys various procedures and programs for the dissemination of public information that may correct inaccuracies and misconceptions. Special consideration is also given to issues involving (a) the assessment of the problem, (b) the content and means of dissemination, (c) the possible contributions of behavior analysts to current misunderstandings, and (d) relationships between behavior analysts and the media. The dissemination of accurate and unbiased information constitutes an important new undertaking for behavior analysis. The future of the field may depend in part on such activity. PMID:22478623
Memory as behavior: The importance of acquisition and remembering strategies
Delaney, Peter F.; Austin, John
1998-01-01
The study of memory has traditionally been the province of cognitive psychology, which has postulated different memory systems that store memory traces to explain remembering. Behavioral psychologists have been unsuccessful at empirically identifying the behavior that occurs during remembering because so much of it occurs rapidly and covertly. In addition, behavior analysts have generally been disinterested in studying transient phenomena such as memory. As a result, the cognitive interpretation has been the only one that has made and tested useful predictions. Recent experimental evidence acquired while having participants “think aloud” suggests that a behavioral approach to memory may provide a superior account of memory performance and allow applied scientists to observe and modify memory-related behavior with well-known applied behavior-analytic techniques. We review evidence supporting and extending the interpretation of memory provided by Palmer (1991), who described memory in terms of precurrent behavior that occurs at the time of acquisition in preparation for problem solving that occurs at the time of remembering. ImagesFig. 1 PMID:22477129
Behavior analysis and the study of human aging
Derenne, Adam; Baron, Alan
2002-01-01
As the population of older adults continues to rise, psychologists along with other behavioral and social scientists have shown increasing interest in this age group. Although behavior analysts have contributed to research on aging, the focus has been on applications that remedy age-related deficits, rather than a concern with aging as a developmental process. In particular, there has been little interest in the central theoretical questions that have guided gerontologists. How does behavior change with advancing years, and what are the sources of those changes? We consider the possibility that this neglect reflects the long-standing commitment of behavior analysts to variables that can be experimentally manipulated, a requirement that excludes the key variable—age itself. We review the options available to researchers and present strategies that minimize deviations from the traditional features of behavior-analytic designs. Our comments are predicated on the view that aging issues within contemporary society are far too important for behavior analysts to ignore. PMID:22478383
75 FR 20385 - Amended Certification Regarding Eligibility To Apply for Worker Adjustment Assistance
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-19
..., Inconen, CTS, Hi-Tec, Woods, Ciber, Kelly Services, Analysts International Corp, Comsys, Filter LLC..., Ciber, Kelly Services, Analysts International Corp, Comsys, Filter LLC, Excell, Entegee, Chipton- Ross..., Kelly Services, Analysts International Corp, Comsys, Filter LLC, Excell, Entegee, Chipton- Ross, Ian...
The Use of Object-Oriented Analysis Methods in Surety Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craft, Richard L.; Funkhouser, Donald R.; Wyss, Gregory D.
1999-05-01
Object-oriented analysis methods have been used in the computer science arena for a number of years to model the behavior of computer-based systems. This report documents how such methods can be applied to surety analysis. By embodying the causality and behavior of a system in a common object-oriented analysis model, surety analysts can make the assumptions that underlie their models explicit and thus better communicate with system designers. Furthermore, given minor extensions to traditional object-oriented analysis methods, it is possible to automatically derive a wide variety of traditional risk and reliability analysis methods from a single common object model. Automaticmore » model extraction helps ensure consistency among analyses and enables the surety analyst to examine a system from a wider variety of viewpoints in a shorter period of time. Thus it provides a deeper understanding of a system's behaviors and surety requirements. This report documents the underlying philosophy behind the common object model representation, the methods by which such common object models can be constructed, and the rules required to interrogate the common object model for derivation of traditional risk and reliability analysis models. The methodology is demonstrated in an extensive example problem.« less
Friman, Patrick C
2010-01-01
At last, the field of applied behavior analysis has a beautifully crafted, true textbook that can proudly stand cover to cover and spine to spine beside any of the expensive, imposing, and ornately designed textbooks used by college instructors who teach courses in conventional areas of education or psychology. In this review, I fully laud this development, credit Cooper, Heron, and Heward for making it happen, argue that it signifies a checkered flag for students and professors, and recommend the book for classes in applied behavior analysis everywhere. Subsequently, I review its chapters, each of which could easily stand alone as publications in their own right. Finally, I supply a cautionary note, a yellow flag to accompany the well-earned checkered flag, by pointing out that, as is true with all general textbooks on applied behavior analysis, a major portion of the references involves research on persons who occupy only a tail of the normal distribution. To attain the mainstream role Skinner envisioned and most (if not all) behavior analysts desire, the field will have to increase its focus on persons who reside under the dome of that distribution.
ERIC Educational Resources Information Center
Menendez, Anthony L.; Mayton, Michael R.; Yurick, Amanda L.
2017-01-01
When rural school districts employ Board Certified Behavior Analysts (BCBAs) to assist in meeting the needs of students with disabilities, it is important that they be aware of the ethical and professional guidelines to which BCBAs are required to adhere. This article describes the role of these guidelines within the practice of BCBAs and presents…
Interpretation and the psychic future.
Cooper, S H
1997-08-01
The author applies the analyst's multi-faceted awareness of his or her view of the patient's psychic future to analytic process. Loewald's (1960) interest in the way in which the analyst anticipates the future of the patient was linked to his epistemological assumptions about the analyst's superior objectivity and maturity relative to the patient. The elucidation of the authority of the analyst (e.g. Hoffman, 1991, 1994) allows us to begin to disentangle the analyst's view of the patient's psychic future from some of these epistemological assumptions. Clinical illustrations attempt to show how the analyst's awareness of this aspect of the interpretive process is often deconstructed over time and can help to understand aspects of resistance from both analyst and patient. This perspective may provide one more avenue for understanding our various modes of influence through interpretive process.
Behavior analysis and public policy
Fawcett, Stephen B.; Bernstein, Gail S.; Czyzewski, Mare J.; Greene, Brandon F.; Hannah, Gerald T.; Iwata, Brian A.; Jason, Leonard A.; Mathews, R. Mark; Morris, Edward K.; Otis-Wilborn, Amy; Seekins, Tom; Winett, Richard A.
1988-01-01
The Task Force on Public Policy was created to examine ways for behavior analysts to be more functional citizen scientists in the policymaking arena. This report informs readers about the contexts and processes of policymaking; and it outlines issues regarding the roles of behavior analysts in crating policy-relevant conceptual analyses, generating research data, and communicating policy-relevant information. We also discuss a possible role for the professional association in enhancing analysis, research, and advocacy on policies relevant to the public interest. PMID:22477991
Translating the covenant: The behavior analyst as ambassador and translator
Foxx, R. M.
1996-01-01
Behavior analysts should be sensitive to how others react to and interpret our language because it is inextricably related to our image. Our use of conceptual revision, with such terms as punishment, has created communicative confusion and hostility on the part of general and professional audiences we have attempted to influence. We must, therefore, adopt the role of ambassador and translator in the nonbehavioral world. A number of recommendations are offered for promoting, translating, and disseminating behavior analysis. PMID:22478256
Translating the covenant: The behavior analyst as ambassador and translator.
Foxx, R M
1996-01-01
Behavior analysts should be sensitive to how others react to and interpret our language because it is inextricably related to our image. Our use of conceptual revision, with such terms as punishment, has created communicative confusion and hostility on the part of general and professional audiences we have attempted to influence. We must, therefore, adopt the role of ambassador and translator in the nonbehavioral world. A number of recommendations are offered for promoting, translating, and disseminating behavior analysis.
An Exploratory Analysis of Economic Factors in the Navy Total Force Strength Model (NTFSM)
2015-12-01
NTFSM is still in the testing phase and its overall behavior is largely unknown. In particular, the analysts that NTFSM was designed to help are...NTFSM is still in the testing phase and its overall behavior is largely unknown. In particular, the analysts that NTFSM was designed to help are...7 B. NTFSM VERIFICATION AND TESTING ......................................... 8 C
Gamification: The Intersection between Behavior Analysis and Game Design Technologies.
Morford, Zachary H; Witts, Benjamin N; Killingsworth, Kenneth J; Alavosius, Mark P
2014-05-01
Deterding et al. (Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, USA 15: 9-15, 2011) report a recent rise in popularity of video game inspired software designed to address issues in a variety of areas, including health, energy conservation, education, and business. These applications have been based on the concept of gamification, which involves a process by which nongame activities are designed to be more like a game. We provide examples of how gamification has been used to increase health-related behavior, energy consumption, academic performance, and other socially-significant behavior. We argue that behavior analytic research and practice stands to benefit from incorporating successful elements of game design. Lastly, we provide suggestions for behavior analysts regarding applied and basic research related to gamification.
Antecedent influences on behavior disorders.
Smith, R G; Iwata, B A
1997-01-01
The influence of antecedent events on behavior disorders has been relatively understudied by applied behavior analysts. This lack of research may be due to a focus on consequences as determinants of behavior and a historical disagreement on a conceptual framework for describing and interpreting antecedent variables. We suggest that antecedent influences can be described using terms derived from basic behavioral principles and that their functional properties can be adequately interpreted as discriminative and establishing operations. A set of studies on assessment and treatment of behavior disorders was selected for review based on their relevance to the topic of antecedent events. These studies were categorized as focusing on assessment of antecedent events, antecedent treatments for behavior disorders maintained by either positive or negative reinforcement, and special cases of antecedent events in behavior disorders. Some directions for future research on antecedent influences in the analysis and treatment of behavior disorders are discussed. PMID:9210312
Sundberg, Mark L.
1996-01-01
Savage-Rumbaugh et al.'s (1993) monograph describes a study that compared the language comprehension of an 8-year-old ape (a bonobo named Kanzi) with that of a normal 2-year-old human (Alia). The primary purpose of the research was to see if Kanzi could comprehend novel and compound spoken English commands without imitative prompts, contrived reinforcement contingencies, or explicit training procedures. As it turned out, Kanzi acquired a complex comprehension repertoire in a pattern similar to the human child's and even performed better than the human child in many cases. Although this review describes these empirical results favorably, it questions the authors' claim that the subjects learned the repertoire on their own, without reinforcement or training. A close examination of the subjects' histories and of the procedures, transcripts, and videos suggested that the training and testing procedures involved a number of independent variables and processes that were not discussed by the authors, including conditioned reinforcement and punishment, verbal prompts, stimulus control, establishing operations, and extinction. Nonetheless, the methodological and empirical contributions to ape and human language research are substantial and deserve behavior analysts' attention and support. Behavior analysts could contribute to this kind of research by applying the analytic and conceptual tools of behavior analysis in general and the concepts from Verbal Behavior (Skinner, 1957) in particular.
Do Sell-Side Stock Analysts Exhibit Escalation of Commitment?
Milkman, Katherine L.
2010-01-01
This paper presents evidence that when an analyst makes an out-of-consensus forecast of a company’s quarterly earnings that turns out to be incorrect, she escalates her commitment to maintaining an out-of-consensus view on the company. Relative to an analyst who was close to the consensus, the out-of-consensus analyst adjusts her forecasts for the current fiscal year’s earnings less in the direction of the quarterly earnings surprise. On average, this type of updating behavior reduces forecasting accuracy, so it does not seem to reflect superior private information. Further empirical results suggest that analysts do not have financial incentives to stand by extreme stock calls in the face of contradictory evidence. Managerial and financial market implications are discussed. PMID:21516220
Real-Time Visualization of Network Behaviors for Situational Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Best, Daniel M.; Bohn, Shawn J.; Love, Douglas V.
Plentiful, complex, and dynamic data make understanding the state of an enterprise network difficult. Although visualization can help analysts understand baseline behaviors in network traffic and identify off-normal events, visual analysis systems often do not scale well to operational data volumes (in the hundreds of millions to billions of transactions per day) nor to analysis of emergent trends in real-time data. We present a system that combines multiple, complementary visualization techniques coupled with in-stream analytics, behavioral modeling of network actors, and a high-throughput processing platform called MeDICi. This system provides situational understanding of real-time network activity to help analysts takemore » proactive response steps. We have developed these techniques using requirements gathered from the government users for which the tools are being developed. By linking multiple visualization tools to a streaming analytic pipeline, and designing each tool to support a particular kind of analysis (from high-level awareness to detailed investigation), analysts can understand the behavior of a network across multiple levels of abstraction.« less
Dynamics of analyst forecasts and emergence of complexity: Role of information disparity
Ahn, Kwangwon
2017-01-01
We report complex phenomena arising among financial analysts, who gather information and generate investment advice, and elucidate them with the help of a theoretical model. Understanding how analysts form their forecasts is important in better understanding the financial market. Carrying out big-data analysis of the analyst forecast data from I/B/E/S for nearly thirty years, we find skew distributions as evidence for emergence of complexity, and show how information asymmetry or disparity affects financial analysts’ forming their forecasts. Here regulations, information dissemination throughout a fiscal year, and interactions among financial analysts are regarded as the proxy for a lower level of information disparity. It is found that financial analysts with better access to information display contrasting behaviors: a few analysts become bolder and issue forecasts independent of other forecasts while the majority of analysts issue more accurate forecasts and flock to each other. Main body of our sample of optimistic forecasts fits a log-normal distribution, with the tail displaying a power law. Based on the Yule process, we propose a model for the dynamics of issuing forecasts, incorporating interactions between analysts. Explaining nicely empirical data on analyst forecasts, this provides an appealing instance of understanding social phenomena in the perspective of complex systems. PMID:28498831
An analysis of herding behavior in security analysts’ networks
NASA Astrophysics Data System (ADS)
Zhao, Zheng; Zhang, YongJie; Feng, Xu; Zhang, Wei
2014-11-01
In this paper, we build undirected weighted networks to study herding behavior among analysts and to analyze the characteristics and the structure of these networks. We then construct a new indicator based on the average degree of nodes and the average weighted clustering coefficient to research the various types of herding behavior. Our findings suggest that every industry has, to a certain degree, herding behavior among analysts. While there is obvious uninformed herding behavior in real estate and certain other industries, industries such as mining and nonferrous metals have informed herding behavior caused by analysts’ similar reactions to public information. Furthermore, we relate the two types of herding behavior to stock price and find that uninformed herding behavior has a positive effect on market prices, whereas informed herding behavior has a negative effect.
USING MICROSOFT OFFICE EXCEL® 2007 TO CONDUCT GENERALIZED MATCHING ANALYSES
Reed, Derek D
2009-01-01
The generalized matching equation is a robust and empirically supported means of analyzing relations between reinforcement and behavior. Unfortunately, no simple task analysis is available to behavior analysts interested in using the matching equation to evaluate data in clinical or applied settings. This technical article presents a task analysis for the use of Microsoft Excel to analyze and plot the generalized matching equation. Using a data-based case example and a step-by-step guide for completing the analysis, these instructions are intended to promote the use of quantitative analyses by researchers with little to no experience in quantitative analyses or the matching law. PMID:20514196
Using Microsoft Office Excel 2007 to conduct generalized matching analyses.
Reed, Derek D
2009-01-01
The generalized matching equation is a robust and empirically supported means of analyzing relations between reinforcement and behavior. Unfortunately, no simple task analysis is available to behavior analysts interested in using the matching equation to evaluate data in clinical or applied settings. This technical article presents a task analysis for the use of Microsoft Excel to analyze and plot the generalized matching equation. Using a data-based case example and a step-by-step guide for completing the analysis, these instructions are intended to promote the use of quantitative analyses by researchers with little to no experience in quantitative analyses or the matching law.
Thermal Hardware for the Thermal Analyst
NASA Technical Reports Server (NTRS)
Steinfeld, David
2015-01-01
The presentation will be given at the 26th Annual Thermal Fluids Analysis Workshop (TFAWS 2015) hosted by the Goddard Space Flight Center (GSFC) Thermal Engineering Branch (Code 545). NCTS 21070-1. Most Thermal analysts do not have a good background into the hardware which thermally controls the spacecraft they design. SINDA and Thermal Desktop models are nice, but knowing how this applies to the actual thermal hardware (heaters, thermostats, thermistors, MLI blanketing, optical coatings, etc...) is just as important. The course will delve into the thermal hardware and their application techniques on actual spacecraft. Knowledge of how thermal hardware is used and applied will make a thermal analyst a better engineer.
Poore, Joshua C; Forlines, Clifton L; Miller, Sarah M; Regan, John R; Irvine, John M
2014-12-01
The decision sciences are increasingly challenged to advance methods for modeling analysts, accounting for both analytic strengths and weaknesses, to improve inferences taken from increasingly large and complex sources of data. We examine whether psychometric measures-personality, cognitive style, motivated cognition-predict analytic performance and whether psychometric measures are competitive with aptitude measures (i.e., SAT scores) as analyst sample selection criteria. A heterogeneous, national sample of 927 participants completed an extensive battery of psychometric measures and aptitude tests and was asked 129 geopolitical forecasting questions over the course of 1 year. Factor analysis reveals four dimensions among psychometric measures; dimensions characterized by differently motivated "top-down" cognitive styles predicted distinctive patterns in aptitude and forecasting behavior. These dimensions were not better predictors of forecasting accuracy than aptitude measures. However, multiple regression and mediation analysis reveals that these dimensions influenced forecasting accuracy primarily through bias in forecasting confidence. We also found that these facets were competitive with aptitude tests as forecast sampling criteria designed to mitigate biases in forecasting confidence while maximizing accuracy. These findings inform the understanding of individual difference dimensions at the intersection of analytic aptitude and demonstrate that they wield predictive power in applied, analytic domains.
Forlines, Clifton L.; Miller, Sarah M.; Regan, John R.; Irvine, John M.
2014-01-01
The decision sciences are increasingly challenged to advance methods for modeling analysts, accounting for both analytic strengths and weaknesses, to improve inferences taken from increasingly large and complex sources of data. We examine whether psychometric measures—personality, cognitive style, motivated cognition—predict analytic performance and whether psychometric measures are competitive with aptitude measures (i.e., SAT scores) as analyst sample selection criteria. A heterogeneous, national sample of 927 participants completed an extensive battery of psychometric measures and aptitude tests and was asked 129 geopolitical forecasting questions over the course of 1 year. Factor analysis reveals four dimensions among psychometric measures; dimensions characterized by differently motivated “top-down” cognitive styles predicted distinctive patterns in aptitude and forecasting behavior. These dimensions were not better predictors of forecasting accuracy than aptitude measures. However, multiple regression and mediation analysis reveals that these dimensions influenced forecasting accuracy primarily through bias in forecasting confidence. We also found that these facets were competitive with aptitude tests as forecast sampling criteria designed to mitigate biases in forecasting confidence while maximizing accuracy. These findings inform the understanding of individual difference dimensions at the intersection of analytic aptitude and demonstrate that they wield predictive power in applied, analytic domains. PMID:25983670
Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.
Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun
2017-05-01
The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.
Values and the Scientific Culture of Behavior Analysis
Ruiz, Maria R; Roche, Bryan
2007-01-01
As scientists and practitioners, behavior analysts must make frequent decisions that affect many lives. Scientific principles have been our guide as we work to promote effective action across a broad spectrum of cultural practices. Yet scientific principles alone may not be sufficient to guide our decision making in cases with potentially conflicting outcomes. In such cases, values function as guides to work through ethical conflicts. We will examine two ethical systems, radical behaviorism and functional contextualism, from which to consider the role of values in behavior analysis, and discuss potential concerns. Finally, we propose philosophical pragmatism, focusing on John Dewey's notions of community and dialogue, as a tradition that can help behavior analysts to integrate talk about values and scientific practices in ethical decision making. PMID:22478484
Misconception and miseducation: Presentations of radical behaviorism in psychology textbooks
Todd, James T.; Morris, Edward K.
1983-01-01
Behavior analysts have recently expressed concern about what appear to be misrepresentations of behaviorism in psychology textbooks. This paper presents an analysis of currently used textbooks in the areas of introductory, social, cognitive, personality, and developmental psychology that confirms this. Topics on which behavior analysis is most often misrepresented relate to the role of animal learning research, environmentalism, the “empty organism,” language, and the overall utility of the approach. Because textbooks are often a major medium of interaction between the public and behaviorism, behavior analysts must work to correct these errors and to prevent possible negative consequences of widespread misunderstanding. Several potential solutions to these problems are presented that take into account current publishing practices and the monetary contingencies which support them. PMID:22478585
Behavior analysis and mechanism: One is not the other
Morris, Edward K.
1993-01-01
Behavior analysts have been called mechanists, and behavior analysis is said to be mechanistic; that is, they are claimed to be aligned with the philosophy of mechanism. What this means is analyzed by (a) examining standard and specialized dictionary and encyclopedia definitions and descriptions of mechanism and its cognates and (b) reviewing contemporary representations of the mechanistic worldview in the literature on the philosophy of psychology. Although the term mechanism and its cognates are sometimes an honorific (e.g., “natural science”), their standard meanings, usages, and functions in society, science, psychology, and philosophy do not aptly characterize the discipline. These terms mischaracterize how behavior analysts conceptualize (a) the behavior of their subjects and the individuals with whom they work and (b) their own behavior as scientists. Discussion is interwoven throughout about the nature of terms and definitions in science. PMID:22478129
Cost approach of health care entity intangible asset valuation.
Reilly, Robert F
2012-01-01
In the valuation synthesis and conclusion process, the analyst should consider the following question: Does the selected valuation approach(es) and method(s) accomplish the analyst's assignment? Also, does the selected valuation approach and method actually quantify the desired objective of the intangible asset analysis? The analyst should also consider if the selected valuation approach and method analyzes the appropriate bundle of legal rights. The analyst should consider if there were sufficient empirical data available to perform the selected valuation approach and method. The valuation synthesis should consider if there were sufficient data available to make the analyst comfortable with the value conclusion. The valuation analyst should consider if the selected approach and method will be understandable to the intended audience. In the valuation synthesis and conclusion, the analyst should also consider which approaches and methods deserve the greatest consideration with respect to the intangible asset's RUL. The intangible asset RUL is a consideration of each valuation approach. In the income approach, the RUL may affect the projection period for the intangible asset income subject to either yield capitalization or direct capitalization. In the cost approach, the RUL may affect the total amount of obsolescence, if any, from the estimate cost measure (that is, the intangible reproduction cost new or replacement cost new). In the market approach, the RUL may effect the selection, rejection, and/or adjustment of the comparable or guideline intangible asset sale and license transactional data. The experienced valuation analyst will use professional judgment to weight the various value indications to conclude a final intangible asset value, based on: The analyst's confidence in the quantity and quality of available data; The analyst's level of due diligence performed on that data; The relevance of the valuation method to the intangible asset life cycle stage and degree of marketability; and The degree of variation in the range of value indications. Valuation analysts value health care intangible assets for a number of reasons. In addition to regulatory compliance reasons, these reasons include various transaction, taxation, financing, litigation, accounting, bankruptcy, and planning purposes. The valuation analyst should consider all generally accepted intangible asset valuation approaches, methods, and procedures. Many valuation analysts are more familiar with market approach and income approach valuation methods. However, there are numerous instances when cost approach valuation methods are also applicable to the health care intangible asset valuation. This discussion summarized the analyst's procedures and considerations with regard to the cost approach. The cost approach is often applicable to the valuation of intangible assets in the health care industry. However, the cost approach is only applicable if the valuation analyst (1) appropriately considers all of the cost components and (2) appropriately identifies and quantifies all obsolescence allowances. Regardless of the health care intangible asset or the reason for the valuation, the analyst should be familiar with all generally accepted valuation approaches and methods. And, the valuation analyst should have a clear, convincing, and cogent rationale for (1) accepting each approach and method applied and (2) rejecting each approach and method not applied. That way, the valuation analyst will best achieve the purpose and objective of the health care intangible asset valuation.
Inserting Phase Change Lines into Microsoft Excel® Graphs.
Dubuque, Erick M
2015-10-01
Microsoft Excel® is a popular graphing tool used by behavior analysts to visually display data. However, this program is not always friendly to the graphing conventions used by behavior analysts. For example, adding phase change lines has typically been a cumbersome process involving the insertion of line objects that do not move when new data is added to a graph. The purpose of this article is to describe a novel way to add phase change lines that move when new data is added and when graphs are resized.
Citation Analysis and Discourse Analysis Revisited
ERIC Educational Resources Information Center
White, Howard D.
2004-01-01
John Swales's 1986 article "Citation analysis and discourse analysis" was written by a discourse analyst to introduce citation research from other fields, mainly sociology of science, to his own discipline. Here, I introduce applied linguists and discourse analysts to citation studies from information science, a complementary tradition not…
An Introduction to the Mission Risk Diagnostic for Incident Management Capabilities (MRD-IMC)
2014-05-01
objectives. Analysts applying the MRD- IMC evaluate a set of systemic risk factors (called drivers) to aggregate decision-making data and provide decision...function is in position to achieve its mission and objective(s) [Alberts 2012]. To accomplish this goal, analysts applying the MRD- IMC evaluate a...005 | 3 evaluation of IM processes and capabilities. The MRD- IMC comprises the following three core tasks: 1. Identify the mission and objective(s
Ask the Experts: How Can New Students Defend Behavior Analysis from Misunderstandings?
Becirevic, Amel
2014-10-01
The success of behavior analysis as a field depends on the successes of its students, researchers, practitioners, and advocates. A new generation of graduate students will ultimately speak on the behalf of the field. In order to further promote the field, students must not only learn about what behavior analysis is, but also about what behavior analysis is not. We must prepare ourselves to adequately defend behavior analysis from those who disseminate misperceptions and misunderstandings. As such, an electronic survey designed to glean some information on how behavior analysts would respond to various inaccuracies or misunderstandings of behavior analysis was distributed through behavior-analytic listservs and social media websites. Findings show that the majority of respondents indicate that any graduate student ought to correct the misunderstandings about the field. What do seasoned behavior analysts have to say about the majority opinion about the responsibilities of graduate students and what recommendations do they have for new graduate students who come across misunderstandings about behavior analysis?
KURTI, ALLISON N.; DALLERY, JESSE
2015-01-01
The use of mobile devices is growing worldwide in both industrialized and developing nations. Alongside the worldwide penetration of web-enabled devices, the leading causes of morbidity and mortality are increasingly modifiable lifestyle factors (e.g., improving one’s diet and exercising more). Behavior analysts have the opportunity to promote health by combining effective behavioral methods with technological advancements. The objectives of this paper are (1) to highlight the public health gains that may be achieved by integrating technology with a behavior analytic approach to developing interventions, and (2) to review some of the currently, under-examined issues related to merging technology and behavior analysis (enhancing sustainability, obtaining frequent measures of behavior, conducting component analyses, evaluating cost-effectiveness, incorporating behavior analysis in the creation of consumer-based applications, and reducing health disparities). Thorough consideration of these issues may inspire the development, implementation, and dissemination of innovative, efficacious interventions that substantially improve global public health. PMID:25774070
The Pentagon's Military Analyst Program
ERIC Educational Resources Information Center
Valeri, Andy
2014-01-01
This article provides an investigatory overview of the Pentagon's military analyst program, what it is, how it was implemented, and how it constitutes a form of propaganda. A technical analysis of the program is applied using the theoretical framework of the propaganda model first developed by Noam Chomsky and Edward S. Herman. Definitions…
Translational Research: It's Not 1960s Behavior Analysis
ERIC Educational Resources Information Center
Poling, Alan; Edwards, Timothy L.
2011-01-01
The authors find Critchfield's article ("Translational Contributions of the Experimental Analysis of Behavior," "The Behavior Analyst," v34, p3-17, 2011) scholarly, clear, and insightful. In it, Critchfield provides an excellent overview of translational research in behavior analysis and suggests several general strategies for increasing the…
Testing Cognitive Behavior With Emphasis on Analytical Propensity of Service Members
2012-04-01
TRADOC Pam 525-3-1, researchers such as Allen (2008), Hutchins et al. (2004; 2007), Fingar (2011), Krizan (1999), and Treverton and Gabbard (2008), among...Joint Military Intelligence College: Washington, DC, 2003. Treverton, G. F.; Gabbard , C. B. Assessing the Tradecraft of Intelligence Analysts. The...Treverton, G. F.; Gabbard , C. B. Assessing the Tradecraft of Intelligence Analysts. The RAND Corporation, National Security Research Division
Bridging Behavioral Assessment and Behavioral Intervention: Finding Your Inner Behavior Analyst
ERIC Educational Resources Information Center
Johnson, LeAnne D.; Monn, Emily
2015-01-01
The persistence of challenging behaviors for some children highlights a need and an opportunity to explore several key principles of behavioral intervention that are necessary for effective decision- making when more personalized interventions must be layered on top of high-quality universal supports. In the absence of expert support,…
Contingency Analysis of Caregiver Behavior: Implications for Parent Training and Future Directions
ERIC Educational Resources Information Center
Stocco, Corey S.; Thompson, Rachel H.
2015-01-01
Parent training is often a required component of effective treatment for a variety of common childhood problems. Although behavior analysts have developed several effective parent-training technologies, we know little about the contingencies that affect parent behavior. Child behavior is one source of control for parent behavior that likely…
Characteristics and Hypothesized Functions of Challenging Behavior in a Community-Based Sample
ERIC Educational Resources Information Center
Petursdottir, Anna Ingeborg; Esch, John W.; Sautter, Rachael A.; Stewart, Kelise K.
2010-01-01
An archival study was conducted to document (a) types of challenging behavior, and (b) functional assessment outcomes, for a sample of persons with developmental disabilities who were referred to community-practicing behavior analysts for assessment and treatment of challenging behavior. Functional assessment reports, prepared by 17 behavior…
Novick, Jack; Novick, Kerry Kelly
2012-01-01
D.W. Winnicott wrote, "One analyst cannot have enough cases to cover all contingencies..." (1958, p. 123). He was referring to the fact that any one analyst has a relatively small number of cases at any one time or even over a lifetime. He was talking then about termination, but his point applies to any issues. here we are grateful for detailed account of a case that offers to all of us additional experience of the successes and challenges of our work.
Using the living laboratory framework as a basis for understanding next-generation analyst work
NASA Astrophysics Data System (ADS)
McNeese, Michael D.; Mancuso, Vincent; McNeese, Nathan; Endsley, Tristan; Forster, Pete
2013-05-01
The preparation of next generation analyst work requires alternative levels of understanding and new methodological departures from the way current work transpires. Current work practices typically do not provide a comprehensive approach that emphasizes the role of and interplay between (a) cognition, (b) emergent activities in a shared situated context, and (c) collaborative teamwork. In turn, effective and efficient problem solving fails to take place, and practice is often composed of piecemeal, techno-centric tools that isolate analysts by providing rigid, limited levels of understanding of situation awareness. This coupled with the fact that many analyst activities are classified produces a challenging situation for researching such phenomena and designing and evaluating systems to support analyst cognition and teamwork. Through our work with cyber, image, and intelligence analysts we have realized that there is more required of researchers to study human-centered designs to provide for analyst's needs in a timely fashion. This paper identifies and describes how The Living Laboratory Framework can be utilized as a means to develop a comprehensive, human-centric, and problem-focused approach to next generation analyst work, design, and training. We explain how the framework is utilized for specific cases in various applied settings (e.g., crisis management analysis, image analysis, and cyber analysis) to demonstrate its value and power in addressing an area of utmost importance to our national security. Attributes of analyst work settings are delineated to suggest potential design affordances that could help improve cognitive activities and awareness. Finally, the paper puts forth a research agenda for the use of the framework for future work that will move the analyst profession in a viable manner to address the concerns identified.
Translational Behavior Analysis and Practical Benefits
ERIC Educational Resources Information Center
Pilgrim, Carol
2011-01-01
In his article, Critchfield ("Translational Contributions of the Experimental Analysis of Behavior," "The Behavior Analyst," v34, p3-17, 2011) summarizes a previous call (Mace & Critchfield, 2010) for basic scientists to reexamine the inspiration for their research and turn increasingly to translational approaches. Interestingly, rather than…
On Critchfield's Proposal: Student Concerns and Recommendations
ERIC Educational Resources Information Center
Bayles, Makenzie W.; Boutain, Ariana R.; Brandt, Julie A. Ackerlund; Call, Nikki; Dracobly, Joseph D.; Greer, Brian D.; Gureghian, Danielle L.; Harper, Amy M.; Merritt, Todd A.; Miller, Jonathan R.; Payne, Steven W.; Morris, Edward K.
2012-01-01
An issue of "The Behavior Analyst" contained an article by Critchfield (2011), entitled "Interesting Times: Practice, Science, and Professional Associations in Behavior Analysis," about a rift between the field's scientists and practitioners. Critchfield observed that the science and practice of behavior analysis are subject to different…
Frieder, Jessica E; Peterson, Stephanie M; Woodward, Judy; Crane, Jaelee; Garner, Marlane
2009-01-01
This paper describes a technically driven, collaborative approach to assessing the function of problem behavior using web-based technology. A case example is provided to illustrate the process used in this pilot project. A school team conducted a functional analysis with a child who demonstrated challenging behaviors in a preschool setting. Behavior analysts at a university setting provided the school team with initial workshop trainings, on-site visits, e-mail and phone communication, as well as live web-based feedback on functional analysis sessions. The school personnel implemented the functional analysis with high fidelity and scored the data reliably. Outcomes of the project suggest that there is great potential for collaboration via the use of web-based technologies for ongoing assessment and development of effective interventions. However, an empirical evaluation of this model should be conducted before wide-scale adoption is recommended.
Roger T. Kelleher, Behavior Analyst
ERIC Educational Resources Information Center
Branch, Marc N.
2006-01-01
Roger T. Kelleher, rightly known as one of the foremost contributors to behavioral pharmacology, also made many important contributions to the experimental analysis of behavior. He participated significantly in the development of the discipline, through both his research and his editorial contributions to this journal. This article summarizes his…
Developing Behavioral Fluency with Movement Cycles Using SAFMEDS
ERIC Educational Resources Information Center
Kubina, Richard M., Jr.; Yurich, Kirsten K. L.; Durica, Krina C.; Healy, Nora M.
2016-01-01
The Precision Teaching term "movement cycle" refers to a behavior with a clearly observable movement and a distinct beginning and end. The present experiment examined whether behavior analysts and special education teachers could become fluent identifying movement cycles. A frequency-building intervention called SAFMEDS, an acronym for…
Applied Counterfactual Reasoning
NASA Astrophysics Data System (ADS)
Hendrickson, Noel
This chapter addresses two goals: The development of a structured method to aid intelligence and security analysts in assessing counterfactuals, and forming a structured method to educate (future) analysts in counterfactual reasoning. In order to pursue these objectives, I offer here an analysis of the purposes, problems, parts, and principles of applied counterfactual reasoning. In particular, the ways in which antecedent scenarios are selected and the ways in which scenarios are developed constitute essential (albeit often neglected) aspects of counterfactual reasoning. Both must be addressed to apply counterfactual reasoning effectively. Naturally, further issues remain, but these should serve as a useful point of departure. They are the beginning of a path to more rigorous and relevant counterfactual reasoning in intelligence analysis and counterterrorism.
Classification of group behaviors in social media via social behavior grammars
NASA Astrophysics Data System (ADS)
Levchuk, Georgiy; Getoor, Lise; Smith, Marc
2014-06-01
The increasing use of online collaboration and information sharing in the last decade has resulted in explosion of criminal and anti-social activities in online communities. Detection of such behaviors are of interest to commercial enterprises who want to guard themselves from cyber criminals, and the military intelligence analysts who desire to detect and counteract cyberwars waged by adversarial states and organizations. The most challenging behaviors to detect are those involving multiple individuals who share actions and roles in the hostile activities and individually appear benign. To detect these behaviors, the theories of group behaviors and interactions must be developed. In this paper we describe our exploration of the data from collaborative social platform to categorize the behaviors of multiple individuals. We applied graph matching algorithms to explore consistent social interactions. Our research led us to a conclusion that complex collaborative behaviors can be modeled and detected using a concept of group behavior grammars, in a manner analogous to natural language processing. These grammars capture constraints on how people take on roles in virtual environments, form groups, and interact over time, providing the building blocks for scalable and accurate multi-entity interaction analysis and social behavior hypothesis testing.
Understanding Observational Learning: An Interbehavioral Approach
ERIC Educational Resources Information Center
Fryling, Mitch J.; Johnston, Cristin; Hayes, Linda J.
2011-01-01
Observational learning is an important area in the field of psychology and behavior science more generally. Given this, it is essential that behavior analysts articulate a sound theory of how behavior change occurs through observation. This paper begins with an overview of seminal research in the area of observational learning, followed by a…
Three Variations of Translational Research: Comments on Critchfield (2011)
ERIC Educational Resources Information Center
Vollmer, Timothy R.
2011-01-01
The author agrees with Critchfield's ("Translational Contributions of the Experimental Analysis of Behavior," "The Behavior Analyst," v34, p3-17, 2011) thesis (to paraphrase): Behavior analysis must adapt; we cannot simply will ourselves into greater social relevance. Critchfield focused on the survival of the basic research arm of behavior…
Behavior Analysts to the Front! A 15-Step Tutorial on Public Speaking.
Friman, Patrick C
2014-10-01
Mainstream prominence was Skinner's vision for behavior analysis. Unfortunately, it remains elusive, even as we approach the 110th anniversary of his birth. It can be achieved, however, and there are many routes. One that seems overlooked in many (most?) behavior analytic training programs is what I call the front of the room. The front of the room is a very powerful locus for influencing people. Mastering it can turn a commoner into a king; a middling man into a mayor; or a group of disorganized, dispirited people into an energized force marching into battle. The most powerful members of our species had their most memorable moments at the front of the room. If so much is available there, why is mastery of it in such short supply, not just in behavior analysts but in the population at large? In this paper, I address why, argue that the primary reason can be overcome, and supply 15 behaviorally based steps to take in pursuit of front of the room mastery.
2014-03-01
for OR Analysts Dr. Jim Morris Overview of Academic Research Opportunities for OR Analysts Dr. Daniel Behringer September 21, 2012 Prize Winners...In Operations Research: Experiences and Perspectives Dr. Jim Morris and Major Brady Vaira (USAF) November 30, 2012 How Does Industry Use OR to...X X Ms. Lynda Liptak Applied Research Associates Publishing With MORS X X X X X Dr. Jim Morris US Air Force Operations Research in
Some verbal behavior about verbal behavior
Salzinger, Kurt
2003-01-01
Beginning with behavior analysts' tendency to characterize verbal behavior as “mere” verbal behavior, the author reviews his own attempt to employ it to influence both his staff and policies of our government. He then describes its role in psychopathology, its effect on speakers in healing themselves and on engendering creativity. The paper ends by calling to our attention the role of verbal behavior in the construction of behavior analysis. PMID:22478393
Gabbard, Glen O; Ogden, Thomas H
2009-04-01
One has the opportunity and responsibility to become an analyst in one's own terms in the course of the years of practice that follow the completion of formal analytic training. The authors discuss their understanding of some of the maturational experiences that have contributed to their becoming analysts in their own terms. They believe that the most important element in the process of their maturation as analysts has been the development of the capacity to make use of what is unique and idiosyncratic to each of them; each, when at his best, conducts himself as an analyst in a way that reflects his own analytic style; his own way of being with, and talking with, his patients; his own form of the practice of psychoanalysis. The types of maturational experiences that the authors examine include situations in which they have learned to listen to themselves speak with their patients and, in so doing, begin to develop a voice of their own; experiences of growth that have occurred in the context of presenting clinical material to a consultant; making self-analytic use of their experience with their patients; creating/discovering themselves as analysts in the experience of analytic writing (with particular attention paid to the maturational experience involved in writing the current paper); and responding to a need to keep changing, to be original in their thinking and behavior as analysts.
B. F. Skinner: The Writer and His Definition of Verbal Behavior
ERIC Educational Resources Information Center
da F. Passos, Maria de Lourdes R.
2012-01-01
Skinner's definition of verbal behavior, with its brief and refined versions, has recently become a point of controversy among behavior analysts. Some of the arguments presented in this controversy might be based on a misreading of Skinner's (1957a) writings. An examination of Skinner's correspondence with editors of scientific journals shows his…
2017-09-01
meta-analytic review and theoretical integration . Journal of Personality and Social Psychology ,65(4), 681. Karr-Wisniewski, P., & Lu, Y. (2010...dissertation applies attribution theory, a product of cognitive psychology , to evaluate how analysts collectively and individually make attributions in...Likewise, many researchers agree that anomaly detection is an integral component for insider threat analysis (Brdiczka, Liu, Price, Shen, Patil, Chow
Mark A. Finney; Charles W. McHugh; Roberta Bartlette; Kelly Close; Paul Langowski
2003-01-01
This report summarizes the progress of the Hayman Fire, its behavior, and the influence of environmental conditions. Data were obtained from narratives from fire behavior analysts assigned to the fire management teams, discussions with fire management staff, meteorology from local weather stations and Bradshaw and others (2003), photographs, satellite imagery, and...
Training Knowledge Bots for Physics-Based Simulations Using Artificial Neural Networks
NASA Technical Reports Server (NTRS)
Samareh, Jamshid A.; Wong, Jay Ming
2014-01-01
Millions of complex physics-based simulations are required for design of an aerospace vehicle. These simulations are usually performed by highly trained and skilled analysts, who execute, monitor, and steer each simulation. Analysts rely heavily on their broad experience that may have taken 20-30 years to accumulate. In addition, the simulation software is complex in nature, requiring significant computational resources. Simulations of system of systems become even more complex and are beyond human capacity to effectively learn their behavior. IBM has developed machines that can learn and compete successfully with a chess grandmaster and most successful jeopardy contestants. These machines are capable of learning some complex problems much faster than humans can learn. In this paper, we propose using artificial neural network to train knowledge bots to identify the idiosyncrasies of simulation software and recognize patterns that can lead to successful simulations. We examine the use of knowledge bots for applications of computational fluid dynamics (CFD), trajectory analysis, commercial finite-element analysis software, and slosh propellant dynamics. We will show that machine learning algorithms can be used to learn the idiosyncrasies of computational simulations and identify regions of instability without including any additional information about their mathematical form or applied discretization approaches.
Blurred Lines: Ethical Implications of Social Media for Behavior Analysts.
O'Leary, Patrick N; Miller, Megan M; Olive, Melissa L; Kelly, Amanda N
2017-03-01
Social networking has a long list of advantages: it enables access to a large group of people that would otherwise not be geographically convenient or possible to connect with; it reaches several different generations, particularly younger ones, which are not typically involved in discussion of current events; and these sites allow a cost effective, immediate, and interactive way to engage with others. With the vast number of individuals who use social media sites as a way to connect with others, it may not be possible to completely abstain from discussions and interactions on social media that pertain to our professional practice. This is all the more reason that behavior analysts attend to the contingencies specific to these tools. This paper discusses potential ethical situations that may arise and offers a review of the Behavior Analysis Certification Board (BACB) guidelines pertaining to social networking, as well as provides suggestions for avoiding or resolving potential violations relating to online social behavior.
U.S. landowner behavior, land use and land cover changes, and climate change mitigation.
Ralph J. Alig
2003-01-01
Landowner behavior is a major determinant of land use and land cover changes. an important consideration for policy analysts concerned with global change. Study of landowner behavior aids in designing more effective incentives for inducing land use and land cover changes to help mitigate climate change by reducing net greenhouse gas emissions. Afforestation,...
How is physiology relevant to behavior analysis?
Reese, Hayne W.
1996-01-01
Physiology is an important biological science; but behavior analysis is not a biological science, and behavior analysts can safely ignore biological processes. However, ignoring products of biological processes might be a serious mistake. The important products include behavior, instinctive drift, behavior potentials, hunger, and many developmental milestones and events. Physiology deals with the sources of such products; behavior analysis can deal with how the products affect behavior, which can be understood without understanding their sources. PMID:22478240
Organizational Performance and Customer Value
ERIC Educational Resources Information Center
Tosti, Donald; Herbst, Scott A.
2009-01-01
While behavior systems analysts have recognized the importance of the consumer of organizational products (i.e., receiving system) in developing models of organizational change, few have offered a systematic assessment of the relationship between consumer and organizational practices. In this article we will discuss how a behavior systems approach…
A content analysis of analyst research: health care through the eyes of analysts.
Nielsen, Christian
2008-01-01
This article contributes to the understanding of how health care companies may communicate the business models by studying financial analysts' analyst reports. The study examines the differences between the information conveyed in recurrent and fundamental analyst reports as well as whether the characteristics of the analysts and their environment affect their business model analyses. A medium-sized health care company in the medical-technology sector, internationally renowned for its state-of-the-art business reporting, was chosen as the basis for the study. An analysis of 111 fundamental and recurrent analyst reports on this company by each investment bank actively following it was conducted using a content analysis methodology. The study reveals that the recurrent analyses are concerned with evaluating the information disclosed by the health care company itself and not so much with digging up new information. It also indicates that while maintenance work might be focused on evaluating specific details, fundamental research is more concerned with extending the understanding of the general picture, i.e., the sustainability and performance of the overall business model. The amount of financial information disclosed in either type of report is not correlated to the other disclosures in the reports. In comparison to business reporting practices, the fundamental analyst reports put considerably less weight on social and sustainability, intellectual capital and corporate governance information, and they disclose much less comparable non-financial information. The suggestion made is that looking at the types of information financial analysts consider important and convey to their "customers," the investors and fund managers, constitutes a valuable indication to health care companies regarding the needs of the financial market users of their reports and other communications. There are some limitations to the possibility of applying statistical tests to the data-set as well as methodological limitations in relation to the exclusion of tables and graphs.
Kurtz, S A
1986-01-01
The space the analyst creates in his consulting room gives expression to the most primitive elements in his personality. It does this despite, and even by means of, the professional conventions it incorporates. This phenomenon is first apparent in Freud's office where the space of the psychoanalytic situation originated. Here the room itself--filled with the antiquities he collected so passionately--met important narcissistic/symbiotic needs. In this sense it encodes a very early, unanalyzed level of relationship with his mother. It is suggested here that these phenomena, visible in Freud's office, are continuing elements of the analytic frame. Because of the character of the analyst and the structure of the relationship, the room becomes a mise-en-scène in which the narcissistic/symbiotic layers of both participants' characters are played out. Failing to recognize this may lead the analyst to treat seemingly regressive behavior as resistance and to intervene at developmental levels the patients has not achieved. Indeed, such "regressions" can only be understood as products of the situation itself. Phenomenologically, the analyst has become the corner in which he took refuge as a child; the corner to which the patient now comes for sanctuary. Because this connection is unconscious it cannot be called an alliance. Rather, it is a fortuitous interlocking that--like mother-child symbiosis--constitutes a matrix for new growth.
Modeling Human Behavior to Anticipate Insider Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Hohimer, Ryan E.
2011-06-09
The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach providesmore » automated support for the detection of high-risk behavioral “triggers” to help focus the analyst’s attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.« less
Values and the Scientific Culture of Behavior Analysis
ERIC Educational Resources Information Center
Ruiz, Maria R.; Roche, Bryan
2007-01-01
As scientists and practitioners, behavior analysts must make frequent decisions that affect many lives. Scientific principles have been our guide as we work to promote effective action across a broad spectrum of cultural practices. Yet scientific principles alone may not be sufficient to guide our decision making in cases with potentially…
The play of transference: some reflections on enactment in the psychoanalytic situation.
McLaughlin, J T
1987-01-01
The incessant play of nonverbal activity between patient and analyst actualizes and amplifies the primary verbal data of the psychoanalytic dialogue. Both parties must inevitably register this kinesic level of communication, and react with capacities acquired in and elaborated from earliest childhood. The analyst's apperceptive (unfocused) looking, as part of his freely hovering attentiveness, utilizes these capabilities gradually to perceive and organize patterns combining the verbal and nonverbal data. It is through the recognizing and eventual understanding of these gestalts that the analyst builds up his knowledge of his patients. In these patterns can be identified: (a) conspicuous behaviors, idiosyncratic for the individual, which often yield to psychoanalytic inquiry to reveal their dynamic-historical antecedents; and (b) inconspicuous background kinesics, habitual to the individual, which ordinarily are opaque to analytic exploration, yet hold rich meaning. Observing these small behaviors in relation to verbal content provides evidence of their linkage to, and enactment of, pregenital- and genital-level conflicts over diadic and triadic object relations, even in highly structured personalities. These enactments combine elements of play, miming, and drama to constitute an experiential dimension that actualizes and externalizes the patients' inner life of conflict and relation to objects.
Why behavior analysts should study emotion: the example of anxiety.
Friman, P C; Hayes, S C; Wilson, K G
1998-01-01
Historically, anxiety has been a dominant subject in mainstream psychology but an incidental or even insignificant one in behavior analysis. We discuss several reasons for this discrepancy. We follow with a behavior-analytic conceptualization of anxiety that could just as easily be applied to emotion in general. Its primary points are (a) that languageable humans have an extraordinary capacity to derive relations between events and that it is a simple matter to show that neutral stimuli can acquire discriminative functions indirectly with no direct training; (b) that private events can readily acquire discriminative functions; (c) that anxiety disorders seem to occur with little apparent direct learning or that the amount of direct learning is extraordinarily out of proportion with the amount of responding; and (d) that the primary function of anxious behavior is experiential avoidance. We conclude that the most interesting aspects of anxiety disorders may occur as a function of derived rather than direct relations between public events and overt and private responses with avoidance functions. Implicit in this conclusion and explicit in the paper is the assertion that anxiety is a suitable subject for behavior-analytic study. PMID:9532758
Creating an iPhone Application for Collecting Continuous ABC Data
ERIC Educational Resources Information Center
Whiting, Seth W.; Dixon, Mark R.
2012-01-01
This paper provides an overview and task analysis for creating a continuous ABC data- collection application using Xcode on a Mac computer. Behavior analysts can program an ABC data collection system, complete with a customized list of target clients, antecedents, behaviors, and consequences to be recorded, and have the data automatically sent to…
Multi-Sensor Information Integration and Automatic Understanding
2008-11-01
also produced a real-time implementation of the tracking and anomalous behavior detection system that runs on real- world data – either using real-time...surveillance and airborne IED detection . 15. SUBJECT TERMS Multi-hypothesis tracking , particle filters, anomalous behavior detection , Bayesian...analyst to support decision making with large data sets. A key feature of the real-time tracking and behavior detection system developed is that the
Multivariate Statistics Applied to Seismic Phase Picking
NASA Astrophysics Data System (ADS)
Velasco, A. A.; Zeiler, C. P.; Anderson, D.; Pingitore, N. E.
2008-12-01
The initial effort of the Seismogram Picking Error from Analyst Review (SPEAR) project has been to establish a common set of seismograms to be picked by the seismological community. Currently we have 13 analysts from 4 institutions that have provided picks on the set of 26 seismograms. In comparing the picks thus far, we have identified consistent biases between picks from different institutions; effects of the experience of analysts; and the impact of signal-to-noise on picks. The institutional bias in picks brings up the important concern that picks will not be the same between different catalogs. This difference means less precision and accuracy when combing picks from multiple institutions. We also note that depending on the experience level of the analyst making picks for a catalog the error could fluctuate dramatically. However, the experience level is based off of number of years in picking seismograms and this may not be an appropriate criterion for determining an analyst's precision. The common data set of seismograms provides a means to test an analyst's level of precision and biases. The analyst is also limited by the quality of the signal and we show that the signal-to-noise ratio and pick error are correlated to the location, size and distance of the event. This makes the standard estimate of picking error based on SNR more complex because additional constraints are needed to accurately constrain the measurement error. We propose to extend the current measurement of error by adding the additional constraints of institutional bias and event characteristics to the standard SNR measurement. We use multivariate statistics to model the data and provide constraints to accurately assess earthquake location and measurement errors.
Richling, Sarah M; Rapp, John T; Funk, Janie A; D'Agostini, Jaimie; Garrido, Natalia; Moreno, Vicki
2014-11-01
This study determined the percentage of presentations at the annual conference of the Association for Behavior Analysis in 2005 with the autism (AUT) and developmental disabilities (DDA) codes (N=880) that (a) provided continuing education credits (CEs) for Board Certified Behavior Analysts (BCBAs) and Board Certified Assistant Behavior Analysts (BCaBAs) and (b) included content that was published in a peer-reviewed outlet. Results indicate that only 77 (8.8%) presentations were ultimately published. Although posters were not eligible for CEs, posters accounted for 57.1% of the published presentations. Specifically, posters presented by a university-affiliated presenter accounted for 44.2% of presentations with published content. As a whole, only 10.4% of AUT and DDA presentations offering CEs contained data sets that were published. Considered together, these results suggest that the content provided to BCBAs and BCaBAs for CEs may not be adequately measured or sufficiently rigorous to guide clinical practices. Copyright © 2014 Elsevier Ltd. All rights reserved.
Countercontrols for the american educational research association.
Greer, R D
1982-01-01
Publications of the American Educational Research Association (AERA) maintain that years of research in education have failed to produce a useful technology for teachers. Little is said to be known about teaching children beyond the potential of new findings such as mastery learning, time on task, and features of an appropriate school climate. These latter conclusions are in stark contrast to the large body of useful findings in the behavior analysis literature. Several possible reasons are discussed for the discrepancy in views between behavior analysts and educational researchers. The lack of acknowledgement of behavior analysis is viewed as a serious problem because of the control that the educational research establishment exerts over federal funding of research and the training of teachers. There is a growing use of some of the aspects of behavior analysis by educational researchers; however, the derivation is not acknowledged and there is little enlightenment about radical behaviorism. It is suggested that ABA should countercontrol the influence of AERA by incorporating doctoral students in educational research as students of behavior analysis, teaching the complexity of behaviorism, teaching the positions of the opposing camp to behavior analysis students. ABA can take an aggressive role in countercontrolling AERA by forming committees to insure (a) quality of treatment, (b) funding representation in government, (c) protection and qualified review of untenured behavior analysts, (d) expansion of certification.
Behavior analysts and cultural analysis: Troubles and issues
Malagodi, E. F.; Jackson, Kevin
1989-01-01
Three strategic suggestions are offered to behavior analysts who are concerned with extending the interests of our discipline into domains traditionally assigned to the social sciences: (1) to expand our world-view perspectives beyond the boundaries commonly accepted by psychologists in general; (2) to build a cultural analytic framework upon the foundations we have developed for the study of individuals; and (3) to study the works of those social scientists whose views are generally compatible with, and complementary to, our own. Sociologist C. Wright Mills' distinction between troubles and issues and anthropologist Marvin Harris's principles of cultural materialism are related to topics raised by these three strategies. The pervasiveness of the “psychocentric” world view within psychology and the social sciences, and throughout our culture at large, is discussed from the points of view of Skinner, Mills, and Harris. It is suggested that a thorough commitment to radical behaviorism, and continuation of interaction between radical behaviorism and cultural materialism, are necessary for maintaining and extending an issues orientation within the discipline of behavior analysis and for guarding against dilutions and subversions of that orientation by “deviation-dampening” contingencies that exist in our profession and in our culture at large. PMID:22478014
The four free-operant freedoms
Lindsley, Ogden R.
1996-01-01
This article reviews early free-operant conditioning laboratory research and applications. The seldom-mentioned four free-operant freedoms are described for the first time in detail. Most current behavior analysts do not realize that the freedom to form responses and the freedom to speed responses were crucial steps in designing free-operant operanda in the 1950s. These four freedoms were known by the laboratory researchers of the 1950s to the point that, along with operanda design, Sidman (1960) did not feel the need to detail them in his classic, Tactics of Scientific Research. The dimensions of freedom in the operant were so well understood and accepted in the 1950s that most thought it redundant to use the term free operant. These issues are reviewed in some detail for younger behavior analysts who did not have the opportunity of learning them firsthand. PMID:22478258
Relatedness, national boarders, perceptions of firms and the value of their innovations
NASA Astrophysics Data System (ADS)
Castor, Adam R.
The main goal of this dissertation is to better understand how external corporate stakeholder perceptions of relatedness affect important outcomes for companies. In pursuit of this goal, I apply the lens of category studies. Categories not only help audiences to distinguish between members of different categories, they also convey patterns of relatedness. In turn, this may have implications for understanding how audiences search, what they attend to, and how the members are ultimately valued. In the first chapter, I apply incites from social psychology to show how the nationality of audience members affects the way that they cognitively group objects into similar categories. I find that the geographic location of stock market analysts affect the degree to which they will revise their earnings estimates for a given company in the wake of an earnings miss by another firm in the same industry. Foreign analysts revise their earnings estimates downward more so than do local analysts, suggesting that foreign analysts ascribe the earnings miss more broadly and tend to lump companies located in the same country into larger groups than do local analysts. In the second chapter, I demonstrate that the structure of inter-category relationships can have consequential effects for the members of a focal category. Leveraging an experimental-like design, I study the outcomes of nanotechnology patents and the pattern of forward citations across multiple patent jurisdictions. I find that members of technology categories with many close category 'neighbors' are more broadly cited than members of categories with few category 'neighbors.' My findings highlight how category embeddedness and category system structure affect the outcomes of category members as well as the role that classification plays in the valuation of innovation. In the third chapter, I propose a novel and dynamic measure of corporate similarity that is constructed from the two-mode analyst and company coverage network. The approach creates a fine-grained continuous measure of company similarity that can be used as an alternative or supplement to existing static industry classification systems. I demonstrate the value of this new measure in the context of predicting financial market responses to merger and acquisition deals.
NASA Astrophysics Data System (ADS)
Piburn, J.; Stewart, R.; Myers, A.; Sorokine, A.; Axley, E.; Anderson, D.; Burdette, J.; Biddle, C.; Hohl, A.; Eberle, R.; Kaufman, J.; Morton, A.
2017-10-01
Spatiotemporal (ST) analytics applied to major data sources such as the World Bank and World Health Organization has shown tremendous value in shedding light on the evolution of cultural, health, economic, and geopolitical landscapes on a global level. WSTAMP engages this opportunity by situating analysts, data, and analytics together within a visually rich and computationally rigorous online analysis environment. Since introducing WSTAMP at the First International Workshop on Spatiotemporal Computing, several transformative advances have occurred. Collaboration with human computer interaction experts led to a complete interface redesign that deeply immerses the analyst within a ST context, significantly increases visual and textual content, provides navigational crosswalks for attribute discovery, substantially reduce mouse and keyboard actions, and supports user data uploads. Secondly, the database has been expanded to include over 16,000 attributes, 50 years of time, and 200+ nation states and redesigned to support non-annual, non-national, city, and interaction data. Finally, two new analytics are implemented for analyzing large portfolios of multi-attribute data and measuring the behavioral stability of regions along different dimensions. These advances required substantial new approaches in design, algorithmic innovations, and increased computational efficiency. We report on these advances and inform how others may freely access the tool.
Toward an explicit analysis of generalization: A stimulus control interpretation
Kirby, Kimberly C.; Bickel, Warren K.
1988-01-01
Producing generality of treatment effects to new settings has been a critical concern for applied behavior analysts, but a systematic and reliable means of producing generality has yet to be provided. We argue that the principles of stimulus control and reinforcement underlie the production of most generalized effects; therefore, we suggest interpreting generalization programming in terms of stimulus control. The generalization programming procedures identified by Stokes and Baer (1977) are discussed in terms of both the stimulus control tactics explicitly identified and those that may be operating but are not explicitly identified. Our interpretation clarifies the critical components of Stokes and Baer's procedures and places greater emphasis on planning for generalization as a part of training procedures. PMID:22478006
ERIC Educational Resources Information Center
Udell, Monique A. R.; Wynne, C. D. L.
2008-01-01
Dogs likely were the first animals to be domesticated and as such have shared a common environment with humans for over ten thousand years. Only recently, however, has this species' behavior been subject to scientific scrutiny. Most of this work has been inspired by research in human cognitive psychology and suggests that in many ways dogs are…
Preventing Stress Disorders for Law Enforcement Officers Exposed to Disturbing Media
2016-09-01
soldiers suffering from post- traumatic stress disorder (PTSD), including group therapy, cognitive behavioral therapy, and service dogs. Further research...child pornography, child exploitation, group therapy, counterintelligence analyst, computer forensics, forensic examiner 15. NUMBER OF PAGES...from post-traumatic stress disorder (PTSD), including group therapy, cognitive behavioral therapy, and service dogs. Further research should be
Using Applied Behaviour Analysis as Standard Practice in a UK Special Needs School
ERIC Educational Resources Information Center
Foran, Denise; Hoerger, Marguerite; Philpott, Hannah; Jones, Elin Walker; Hughes, J. Carl; Morgan, Jonathan
2015-01-01
This article describes how applied behaviour analysis can be implemented effectively and affordably in a maintained special needs school in the UK. Behaviour analysts collaborate with classroom teachers to provide early intensive behaviour education for young children with autism spectrum disorders (ASD), and function based behavioural…
K. E. Gibos; A. Slijepcevic; T. Wells; L. Fogarty
2015-01-01
Wildland fire managers must frequently make meaning from chaos in order to protect communities and infrastructure from the negative impacts of fire. Fire management personnel are increasingly turning to science to support their experience-based decision-making processes and to provide clear, confident leadership for communities frequently exposed to risk from wildfire...
Doing More with Less: Innovative Program Building in ABA and Special Education in a Rural Setting
ERIC Educational Resources Information Center
Bethune, Keri S.; Kiser, Ansley
2017-01-01
There is a need for both special education teachers and Board Certified Behavior Analysts (BCBAs) who are trained to work in rural school settings with students with disabilities and problem behaviors. The specific challenges presented by rural communities, such as diminished access to resources and fewer community partners, can make it difficult…
Climate Change: Meeting the Challenge
ERIC Educational Resources Information Center
Chance, Paul; Heward, William L.
2010-01-01
In "Climate Change: Meeting the Challenge," we conclude the special section by assuming that you have been persuaded by Thompson's paper or other evidence that global warming is real and poses a threat that must be dealt with, and that for now the only way to deal with it is by changing behavior. Then we ask what you, as behavior analysts, can do…
Understanding Observational Learning: An Interbehavioral Approach
Fryling, Mitch J; Johnston, Cristin; Hayes, Linda J
2011-01-01
Observational learning is an important area in the field of psychology and behavior science more generally. Given this, it is essential that behavior analysts articulate a sound theory of how behavior change occurs through observation. This paper begins with an overview of seminal research in the area of observational learning, followed by a consideration of common behavior analytic conceptualizations of these findings. The interbehavioral perspective is then outlined, shedding light on some difficulties with the existing behavior analytic approaches. The implications of embracing the interbehavioral perspective for understanding the most complex sorts of behavior, including those involved in observational learning are considered. PMID:22532764
ERIC Educational Resources Information Center
Critchfield, Thomas S.; Becirevic, Amel; Reed, Derek D.
2017-01-01
It has often been suggested that nonexperts find the communication of behavior analysts to be viscerally off-putting. We argue that this concern should be the focus of systematic research rather than mere discussion, and describe five studies that illustrate how publicly available lists of word-emotion ratings can be used to estimate the responses…
Developing an intelligence analysis process through social network analysis
NASA Astrophysics Data System (ADS)
Waskiewicz, Todd; LaMonica, Peter
2008-04-01
Intelligence analysts are tasked with making sense of enormous amounts of data and gaining an awareness of a situation that can be acted upon. This process can be extremely difficult and time consuming. Trying to differentiate between important pieces of information and extraneous data only complicates the problem. When dealing with data containing entities and relationships, social network analysis (SNA) techniques can be employed to make this job easier. Applying network measures to social network graphs can identify the most significant nodes (entities) and edges (relationships) and help the analyst further focus on key areas of concern. Strange developed a model that identifies high value targets such as centers of gravity and critical vulnerabilities. SNA lends itself to the discovery of these high value targets and the Air Force Research Laboratory (AFRL) has investigated several network measures such as centrality, betweenness, and grouping to identify centers of gravity and critical vulnerabilities. Using these network measures, a process for the intelligence analyst has been developed to aid analysts in identifying points of tactical emphasis. Organizational Risk Analyzer (ORA) and Terrorist Modus Operandi Discovery System (TMODS) are the two applications used to compute the network measures and identify the points to be acted upon. Therefore, the result of leveraging social network analysis techniques and applications will provide the analyst and the intelligence community with more focused and concentrated analysis results allowing them to more easily exploit key attributes of a network, thus saving time, money, and manpower.
Haidar Ahmad, Imad A; Tam, James; Li, Xue; Duffield, William; Tarara, Thomas; Blasko, Andrei
2017-02-05
The parameters affecting the recovery of pharmaceutical residues from the surface of stainless steel coupons for quantitative cleaning verification method development have been studied, including active pharmaceutical ingredient (API) level, spiking procedure, API/excipient ratio, analyst-to-analyst variability, inter-day variability, and cleaning procedure of the coupons. The lack of a well-defined procedure that consistently cleaned coupon surface was identified as the major contributor to low and variable recoveries. Assessment of acid, base, and oxidant washes, as well as the order of treatment, showed that a base-water-acid-water-oxidizer-water wash procedure resulted in consistent, accurate spiked recovery (>90%) and reproducible results (S rel ≤4%). By applying this cleaning procedure to the previously used coupons that failed the cleaning acceptance criteria, multiple analysts were able to obtain consistent recoveries from day-to-day for different APIs, and API/excipient ratios at various spike levels. We successfully applied our approach for cleaning verification of small molecules (MW<1000Da) as well as large biomolecules (MW up to 50,000Da). Method robustness was greatly influenced by the sample preparation procedure, especially for analyses using total organic carbon (TOC) determination. Copyright © 2016 Elsevier B.V. All rights reserved.
Licensing Behavior Analysts: Risks and Alternatives
Green, Gina; Johnston, James M
2009-01-01
Under certain conditions, obtaining state laws to license practitioners of behavior analysis might be feasible and could produce benefits for practitioners and consumers. Those conditions are not yet in place in most states, however, and pursuing licensure prematurely carries substantial risks for the entire field. We describe the most serious risks and the conditions that make it more or less likely that licensure initiatives will succeed. Finally, we recommend strategies for securing recognition of practitioners of behavior analysis in laws, regulations, and policies that can minimize risks. PMID:22477698
Tonneau, François
2006-01-01
Book-length treatments of behaviorism from a philosophical and historical perspective are few in number. Tilquin's (1942) is one of these, but its publication in French during World War II and the limited number of available copies make for difficult access. In this paper, I summarize the contents of the book for a general audience of behavior analysts. Tilquin's work is a useful tour of the behaviorism of its time, and most of the topics discussed in it remain relevant to behavior analysis.
Quintero, Gilbert; Bundy, Henry
2011-01-01
This study examined the utilization of the Internet by young adults as a source of information for the non-medical use of prescription drugs. Collected during 2008 and 2009, the data presented here comes from semi-structured interviews (N=62) conducted in a northwestern city of the United States through support from the National Institute on Drug Abuse. Previous studies have characterized young adults as particularly vulnerable to online prescription drug information which analysts portray as having a significant, invariably detrimental, impact on youth drug use behaviors. The results presented here suggest that young adults are more skeptical and information-savvy than many substance abuse analysts acknowledge. PMID:21599506
Quantified trends in the history of verbal behavior research
Eshleman, John W.
1991-01-01
The history of scientific research about verbal behavior research, especially that based on Verbal Behavior (Skinner, 1957), can be assessed on the basis of a frequency and celeration analysis of the published and presented literature. In order to discover these quantified trends, a comprehensive bibliographical database was developed. Based on several literature searches, the bibliographic database included papers pertaining to verbal behavior that were published in the Journal of the Experimental Analysis of Behavior, the Journal of Applied Behavior Analysis, Behaviorism, The Behavior Analyst, and The Analysis of Verbal Behavior. A nonbehavioral journal, the Journal of Verbal Learning and Verbal Behavior was assessed as a nonexample comparison. The bibliographic database also included a listing of verbal behavior papers presented at the meetings of the Association for Behavior Analysis. Papers were added to the database if they (a) were about verbal behavior, (b) referenced B.F. Skinner's (1957) book Verbal Behavior, or (c) did both. Because the references indicated the year of publication or presentation, a count per year of them was measured. These yearly frequencies were plotted on Standard Celeration Charts. Once plotted, various celeration trends in the literature became visible, not the least of which was the greater quantity of verbal behavior research than is generally acknowledged. The data clearly show an acceleration of research across the past decade. The data also question the notion that a “paucity” of research based on Verbal Behavior currently exists. Explanations of the acceleration of verbal behavior research are suggested, and plausible reasons are offered as to why a relative lack of verbal behavior research extended through the mid 1960s to the latter 1970s. PMID:22477630
On the Distinction Between the Motivating Operation and Setting Event Concepts.
Nosik, Melissa R; Carr, James E
2015-10-01
In recent decades, behavior analysts have generally used two different concepts to speak about motivational influences on operant contingencies: setting event and motivating operation. Although both concepts still appear in the contemporary behavior-analytic literature and were designed to address the same antecedent phenomena, the concepts are quite different. The purpose of the present article is to describe and distinguish the concepts and to illustrate their current usage.
Design Science Methodology Applied to a Chemical Surveillance Tool
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, Zhuanyi; Han, Kyungsik; Charles-Smith, Lauren E.
Public health surveillance systems gain significant benefits from integrating existing early incident detection systems,supported by closed data sources, with open source data.However, identifying potential alerting incidents relies on finding accurate, reliable sources and presenting the high volume of data in a way that increases analysts work efficiency; a challenge for any system that leverages open source data. In this paper, we present the design concept and the applied design science research methodology of ChemVeillance, a chemical analyst surveillance system.Our work portrays a system design and approach that translates theoretical methodology into practice creating a powerful surveillance system built for specificmore » use cases.Researchers, designers, developers, and related professionals in the health surveillance community can build upon the principles and methodology described here to enhance and broaden current surveillance systems leading to improved situational awareness based on a robust integrated early warning system.« less
NASA Astrophysics Data System (ADS)
Gad, Mohamed A.; Elshehaly, Mai H.; Gračanin, Denis; Elmongui, Hicham G.
2018-02-01
This research presents a novel Trajectory-based Tracking Analyst (TTA) that can track and link spatiotemporally variable data from multiple sources. The proposed technique uses trajectory information to determine the positions of time-enabled and spatially variable scatter data at any given time through a combination of along trajectory adjustment and spatial interpolation. The TTA is applied in this research to track large spatiotemporal data of volcanic eruptions (acquired using multi-sensors) in the unsteady flow field of the atmosphere. The TTA enables tracking injections into the atmospheric flow field, the reconstruction of the spatiotemporally variable data at any desired time, and the spatiotemporal join of attribute data from multiple sources. In addition, we were able to create a smooth animation of the volcanic ash plume at interactive rates. The initial results indicate that the TTA can be applied to a wide range of multiple-source data.
GLO-STIX: Graph-Level Operations for Specifying Techniques and Interactive eXploration
Stolper, Charles D.; Kahng, Minsuk; Lin, Zhiyuan; Foerster, Florian; Goel, Aakash; Stasko, John; Chau, Duen Horng
2015-01-01
The field of graph visualization has produced a wealth of visualization techniques for accomplishing a variety of analysis tasks. Therefore analysts often rely on a suite of different techniques, and visual graph analysis application builders strive to provide this breadth of techniques. To provide a holistic model for specifying network visualization techniques (as opposed to considering each technique in isolation) we present the Graph-Level Operations (GLO) model. We describe a method for identifying GLOs and apply it to identify five classes of GLOs, which can be flexibly combined to re-create six canonical graph visualization techniques. We discuss advantages of the GLO model, including potentially discovering new, effective network visualization techniques and easing the engineering challenges of building multi-technique graph visualization applications. Finally, we implement the GLOs that we identified into the GLO-STIX prototype system that enables an analyst to interactively explore a graph by applying GLOs. PMID:26005315
A review method for UML requirements analysis model employing system-side prototyping.
Ogata, Shinpei; Matsuura, Saeko
2013-12-01
User interface prototyping is an effective method for users to validate the requirements defined by analysts at an early stage of a software development. However, a user interface prototype system offers weak support for the analysts to verify the consistency of the specifications about internal aspects of a system such as business logic. As the result, the inconsistency causes a lot of rework costs because the inconsistency often makes the developers impossible to actualize the system based on the specifications. For verifying such consistency, functional prototyping is an effective method for the analysts, but it needs a lot of costs and more detailed specifications. In this paper, we propose a review method so that analysts can verify the consistency among several different kinds of diagrams in UML efficiently by employing system-side prototyping without the detailed model. The system-side prototype system does not have any functions to achieve business logic, but visualizes the results of the integration among the diagrams in UML as Web pages. The usefulness of our proposal was evaluated by applying our proposal into a development of Library Management System (LMS) for a laboratory. This development was conducted by a group. As the result, our proposal was useful for discovering the serious inconsistency caused by the misunderstanding among the members of the group.
Working conditions, visual fatigue, and mental health among systems analysts in São Paulo, Brazil
Rocha, L; Debert-Ribeiro, M
2004-01-01
Aims: To evaluate the association between working conditions and visual fatigue and mental health among systems analysts living in São Paulo, Brazil. Methods: A cross sectional study was carried out by a multidisciplinary team. It included: ergonomic analysis of work, individual and group interviews, and 553 self applied questionnaires in two enterprises. The comparison population numbered 136 workers in different occupations. Results: The study population mainly comprised young males. Among systems analysts, visual fatigue was associated with mental workload, inadequate equipment and workstation, low level of worker participation, being a woman, and subject's attitude of fascination by the computer. Nervousness and intellectual performance were associated with mental workload, inadequate equipment, work environment, and tools. Continuing education and leisure were protective factors. Work interfering in family life was associated with mental workload, difficulties with clients, strict deadlines, subject's attitude of fascination by the computer, and finding solutions of work problems outside work. Family support, satisfaction in life and work, and adequate work environment and tools were protective factors. Work interfering in personal life was associated with subject's attitude of fascination by the computer, strict deadlines, inadequate equipment, and high level of work participation. Satisfaction in life and work and continuing education were protective factors. The comparison population did not share common working factors with the systems analysts in the regression analysis. Conclusions: The main health effects of systems analysts' work were expressed by machine anthropomorphism, being very demanding, mental acceleration, mental absorption, and difficulty in dealing with emotions. PMID:14691269
Army Task Force on Behavioral Health: Corrective Action Plan
2013-01-01
Veterans Affairs Legal Section KNOWLEDGE MGMT SECTION • KMO • CAA Analyst Figure I-1. Task Force Organization. ACRONYM Key ASA(M&RA): Assistant...Army Audit Agency OTIG: Office of the Inspector General OTSG: Office of the Surgeon General KMO : Knowledge Management Officer CAA: Center for
Nayar, Monisha C
2008-03-01
This paper addresses two specific aspects of clinical technique in the treatment of traumatized individuals. The first aspect involves the creation of a safe holding environment as an essential step for the emergence of trauma-related memories and the containment of the affects accompanying them. Such scenarios may appear in the clinical material only through the workings of "procedural memory." It is therefore important to contain and gradually decipher repetitive patterns of behavior and feelings of shame, guilt and rage that go with them. The second aspect examines the challenges such work poses to the analyst's containing capacities, credulousness and even his or her reality testing within a clinical situation. The resulting instability of the analyst's work ego can make it hard for him or her to remain vigilant yet empathic, and emotionally attuned but analytically skeptical. The analyst's flexibility to be utilized as a transference object, developmental object and self-object remains a critical determinant of the treatment outcome under such circumstances. The paper provides clinical material to illustrate these two aspects of clinical technique.
78 FR 45198 - Federal Acquisition Regulation; Submission for OMB Review; Anti-Kickback Procedures
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-26
... INFORMATION CONTACT: Ms. Cecelia L. Davis, Procurement Analyst, Office of Governmentwide Acquisition Policy..., Contractor Business Ethics Compliance Program and Disclosure Requirements. Response: It is important to... business. In the normal course of business, a company that is concerned about ethical behavior will take...
ERIC Educational Resources Information Center
Ramirez, Ricardo; Felix, Adrian
2011-01-01
In the current period of international migration there is no consensus among analysts regarding the relationship between immigrant transnationalism and civic engagement in the United States. Focusing mainly on the transnational behaviors of Latin American migrants, three views predominate: critics argue that immigrant transnationalism hinders…
Helping Anxious Students Move Forward
ERIC Educational Resources Information Center
Minahan, Jessica
2018-01-01
Students with anxiety are prone to giving up a difficult work assignment before they even start it. So how can teachers help these students develop skills to successfully start and finish assignments and succeed in school? Behavioral analyst Jessica Minahan offers some practical solutions that teachers can implement in the classroom to motivate…
A Response to Stewart, McElwee, and Ming
ERIC Educational Resources Information Center
Martin, Garry L.; Yu, C. T.
2010-01-01
In a recent article published in "The Behavior Analyst," Stewart, McElwee, and Ming (2010) suggested that "scientific experts in scientific contexts" should use more "technically accurate and precise labeling" when describing the Assessment of Basic Learning Abilities (ABLA) in published articles. They concluded by stating, "We believe that…
The Ultimate Challenge: Prove B. F. Skinner Wrong
Chance, Paul
2007-01-01
For much of his career, B. F. Skinner displayed the optimism that is often attributed to behaviorists. With time, however, he became less and less sanguine about the power of behavior science to solve the major problems facing humanity. Near the end of his life he concluded that a fair consideration of principles revealed by the scientific analysis of behavior leads to pessimism about our species. In this article I discuss the case for Skinner's pessimism and suggest that the ultimate challenge for behavior analysts today is to prove Skinner wrong. PMID:22478494
User Guidelines and Best Practices for CASL VUQ Analysis Using Dakota.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adams, Brian M.; Coleman, Kayla; Hooper, Russell
2016-11-01
Sandia's Dakota software (available at http://dakota.sandia.gov) supports science and engineering transformation through advanced exploration of simulations. Specifically, it manages and analyzes ensembles of simulations to provide broader and deeper perspective for analysts and decision makers. This enables them to enhance understanding of risk, improve products, and assess simulation credibility. This manual offers Consortium for Advanced Simulation of Light Water Reactors (LWRs) (CASL) partners a guide to conducting Dakota-based VUQ studies for CASL problems. It motivates various classes of Dakota methods and includes examples of their use on representative application problems. On reading, a CASL analyst should understand why and howmore » to apply Dakota to a simulation problem.« less
TelCoVis: Visual Exploration of Co-occurrence in Urban Human Mobility Based on Telco Data.
Wu, Wenchao; Xu, Jiayi; Zeng, Haipeng; Zheng, Yixian; Qu, Huamin; Ni, Bing; Yuan, Mingxuan; Ni, Lionel M
2016-01-01
Understanding co-occurrence in urban human mobility (i.e. people from two regions visit an urban place during the same time span) is of great value in a variety of applications, such as urban planning, business intelligence, social behavior analysis, as well as containing contagious diseases. In recent years, the widespread use of mobile phones brings an unprecedented opportunity to capture large-scale and fine-grained data to study co-occurrence in human mobility. However, due to the lack of systematic and efficient methods, it is challenging for analysts to carry out in-depth analyses and extract valuable information. In this paper, we present TelCoVis, an interactive visual analytics system, which helps analysts leverage their domain knowledge to gain insight into the co-occurrence in urban human mobility based on telco data. Our system integrates visualization techniques with new designs and combines them in a novel way to enhance analysts' perception for a comprehensive exploration. In addition, we propose to study the correlations in co-occurrence (i.e. people from multiple regions visit different places during the same time span) by means of biclustering techniques that allow analysts to better explore coordinated relationships among different regions and identify interesting patterns. The case studies based on a real-world dataset and interviews with domain experts have demonstrated the effectiveness of our system in gaining insights into co-occurrence and facilitating various analytical tasks.
Robust Decision-making Applied to Model Selection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hemez, Francois M.
2012-08-06
The scientific and engineering communities are relying more and more on numerical models to simulate ever-increasingly complex phenomena. Selecting a model, from among a family of models that meets the simulation requirements, presents a challenge to modern-day analysts. To address this concern, a framework is adopted anchored in info-gap decision theory. The framework proposes to select models by examining the trade-offs between prediction accuracy and sensitivity to epistemic uncertainty. The framework is demonstrated on two structural engineering applications by asking the following question: Which model, of several numerical models, approximates the behavior of a structure when parameters that define eachmore » of those models are unknown? One observation is that models that are nominally more accurate are not necessarily more robust, and their accuracy can deteriorate greatly depending upon the assumptions made. It is posited that, as reliance on numerical models increases, establishing robustness will become as important as demonstrating accuracy.« less
NASA Astrophysics Data System (ADS)
Czajkowski, M.; Shilliday, A.; LoFaso, N.; Dipon, A.; Van Brackle, D.
2016-09-01
In this paper, we describe and depict the Defense Advanced Research Projects Agency (DARPA)'s OrbitOutlook Data Archive (OODA) architecture. OODA is the infrastructure that DARPA's OrbitOutlook program has developed to integrate diverse data from various academic, commercial, government, and amateur space situational awareness (SSA) telescopes. At the heart of the OODA system is its world model - a distributed data store built to quickly query big data quantities of information spread out across multiple processing nodes and data centers. The world model applies a multi-index approach where each index is a distinct view on the data. This allows for analysts and analytics (algorithms) to access information through queries with a variety of terms that may be of interest to them. Our indices include: a structured global-graph view of knowledge, a keyword search of data content, an object-characteristic range search, and a geospatial-temporal orientation of spatially located data. In addition, the world model applies a federated approach by connecting to existing databases and integrating them into one single interface as a "one-stop shopping place" to access SSA information. In addition to the world model, OODA provides a processing platform for various analysts to explore and analytics to execute upon this data. Analytic algorithms can use OODA to take raw data and build information from it. They can store these products back into the world model, allowing analysts to gain situational awareness with this information. Analysts in turn would help decision makers use this knowledge to address a wide range of SSA problems. OODA is designed to make it easy for software developers who build graphical user interfaces (GUIs) and algorithms to quickly get started with working with this data. This is done through a multi-language software development kit that includes multiple application program interfaces (APIs) and a data model with SSA concepts and terms such as: space observation, observable, measurable, metadata, track, space object, catalog, expectation, and maneuver.
Functional Analysis in Public Schools: A Summary of 90 Functional Analyses
ERIC Educational Resources Information Center
Mueller, Michael M.; Nkosi, Ajamu; Hine, Jeffrey F.
2011-01-01
Several review and epidemiological studies have been conducted over recent years to inform behavior analysts of functional analysis outcomes. None to date have closely examined demographic and clinical data for functional analyses conducted exclusively in public school settings. The current paper presents a data-based summary of 90 functional…
ERIC Educational Resources Information Center
Cox, David J.
2012-01-01
To address the developmental deficits of children with autism, several disciplines have come to the forefront within intervention programs. These are speech-pathologists, psychologists/counselors, occupational-therapists/physical-therapists, special-education consultants, behavior analysts, and physicians/medical personnel. As the field of autism…
Comparing the Effectiveness of Error-Correction Strategies in Discrete Trial Training
ERIC Educational Resources Information Center
Turan, Michelle K.; Moroz, Lianne; Croteau, Natalie Paquet
2012-01-01
Error-correction strategies are essential considerations for behavior analysts implementing discrete trial training with children with autism. The research literature, however, is still lacking in the number of studies that compare and evaluate error-correction procedures. The purpose of this study was to compare two error-correction strategies:…
Designing Realistic Human Behavior into Multi-Agent Systems
2001-09-01
different results based on some sort of randomness built into it, a trend can be looked at over time and a success or failure rate can be...simulation remains in that state, very different results can be achieved each simulation run. An analyst can look at success and failure over a long
Clarifying evacuation options through fire behavior and traffic modeling
Carol L. Rice; Ronny J. Coleman; Mike Price
2011-01-01
Communities are becoming increasingly concerned with the variety of choices related to wildfire evacuation. We used ArcView with Network Analyst to evaluate the different options for evacuations during wildfire in a case study community. We tested overlaying fire growth patterns with the road network and population characteristics to determine recommendations for...
Zhou, Xinyu; Liu, Lanxiang; Zhang, Yuqing; Pu, Juncai; Yang, Lining; Zhou, Chanjuan; Yuan, Shuai; Zhang, Hanping; Xie, Peng
2017-02-20
Major depressive disorder is a serious psychiatric condition associated with high rates of suicide and is a leading cause of health burden worldwide. However, the underlying molecular mechanisms of major depression are still essentially unclear. In our study, a non-targeted gas chromatography-mass spectrometry-based metabolomics approach was used to investigate metabolic changes in the prefrontal cortex of the learned helplessness (LH) rat model of depression. Body-weight measurements and behavioral tests including the active escape test, sucrose preference test, forced swimming test, elevated plus-maze and open field test were used to assess changes in the behavioral spectrum after inescapable footshock stress. Rats in the stress group exhibited significant learned helpless and depression-like behaviors, while without any significant change in anxiety-like behaviors. Using multivariate and univariate statistical analysis, a total of 18 differential metabolites were identified after the footshock stress protocol. Ingenuity Pathways Analysis and MetaboAnalyst were applied for predicted pathways and biological functions analysis. "Amino Acid Metabolism, Molecule Transport, Small Molecule Biochemistry" was the most significantly altered network in the LH model. Amino acid metabolism, particularly glutamate metabolism, cysteine and methionine metabolism, arginine and proline metabolism, was significantly perturbed in the prefrontal cortex of LH rats. Copyright © 2016 IBRO. Published by Elsevier Ltd. All rights reserved.
Mapping forest height in Alaska using GLAS, Landsat composites, and airborne LiDAR
Peterson, Birgit; Nelson, Kurtis
2014-01-01
Vegetation structure, including forest canopy height, is an important input variable to fire behavior modeling systems for simulating wildfire behavior. As such, forest canopy height is one of a nationwide suite of products generated by the LANDFIRE program. In the past, LANDFIRE has relied on a combination of field observations and Landsat imagery to develop existing vegetation structure products. The paucity of field data in the remote Alaskan forests has led to a very simple forest canopy height classification for the original LANDFIRE forest height map. To better meet the needs of data users and refine the map legend, LANDFIRE incorporated ICESat Geoscience Laser Altimeter System (GLAS) data into the updating process when developing the LANDFIRE 2010 product. The high latitude of this region enabled dense coverage of discrete GLAS samples, from which forest height was calculated. Different methods for deriving height from the GLAS waveform data were applied, including an attempt to correct for slope. These methods were then evaluated and integrated into the final map according to predefined criteria. The resulting map of forest canopy height includes more height classes than the original map, thereby better depicting the heterogeneity of the landscape, and provides seamless data for fire behavior analysts and other users of LANDFIRE data.
CREATING AN IPHONE APPLICATION FOR COLLECTING CONTINUOUS ABC DATA
Whiting, Seth W; Dixon, Mark R
2012-01-01
This paper provides an overview and task analysis for creating a continuous ABC data-collection application using Xcode on a Mac computer. Behavior analysts can program an ABC data collection system, complete with a customized list of target clients, antecedents, behaviors, and consequences to be recorded, and have the data automatically sent to an e-mail account after observations have concluded. Further suggestions are provided to customize the ABC data- collection system for individual preferences and clinical needs. PMID:23060682
Creating an iPhone application for collecting continuous ABC data.
Whiting, Seth W; Dixon, Mark R
2012-01-01
This paper provides an overview and task analysis for creating a continuous ABC data-collection application using Xcode on a Mac computer. Behavior analysts can program an ABC data collection system, complete with a customized list of target clients, antecedents, behaviors, and consequences to be recorded, and have the data automatically sent to an e-mail account after observations have concluded. Further suggestions are provided to customize the ABC data- collection system for individual preferences and clinical needs.
Gabbard, Ryan; Fendley, Mary; Dar, Irfaan A; Warren, Rik; Kashou, Nasser H
2017-10-01
Occupational noise frequently occurs in the work environment in military intelligence, surveillance, and reconnaissance operations. This impacts cognitive performance by acting as a stressor, potentially interfering with the analysts' decision-making process. We investigated the effects of different noise stimuli on analysts' performance and workload in anomaly detection by simulating a noisy work environment. We utilized functional near-infrared spectroscopy (fNIRS) to quantify oxy-hemoglobin (HbO) and deoxy-hemoglobin concentration changes in the prefrontal cortex (PFC), as well as behavioral measures, which include eye tracking, reaction time, and accuracy rate. We hypothesized that noisy environments would have a negative effect on the participant in terms of anomaly detection performance due to the increase in workload, which would be reflected by an increase in PFC activity. We found that HbO for some of the channels analyzed were significantly different across noise types ([Formula: see text]). Our results also indicated that HbO activation for short-intermittent noise stimuli was greater in the PFC compared to long-intermittent noises. These approaches using fNIRS in conjunction with an understanding of the impact on human analysts in anomaly detection could potentially lead to better performance by optimizing work environments.
The threat of nuclear war: Some responses
Marcattilio, A. J. M.; Nevin, John A.
1986-01-01
The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648
Should I use that model? Assessing the transferability of ecological models to new settings
Analysts and scientists frequently apply existing models that estimate ecological endpoints or simulate ecological processes to settings where the models have not been used previously, and where data to parameterize and validate the model may be sparse. Prior to transferring an ...
A Mobile Computing Solution for Collecting Functional Analysis Data on a Pocket PC
ERIC Educational Resources Information Center
Jackson, James; Dixon, Mark R.
2007-01-01
The present paper provides a task analysis for creating a computerized data system using a Pocket PC and Microsoft Visual Basic. With Visual Basic software and any handheld device running the Windows MOBLE operating system, this task analysis will allow behavior analysts to program and customize their own functional analysis data-collection…
Skyview Foods: Eric's Real Dilemma with Channel Partners
ERIC Educational Resources Information Center
Castleberry, Stephen B.
2011-01-01
As a marketing analyst, Eric is faced with several ethical dilemmas. When asked to engage in unethical and illegal behavior, Eric must decide whether to obey his boss and fudge the numbers (the counts of product purchased in order to get reimbursed more from the manufacturer during special sales) or take the ethical route. The case consists of two…
The challenges of applying benefit transfer models to policy sites are often underestimated. Analysts commonly need to estimate site-specific effects for areas that lack data on the number of people who use the resource, intensity of use, and other relevant variables. Yet, the be...
17 CFR 242.505 - Exclusion for news media.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Exclusion for news media. 242.505 Section 242.505 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...-Analyst Certification § 242.505 Exclusion for news media. No provision of this Regulation AC shall apply...
17 CFR 242.505 - Exclusion for news media.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Exclusion for news media. 242.505 Section 242.505 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...-Analyst Certification § 242.505 Exclusion for news media. No provision of this Regulation AC shall apply...
17 CFR 242.505 - Exclusion for news media.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exclusion for news media. 242.505 Section 242.505 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...-Analyst Certification § 242.505 Exclusion for news media. No provision of this Regulation AC shall apply...
17 CFR 242.505 - Exclusion for news media.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Exclusion for news media. 242.505 Section 242.505 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...-Analyst Certification § 242.505 Exclusion for news media. No provision of this Regulation AC shall apply...
17 CFR 242.505 - Exclusion for news media.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Exclusion for news media. 242.505 Section 242.505 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...-Analyst Certification § 242.505 Exclusion for news media. No provision of this Regulation AC shall apply...
| 303-384-7527 Noah joined NREL in 2017 after having worked as a consulting building energy analyst. His to smooth the integration of building energy modeling into the building design process. Noah applies a variety of analytical techniques to solve problems associated with building performance as they
DOT National Transportation Integrated Search
2009-01-01
This booklet provides an overview of SafetyAnalyst. SafetyAnalyst is a set of software tools under development to help State and local highway agencies advance their programming of site-specific safety improvements. SafetyAnalyst will incorporate sta...
A crisis in the analyst's life: self-containment, symbolization, and the holding space.
Michelle, Flax
2011-04-01
Most analysts will experience some degree of crisis in the course of their working life. This paper explores the complex interplay between the analyst's affect during a crisis in her lifeü and the affective dynamics of the patient. The central question is "who or what holds the analyst"--especially in times of crisis. Symbolization of affect, facilitated by the analyst's self-created holding environment, is seen as a vital process in order for containment to take place. In the clinical case presented, the analyst's dog was an integral part of the analyst's self-righting through this difficult period; the dog functioned as an "analytic object" within the analysis.
Conducting meta-analyses of HIV prevention literatures from a theory-testing perspective.
Marsh, K L; Johnson, B T; Carey, M P
2001-09-01
Using illustrations from HIV prevention research, the current article advocates approaching meta-analysis as a theory-testing scientific method rather than as merely a set of rules for quantitative analysis. Like other scientific methods, meta-analysis has central concerns with internal, external, and construct validity. The focus of a meta-analysis should only rarely be merely describing the effects of health promotion, but rather should be on understanding and explaining phenomena and the processes underlying them. The methodological decisions meta-analysts make in conducting reviews should be guided by a consideration of the underlying goals of the review (e.g., simply effect size estimation or, preferably theory testing). From the advocated perspective that a health behavior meta-analyst should test theory, the authors present a number of issues to be considered during the conduct of meta-analyses.
Geographic Visualization of Power-Grid Dynamics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sukumar, Sreenivas R.
2015-06-18
The visualization enables the simulation analyst to see changes in the frequency through time and space. With this technology, the analyst has a bird's eye view of the frequency at loads and generators as the simulated power system responds to the loss of a generator, spikes in load, and other contingencies. The significance of a contingency to the operation of an electrical power system depends critically on how the resulting tansients evolve in time and space. Consequently, these dynamic events can only be understood when seen in their proper geographic context. this understanding is indispensable to engineers working on themore » next generation of distributed sensing and control systems for the smart grid. By making possible a natural and intuitive presentation of dynamic behavior, our new visualization technology is a situational-awareness tool for power-system engineers.« less
Are Brazilian Behavior Analysts Publishing Outside the Box? A Survey of General Science Media.
Dal Ben, Rodrigo; Calixto, Fernanda Castanho; Ferreira, André Luiz
2017-09-01
Recent studies have stressed the importance of disseminating behavior analysis to a more diverse audience and have provided ways to do so effectively. General science publications offer an attractive venue for communicating with a scientifically educated public. The present study examines behavior analysis research published in Science Today and Research Fapesp , monthly general science publications published by the Brazilian Society for the Advancement of Science and São Paulo Research Foundation, respectively. Behavior analytic terms were searched in issues published from 2003 to 2014, along with psychoanalytic terms as a comparative measure. Only 13 behavior analysis articles were found, while psychoanalytic articles totaled 150. Six of the behavior analysis articles misconstrue fundamental concepts of behavior analysis. The study recommends that behavior analysis researchers extend the dissemination of their findings outside the box.
Thermoviscoplastic analysis of fibrous periodic composites using triangular subvolumes
NASA Technical Reports Server (NTRS)
Walker, Kevin P.; Freed, Alan D.; Jordan, Eric H.
1993-01-01
The nonlinear viscoplastic behavior of fibrous periodic composites is analyzed by discretizing the unit cell into triangular subvolumes. A set of these subvolumes can be configured by the analyst to construct a representation for the unit cell of a periodic composite. In each step of the loading history, the total strain increment at any point is governed by an integral equation which applies to the entire composite. A Fourier series approximation allows the incremental stresses and strains to be determined within a unit cell of the periodic lattice. The nonlinearity arising from the viscoplastic behavior of the constituent materials comprising the composite is treated as fictitious body force in the governing integral equation. Specific numerical examples showing the stress distributions in the unit cell of a fibrous tungsten/copper metal matrix composite under viscoplastic loading conditions are given. The stress distribution resulting in the unit cell when the composite material is subjected to an overall transverse stress loading history perpendicular to the fibers is found to be highly heterogeneous, and typical homogenization techniques based on treating the stress and strain distributions within the constituent phases as homogeneous result in large errors under inelastic loading conditions.
Thermoviscoplastic analysis of fibrous periodic composites by the use of triangular subvolumes
NASA Technical Reports Server (NTRS)
Walker, Kevin P.; Freed, Alan D.; Jordan, Eric H.
1994-01-01
The non-linear viscoplastic behavior of fibrous periodic composites is analyzed by discretizing the unit cell into triangular subvolumes. A set of these subvolumes can be configured by the analyst to construct a representation for the unit cell of a periodic composite. In each step of the loading history the total strain increment at any point is governed by an integral equation which applies to the entire composite. A Fourier series approximation allows the incremental stresses and strains to be determined within a unit cell of the periodic lattice. The non-linearity arising from the viscoplastic behavior of the constituent materials comprising the composite is treated as a fictitious body force in the governing integral equation. Specific numerical examples showing the stress distributions in the unit cell of a fibrous tungsten/copper metal-matrix composite under viscoplastic loading conditions are given. The stress distribution resulting in the unit cell when the composite material is subjected to an overall transverse stress loading history perpendicular to the fibers is found to be highly heterogeneous, and typical homogenization techniques based on treating the stress and strain distributions within the constituent phases as homogeneous result in large errors under inelastic loading conditions.
NASA Technical Reports Server (NTRS)
Wharton, S. W.
1980-01-01
An Interactive Cluster Analysis Procedure (ICAP) was developed to derive classifier training statistics from remotely sensed data. The algorithm interfaces the rapid numerical processing capacity of a computer with the human ability to integrate qualitative information. Control of the clustering process alternates between the algorithm, which creates new centroids and forms clusters and the analyst, who evaluate and elect to modify the cluster structure. Clusters can be deleted or lumped pairwise, or new centroids can be added. A summary of the cluster statistics can be requested to facilitate cluster manipulation. The ICAP was implemented in APL (A Programming Language), an interactive computer language. The flexibility of the algorithm was evaluated using data from different LANDSAT scenes to simulate two situations: one in which the analyst is assumed to have no prior knowledge about the data and wishes to have the clusters formed more or less automatically; and the other in which the analyst is assumed to have some knowledge about the data structure and wishes to use that information to closely supervise the clustering process. For comparison, an existing clustering method was also applied to the two data sets.
The intersubjective links in perversion.
Eiguer, Alberto
2007-10-01
The author studies the intersubjective links which the pervert maintains with analyst or partner, attempting to indicate the differences between the investments in each case. Rather than accepting that empathy towards these patients is impossible to achieve and disturbs the countertransference profoundly, it attempts to show that these difficulties may be overcome if they are reinterpreted in the light of the theory of the intersubjective link. The author examines the theories and the practice of intersubjectivity and gives a definition of his approach to the link between two subjects. He applies these ideas to the case of a sexually masochistic female patient. The countertransference is marked successively by indifference, rejection and smothering. The analysis of the analyst's dream allows the situation to evolve. Failures in primary identification can result in domination over others and utilitarianism. The author examines the place of the challenge to the 'Law' and the father (in the attempt by the patient to put a theory to the test) in order to identify the figure of the witness in the pervert's intersubjective links. The desire of the transference would be marked by the figure of the witness rather than by that of the analyst as accomplice.
Online Interactive Tutorials for Creating Graphs With Excel 2007 or 2010
Vanselow, Nicholas R
2012-01-01
Graphic display of clinical data is a useful tool for the behavior-analytic clinician. However, graphs can sometimes be difficult to create. We describe how to access and use an online interactive tutorial that teaches the user to create a variety of graphs often used by behavior analysts. Three tutorials are provided that cover the basics of Microsoft Excel 2007 or 2010, creating graphs for clinical purposes, and creating graphs for research purposes. The uses for this interactive tutorial and other similar programs are discussed. PMID:23326629
Online interactive tutorials for creating graphs with excel 2007 or 2010.
Vanselow, Nicholas R; Bourret, Jason C
2012-01-01
Graphic display of clinical data is a useful tool for the behavior-analytic clinician. However, graphs can sometimes be difficult to create. We describe how to access and use an online interactive tutorial that teaches the user to create a variety of graphs often used by behavior analysts. Three tutorials are provided that cover the basics of Microsoft Excel 2007 or 2010, creating graphs for clinical purposes, and creating graphs for research purposes. The uses for this interactive tutorial and other similar programs are discussed.
2012-01-01
Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com Web site: http://www.igi-global.com Copyright © 2011...Lawrence Erlbaum Associates. Anderson, J. R., & Lebiere, C. (2003). The New- ell test for a theory of mind. The Behavioral and Brain Sciences, 26(5
ERIC Educational Resources Information Center
Kingsdorf, Sheri
2014-01-01
One of the domains most commonly affected by autism spectrum disorders (ASD) is communication (American Psychiatric Association, 2000). Language deficits in children with ASD can be as severe as to warrant a label as nonverbal, or characterized by difficulties with the functions of communication. Additionally, deficits in language for children…
ERIC Educational Resources Information Center
Tyner, Bryan C.; Fienup, Daniel M.
2015-01-01
Graphing is socially significant for behavior analysts; however, graphing can be difficult to learn. Video modeling (VM) may be a useful instructional method but lacks evidence for effective teaching of computer skills. A between-groups design compared the effects of VM, text-based instruction, and no instruction on graphing performance.…
Using steady-state equations for transient flow calculation in natural gas pipelines
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maddox, R.N.; Zhou, P.
1984-04-02
Maddox and Zhou have extended their technique for calculating the unsteady-state behavior of straight gas pipelines to complex pipeline systems and networks. After developing the steady-state flow rate and pressure profile for each pipe in the network, analysts can perform the transient-state analysis in the real-time step-wise manner described for this technique.
ERIC Educational Resources Information Center
Lambert, Joseph M.; Lloyd, Blair P.; Staubitz, Johanna L.; Weaver, Emily S.; Jennings, Chelsea M.
2014-01-01
The trial-based functional analysis (FA) is a useful alternative to the traditional FA in contexts in which it is challenging to establish environmental control for extended periods of time. Previous researchers have demonstrated that others can be trained to conduct trial-based FAs with high procedural fidelity by providing a didactic…
Analytical Tools for Behavioral Influences Operations
2003-12-01
NASIC’s Investment in Analytical Capabilities ....................................................... 56 6.2 Study Limitations...get started. This project is envisioned as a foundation for future work by NASIC analysts. They will use the tools identified in this study to...capabilities Though this study took all three categories into account, most (90%) of the focus for the SRA team’s effort was on identifying and analyzing
NASA Astrophysics Data System (ADS)
Hutchinson, Steve; Erbacher, Robert F.
2015-05-01
Network security monitoring is currently challenged by its reliance on human analysts and the inability for tools to generate indications and warnings for previously unknown attacks. We propose a reputation system based on IP address set membership within the Autonomous System Number (ASN) system. Essentially, a metric generated based on the historic behavior, or misbehavior, of nodes within a given ASN can be used to predict future behavior and provide a mechanism to locate network activity requiring inspection. This will provide reinforcement of notifications and warnings and lead to inspection for ASNs known to be problematic even if initial inspection leads to interpretation of the event as innocuous. We developed proof of concept capabilities to generate the IP address to ASN set membership and analyze the impact of the results. These results clearly show that while some ASNs are one-offs with individual or small numbers of misbehaving IP addresses, there are definitive ASNs with a history of long term and wide spread misbehaving IP addresses. These ASNs with long histories are what we are especially interested in and will provide an additional correlation metric for the human analyst and lead to new tools to aid remediation of these IP address blocks.
A Funny Thing Hapenned on the Way to the Future: Regenerating Our Academic Institutions.
ERIC Educational Resources Information Center
Robson, Kenneth
The development of modern planning theories and strategies, as applied to higher education, has been both contentious and inconsistent. Planning originated as a management function and responsibility, but by the 1960s, analysts, statisticians, and strategists were providing the rationales for the major planning decisions. The inflexibility of…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-17
... comments via: E-mail: [email protected] Mail: George Higginbotham, Management Policy Analyst... individuals and/or officers of for-profit and non-profit non-governmental organizations (NGOs) who apply for..., 2011. Lynn Winston, Division Chief, Information and Records Division, Office of Management Services...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
... Internatinal Corp, Comsys, Filter LLC, Excell, Entegee, Chipton-Ross, Ian Martin, Can-Tech, IT Services, IDEX... Internatinal Corp, Comsys, Filter LLC, Excell, Entegee, Chipton-Ross, Ian Martin, Can-Tech, IT Services, IDEX..., Inconen, CTS, Hi-Tec, Woods, Ciber, Kelly Services, Analysts International Corp, Comsys, Filter LLC...
Library Effectiveness: A Systems Approach.
ERIC Educational Resources Information Center
Morse, Philip M.
Addressed to both librarians and systems analysts, this book attempts to apply the analytic methods of operations research and systems analysis to the operating problems of the library. The first part of the book discusses theoretical models with emphasis on the pattern of book use, on its change with time and on the problem of estimating and…
Three Approaches for Developing Training Materials and Curriculum Policies.
ERIC Educational Resources Information Center
Doxey, Isabel
Agencies funding early childhood education projects, policy analysts, and research consumers have created a demand for research tools generating data with applied reliability. This paper examines the focus group as a social science research tool which meets this demand. Part 1 defines a focus group as a carefully planned discussion designed to…
NASA Astrophysics Data System (ADS)
Ferdous, Nazneen; Bhat, Chandra R.
2013-01-01
This paper proposes and estimates a spatial panel ordered-response probit model with temporal autoregressive error terms to analyze changes in urban land development intensity levels over time. Such a model structure maintains a close linkage between the land owner's decision (unobserved to the analyst) and the land development intensity level (observed by the analyst) and accommodates spatial interactions between land owners that lead to spatial spillover effects. In addition, the model structure incorporates spatial heterogeneity as well as spatial heteroscedasticity. The resulting model is estimated using a composite marginal likelihood (CML) approach that does not require any simulation machinery and that can be applied to data sets of any size. A simulation exercise indicates that the CML approach recovers the model parameters very well, even in the presence of high spatial and temporal dependence. In addition, the simulation results demonstrate that ignoring spatial dependency and spatial heterogeneity when both are actually present will lead to bias in parameter estimation. A demonstration exercise applies the proposed model to examine urban land development intensity levels using parcel-level data from Austin, Texas.
Principles of computer processing of Landsat data for geologic applications
Taranik, James V.
1978-01-01
The main objectives of computer processing of Landsat data for geologic applications are to improve display of image data to the analyst or to facilitate evaluation of the multispectral characteristics of the data. Interpretations of the data are made from enhanced and classified data by an analyst trained in geology. Image enhancements involve adjustments of brightness values for individual picture elements. Image classification involves determination of the brightness values of picture elements for a particular cover type. Histograms are used to display the range and frequency of occurrence of brightness values. Landsat-1 and -2 data are preprocessed at Goddard Space Flight Center (GSFC) to adjust for the detector response of the multispectral scanner (MSS). Adjustments are applied to minimize the effects of striping, adjust for bad-data lines and line segments and lost individual pixel data. Because illumination conditions and landscape characteristics vary considerably and detector response changes with time, the radiometric adjustments applied at GSFC are seldom perfect and some detector striping remain in Landsat data. Rotation of the Earth under the satellite and movements of the satellite platform introduce geometric distortions in the data that must also be compensated for if image data are to be correctly displayed to the data analyst. Adjustments to Landsat data are made to compensate for variable solar illumination and for atmospheric effects. GeoMetric registration of Landsat data involves determination of the spatial location of a pixel in. the output image and the determination of a new value for the pixel. The general objective of image enhancement is to optimize display of the data to the analyst. Contrast enhancements are employed to expand the range of brightness values in Landsat data so that the data can be efficiently recorded in a manner desired by the analyst. Spatial frequency enhancements are designed to enhance boundaries between features which have subtle differences in brightness values. Ratioing tends to reduce the effects due to topography and it tends to emphasize changes in brightness values between two Landsat bands. Simulated natural color is produced for geologists so that the colors of materials on images appear similar to colors of actual materials in the field. Image classification of Landsat data involves both machine assisted delineation of multispectral patterns in four-dimensional spectral space and identification of machine delineated multispectral patterns that represent particular cover conditions. The geological information derived from an analysis of a multispectral classification is usually related to lithology.
Dynamics of early planetary gear trains
NASA Technical Reports Server (NTRS)
August, R.; Kasuba, R.; Frater, J. L.; Pintz, A.
1984-01-01
A method to analyze the static and dynamic loads in a planetary gear train was developed. A variable-variable mesh stiffness (VVMS) model was used to simulate the external and internal spur gear mesh behavior, and an equivalent conventional gear train concept was adapted for the dynamic studies. The analysis can be applied either involute or noninvolute spur gearing. By utilizing the equivalent gear train concept, the developed method may be extended for use for all types of epicyclic gearing. The method is incorporated into a computer program so that the static and dynamic behavior of individual components can be examined. Items considered in the analysis are: (1) static and dynamic load sharing among the planets; (2) floating or fixed Sun gear; (3) actual tooth geometry, including errors and modifications; (4) positioning errors of the planet gears; (5) torque variations due to noninvolute gear action. A mathematical model comprised of power source, load, and planetary transmission is used to determine the instantaneous loads to which the components are subjected. It considers fluctuating output torque, elastic behavior in the system, and loss of contact between gear teeth. The dynamic model has nine degrees of freedom resulting in a set of simultaneous second order differential equations with time varying coefficients, which are solved numerically. The computer program was used to determine the effect of manufacturing errors, damping and component stiffness, and transmitted load on dynamic behavior. It is indicated that this methodology offers the designer/analyst a comprehensive tool with which planetary drives may be quickly and effectively evaluated.
MetaboAnalystR: an R package for flexible and reproducible analysis of metabolomics data.
Chong, Jasmine; Xia, Jianguo
2018-06-28
The MetaboAnalyst web application has been widely used for metabolomics data analysis and interpretation. Despite its user-friendliness, the web interface has presented its inherent limitations (especially for advanced users) with regard to flexibility in creating customized workflow, support for reproducible analysis, and capacity in dealing with large data. To address these limitations, we have developed a companion R package (MetaboAnalystR) based on the R code base of the web server. The package has been thoroughly tested to ensure that the same R commands will produce identical results from both interfaces. MetaboAnalystR complements the MetaboAnalyst web server to facilitate transparent, flexible and reproducible analysis of metabolomics data. MetaboAnalystR is freely available from https://github.com/xia-lab/MetaboAnalystR. Supplementary data are available at Bioinformatics online.
Extracting decision rules from police accident reports through decision trees.
de Oña, Juan; López, Griselda; Abellán, Joaquín
2013-01-01
Given the current number of road accidents, the aim of many road safety analysts is to identify the main factors that contribute to crash severity. To pinpoint those factors, this paper shows an application that applies some of the methods most commonly used to build decision trees (DTs), which have not been applied to the road safety field before. An analysis of accidents on rural highways in the province of Granada (Spain) between 2003 and 2009 (both inclusive) showed that the methods used to build DTs serve our purpose and may even be complementary. Applying these methods has enabled potentially useful decision rules to be extracted that could be used by road safety analysts. For instance, some of the rules may indicate that women, contrary to men, increase their risk of severity under bad lighting conditions. The rules could be used in road safety campaigns to mitigate specific problems. This would enable managers to implement priority actions based on a classification of accidents by types (depending on their severity). However, the primary importance of this proposal is that other databases not used here (i.e. other infrastructure, roads and countries) could be used to identify unconventional problems in a manner easy for road safety managers to understand, as decision rules. Copyright © 2012 Elsevier Ltd. All rights reserved.
A General Methodology for the Translation of Behavioral Terms into Vernacular Languages.
Virues-Ortega, Javier; Martin, Neil; Schnerch, Gabriel; García, Jesús Ángel Miguel; Mellichamp, Fae
2015-05-01
As the field of behavior analysis expands internationally, the need for comprehensive and systematic glossaries of behavioral terms in the vernacular languages of professionals and clients becomes crucial. We created a Spanish-language glossary of behavior-analytic terms by developing and employing a systematic set of decision-making rules for the inclusion of terms. We then submitted the preliminary translation to a multi-national advisory committee to evaluate the transnational acceptability of the glossary. This method led to a translated corpus of over 1200 behavioral terms. The end products of this work included the following: (a) a Spanish-language glossary of behavior analytic terms that are publicly available over the Internet through the Behavior Analyst Certification Board and (b) a set of translation guidelines summarized here that may be useful for the development of glossaries of behavioral terms into other vernacular languages.
Commentary on Malone: Who Founded Behaviorism?
Reese, Hayne W
2015-05-01
Malone (The Behavior Analyst, 37, 1-12 2014) argued that the emergence of behaviorism was inevitable with or without Watson's participation, mainly because protobehavioral ideas and dissatisfaction with classical structuralism were already widespread. However, the first premise is questionable because many of the ideas Malone cited were consistent with structuralism rather than behaviorism, and even if both premises were true they would not make the emergence of behaviorism-or anything else-inevitable. Historical evidence for inevitability is always retrospective and therefore always allows the logical fallacy of "after this, therefore because of this." In the relevant real world Watson existed, he was a psychologist, he was the first to publish an article that described a "behaviorism," and he promoted his behaviorism in later works. Stories about what would have happened without Watson's participation are therefore counterfactual and this lack of historicity makes the stories fictional rather than scientific. In the real world, Watson founded behaviorism.
Buchanan, Verica; Lu, Yafeng; McNeese, Nathan; Steptoe, Michael; Maciejewski, Ross; Cooke, Nancy
2017-03-01
Historically, domains such as business intelligence would require a single analyst to engage with data, develop a model, answer operational questions, and predict future behaviors. However, as the problems and domains become more complex, organizations are employing teams of analysts to explore and model data to generate knowledge. Furthermore, given the rapid increase in data collection, organizations are struggling to develop practices for intelligence analysis in the era of big data. Currently, a variety of machine learning and data mining techniques are available to model data and to generate insights and predictions, and developments in the field of visual analytics have focused on how to effectively link data mining algorithms with interactive visuals to enable analysts to explore, understand, and interact with data and data models. Although studies have explored the role of single analysts in the visual analytics pipeline, little work has explored the role of teamwork and visual analytics in the analysis of big data. In this article, we present an experiment integrating statistical models, visual analytics techniques, and user experiments to study the role of teamwork in predictive analytics. We frame our experiment around the analysis of social media data for box office prediction problems and compare the prediction performance of teams, groups, and individuals. Our results indicate that a team's performance is mediated by the team's characteristics such as openness of individual members to others' positions and the type of planning that goes into the team's analysis. These findings have important implications for how organizations should create teams in order to make effective use of information from their analytic models.
"This strange disease": adolescent transference and the analyst's sexual orientation.
Burton, John K; Gilmore, Karen
2010-08-01
The treatment of adolescents by gay analysts is uncharted territory regarding the impact of the analyst's sexuality on the analytic process. Since a core challenge of adolescence involves the integration of the adult sexual body, gender role, and reproductive capacities into evolving identity, and since adolescents seek objects in their environment to facilitate both identity formation and the establishment of autonomy from primary objects, the analyst's sexual orientation is arguably a potent influence on the outcome of adolescent development. However, because sexual orientation is a less visible characteristic of the analyst than gender, race, or age, for example, the line between reality and fantasy is less clearly demarcated. This brings up special considerations regarding discovery and disclosure in the treatment. To explore these issues, the case of a late adolescent girl in treatment with a gay male analyst is presented. In this treatment, the question of the analyst's sexual orientation, and the demand by the patient for the analyst's self-disclosure, became a transference nucleus around which the patient's individual dynamics and adolescent dilemmas could be explored and clarified.
Optimization and validation of a minicolumn method for determining aflatoxins in copra meal.
Arim, R H; Aguinaldo, A R; Tanaka, T; Yoshizawa, T
1999-01-01
A minicolumn (MC) method for determining aflatoxins in copra meal was optimized and validated. The method uses methanol-4% KCl solution as extractant and CuSO4 solution as clarifying agent. The chloroform extract is applied to an MC that incorporates "lahar," an indigenous material, as substitute for silica gel. The "lahar"-containing MC produces a more distinct and intense blue fluoresence on the Florisil layer than an earlier MC. The method has a detection limit of 15 micrograms total aflatoxins/kg sample. Confirmatory tests using 50% H2SO4 and trifluoroacetic acid in benzene with 25% HNO3 showed that copra meal samples contained aflatoxins and no interfering agents. The MC responses of the copra meal samples were in good agreement with their behavior in thin-layer chromatography. This modified MC method is accurate, giving linearity-valid results; rapid, being done in 15 min; economical, using low-volume reagents; relatively safe, having low-exposure risk of analysts to chemicals; and simple, making its field application feasible.
Towards Evaluating and Enhancing the Reach of Online Health Forums for Smoking Cessation
Stearns, Michael; Nambiar, Siddhartha; Nikolaev, Alexander; Semenov, Alexander; McIntosh, Scott
2015-01-01
Online pro-health social networks facilitating smoking cessation through web-assisted interventions have flourished in the past decade. In order to properly evaluate and increase the impact of this form of treatment on society, one needs to understand and be able to quantify its reach, as defined within the widely-adopted RE-AIM framework. In the online communication context, user engagement is an integral component of reach. This paper quantitatively studies the effect of engagement on the users of the Alt.Support.Stop-Smoking forum that served the needs of an online smoking cessation community for more than ten years. The paper then demonstrates how online service evaluation and planning by social network analysts can be applied towards strategic interventions targeting increased user engagement in online health forums. To this end, the challenges and opportunities are identified in the development of thread recommendation systems using core-users as a strategic resource for effective and efficient spread of healthy behaviors, in particular smoking cessation. PMID:26075158
The SRI-WEFA Soviet Econometric Model: Phase One Documentation
1975-03-01
established prices. We also have an estimated equation for an end-use residual category which conceptually includes state grain reserves, other undis...forecasting. An important virtue of the econometric discipline is that it requires one first to conceptualize and estimate regularities of behavior...any de- scriptive analysis. Within the framwork of an econometric model, the analyst is able to discriminate among these "special events
Project Air Force Annual Report 2007
2007-01-01
China has developed options that would make it a formidable adversary, particularly in a conflict over Taiwan , which the United States remains...he focused on China’s relationship with Taiwan . Since then, he has worked with other RAND analysts, such as David Orletsky, Evan Medeiros, Keith Crane...Hamilton, engineers Jeff Hagen and David Vaughan, Air Force Fellow Michelle Grace, behavioral scientist Larry Hanser, and information scientist Herb Shukiar
ERIC Educational Resources Information Center
Apsche, Jack A.; Bass, Christopher K.; Murphy, Christopher J.
2004-01-01
This paper compares the results of two separate published studies regarding adolescent males with conduct disorders and/or personality disorders/traits. Both studies were published in the Behavior Analyst Today, Vol. 3, No. 4, Vol 5, No. 1, respectively. The concept is to evaluate two treatment research studies that represent "the best" practices…
Haidar Ahmad, Imad A; Blasko, Andrei
2017-08-11
The aim of this work is to identify the parameters that affect the recovery of pharmaceutical residues from the surface of stainless steel coupons. A series of factors were assessed, including drug product spike levels, spiking procedure, drug-excipient ratios, analyst-to-analyst variability, intraday variability, and cleaning procedure of the coupons. The lack of a well-defined procedure that consistently cleaned the coupon surface was identified as the major contributor to low and variable recoveries. Assessment of cleaning the surface of the coupons with clean-in-place solutions (CIP) gave high recovery (>90%) and reproducible results (Srel≤4%) regardless of the conditions that were assessed previously. The approach was successfully applied for cleaning verification of small molecules (MW <1,000 Da) as well as large biomolecules (MW up to 50,000 Da).
The Performance of Local Dependence Measures with Psychological Data
ERIC Educational Resources Information Center
Houts, Carrie R.; Edwards, Michael C.
2013-01-01
The violation of the assumption of local independence when applying item response theory (IRT) models has been shown to have a negative impact on all estimates obtained from the given model. Numerous indices and statistics have been proposed to aid analysts in the detection of local dependence (LD). A Monte Carlo study was conducted to evaluate…
Annual Technology Baseline and Standard Scenarios | Energy Analysis | NREL
electric sector analysis in the United States. NREL analysts consistently apply the products of this work Scenarios Annual Report and A U.S. Electric Sector Outlook - This annual report presents an outlook of the U.S. electricity sector based on a suite of standard scenarios with their associated assumptions
Rachlin, H
1999-01-01
Mentalistic terms such as belief and desire have been rejected by behavior analysts because they are traditionally held to refer to unobservable events inside the organism. Behavior analysis has consequently been viewed by philosophers to be at best irrelevant to psychology, understood as a science of the mind. In this book, the philosopher Rowland Stout argues cogently that beliefs and desires (like operants such as rats' lever presses) are best understood in terms of an interaction over time between overt behavior and its overt consequences (a viewpoint called teleological behaviorism). This book is important because it identifies the science of the mind with the science of overt behavior and implies that the psychologists best equipped to study mental life are not those who purport to do so but those who focus on the experimental analysis of behavior. PMID:10503301
ERIC Educational Resources Information Center
Arellano, Eduardo C.; Martinez, Mario C.
2009-01-01
This study compares the extent to which higher education policy analysts and master's and doctoral faculty of higher education and public affairs programs match on a set of competencies thought to be important to higher education policy analysis. Analysts matched master's faculty in three competencies while analysts and doctoral faculty matched in…
The Variability of Crater Identification Among Expert and Community Crater Analysts
NASA Astrophysics Data System (ADS)
Robbins, S. J.; Antonenko, I.; Kirchoff, M. R.; Chapman, C. R.; Fassett, C. I.; Herrick, R. R.; Singer, K.; Zanetti, M.; Lehan, C.; Huang, D.; Gay, P.
2014-04-01
Statistical studies of impact crater populations have been used to model ages of planetary surfaces for several decades [1]. This assumes that crater counts are approximately invariant and a "correct" population will be identified if the analyst is skilled and diligent. However, the reality is that crater identification is somewhat subjective, so variability between analysts, or even a single analyst's variation from day-to-day, is expected [e.g., 2, 3]. This study was undertaken to quantify that variability within an expert analyst population and between experts and minimally trained volunteers.
Tyner, Bryan C; Fienup, Daniel M
2015-09-01
Graphing is socially significant for behavior analysts; however, graphing can be difficult to learn. Video modeling (VM) may be a useful instructional method but lacks evidence for effective teaching of computer skills. A between-groups design compared the effects of VM, text-based instruction, and no instruction on graphing performance. Participants who used VM constructed graphs significantly faster and with fewer errors than those who used text-based instruction or no instruction. Implications for instruction are discussed. © Society for the Experimental Analysis of Behavior.
Reasons to value the health care intangible asset valuation.
Reilly, Robert F
2012-01-01
There are numerous individual reasons to conduct a health care intangible asset valuation. This discussion summarized many of these reasons and considered the common categories of these individual reasons. Understanding the reason for the intangible asset analysis is an important prerequisite to conducting the valuation, both for the analyst and the health care owner/operator. This is because an intangible asset valuation may not be the type of analysis that the owner/operator really needs. Rather, the owner/operator may really need an economic damages measurement, a license royalty rate analysis, an intercompany transfer price study, a commercialization potential evaluation, or some other type of intangible asset analysis. In addition, a clear definition of the reason for the valuation will allow the analyst to understand if (1) any specific analytical guidelines, procedures, or regulations apply and (2) any specific reporting requirement applies. For example, intangible asset valuations prepared for fair value accounting purposes should meet specific ASC 820 fair value accounting guidance. Intangible asset valuations performed for intercompany transfer price tax purposes should comply with the guidance provided in the Section 482 regulations. Likewise, intangible asset valuations prepared for Section 170 charitable contribution purposes should comply with specific reporting requirements. The individual reasons for the health care intangible asset valuation may influence the standard of value applied, the valuation date selected, the valuation approaches and methods applied, the form and format of valuation report prepared, and even the type of professional employed to perform the valuation.
Zhao, Jian; Glueck, Michael; Breslav, Simon; Chevalier, Fanny; Khan, Azam
2017-01-01
User-authored annotations of data can support analysts in the activity of hypothesis generation and sensemaking, where it is not only critical to document key observations, but also to communicate insights between analysts. We present annotation graphs, a dynamic graph visualization that enables meta-analysis of data based on user-authored annotations. The annotation graph topology encodes annotation semantics, which describe the content of and relations between data selections, comments, and tags. We present a mixed-initiative approach to graph layout that integrates an analyst's manual manipulations with an automatic method based on similarity inferred from the annotation semantics. Various visual graph layout styles reveal different perspectives on the annotation semantics. Annotation graphs are implemented within C8, a system that supports authoring annotations during exploratory analysis of a dataset. We apply principles of Exploratory Sequential Data Analysis (ESDA) in designing C8, and further link these to an existing task typology in the visualization literature. We develop and evaluate the system through an iterative user-centered design process with three experts, situated in the domain of analyzing HCI experiment data. The results suggest that annotation graphs are effective as a method of visually extending user-authored annotations to data meta-analysis for discovery and organization of ideas.
NASA Astrophysics Data System (ADS)
Brekke, L. D.; Pruitt, T.; Maurer, E. P.; Duffy, P. B.
2007-12-01
Incorporating climate change information into long-term evaluations of water and energy resources requires analysts to have access to climate projection data that have been spatially downscaled to "basin-relevant" resolution. This is necessary in order to develop system-specific hydrology and demand scenarios consistent with projected climate scenarios. Analysts currently have access to "climate model" resolution data (e.g., at LLNL PCMDI), but not spatially downscaled translations of these datasets. Motivated by a common interest in supporting regional and local assessments, the U.S. Bureau of Reclamation and LLNL (through support from the DOE National Energy Technology Laboratory) have teamed to develop an archive of downscaled climate projections (temperature and precipitation) with geographic coverage consistent with the North American Land Data Assimilation System domain, encompassing the contiguous United States. A web-based information service, hosted at LLNL Green Data Oasis, has been developed to provide Reclamation, LLNL, and other interested analysts free access to archive content. A contemporary statistical method was used to bias-correct and spatially disaggregate projection datasets, and was applied to 112 projections included in the WCRP CMIP3 multi-model dataset hosted by LLNL PCMDI (i.e. 16 GCMs and their multiple simulations of SRES A2, A1b, and B1 emissions pathways).
The development of a reliable amateur boxing performance analysis template.
Thomson, Edward; Lamb, Kevin; Nicholas, Ceri
2013-01-01
The aim of this study was to devise a valid performance analysis system for the assessment of the movement characteristics associated with competitive amateur boxing and assess its reliability using analysts of varying experience of the sport and performance analysis. Key performance indicators to characterise the demands of an amateur contest (offensive, defensive and feinting) were developed and notated using a computerised notational analysis system. Data were subjected to intra- and inter-observer reliability assessment using median sign tests and calculating the proportion of agreement within predetermined limits of error. For all performance indicators, intra-observer reliability revealed non-significant differences between observations (P > 0.05) and high agreement was established (80-100%) regardless of whether exact or the reference value of ±1 was applied. Inter-observer reliability was less impressive for both analysts (amateur boxer and experienced analyst), with the proportion of agreement ranging from 33-100%. Nonetheless, there was no systematic bias between observations for any indicator (P > 0.05), and the proportion of agreement within the reference range (±1) was 100%. A reliable performance analysis template has been developed for the assessment of amateur boxing performance and is available for use by researchers, coaches and athletes to classify and quantify the movement characteristics of amateur boxing.
Analyst-to-Analyst Variability in Simulation-Based Prediction
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glickman, Matthew R.; Romero, Vicente J.
This report describes findings from the culminating experiment of the LDRD project entitled, "Analyst-to-Analyst Variability in Simulation-Based Prediction". For this experiment, volunteer participants solving a given test problem in engineering and statistics were interviewed at different points in their solution process. These interviews are used to trace differing solutions to differing solution processes, and differing processes to differences in reasoning, assumptions, and judgments. The issue that the experiment was designed to illuminate -- our paucity of understanding of the ways in which humans themselves have an impact on predictions derived from complex computational simulations -- is a challenging and openmore » one. Although solution of the test problem by analyst participants in this experiment has taken much more time than originally anticipated, and is continuing past the end of this LDRD, this project has provided a rare opportunity to explore analyst-to-analyst variability in significant depth, from which we derive evidence-based insights to guide further explorations in this important area.« less
A method for discrimination of noise and EMG signal regions recorded during rhythmic behaviors.
Ying, Rex; Wall, Christine E
2016-12-08
Analyses of muscular activity during rhythmic behaviors provide critical data for biomechanical studies. Electrical potentials measured from muscles using electromyography (EMG) require discrimination of noise regions as the first step in analysis. An experienced analyst can accurately identify the onset and offset of EMG but this process takes hours to analyze a short (10-15s) record of rhythmic EMG bursts. Existing computational techniques reduce this time but have limitations. These include a universal threshold for delimiting noise regions (i.e., a single signal value for identifying the EMG signal onset and offset), pre-processing using wide time intervals that dampen sensitivity for EMG signal characteristics, poor performance when a low frequency component (e.g., DC offset) is present, and high computational complexity leading to lack of time efficiency. We present a new statistical method and MATLAB script (EMG-Extractor) that includes an adaptive algorithm to discriminate noise regions from EMG that avoids these limitations and allows for multi-channel datasets to be processed. We evaluate the EMG-Extractor with EMG data on mammalian jaw-adductor muscles during mastication, a rhythmic behavior typified by low amplitude onsets/offsets and complex signal pattern. The EMG-Extractor consistently and accurately distinguishes noise from EMG in a manner similar to that of an experienced analyst. It outputs the raw EMG signal region in a form ready for further analysis. Copyright © 2016 Elsevier Ltd. All rights reserved.
Walters, Kerri; Thomson, Kendra
2013-01-01
This article examines the convergence of factors that led to behavior analysis taking root, flourishing, and bearing fruit in a prairie province of Canada. In the latter half of the 1960s, Garry Martin and Joseph Pear began teaching behavior-analytic courses at the University of Manitoba. They and their students then initiated behavioral treatment and research programs at the Manitoba Developmental Center and St.Amant, the two main residential facilities for persons with intellectual disabilities and autism. Since that time, behavior analysis in Manitoba has flourished, and the knowledge and skills gained have been shared with other behavior analysts throughout the world through conferences, articles, and books. Behavior-analytic books by authors who live and work in Manitoba have been translated into eight languages. Moreover, University of Manitoba graduates in behavior analysis have helped to spread knowledge of behavior analysis throughout the world, and a number have achieved highly influential positions and widespread recognition within the discipline. PMID:25729132
The patient who believes and the analyst who does not (1).
Lijtmaer, Ruth M
2009-01-01
A patient's religious beliefs and practices challenge the clinical experience and self-knowledge of the analyst owing to a great complexity of factors, and often take the form of the analyst's resistances and countertransference reactions to spiritual and religious issues. The analyst's feelings about the patient's encounters with religion and other forms of healing experiences may result in impasses and communication breakdown for a variety of reasons. These reasons include the analyst's own unresolved issues around her role as a psychoanalyst-which incorporates in some way psychoanalysis's views of religious belief-and these old conflicts may be irritated by the religious themes expressed by the patient. Vignettes from the treatments of two patients provide examples of the analyst's countertransference conflicts, particularly envy in the case of a therapist who is an atheist.
NASA Astrophysics Data System (ADS)
Garfinkle, Noah W.; Selig, Lucas; Perkins, Timothy K.; Calfas, George W.
2017-05-01
Increasing worldwide internet connectivity and access to sources of print and open social media has increased near realtime availability of textual information. Capabilities to structure and integrate textual data streams can contribute to more meaningful representations of operational environment factors (i.e., Political, Military, Economic, Social, Infrastructure, Information, Physical Environment, and Time [PMESII-PT]) and tactical civil considerations (i.e., Areas, Structures, Capabilities, Organizations, People and Events [ASCOPE]). However, relying upon human analysts to encode this information as it arrives quickly proves intractable. While human analysts possess an ability to comprehend context in unstructured text far beyond that of computers, automated geoparsing (the extraction of locations from unstructured text) can empower analysts to automate sifting through datasets for areas of interest. This research evaluates existing approaches to geoprocessing as well as initiating the research and development of locally-improved methods of tagging parts of text as possible locations, resolving possible locations into coordinates, and interfacing such results with human analysts. The objective of this ongoing research is to develop a more contextually-complete picture of an area of interest (AOI) including human-geographic context for events. In particular, our research is working to make improvements to geoparsing (i.e., the extraction of spatial context from documents), which requires development, integration, and validation of named-entity recognition (NER) tools, gazetteers, and entity-attribution. This paper provides an overview of NER models and methodologies as applied to geoparsing, explores several challenges encountered, presents preliminary results from the creation of a flexible geoparsing research pipeline, and introduces ongoing and future work with the intention of contributing to the efficient geocoding of information containing valuable insights into human activities in space.
Analyzing Human-Landscape Interactions: Tools That Integrate
NASA Astrophysics Data System (ADS)
Zvoleff, Alex; An, Li
2014-01-01
Humans have transformed much of Earth's land surface, giving rise to loss of biodiversity, climate change, and a host of other environmental issues that are affecting human and biophysical systems in unexpected ways. To confront these problems, environmental managers must consider human and landscape systems in integrated ways. This means making use of data obtained from a broad range of methods (e.g., sensors, surveys), while taking into account new findings from the social and biophysical science literatures. New integrative methods (including data fusion, simulation modeling, and participatory approaches) have emerged in recent years to address these challenges, and to allow analysts to provide information that links qualitative and quantitative elements for policymakers. This paper brings attention to these emergent tools while providing an overview of the tools currently in use for analysis of human-landscape interactions. Analysts are now faced with a staggering array of approaches in the human-landscape literature—in an attempt to bring increased clarity to the field, we identify the relative strengths of each tool, and provide guidance to analysts on the areas to which each tool is best applied. We discuss four broad categories of tools: statistical methods (including survival analysis, multi-level modeling, and Bayesian approaches), GIS and spatial analysis methods, simulation approaches (including cellular automata, agent-based modeling, and participatory modeling), and mixed-method techniques (such as alternative futures modeling and integrated assessment). For each tool, we offer an example from the literature of its application in human-landscape research. Among these tools, participatory approaches are gaining prominence for analysts to make the broadest possible array of information available to researchers, environmental managers, and policymakers. Further development of new approaches of data fusion and integration across sites or disciplines pose an important challenge for future work in integrating human and landscape components.
2003-04-21
Harrop. 64 Gareth R. Jones, Organizational Theory, 3rd ed. (Upper Saddle River, N.J.: Prentice Hall, 2001), 391. 65 Jones, 391. 66 Szilagyi Wallace ...Select Committee on Intelligence, 10 December 2002. Wallace , Szilagyi . Organizational Behavior and Performance, 4th ed. Glenview, IL: Scott...to compare or measure the effect of envisioned changes. Wallace identifies an additional characteristic for introducing change into an
Using Cognitive Task Analysis and Eye Tracking to Understand Imagery Analysis
2006-01-01
Using Cognitive Task Analysis and Eye Tracking to Understand Imagery Analysis Laura Kurland, Abigail Gertner, Tom Bartee, Michael Chisholm and...have used these to study the analysts search behavior in detail. 2 EXPERIMENT Using a Cognitive Task Analysis (CTA) framework for knowledge...TITLE AND SUBTITLE Using Cognitive Task Analysis and Eye Tracking to Understand Imagery Analysis 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM
Explaining Iran’s Foreign Policy, 1979-2009
2010-12-01
of reasons. From a strictly realist perspective, Iran’s behavior may seem maddeningly inconsistent. Decisions made by the leadership to prolong...objective of this book is to offer a framework to help U.S. policymakers and analysts better understand existing and evolving leadership dynamics...neoconservatives and liberals sold on Kantian peace. While the realities of the Iraq war may have muted calls for regime change in Iran, recent
#FluxFlow: Visual Analysis of Anomalous Information Spreading on Social Media.
Zhao, Jian; Cao, Nan; Wen, Zhen; Song, Yale; Lin, Yu-Ru; Collins, Christopher
2014-12-01
We present FluxFlow, an interactive visual analysis system for revealing and analyzing anomalous information spreading in social media. Everyday, millions of messages are created, commented, and shared by people on social media websites, such as Twitter and Facebook. This provides valuable data for researchers and practitioners in many application domains, such as marketing, to inform decision-making. Distilling valuable social signals from the huge crowd's messages, however, is challenging, due to the heterogeneous and dynamic crowd behaviors. The challenge is rooted in data analysts' capability of discerning the anomalous information behaviors, such as the spreading of rumors or misinformation, from the rest that are more conventional patterns, such as popular topics and newsworthy events, in a timely fashion. FluxFlow incorporates advanced machine learning algorithms to detect anomalies, and offers a set of novel visualization designs for presenting the detected threads for deeper analysis. We evaluated FluxFlow with real datasets containing the Twitter feeds captured during significant events such as Hurricane Sandy. Through quantitative measurements of the algorithmic performance and qualitative interviews with domain experts, the results show that the back-end anomaly detection model is effective in identifying anomalous retweeting threads, and its front-end interactive visualizations are intuitive and useful for analysts to discover insights in data and comprehend the underlying analytical model.
Improved Intelligence Warning in an Age of Complexity
2015-05-21
at, and applying complexity science to this problem, which is represented by a multidiscipline study of large networks comprised of interdependent...For analysts and policy makers, complexity science offers methods to improve this understanding. As said by Ms. Irene Sanders, director of the... science to improve intelligence warning. The initial section describes how policy makers and national security leaders understand the current
Simulating the Composite Propellant Manufacturing Process
NASA Technical Reports Server (NTRS)
Williamson, Suzanne; Love, Gregory
2000-01-01
There is a strategic interest in understanding how the propellant manufacturing process contributes to military capabilities outside the United States. The paper will discuss how system dynamics (SD) has been applied to rapidly assess the capabilities and vulnerabilities of a specific composite propellant production complex. These facilities produce a commonly used solid propellant with military applications. The authors will explain how an SD model can be configured to match a specific production facility followed by a series of scenarios designed to analyze operational vulnerabilities. By using the simulation model to rapidly analyze operational risks, the analyst gains a better understanding of production complexities. There are several benefits of developing SD models to simulate chemical production. SD is an effective tool for characterizing complex problems, especially the production process where the cascading effect of outages quickly taxes common understanding. By programming expert knowledge into an SD application, these tools are transformed into a knowledge management resource that facilitates rapid learning without requiring years of experience in production operations. It also permits the analyst to rapidly respond to crisis situations and other time-sensitive missions. Most importantly, the quantitative understanding gained from applying the SD model lends itself to strategic analysis and planning.
Convergences with behavior analysis: Recommendations from the rhetoric of inquiry
Czubaroff, J.
1993-01-01
This analysis speculates on reasons why behavior analysis has not had the professional impact it desires, and suggests that increased contact with non-behavior-analytic research traditions and increased research in the area of verbal behavior may reverse the profession's fortunes. Behaviorists have accured a number of advantages from constituting themselves as a separate school in psychology. Nonetheless, school status can lead to isolation from other research traditions and can restrict communicative encounters with outside scholars to efforts to attack their research programs and defend one's own. Efforts to counteract these tendencies should help bring behavior analysis into the mainstream of contemporary social science research. In addition, if behavior analysts reconsider some of their assumptions about verbal and nonverbal behaviors and some of their methodological assumptions about how verbal behavior is to be studied, and if they place verbal behavior research on center stage, they may make substantive contributions to the contemporary multidisciplinary study of language. PMID:22478127
Multi-Intelligence Analytics for Next Generation Analysts (MIAGA)
NASA Astrophysics Data System (ADS)
Blasch, Erik; Waltz, Ed
2016-05-01
Current analysts are inundated with large volumes of data from which extraction, exploitation, and indexing are required. A future need for next-generation analysts is an appropriate balance between machine analytics from raw data and the ability of the user to interact with information through automation. Many quantitative intelligence tools and techniques have been developed which are examined towards matching analyst opportunities with recent technical trends such as big data, access to information, and visualization. The concepts and techniques summarized are derived from discussions with real analysts, documented trends of technical developments, and methods to engage future analysts with multiintelligence services. For example, qualitative techniques should be matched against physical, cognitive, and contextual quantitative analytics for intelligence reporting. Future trends include enabling knowledge search, collaborative situational sharing, and agile support for empirical decision-making and analytical reasoning.
Visualization of multi-INT fusion data using Java Viewer (JVIEW)
NASA Astrophysics Data System (ADS)
Blasch, Erik; Aved, Alex; Nagy, James; Scott, Stephen
2014-05-01
Visualization is important for multi-intelligence fusion and we demonstrate issues for presenting physics-derived (i.e., hard) and human-derived (i.e., soft) fusion results. Physics-derived solutions (e.g., imagery) typically involve sensor measurements that are objective, while human-derived (e.g., text) typically involve language processing. Both results can be geographically displayed for user-machine fusion. Attributes of an effective and efficient display are not well understood, so we demonstrate issues and results for filtering, correlation, and association of data for users - be they operators or analysts. Operators require near-real time solutions while analysts have the opportunities of non-real time solutions for forensic analysis. In a use case, we demonstrate examples using the JVIEW concept that has been applied to piloting, space situation awareness, and cyber analysis. Using the open-source JVIEW software, we showcase a big data solution for multi-intelligence fusion application for context-enhanced information fusion.
Pedestrian paths: why path-dependence theory leaves health policy analysis lost in space.
Brown, Lawrence D
2010-08-01
Path dependence, a model first advanced to explain puzzles in the diffusion of technology, has lately won allegiance among analysts of the politics of public policy, including health care policy. Though the central premise of the model--that past events and decisions shape options for innovation in the present and future--is indisputable (indeed path dependence is, so to speak, too shallow to be false), the approach, at least as applied to health policy, suffers from ambiguities that undercut its claims to illuminate policy projects such as managed care, on which this article focuses. Because path dependence adds little more than marginal value to familiar images of the politics of policy--incrementalism, for one--analysts might do well to put it on the back burner and pursue instead "thick descriptions" that help them to distinguish different degrees of openness to exogenous change among diverse policy arenas.
Applying Bayesian belief networks in rapid response situations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gibson, William L; Deborah, Leishman, A.; Van Eeckhout, Edward
2008-01-01
The authors have developed an enhanced Bayesian analysis tool called the Integrated Knowledge Engine (IKE) for monitoring and surveillance. The enhancements are suited for Rapid Response Situations where decisions must be made based on uncertain and incomplete evidence from many diverse and heterogeneous sources. The enhancements extend the probabilistic results of the traditional Bayesian analysis by (1) better quantifying uncertainty arising from model parameter uncertainty and uncertain evidence, (2) optimizing the collection of evidence to reach conclusions more quickly, and (3) allowing the analyst to determine the influence of the remaining evidence that cannot be obtained in the time allowed.more » These extended features give the analyst and decision maker a better comprehension of the adequacy of the acquired evidence and hence the quality of the hurried decisions. They also describe two example systems where the above features are highlighted.« less
User guidelines and best practices for CASL VUQ analysis using Dakota.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adams, Brian M.; Swiler, Laura Painton; Hooper, Russell
2014-03-01
Sandia's Dakota software (available at http://dakota.sandia.gov) supports science and engineering transformation through advanced exploration of simulations. Specifically it manages and analyzes ensembles of simulations to provide broader and deeper perspective for analysts and decision makers. This enables them to enhance understanding of risk, improve products, and assess simulation credibility. This manual offers Consortium for Advanced Simulation of Light Water Reactors (LWRs) (CASL) partners a guide to conducting Dakota-based VUQ studies for CASL problems. It motivates various classes of Dakota methods and includes examples of their use on representative application problems. On reading, a CASL analyst should understand why and howmore » to apply Dakota to a simulation problem. This SAND report constitutes the product of CASL milestone L3:VUQ.V&V.P8.01 and is also being released as a CASL unlimited release report with number CASL-U-2014-0038-000.« less
NASA Astrophysics Data System (ADS)
Sadler, Laurel
2017-05-01
In today's battlefield environments, analysts are inundated with real-time data received from the tactical edge that must be evaluated and used for managing and modifying current missions as well as planning for future missions. This paper describes a framework that facilitates a Value of Information (VoI) based data analytics tool for information object (IO) analysis in a tactical and command and control (C2) environment, which reduces analyst work load by providing automated or analyst assisted applications. It allows the analyst to adjust parameters for data matching of the IOs that will be received and provides agents for further filtering or fusing of the incoming data. It allows for analyst enhancement and markup to be made to and/or comments to be attached to the incoming IOs, which can then be re-disseminated utilizing the VoI based dissemination service. The analyst may also adjust the underlying parameters before re-dissemination of an IO, which will subsequently adjust the value of the IO based on this new/additional information that has been added, possibly increasing the value from the original. The framework is flexible and extendable, providing an easy to use, dynamically changing Command and Control decision aid that focuses and enhances the analyst workflow.
The analyst: his professional novel.
Ambrosiano, Laura
2005-12-01
The psychoanalyst needs to be in touch with a community of colleagues; he needs to feel part of a group with which he can share cognitive tension and therapeutic knowledge. Yet group ties are an aspect we analysts seldom discuss. The author defines the analyst's 'professional novel' as the emotional vicissitudes with the group that have marked the professional itinerary of every analyst; his relationship with institutions and with theories, and the emotional nuance of these relationships. The analyst's professional novel is the narrative elaboration of his professional autobiography. It is capable of transforming the individual's need to belong and the paths of identification and de-identification. Experience of the oedipal configuration allows the analyst to begin psychic work aimed at gaining spaces of separateness in his relationship with the group. This passage is marked by the work on mourning that separation involves, but also of mourning implicit in the awareness of the representative limits of our theories. Right from the start of analysis, the patient observes the emotional nuance of the analyst's connection to his group and theories; the patient notices how much this connection is governed by rigid needs to belong, and how much freedom of thought and exploration it allows the analyst. The author uses clinical examples to illustrate these hypotheses.
Godsil, Geraldine
2018-02-01
This paper discusses the residues of a somatic countertransference that revealed its meaning several years after apparently successful analytic work had ended. Psychoanalytic and Jungian analytic ideas on primitive communication, dissociation and enactment are explored in the working through of a shared respiratory symptom between patient and analyst. Growth in the analyst was necessary so that the patient's communication at a somatic level could be understood. Bleger's concept that both the patient's and analyst's body are part of the setting was central in the working through. © 2018, The Society of Analytical Psychology.
Sports chronobiology consultation: from the lab to the arena.
Postolache, Teodor T; Hung, Tsung-Min; Rosenthal, Richard N; Soriano, Joseph J; Montes, Fernando; Stiller, John W
2005-04-01
This final article, coauthored by a chronobiology consultant, a sports psychologist who applied a chronobiology-based program to an Olympic national team, a clinical neurologist, a performance data analyst, a training-conditioning coach from a major league baseball team who applied chronobiology principles to major league pitchers, and a substance abuse expert, discusses practical aspects of a sports chronobiology consultation, including the goals and current arsenal of available interventions. Short vignettes of actual cases are presented for edification, and references are made to appropriate reviews found elsewhere in this issue.
Data exploration systems for databases
NASA Technical Reports Server (NTRS)
Greene, Richard J.; Hield, Christopher
1992-01-01
Data exploration systems apply machine learning techniques, multivariate statistical methods, information theory, and database theory to databases to identify significant relationships among the data and summarize information. The result of applying data exploration systems should be a better understanding of the structure of the data and a perspective of the data enabling an analyst to form hypotheses for interpreting the data. This paper argues that data exploration systems need a minimum amount of domain knowledge to guide both the statistical strategy and the interpretation of the resulting patterns discovered by these systems.
Using MetaboAnalyst 3.0 for Comprehensive Metabolomics Data Analysis.
Xia, Jianguo; Wishart, David S
2016-09-07
MetaboAnalyst (http://www.metaboanalyst.ca) is a comprehensive Web application for metabolomic data analysis and interpretation. MetaboAnalyst handles most of the common metabolomic data types from most kinds of metabolomics platforms (MS and NMR) for most kinds of metabolomics experiments (targeted, untargeted, quantitative). In addition to providing a variety of data processing and normalization procedures, MetaboAnalyst also supports a number of data analysis and data visualization tasks using a range of univariate, multivariate methods such as PCA (principal component analysis), PLS-DA (partial least squares discriminant analysis), heatmap clustering and machine learning methods. MetaboAnalyst also offers a variety of tools for metabolomic data interpretation including MSEA (metabolite set enrichment analysis), MetPA (metabolite pathway analysis), and biomarker selection via ROC (receiver operating characteristic) curve analysis, as well as time series and power analysis. This unit provides an overview of the main functional modules and the general workflow of the latest version of MetaboAnalyst (MetaboAnalyst 3.0), followed by eight detailed protocols. © 2016 by John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc.
The Pope's confessor: a metaphor relating to illness in the analyst.
Clark, R W
1995-01-01
This paper examines some of the internal and external eventualities in the situation of illness in the analyst. The current emphasis on the use of the self as part of the analyzing instrument makes impairments in the analyst's physical well-being potentially disabling to the analytic work. A recommendation is made for analysts, both individually and as a professional group, to always consider this aspect of a personal medical problem.
Desire and the female analyst.
Schaverien, J
1996-04-01
The literature on erotic transference and countertransference between female analyst and male patient is reviewed and discussed. It is known that female analysts are less likely than their male colleagues to act out sexually with their patients. It has been claimed that a) male patients do not experience sustained erotic transferences, and b) female analysts do not experience erotic countertransferences with female or male patients. These views are challenged and it is argued that, if there is less sexual acting out by female analysts, it is not because of an absence of eros in the therapeutic relationship. The literature review covers material drawn from psychoanalysis, feminist psychotherapy, Jungian analysis, as well as some sociological and cultural sources. It is organized under the following headings: the gender of the analyst, sexual acting out, erotic transference, maternal and paternal transference, gender and power, countertransference, incest taboo--mothers and sons and sexual themes in the transference.
Recording an Excel(®) Macro to Specify Date Ranges for Clinical Data.
Deochand, Neil; Costello, Mack S; Fuqua, R Wayne
2016-09-01
The individuals served by behavior analysts are often funded by Medicaid, insurance companies, or private pay. The first two options usually require progress notes detailing graphically and quantitatively the behavioral outcomes. These progress notes usually come in the form of a written account of milestones achieved or barriers faced, graphical displays of behavioral data, and summary tables. The graphical displays are monthly, quarterly, and annual reports for the individuals that they serve. Microsoft Excel® is one of the most accessible tools by which to accomplish this task; however, presenting the required date ranges can be a time-consuming task. A task analysis is outlined to automate this process and reduce the time taken to accomplish indirect service hours to the clients served.
Averaging Theory for Description of Environmental Problems: What Have We Learned?
Miller, Cass T.; Schrefler, Bernhard A.
2012-01-01
Advances in Water Resources has been a prime archival source for implementation of averaging theories in changing the scale at which processes of importance in environmental modeling are described. Thus in celebration of the 35th year of this journal, it seems appropriate to assess what has been learned about these theories and about their utility in describing systems of interest. We review advances in understanding and use of averaging theories to describe porous medium flow and transport at the macroscale, an averaged scale that models spatial variability, and at the megascale, an integral scale that only considers time variation of system properties. We detail physical insights gained from the development and application of averaging theory for flow through porous medium systems and for the behavior of solids at the macroscale. We show the relationship between standard models that are typically applied and more rigorous models that are derived using modern averaging theory. We discuss how the results derived from averaging theory that are available can be built upon and applied broadly within the community. We highlight opportunities and needs that exist for collaborations among theorists, numerical analysts, and experimentalists to advance the new classes of models that have been derived. Lastly, we comment on averaging developments for rivers, estuaries, and watersheds. PMID:23393409
49 CFR 1245.5 - Classification of job titles.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., Computer Programmer, Computer Analyst, Market Analyst, Pricing Analyst, Employment Supervisor, Research..., Traveling Auditors or Accountants Title is descriptive Traveling Auditor, Accounting Specialist Auditors... 21; adds new titles. 207 Supervising and Chief Claim Agents Title is descriptive Chief Claim Agent...
49 CFR 1245.5 - Classification of job titles.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., Computer Programmer, Computer Analyst, Market Analyst, Pricing Analyst, Employment Supervisor, Research..., Traveling Auditors or Accountants Title is descriptive Traveling Auditor, Accounting Specialist Auditors... 21; adds new titles. 207 Supervising and Chief Claim Agents Title is descriptive Chief Claim Agent...
49 CFR 1245.5 - Classification of job titles.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., Computer Programmer, Computer Analyst, Market Analyst, Pricing Analyst, Employment Supervisor, Research..., Traveling Auditors or Accountants Title is descriptive Traveling Auditor, Accounting Specialist Auditors... 21; adds new titles. 207 Supervising and Chief Claim Agents Title is descriptive Chief Claim Agent...
49 CFR 1245.5 - Classification of job titles.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., Computer Programmer, Computer Analyst, Market Analyst, Pricing Analyst, Employment Supervisor, Research..., Traveling Auditors or Accountants Title is descriptive Traveling Auditor, Accounting Specialist Auditors... 21; adds new titles. 207 Supervising and Chief Claim Agents Title is descriptive Chief Claim Agent...
49 CFR 1245.5 - Classification of job titles.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., Computer Programmer, Computer Analyst, Market Analyst, Pricing Analyst, Employment Supervisor, Research..., Traveling Auditors or Accountants Title is descriptive Traveling Auditor, Accounting Specialist Auditors... 21; adds new titles. 207 Supervising and Chief Claim Agents Title is descriptive Chief Claim Agent...
Smarter Cities Marketing Insights 2.0 initiative, a data quality analyst at EnerNOC for its demand wind energy as a wind program analyst for Green Energy Ohio in 2005 and as a data analyst for The
Elements of analytic style: Bion's clinical seminars.
Ogden, Thomas H
2007-10-01
The author finds that the idea of analytic style better describes significant aspects of the way he practices psychoanalysis than does the notion of analytic technique. The latter is comprised to a large extent of principles of practice developed by previous generations of analysts. By contrast, the concept of analytic style, though it presupposes the analyst's thorough knowledge of analytic theory and technique, emphasizes (1) the analyst's use of his unique personality as reflected in his individual ways of thinking, listening, and speaking, his own particular use of metaphor, humor, irony, and so on; (2) the analyst's drawing on his personal experience, for example, as an analyst, an analysand, a parent, a child, a spouse, a teacher, and a student; (3) the analyst's capacity to think in a way that draws on, but is independent of, the ideas of his colleagues, his teachers, his analyst, and his analytic ancestors; and (4) the responsibility of the analyst to invent psychoanalysis freshly for each patient. Close readings of three of Bion's 'Clinical seminars' are presented in order to articulate some of the elements of Bion's analytic style. Bion's style is not presented as a model for others to emulate or, worse yet, imitate; rather, it is described in an effort to help the reader consider from a different vantage point (provided by the concept of analytic style) the way in which he, the reader, practices psychoanalysis.
ERIC Educational Resources Information Center
Gilbourne, David; Jones, Robyn; Jordan, Spencer
2014-01-01
In some quarters it is argued that, narrative researchers might be classified as being either story-analysts or storytellers. They go on to suggest that one feature of storytellers is that they undertake a form of analysis as the process of writing unfolds. With these sentiments in mind, in the present paper, we consider how auto-ethnographical…
Christopher A. Armatas; Tyron J. Venn; Alan E. Watson
2014-01-01
The underlying validity of stated preference non-market valuation methods relies on the analyst's ability to identify, select, define, and articulate the goods being valued in a way that is relevant and understandable to the respondent, which requires detailed understanding of the respondents' experiences and points of view. Poor articulation of the good...
A Mobile Computing Solution for Collecting Functional Analysis Data on a Pocket PC
Jackson, James; Dixon, Mark R
2007-01-01
The present paper provides a task analysis for creating a computerized data system using a Pocket PC and Microsoft Visual Basic. With Visual Basic software and any handheld device running the Windows Moble operating system, this task analysis will allow behavior analysts to program and customize their own functional analysis data-collection system. The program will allow the user to select the type of behavior to be recorded, choose between interval and frequency data collection, and summarize data for graphing and analysis. We also provide suggestions for customizing the data-collection system for idiosyncratic research and clinical needs. PMID:17624078
Sociocultural Behavior Influence Modelling & Assessment: Current Work and Research Frontiers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bernard, Michael Lewis
A common problem associated with the effort to better assess potential behaviors of various individuals within different countries is the shear difficulty in comprehending the dynamic nature of populations, particularly over time and considering feedback effects. This paper discusses a theory-based analytical capability designed to enable analysts to better assess the influence of events on individuals interacting within a country or region. These events can include changes in policy, man-made or natural disasters, migration, war, or other changes in environmental/economic conditions. In addition, this paper describes potential extensions of this type of research to enable more timely and accurate assessments.
Forsyth, Ann; Lytle, Leslie; Riper, David Van
2011-01-01
A significant amount of travel is undertaken to find food. This paper examines challenges in measuring access to food using Geographic Information Systems (GIS), important in studies of both travel and eating behavior. It compares different sources of data available including fieldwork, land use and parcel data, licensing information, commercial listings, taxation data, and online street-level photographs. It proposes methods to classify different kinds of food sales places in a way that says something about their potential for delivering healthy food options. In assessing the relationship between food access and travel behavior, analysts must clearly conceptualize key variables, document measurement processes, and be clear about the strengths and weaknesses of data. PMID:21837264
One decade of the Data Fusion Information Group (DFIG) model
NASA Astrophysics Data System (ADS)
Blasch, Erik
2015-05-01
The revision of the Joint Directors of the Laboratories (JDL) Information Fusion model in 2004 discussed information processing, incorporated the analyst, and was coined the Data Fusion Information Group (DFIG) model. Since that time, developments in information technology (e.g., cloud computing, applications, and multimedia) have altered the role of the analyst. Data production has outpaced the analyst; however the analyst still has the role of data refinement and information reporting. In this paper, we highlight three examples being addressed by the DFIG model. One example is the role of the analyst to provide semantic queries (through an ontology) so that vast amount of data available can be indexed, accessed, retrieved, and processed. The second idea is reporting which requires the analyst to collect the data into a condensed and meaningful form through information management. The last example is the interpretation of the resolved information from data that must include contextual information not inherent in the data itself. Through a literature review, the DFIG developments in the last decade demonstrate the usability of the DFIG model to bring together the user (analyst or operator) and the machine (information fusion or manager) in a systems design.
SafetyAnalyst : software tools for safety management of specific highway sites
DOT National Transportation Integrated Search
2010-07-01
SafetyAnalyst provides a set of software tools for use by state and local highway agencies for highway safety management. SafetyAnalyst can be used by highway agencies to improve their programming of site-specific highway safety improvements. SafetyA...
Exploring the Analytical Processes of Intelligence Analysts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chin, George; Kuchar, Olga A.; Wolf, Katherine E.
We present an observational case study in which we investigate and analyze the analytical processes of intelligence analysts. Participating analysts in the study carry out two scenarios where they organize and triage information, conduct intelligence analysis, report results, and collaborate with one another. Through a combination of artifact analyses, group interviews, and participant observations, we explore the space and boundaries in which intelligence analysts work and operate. We also assess the implications of our findings on the use and application of relevant information technologies.
Reflections: can the analyst share a traumatizing experience with a traumatized patient?
Lijtmaer, Ruth
2010-01-01
This is a personal account of a dreadful event in the analyst's life that was similar to a patient's trauma. It is a reflection on how the analyst dealt with her own trauma, the patient's trauma, and the transference and countertransference dynamics. Included is a description of the analyst's inner struggles with self-disclosure, continuance of her professional work, and the need for persistent self-scrutiny. The meaning of objects in people's life, particularly the concept of home, will be addressed.
iTTVis: Interactive Visualization of Table Tennis Data.
Wu, Yingcai; Lan, Ji; Shu, Xinhuan; Ji, Chenyang; Zhao, Kejian; Wang, Jiachen; Zhang, Hui
2018-01-01
The rapid development of information technology paved the way for the recording of fine-grained data, such as stroke techniques and stroke placements, during a table tennis match. This data recording creates opportunities to analyze and evaluate matches from new perspectives. Nevertheless, the increasingly complex data poses a significant challenge to make sense of and gain insights into. Analysts usually employ tedious and cumbersome methods which are limited to watching videos and reading statistical tables. However, existing sports visualization methods cannot be applied to visualizing table tennis competitions due to different competition rules and particular data attributes. In this work, we collaborate with data analysts to understand and characterize the sophisticated domain problem of analysis of table tennis data. We propose iTTVis, a novel interactive table tennis visualization system, which to our knowledge, is the first visual analysis system for analyzing and exploring table tennis data. iTTVis provides a holistic visualization of an entire match from three main perspectives, namely, time-oriented, statistical, and tactical analyses. The proposed system with several well-coordinated views not only supports correlation identification through statistics and pattern detection of tactics with a score timeline but also allows cross analysis to gain insights. Data analysts have obtained several new insights by using iTTVis. The effectiveness and usability of the proposed system are demonstrated with four case studies.
Enhanced detection and visualization of anomalies in spectral imagery
NASA Astrophysics Data System (ADS)
Basener, William F.; Messinger, David W.
2009-05-01
Anomaly detection algorithms applied to hyperspectral imagery are able to reliably identify man-made objects from a natural environment based on statistical/geometric likelyhood. The process is more robust than target identification, which requires precise prior knowledge of the object of interest, but has an inherently higher false alarm rate. Standard anomaly detection algorithms measure deviation of pixel spectra from a parametric model (either statistical or linear mixing) estimating the image background. The topological anomaly detector (TAD) creates a fully non-parametric, graph theory-based, topological model of the image background and measures deviation from this background using codensity. In this paper we present a large-scale comparative test of TAD against 80+ targets in four full HYDICE images using the entire canonical target set for generation of ROC curves. TAD will be compared against several statistics-based detectors including local RX and subspace RX. Even a perfect anomaly detection algorithm would have a high practical false alarm rate in most scenes simply because the user/analyst is not interested in every anomalous object. To assist the analyst in identifying and sorting objects of interest, we investigate coloring of the anomalies with principle components projections using statistics computed from the anomalies. This gives a very useful colorization of anomalies in which objects of similar material tend to have the same color, enabling an analyst to quickly sort and identify anomalies of highest interest.
Mortality, integrity, and psychoanalysis (who are you to me? Who am I to you?).
Pinsky, Ellen
2014-01-01
The author narrates her experience of mourning her therapist's sudden death. The profession has neglected implications of the analyst's mortality: what is lost or vulnerable to loss? What is that vulnerability's function? The author's process of mourning included her writing and her becoming an analyst. Both pursuits inspired reflections on mortality in two overlapping senses: bodily (the analyst is mortal and can die) and character (the analyst is mortal and can err). The subject thus expands to include impaired character and ethical violations. Paradoxically, the analyst's human limitations threaten each psychoanalytic situation, but also enable it: human imperfection animates the work. The essay ends with a specific example of integrity. © 2014 The Psychoanalytic Quarterly, Inc.
The tobacco industry's use of Wall Street analysts in shaping policy.
Alamar, B C; Glantz, S A
2004-09-01
To document how the tobacco industry has used Wall Street analysts to further its public policy objectives. Searching tobacco documents available on the internet, newspaper articles, and transcripts of public hearings. The tobacco industry used nominally independent Wall Street analysts as third parties to support the tobacco industry's legislative agenda at both national and state levels in the USA. The tobacco industry has, for example, edited the testimony of at least one analyst before he testified to the US Senate Judiciary Committee, while representing himself as independent of the industry. The tobacco industry has used undisclosed collaboration with Wall Street analysts, as they have used undisclosed relationships with research scientists and academics, to advance the interests of the tobacco industry in public policy.
Subcellular object quantification with Squassh3C and SquasshAnalyst.
Rizk, Aurélien; Mansouri, Maysam; Ballmer-Hofer, Kurt; Berger, Philipp
2015-11-01
Quantitative image analysis plays an important role in contemporary biomedical research. Squassh is a method for automatic detection, segmentation, and quantification of subcellular structures and analysis of their colocalization. Here we present the applications Squassh3C and SquasshAnalyst. Squassh3C extends the functionality of Squassh to three fluorescence channels and live-cell movie analysis. SquasshAnalyst is an interactive web interface for the analysis of Squassh3C object data. It provides segmentation image overview and data exploration, figure generation, object and image filtering, and a statistical significance test in an easy-to-use interface. The overall procedure combines the Squassh3C plug-in for the free biological image processing program ImageJ and a web application working in conjunction with the free statistical environment R, and it is compatible with Linux, MacOS X, or Microsoft Windows. Squassh3C and SquasshAnalyst are available for download at www.psi.ch/lbr/SquasshAnalystEN/SquasshAnalyst.zip.
This art of psychoanalysis. Dreaming undreamt dreams and interrupted cries.
Ogden, Thomas H
2004-08-01
It is the art of psychoanalysis in the making, a process inventing itself as it goes, that is the subject of this paper. The author articulates succinctly how he conceives of psychoanalysis, and offers a detailed clinical illustration. He suggests that each analysand unconsciously (and ambivalently) is seeking help in dreaming his 'night terrors' (his undreamt and undreamable dreams) and his 'nightmares' (his dreams that are interrupted when the pain of the emotional experience being dreamt exceeds his capacity for dreaming). Undreamable dreams are understood as manifestations of psychotic and psychically foreclosed aspects of the personality; interrupted dreams are viewed as reflections of neurotic and other non-psychotic parts of the personality. The analyst's task is to generate conditions that may allow the analysand--with the analyst's participation--to dream the patient's previously undreamable and interrupted dreams. A significant part of the analyst's participation in the patient's dreaming takes the form of the analyst's reverie experience. In the course of this conjoint work of dreaming in the analytic setting, the analyst may get to know the analysand sufficiently well for the analyst to be able to say something that is true to what is occurring at an unconscious level in the analytic relationship. The analyst's use of language contributes significantly to the possibility that the patient will be able to make use of what the analyst has said for purposes of dreaming his own experience, thereby dreaming himself more fully into existence.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small And Medium Business, Tampa, Florida; Verizon Business Networks Services, Inc., Senior Coordinator-Order... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-06
...,968B] Verizon Business Networks Services, Inc. Senior Analysts-Sales Impletmentation (SA-SI) Birmingham, Alabama; Verizon Business Networks Services, Inc. Senior Analysts-Sales Impletmentation (SA-SI) Service Program Delivery Division San Francisco, California; Verizon Business Networks Services, Inc.Senior...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-01
.... Securities Offering. Series 86 Research Analyst--Analysis..... From $160 to $175. Series 87 Research Analyst... Order Processing Assistant Representatives, Research Analysts and Operations Professionals, respectively... examination.\\7\\ \\6\\ PROCTOR is a computer system that is specifically designed for the administration and...
The Search for, Recovery, and Positive Identification of a Vietnam-Era U.S. Army Soldier
2010-02-01
CriminalJustice, College at Brnckpon. SUNY Brockpon. NY 14420. tCeiilrül Identification Laboratory (CIL), Joint POW-MIA Accounting Ciimmand (JPAC...most consistent with Mongoloid ancestry during the subse- quent joint forensic review (JFR). which involved American and Vietnamese forensic experts...described by analysts as "unreliable" apparently because of his nervous behavior. One of the other four witnesses turned over a wrist- watch and a dog
Horn’s Curve Estimation Through Multi-Dimensional Interpolation
2013-03-01
complex nature of human behavior has not yet been broached. This is not to say analysts play favorites in reaching conclusions, only that varied...Chapter III, Section 3.7. For now, it is sufficient to say underdetermined data presents technical challenges and all such datasets will be excluded from...database lookup table and then use the method of linear interpolation to instantaneously estimate the unknown points on an as-needed basis ( say from a user
1990-10-01
involving a heavy artillery barrage, the impact point output alone could consume upwards of 10,000 pages of computer paper. For this reason, AURA provides...but pervasive factor: the asset allocation model must be compatible with the mathematical behavior of the input data. Thus, for example, if assets are...described as expendable during repair or decontamination activities, it must have HOMELINKS which appear in the consuming repair SUBCHAINs
Uncertainty importance analysis using parametric moment ratio functions.
Wei, Pengfei; Lu, Zhenzhou; Song, Jingwen
2014-02-01
This article presents a new importance analysis framework, called parametric moment ratio function, for measuring the reduction of model output uncertainty when the distribution parameters of inputs are changed, and the emphasis is put on the mean and variance ratio functions with respect to the variances of model inputs. The proposed concepts efficiently guide the analyst to achieve a targeted reduction on the model output mean and variance by operating on the variances of model inputs. The unbiased and progressive unbiased Monte Carlo estimators are also derived for the parametric mean and variance ratio functions, respectively. Only a set of samples is needed for implementing the proposed importance analysis by the proposed estimators, thus the computational cost is free of input dimensionality. An analytical test example with highly nonlinear behavior is introduced for illustrating the engineering significance of the proposed importance analysis technique and verifying the efficiency and convergence of the derived Monte Carlo estimators. Finally, the moment ratio function is applied to a planar 10-bar structure for achieving a targeted 50% reduction of the model output variance. © 2013 Society for Risk Analysis.
Setting analyst: A practical harvest planning technique
Olivier R.M. Halleux; W. Dale Greene
2001-01-01
Setting Analyst is an ArcView extension that facilitates practical harvest planning for ground-based systems. By modeling the travel patterns of ground-based machines, it compares different harvesting settings based on projected average skidding distance, logging costs, and site disturbance levels. Setting Analyst uses information commonly available to consulting...
21 CFR 1304.23 - Records for chemical analysts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Records for chemical analysts. 1304.23 Section... REGISTRANTS Continuing Records § 1304.23 Records for chemical analysts. (a) Each person registered or authorized (by § 1301.22(b) of this chapter) to conduct chemical analysis with controlled substances shall...
21 CFR 1304.23 - Records for chemical analysts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Records for chemical analysts. 1304.23 Section... REGISTRANTS Continuing Records § 1304.23 Records for chemical analysts. (a) Each person registered or authorized (by § 1301.22(b) of this chapter) to conduct chemical analysis with controlled substances shall...
21 CFR 1304.23 - Records for chemical analysts.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Records for chemical analysts. 1304.23 Section... REGISTRANTS Continuing Records § 1304.23 Records for chemical analysts. (a) Each person registered or authorized (by § 1301.22(b) of this chapter) to conduct chemical analysis with controlled substances shall...
21 CFR 1304.23 - Records for chemical analysts.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Records for chemical analysts. 1304.23 Section... REGISTRANTS Continuing Records § 1304.23 Records for chemical analysts. (a) Each person registered or authorized (by § 1301.22(b) of this chapter) to conduct chemical analysis with controlled substances shall...
78 FR 77769 - Data Collection Available for Public Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... comments to Amy Garcia, Program Analyst, Office of Government Contracting, Small Business Administration, 409 3rd Street, 7th Floor, Washington, DC 20416. FOR FURTHER INFORMATION CONTACT: Amy Garcia, Program Analyst, 202-205- 6842, amy.garcia@sba.gov , or Curtis B. Rich, Management Analyst, 202- 205-7030, curtis...
An Application of Epidemiological Modeling to Information Diffusion
NASA Astrophysics Data System (ADS)
McCormack, Robert; Salter, William
Messages often spread within a population through unofficial - particularly web-based - media. Such ideas have been termed "memes." To impede the flow of terrorist messages and to promote counter messages within a population, intelligence analysts must understand how messages spread. We used statistical language processing technologies to operationalize "memes" as latent topics in electronic text and applied epidemiological techniques to describe and analyze patterns of message propagation. We developed our methods and applied them to English-language newspapers and blogs in the Arab world. We found that a relatively simple epidemiological model can reproduce some dynamics of observed empirical relationships.
Collaborative human-machine analysis using a controlled natural language
NASA Astrophysics Data System (ADS)
Mott, David H.; Shemanski, Donald R.; Giammanco, Cheryl; Braines, Dave
2015-05-01
A key aspect of an analyst's task in providing relevant information from data is the reasoning about the implications of that data, in order to build a picture of the real world situation. This requires human cognition, based upon domain knowledge about individuals, events and environmental conditions. For a computer system to collaborate with an analyst, it must be capable of following a similar reasoning process to that of the analyst. We describe ITA Controlled English (CE), a subset of English to represent analyst's domain knowledge and reasoning, in a form that it is understandable by both analyst and machine. CE can be used to express domain rules, background data, assumptions and inferred conclusions, thus supporting human-machine interaction. A CE reasoning and modeling system can perform inferences from the data and provide the user with conclusions together with their rationale. We present a logical problem called the "Analysis Game", used for training analysts, which presents "analytic pitfalls" inherent in many problems. We explore an iterative approach to its representation in CE, where a person can develop an understanding of the problem solution by incremental construction of relevant concepts and rules. We discuss how such interactions might occur, and propose that such techniques could lead to better collaborative tools to assist the analyst and avoid the "pitfalls".
Osborne, Nikola K P; Taylor, Michael C; Healey, Matthew; Zajac, Rachel
2016-03-01
It is becoming increasingly apparent that contextual information can exert a considerable influence on decisions about forensic evidence. Here, we explored accuracy and contextual influence in bloodstain pattern classification, and how these variables might relate to analyst characteristics. Thirty-nine bloodstain pattern analysts with varying degrees of experience each completed measures of compliance, decision-making style, and need for closure. Analysts then examined a bloodstain pattern without any additional contextual information, and allocated votes to listed pattern types according to favoured and less favoured classifications. Next, if they believed it would assist with their classification, analysts could request items of contextual information - from commonly encountered sources of information in bloodstain pattern analysis - and update their vote allocation. We calculated a shift score for each item of contextual information based on vote reallocation. Almost all forms of contextual information influenced decision-making, with medical findings leading to the highest shift scores. Although there was a small positive association between shift scores and the degree to which analysts displayed an intuitive decision-making style, shift scores did not vary meaningfully as a function of experience or the other characteristics measured. Almost all of the erroneous classifications were made by novice analysts. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.
ERIC Educational Resources Information Center
Plonsky, Luke; Brown, Dan
2015-01-01
Applied linguists have turned increasingly in recent years to meta-analysis as the preferred means of synthesizing quantitative research. The first step in the meta-analytic process involves defining a domain of interest. Despite its apparent simplicity, this step involves a great deal of subjectivity on the part of the meta-analyst. This article…
Qualitative Maintenance Experience Handbook. P-3C/S-3A Supplement.
1977-06-15
axle which automatically assists in disc alignment, a positive feature, in easing maintenance and preventing casual damage. Brake assemblies should...Reverse Of Removal Use brake tool to align brake discs . After Installation Actions: _ Bleed _ Rig _ Adjust X Service Lubricate - Boresight. _ Other...Hydraulic I Access Required: Test Equipment Required: Actions: 1. Check clearance of discs after brakes are put on. 2. Apply brakes . 8 ANALYST’S COMMENTS
Non-Strategic Nuclear Targeting in a Non-Nuclear Army
1994-06-03
their needs. After all, the nucler planners and target analysts at corps level must surely consider their preparedness an important issue. Also...controlled escalation (the nuclear signal) and its ability to apply nuclear power in a decisive manner. A hedge against the emergence of an overwhelming...manuals envision NSNF as powerful yet flexible alternatives to the more destabilizing strategic nuclear weapons. NSNF could be used as a show of
A Classification and Analysis of Contracting Literature
1989-12-01
Pricing Model ( CAPM . This is a model designed by investment analysts to determine required rates of return given the systematic risk of a company. The...For the amount of risk they take, these profit margins were not excessively high. The author examined profitability in terms of the Capital Asset ...taxonomy was applied was limited , the results were necessarily qualified. However, at the least this application provided areas for further research
This study examined inter-analyst classification variability based on training site signature selection only for six classifications from a 10 km2 Landsat ETM+ image centered over a highly heterogeneous area in south-central Virginia. Six analysts classified the image...
Avila, Manuel; Graterol, Eduardo; Alezones, Jesús; Criollo, Beisy; Castillo, Dámaso; Kuri, Victoria; Oviedo, Norman; Moquete, Cesar; Romero, Marbella; Hanley, Zaida; Taylor, Margie
2012-06-01
The appearance of rice grain is a key aspect in quality determination. Mainly, this analysis is performed by expert analysts through visual observation; however, due to the subjective nature of the analysis, the results may vary among analysts. In order to evaluate the concordance between analysts from Latin-American rice quality laboratories for rice grain appearance through digital images, an inter-laboratory test was performed with ten analysts and images of 90 grains captured with a high resolution scanner. Rice grains were classified in four categories including translucent, chalky, white belly, and damaged grain. Data was categorized using statistic parameters like mode and its frequency, the relative concordance, and the reproducibility parameter kappa. Additionally, a referential image gallery of typical grain for each category was constructed based on mode frequency. Results showed a Kappa value of 0.49, corresponding to a moderate reproducibility, attributable to subjectivity in the visual analysis of grain images. These results reveal the need for standardize the evaluation criteria among analysts to improve the confidence of the determination of rice grain appearance.
Composable Analytic Systems for next-generation intelligence analysis
NASA Astrophysics Data System (ADS)
DiBona, Phil; Llinas, James; Barry, Kevin
2015-05-01
Lockheed Martin Advanced Technology Laboratories (LM ATL) is collaborating with Professor James Llinas, Ph.D., of the Center for Multisource Information Fusion at the University at Buffalo (State of NY), researching concepts for a mixed-initiative associate system for intelligence analysts to facilitate reduced analysis and decision times while proactively discovering and presenting relevant information based on the analyst's needs, current tasks and cognitive state. Today's exploitation and analysis systems have largely been designed for a specific sensor, data type, and operational context, leading to difficulty in directly supporting the analyst's evolving tasking and work product development preferences across complex Operational Environments. Our interactions with analysts illuminate the need to impact the information fusion, exploitation, and analysis capabilities in a variety of ways, including understanding data options, algorithm composition, hypothesis validation, and work product development. Composable Analytic Systems, an analyst-driven system that increases flexibility and capability to effectively utilize Multi-INT fusion and analytics tailored to the analyst's mission needs, holds promise to addresses the current and future intelligence analysis needs, as US forces engage threats in contested and denied environments.
Code inspection instructional validation
NASA Technical Reports Server (NTRS)
Orr, Kay; Stancil, Shirley
1992-01-01
The Shuttle Data Systems Branch (SDSB) of the Flight Data Systems Division (FDSD) at Johnson Space Center contracted with Southwest Research Institute (SwRI) to validate the effectiveness of an interactive video course on the code inspection process. The purpose of this project was to determine if this course could be effective for teaching NASA analysts the process of code inspection. In addition, NASA was interested in the effectiveness of this unique type of instruction (Digital Video Interactive), for providing training on software processes. This study found the Carnegie Mellon course, 'A Cure for the Common Code', effective for teaching the process of code inspection. In addition, analysts prefer learning with this method of instruction, or this method in combination with other methods. As is, the course is definitely better than no course at all; however, findings indicate changes are needed. Following are conclusions of this study. (1) The course is instructionally effective. (2) The simulation has a positive effect on student's confidence in his ability to apply new knowledge. (3) Analysts like the course and prefer this method of training, or this method in combination with current methods of training in code inspection, over the way training is currently being conducted. (4) Analysts responded favorably to information presented through scenarios incorporating full motion video. (5) Some course content needs to be changed. (6) Some content needs to be added to the course. SwRI believes this study indicates interactive video instruction combined with simulation is effective for teaching software processes. Based on the conclusions of this study, SwRI has outlined seven options for NASA to consider. SwRI recommends the option which involves creation of new source code and data files, but uses much of the existing content and design from the current course. Although this option involves a significant software development effort, SwRI believes this option will produce the most effective results.
NASA Astrophysics Data System (ADS)
Houchin, J. S.
2014-09-01
A common problem for the off-line validation of the calibration algorithms and algorithm coefficients is being able to run science data through the exact same software used for on-line calibration of that data. The Joint Polar Satellite System (JPSS) program solved part of this problem by making the Algorithm Development Library (ADL) available, which allows the operational algorithm code to be compiled and run on a desktop Linux workstation using flat file input and output. However, this solved only part of the problem, as the toolkit and methods to initiate the processing of data through the algorithms were geared specifically toward the algorithm developer, not the calibration analyst. In algorithm development mode, a limited number of sets of test data are staged for the algorithm once, and then run through the algorithm over and over as the software is developed and debugged. In calibration analyst mode, we are continually running new data sets through the algorithm, which requires significant effort to stage each of those data sets for the algorithm without additional tools. AeroADL solves this second problem by providing a set of scripts that wrap the ADL tools, providing both efficient means to stage and process an input data set, to override static calibration coefficient look-up-tables (LUT) with experimental versions of those tables, and to manage a library containing multiple versions of each of the static LUT files in such a way that the correct set of LUTs required for each algorithm are automatically provided to the algorithm without analyst effort. Using AeroADL, The Aerospace Corporation's analyst team has demonstrated the ability to quickly and efficiently perform analysis tasks for both the VIIRS and OMPS sensors with minimal training on the software tools.
Smart Drill-Down: A New Data Exploration Operator
Joglekar, Manas; Garcia-Molina, Hector; Parameswaran, Aditya
2015-01-01
We present a data exploration system equipped with smart drill-down, a novel operator for interactively exploring a relational table to discover and summarize “interesting” groups of tuples. Each such group of tuples is represented by a rule. For instance, the rule (a, b, ★, 1000) tells us that there are a thousand tuples with value a in the first column and b in the second column (and any value in the third column). Smart drill-down presents an analyst with a list of rules that together describe interesting aspects of the table. The analyst can tailor the definition of interesting, and can interactively apply smart drill-down on an existing rule to explore that part of the table. In the demonstration, conference attendees will be able to use the data exploration system equipped with smart drill-down, and will be able to contrast smart drill-down to traditional drill-down, for various interestingness measures, and resource constraints. PMID:26844008
Protecting medical data for decision-making analyses.
Brumen, Bostjan; Welzer, Tatjana; Druzovec, Marjan; Golob, Izidor; Jaakkola, Hannu; Rozman, Ivan; Kubalík, Jiri
2005-02-01
In this paper, we present a procedure for data protection, which can be applied before any model building based analyses are performed. In medical environments, abundant data exist, but because of the lack of knowledge, they are rarely analyzed, although they hide valuable and often life-saving knowledge. To be able to analyze the data, the analyst needs to have a full access to the relevant sources, but this may be in the direct contradiction with the demand that data remain secure, and more importantly in medical area, private. This is especially the case if the data analyst is outsourced and not directly affiliated with the data owner. We address this issue and propose a solution where the model-building process is still possible while data are better protected. We consider the case where the distributions of original data values are preserved while the values themselves change, so that the resulting model is equivalent to the one built with original data.
Evidence-based Sensor Tasking for Space Domain Awareness
NASA Astrophysics Data System (ADS)
Jaunzemis, A.; Holzinger, M.; Jah, M.
2016-09-01
Space Domain Awareness (SDA) is the actionable knowledge required to predict, avoid, deter, operate through, recover from, and/or attribute cause to the loss and/or degradation of space capabilities and services. A main purpose for SDA is to provide decision-making processes with a quantifiable and timely body of evidence of behavior(s) attributable to specific space threats and/or hazards. To fulfill the promise of SDA, it is necessary for decision makers and analysts to pose specific hypotheses that may be supported or refuted by evidence, some of which may only be collected using sensor networks. While Bayesian inference may support some of these decision making needs, it does not adequately capture ambiguity in supporting evidence; i.e., it struggles to rigorously quantify 'known unknowns' for decision makers. Over the past 40 years, evidential reasoning approaches such as Dempster Shafer theory have been developed to address problems with ambiguous bodies of evidence. This paper applies mathematical theories of evidence using Dempster Shafer expert systems to address the following critical issues: 1) How decision makers can pose critical decision criteria as rigorous, testable hypotheses, 2) How to interrogate these hypotheses to reduce ambiguity, and 3) How to task a network of sensors to gather evidence for multiple competing hypotheses. This theory is tested using a simulated sensor tasking scenario balancing search versus track responsibilities.
Agent based modeling in tactical wargaming
NASA Astrophysics Data System (ADS)
James, Alex; Hanratty, Timothy P.; Tuttle, Daniel C.; Coles, John B.
2016-05-01
Army staffs at division, brigade, and battalion levels often plan for contingency operations. As such, analysts consider the impact and potential consequences of actions taken. The Army Military Decision-Making Process (MDMP) dictates identification and evaluation of possible enemy courses of action; however, non-state actors often do not exhibit the same level and consistency of planned actions that the MDMP was originally designed to anticipate. The fourth MDMP step is a particular challenge, wargaming courses of action within the context of complex social-cultural behaviors. Agent-based Modeling (ABM) and its resulting emergent behavior is a potential solution to model terrain in terms of the human domain and improve the results and rigor of the traditional wargaming process.
Human/autonomy collaboration for the automated generation of intelligence products
NASA Astrophysics Data System (ADS)
DiBona, Phil; Schlachter, Jason; Kuter, Ugur; Goldman, Robert
2017-05-01
Intelligence Analysis remains a manual process despite trends toward autonomy in information processing. Analysts need agile decision--support tools that can adapt to the evolving information needs of the mission, allowing the analyst to pose novel analytic questions. Our research enables the analysts to only provide a constrained English specification of what the intelligence product should be. Using HTN planning, the autonomy discovers, decides, and generates a workflow of algorithms to create the intelligence product. Therefore, the analyst can quickly and naturally communicate to the autonomy what information product is needed, rather than how to create it.
The Importance of Nonlinear Transformations Use in Medical Data Analysis.
Shachar, Netta; Mitelpunkt, Alexis; Kozlovski, Tal; Galili, Tal; Frostig, Tzviel; Brill, Barak; Marcus-Kalish, Mira; Benjamini, Yoav
2018-05-11
The accumulation of data and its accessibility through easier-to-use platforms will allow data scientists and practitioners who are less sophisticated data analysts to get answers by using big data for many purposes in multiple ways. Data scientists working with medical data are aware of the importance of preprocessing, yet in many cases, the potential benefits of using nonlinear transformations is overlooked. Our aim is to present a semi-automated approach of symmetry-aiming transformations tailored for medical data analysis and its advantages. We describe 10 commonly encountered data types used in the medical field and the relevant transformations for each data type. Data from the Alzheimer's Disease Neuroimaging Initiative study, Parkinson's disease hospital cohort, and disease-simulating data were used to demonstrate the approach and its benefits. Symmetry-targeted monotone transformations were applied, and the advantages gained in variance, stability, linearity, and clustering are demonstrated. An open source application implementing the described methods was developed. Both linearity of relationships and increase of stability of variability improved after applying proper nonlinear transformation. Clustering simulated nonsymmetric data gave low agreement to the generating clusters (Rand value=0.681), while capturing the original structure after applying nonlinear transformation to symmetry (Rand value=0.986). This work presents the use of nonlinear transformations for medical data and the importance of their semi-automated choice. Using the described approach, the data analyst increases the ability to create simpler, more robust and translational models, thereby facilitating the interpretation and implementation of the analysis by medical practitioners. Applying nonlinear transformations as part of the preprocessing is essential to the quality and interpretability of results. ©Netta Shachar, Alexis Mitelpunkt, Tal Kozlovski, Tal Galili, Tzviel Frostig, Barak Brill, Mira Marcus-Kalish, Yoav Benjamini. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 11.05.2018.
Data Shaping in the Cultural Simulation Modeler Integrated Behavioral Assessment Capability. Phase I
2007-07-01
articles that appeared in global media in the years 1999-2006. The articles were all open source information and were obtained in part through an...agreement between Factiva Dow Jones and the NRL for this project, and in part collected by IndaSea from the Open Source Center database and a variety of...This view implied that a system geared to assist analysts should be open and completely dynamic. It is IndaSea’s perspective that there are advantages
ERIC Educational Resources Information Center
Watson, William J.
Occupational analysts using Comprehensive Occupational Data Analysis Programs (CODAP) make subjective decisions at various stages in their analysis of an occupation. The possibility exists that two different analysts could reach different conclusions in analyzing an occupation, and thereby provide divergent guidance to management. Two analysts,…
Three-Dimensional Dispaly Of Document Set
Lantrip, David B.; Pennock, Kelly A.; Pottier, Marc C.; Schur, Anne; Thomas, James J.; Wise, James A.
2003-06-24
A method for spatializing text content for enhanced visual browsing and analysis. The invention is applied to large text document corpora such as digital libraries, regulations and procedures, archived reports, and the like. The text content from these sources may be transformed to a spatial representation that preserves informational characteristics from the documents. The three-dimensional representation may then be visually browsed and analyzed in ways that avoid language processing and that reduce the analysts' effort.
Three-dimensional display of document set
Lantrip, David B [Oxnard, CA; Pennock, Kelly A [Richland, WA; Pottier, Marc C [Richland, WA; Schur, Anne [Richland, WA; Thomas, James J [Richland, WA; Wise, James A [Richland, WA
2006-09-26
A method for spatializing text content for enhanced visual browsing and analysis. The invention is applied to large text document corpora such as digital libraries, regulations and procedures, archived reports, and the like. The text content from these sources may e transformed to a spatial representation that preserves informational characteristics from the documents. The three-dimensional representation may then be visually browsed and analyzed in ways that avoid language processing and that reduce the analysts' effort.
Three-dimensional display of document set
Lantrip, David B [Oxnard, CA; Pennock, Kelly A [Richland, WA; Pottier, Marc C [Richland, WA; Schur, Anne [Richland, WA; Thomas, James J [Richland, WA; Wise, James A [Richland, WA
2001-10-02
A method for spatializing text content for enhanced visual browsing and analysis. The invention is applied to large text document corpora such as digital libraries, regulations and procedures, archived reports, and the like. The text content from these sources may be transformed to a spatial representation that preserves informational characteristics from the documents. The three-dimensional representation may then be visually browsed and analyzed in ways that avoid language processing and that reduce the analysts' effort.
Three-dimensional display of document set
Lantrip, David B [Oxnard, CA; Pennock, Kelly A [Richland, WA; Pottier, Marc C [Richland, WA; Schur, Anne [Richland, WA; Thomas, James J [Richland, WA; Wise, James A [Richland, WA; York, Jeremy [Bothell, WA
2009-06-30
A method for spatializing text content for enhanced visual browsing and analysis. The invention is applied to large text document corpora such as digital libraries, regulations and procedures, archived reports, and the like. The text content from these sources may be transformed to a spatial representation that preserves informational characteristics from the documents. The three-dimensional representation may then be visually browsed and analyzed in ways that avoid language processing and that reduce the analysts' effort.
Human Augmentation of Reasoning Through Patterning (HARP)
2008-04-01
develop what we then referred to as “ Uber - CIM,” in which a set of independent but tightly-joined CIM models could be developed. However, although that...analysts to apply “tags” (keywords) to Web-based resources, and to see and leverage the tags and tagged resources of others. Catalyst is a modeling ...issues. Catalyst models consist of nodes of information organized into hierarchical tree structures. Nodes can contain attachments or links to tags
Sustaining AMEDD Professional Strength in the Reserve Components
2004-05-03
During the 8 May 2003 Reserve Component Coordination Council meeting8, General John Keane, then Vice Chief of Staff of the Army; Major General Kenneth...retirement. 2001 FOCUS GROUP DATA John Whaley and Dr. Sandra Baxter of Applied Research Analysts moderated six focus groups with the 313th and 399th...with the remainder to be made up from realignment of local structure, contracting medical professionals for the local hospital, or outsourcing to
Abstracts of Master of Military Art and Science (MMAS) Theses and Special Studies 1964-1976
1976-01-01
Missions. They are listed below in a probable chronological order of appli- cation. 1. Undertake self-preparation to become familiar with the concept of...analyst. Familiarity with these tools has the tendency to reduce the reluc- tance sometimes evidenced by the military decision-maker to include such...the fundamentals of combat service support, initiating a branch immaterial logistics familiarization course, teaching a Senior Officer Combat Service
The Pacor 2 expert system: A case-based reasoning approach to troubleshooting
NASA Technical Reports Server (NTRS)
Sary, Charisse
1994-01-01
The Packet Processor 2 (Pacor 2) Data Capture Facility (DCF) acquires, captures, and performs level-zero processing of packet telemetry for spaceflight missions that adhere to communication services recommendations established by the Consultative Committee for Space Data Systems (CCSDS). A major goal of this project is to reduce life-cycle costs. One way to achieve this goal is to increase automation. Through automation, using expert systems, and other technologies, staffing requirements will remain static, which will enable the same number of analysts to support more missions. Analysts provide packet telemetry data evaluation and analysis services for all data received. Data that passes this evaluation is forwarded to the Data Distribution Facility (DDF) and released to scientists. Through troubleshooting, data that fails this evaluation is dumped and analyzed to determine if its quality can be improved before it is released. This paper describes a proof-of-concept prototype that troubleshoots data quality problems. The Pacor 2 expert system prototype uses the case-based reasoning (CBR) approach to development, an alternative to a rule-based approach. Because Pacor 2 is not operational, the prototype has been developed using cases that describe existing troubleshooting experience from currently operating missions. Through CBR, this experience will be available to analysts when Pacor 2 becomes operational. As Pacor 2 unique experience is gained, analysts will update the case base. In essence, analysts are training the system as they learn. Once the system has learned the cases most likely to recur, it can serve as an aide to inexperienced analysts, a refresher to experienced analysts for infrequently occurring problems, or a training tool for new analysts. The Expert System Development Methodology (ESDM) is being used to guide development.
Collision count in rugby union: A comparison of micro-technology and video analysis methods.
Reardon, Cillian; Tobin, Daniel P; Tierney, Peter; Delahunt, Eamonn
2017-10-01
The aim of our study was to determine if there is a role for manipulation of g force thresholds acquired via micro-technology for accurately detecting collisions in rugby union. In total, 36 players were recruited from an elite Guinness Pro12 rugby union team. Player movement profiles and collisions were acquired via individual global positioning system (GPS) micro-technology units. Players were assigned to a sub-category of positions in order to determine positional collision demands. The coding of collisions by micro-technology at g force thresholds between 2 and 5.5 g (0.5 g increments) was compared with collision coding by an expert video analyst using Bland-Altman assessments. The most appropriate g force threshold (smallest mean difference compared with video analyst coding) was lower for all forwards positions (2.5 g) than for all backs positions (3.5 g). The Bland-Altman 95% limits of agreement indicated that there may be a substantial over- or underestimation of collisions coded via GPS micro-technology when using expert video analyst coding as the reference comparator. The manipulation of the g force thresholds applied to data acquired by GPS micro-technology units based on incremental thresholds of 0.5 g does not provide a reliable tool for the accurate coding of collisions in rugby union. Future research should aim to investigate smaller g force threshold increments and determine the events that cause coding of false positives.
Understanding the health care business model: the financial analysts' point of view.
Bukh, Per Nikolaj; Nielsen, Christian
2010-01-01
This study focuses on how financial analysts understand the strategy of a health care company and which elements, from such a strategy perspective, they perceive as constituting the cornerstone of a health care company's business model. The empirical part of this study is based on semi-structured interviews with analysts following a large health care company listed on the Copenhagen Stock Exchange. The authors analyse how the financial analysts view strategy and value creation within the framework of a business model. Further, the authors analyze whether the characteristics emerging from a comprehensive literature review are reflected in the financial analysts' perceptions of which information is decision-relevant and important to communicate to the financial markets. Among the conclusions of the study is the importance of distinguishing between the health care companies' business model and the model by which the payment of revenues are allocated between end users and reimbursing organizations.
The analyst's authenticity: "if you see something, say something".
Goldstein, George; Suzuki, Jessica Y
2015-05-01
The history of authenticity in psychoanalysis is as old as analysis itself, but the analyst's authenticity in particular has become an increasingly important area of focus in recent decades. This article traces the development of conceptions of analytic authenticity and proposes that the analyst's spontaneous verbalization of his or her unformulated experience in session can be a potent force in the course of an analysis. We acknowledge that although analytic authenticity can be a challenging ideal for the analyst to strive for, it contains the power to transform the experience of the patient and the analyst, as well as the meaning of their work together. Whether it comes in the form of an insight-oriented comment or a simple acknowledgment of things as they seem to be, a therapist's willingness to speak aloud something that has lost its language is a powerful clinical phenomenon that transcends theoretical orientation and modality. © 2015 Wiley Periodicals, Inc.
Instruction in information structuring improves Bayesian judgment in intelligence analysts.
Mandel, David R
2015-01-01
An experiment was conducted to test the effectiveness of brief instruction in information structuring (i.e., representing and integrating information) for improving the coherence of probability judgments and binary choices among intelligence analysts. Forty-three analysts were presented with comparable sets of Bayesian judgment problems before and immediately after instruction. After instruction, analysts' probability judgments were more coherent (i.e., more additive and compliant with Bayes theorem). Instruction also improved the coherence of binary choices regarding category membership: after instruction, subjects were more likely to invariably choose the category to which they assigned the higher probability of a target's membership. The research provides a rare example of evidence-based validation of effectiveness in instruction to improve the statistical assessment skills of intelligence analysts. Such instruction could also be used to improve the assessment quality of other types of experts who are required to integrate statistical information or make probabilistic assessments.
The lure of the symptom in psychoanalytic treatment.
Ogden, Thomas H; Gabbard, Glen O
2010-06-01
Psychoanalysis, which at its core is a search for truth, stands in a subversive position vis-à-vis the contemporary therapeutic culture that places a premium on symptomatic "cure." Nevertheless, analysts are vulnerable to succumbing to the internal and external pressures for the achievement of symptomatic improvement. In this communication we trace the evolution of Freud's thinking about the relationship between the aims of psychoanalysis and the alleviation of symptoms. We note that analysts today may recapitulate Freud's early struggles in their pursuit of symptom removal. We present an account of a clinical consultation in which the analytic pair were ensnared in an impasse that involved the analyst's preoccupation with the intransigence of one of the patient's symptoms. We suggest alternative ways of working with these clinical issues and offer some thoughts on how our own work as analysts and consultants to colleagues has been influenced by our understanding of what frequently occurs when the analyst becomes symptom-focused.
Self-disclosure, trauma and the pressures on the analyst.
West, Marcus
2017-09-01
This paper argues that self-disclosure is intimately related to traumatic experience and the pressures on the analyst not to re-traumatize the patient or repeat traumatic dynamics. The paper gives a number of examples of such pressures and outlines the difficulties the analyst may experience in adopting an analytic attitude - attempting to stay as closely as possible with what the patient brings. It suggests that self-disclosure may be used to try to disconfirm the patient's negative sense of themselves or the analyst, or to try to induce a positive sense of self or of the analyst which, whilst well-meaning, may be missing the point and may be prolonging the patient's distress. Examples are given of staying with the co-construction of the traumatic early relational dynamics and thus working through the traumatic complex; this attitude is compared and contrasted with some relational psychoanalytic attitudes. © 2017, The Society of Analytical Psychology.
2012-01-01
Hundreds of studies have shown the efficacy of treatments for problem behavior based on an understanding of its function. Assertions regarding the legitimacy of different types of functional assessment vary substantially across published articles, and best practices regarding the functional assessment process are sometimes difficult to cull from the empirical literature or from published discussions of the behavioral assessment process. A number of myths regarding the functional assessment process, which appear to be pervasive within different behavior-analytic research and practice communities, will be reviewed in the context of an attempt to develop new lore regarding the functional assessment process. Frequently described obstacles to implementing a critical aspect of the functional assessment process, the functional analysis, will be reviewed in the context of solutions for overcoming them. Finally, the aspects of the functional assessment process that should be exported to others versus those features that should remain the sole technological property of behavior analysts will be discussed. PMID:23326630
An automated data exploitation system for airborne sensors
NASA Astrophysics Data System (ADS)
Chen, Hai-Wen; McGurr, Mike
2014-06-01
Advanced wide area persistent surveillance (WAPS) sensor systems on manned or unmanned airborne vehicles are essential for wide-area urban security monitoring in order to protect our people and our warfighter from terrorist attacks. Currently, human (imagery) analysts process huge data collections from full motion video (FMV) for data exploitation and analysis (real-time and forensic), providing slow and inaccurate results. An Automated Data Exploitation System (ADES) is urgently needed. In this paper, we present a recently developed ADES for airborne vehicles under heavy urban background clutter conditions. This system includes four processes: (1) fast image registration, stabilization, and mosaicking; (2) advanced non-linear morphological moving target detection; (3) robust multiple target (vehicles, dismounts, and human) tracking (up to 100 target tracks); and (4) moving or static target/object recognition (super-resolution). Test results with real FMV data indicate that our ADES can reliably detect, track, and recognize multiple vehicles under heavy urban background clutters. Furthermore, our example shows that ADES as a baseline platform can provide capability for vehicle abnormal behavior detection to help imagery analysts quickly trace down potential threats and crimes.
User's guide to the Reliability Estimation System Testbed (REST)
NASA Technical Reports Server (NTRS)
Nicol, David M.; Palumbo, Daniel L.; Rifkin, Adam
1992-01-01
The Reliability Estimation System Testbed is an X-window based reliability modeling tool that was created to explore the use of the Reliability Modeling Language (RML). RML was defined to support several reliability analysis techniques including modularization, graphical representation, Failure Mode Effects Simulation (FMES), and parallel processing. These techniques are most useful in modeling large systems. Using modularization, an analyst can create reliability models for individual system components. The modules can be tested separately and then combined to compute the total system reliability. Because a one-to-one relationship can be established between system components and the reliability modules, a graphical user interface may be used to describe the system model. RML was designed to permit message passing between modules. This feature enables reliability modeling based on a run time simulation of the system wide effects of a component's failure modes. The use of failure modes effects simulation enhances the analyst's ability to correctly express system behavior when using the modularization approach to reliability modeling. To alleviate the computation bottleneck often found in large reliability models, REST was designed to take advantage of parallel processing on hypercube processors.
Concept of operations for knowledge discovery from Big Data across enterprise data warehouses
NASA Astrophysics Data System (ADS)
Sukumar, Sreenivas R.; Olama, Mohammed M.; McNair, Allen W.; Nutaro, James J.
2013-05-01
The success of data-driven business in government, science, and private industry is driving the need for seamless integration of intra and inter-enterprise data sources to extract knowledge nuggets in the form of correlations, trends, patterns and behaviors previously not discovered due to physical and logical separation of datasets. Today, as volume, velocity, variety and complexity of enterprise data keeps increasing, the next generation analysts are facing several challenges in the knowledge extraction process. Towards addressing these challenges, data-driven organizations that rely on the success of their analysts have to make investment decisions for sustainable data/information systems and knowledge discovery. Options that organizations are considering are newer storage/analysis architectures, better analysis machines, redesigned analysis algorithms, collaborative knowledge management tools, and query builders amongst many others. In this paper, we present a concept of operations for enabling knowledge discovery that data-driven organizations can leverage towards making their investment decisions. We base our recommendations on the experience gained from integrating multi-agency enterprise data warehouses at the Oak Ridge National Laboratory to design the foundation of future knowledge nurturing data-system architectures.
The translational metaphor in psychoanalysis.
Kirshner, Lewis
2015-02-01
The translational metaphor in psychoanalysis refers to the traditional method of interpreting or restating the meaning of verbal and behavioral acts of a patient in other, presumably more accurate terms that specify the forces and conflicts underlying symptoms. The analyst translates the clinical phenomenology to explain its true meaning and origin. This model of analytic process has been challenged from different vantage points by authors presenting alternative conceptions of therapeutic action. Although the temptation to find and make interpretations of clinical material is difficult to resist, behaving in this way places the analyst in the position of a teacher or diagnostician, seeking a specific etiology, which has not proven fruitful. Despite its historical appeal, I argue that the translational model is a misleading and anachronistic version of what actually occurs in psychoanalysis. I emphasize instead the capacity of analysis to promote the emergence of new forms of representation, or figuration, from the unconscious, using the work of Lacan, Laplanche, and Modell to exemplify this reformulation, and provide clinical illustrations of how it looks in practice. Copyright © 2014 Institute of Psychoanalysis.
PBIS Is (Not) Behavior Analysis: a Response to Horner and Sugai (2015).
Loukus, Amy K
2015-05-01
I comment on Horner's and Sugai's article regarding the lessons learned from implementing Positive Behavioral Interventions and Support (PBIS)-that is, the things to consider when attempting to extend other works in behavior analysis to the likes of mainstream society. In adopting a critical eye toward the PBIS model, I comment first on the need for dissemination of behavioral principles to a public audience, and then outline the suggestions made by the authors for enhancing acceptance across disciplines. I clarify the definition of PBIS presented by the authors, and summarize the benefits and drawbacks associated with the conceptual argument surrounding the contention that PBIS is a behavior analytic approach to system-wide change, and argue instead for the distinction of elements in the PBIS model and their respective empirical effectiveness. I refer to other works in behavior analysis that are relevant to the current discussion and offer additional considerations for behavior analysts interested in forging ahead with endeavors that aim increase dissemination, particularly those that incorporate a culmination of alternative professional practices.
Critchfield, Thomas S; Doepke, Karla J; Kimberly Epting, L; Becirevic, Amel; Reed, Derek D; Fienup, Daniel M; Kremsreiter, Jamie L; Ecott, Cheryl L
2017-06-01
It has been suggested that non-experts regard the jargon of behavior analysis as abrasive, harsh, and unpleasant. If this is true, excessive reliance on jargon could interfere with the dissemination of effective services. To address this often discussed but rarely studied issue, we consulted a large, public domain list of English words that have been rated by members of the general public for the emotional reactions they evoke. Selected words that behavior analysts use as technical terms were compared to selected words that are commonly used to discuss general science, general clinical work, and behavioral assessment. There was a tendency for behavior analysis terms to register as more unpleasant than other kinds of professional terms and also as more unpleasant than English words generally. We suggest possible reasons for this finding, discuss its relevance to the challenge of deciding how to communicate with consumers who do not yet understand or value behavior analysis, and advocate for systematic research to guide the marketing of behavior analysis.
Department of the Air Force Information Technology Program FY 95 President’s Budget
1994-03-01
2095 2200 552 900 1032 Description: Contractor hardware maintenan support, systems analyst support software development and maintenance, and off -the...hardware maintenance support, systems analyst support, operations support, configuration management, test support, and off -the-shelf software license...2419 2505 2594 Description: Contractor hardware maintenance support, systems analyst support, operations support, and off -the-shelf software license
Micro-based fact collection tool user's manual
NASA Technical Reports Server (NTRS)
Mayer, Richard
1988-01-01
A procedure designed for use by an analyst to assist in the collection and organization of data gathered during the interview processes associated with system analysis and modeling task is described. The basic concept behind the development of this tool is that during the interview process an analyst is presented with assertions of facts by the domain expert. The analyst also makes observations of the domain. These facts need to be collected and preserved in such a way as to allow them to serve as the basis for a number of decision making processes throughout the system development process. This tool can be thought of as a computerization of the analysts's notebook.
Nothing but the truth: self-disclosure, self-revelation, and the persona of the analyst.
Levine, Susan S
2007-01-01
The question of the analyst's self-disclosure and self-revelation inhabits every moment of every psychoanalytic treatment. All self-disclosures and revelations, however, are not equivalent, and differentiating among them allows us to define a construct that can be called the analytic persona. Analysts already rely on an unarticulated concept of an analytic persona that guides them, for instance, as they decide what constitutes appropriate boundaries. Clinical examples illustrate how self-disclosures and revelations from within and without the analytic persona feel different, for both patient and analyst. The analyst plays a specific role for each patient and is both purposefully and unconsciously different in this context than in other settings. To a great degree, the self is a relational phenomenon. Our ethics call for us to tell nothing but the truth and simultaneously for us not to tell the whole truth. The unarticulated working concept of an analytic persona that many analysts have refers to the self we step out of at the close of each session and the self we step into as the patient enters the room. Attitudes toward self-disclosure and self-revelation can be considered reflections of how we conceptualize this persona.
Analyst-centered models for systems design, analysis, and development
NASA Technical Reports Server (NTRS)
Bukley, A. P.; Pritchard, Richard H.; Burke, Steven M.; Kiss, P. A.
1988-01-01
Much has been written about the possible use of Expert Systems (ES) technology for strategic defense system applications, particularly for battle management algorithms and mission planning. It is proposed that ES (or more accurately, Knowledge Based System (KBS)) technology can be used in situations for which no human expert exists, namely to create design and analysis environments that allow an analyst to rapidly pose many different possible problem resolutions in game like fashion and to then work through the solution space in search of the optimal solution. Portions of such an environment exist for expensive AI hardware/software combinations such as the Xerox LOOPS and Intellicorp KEE systems. Efforts are discussed to build an analyst centered model (ACM) using an ES programming environment, ExperOPS5 for a simple missile system tradeoff study. By analyst centered, it is meant that the focus of learning is for the benefit of the analyst, not the model. The model's environment allows the analyst to pose a variety of what if questions without resorting to programming changes. Although not an ES per se, the ACM would allow for a design and analysis environment that is much superior to that of current technologies.
Fault Tree in the Trenches, A Success Story
NASA Technical Reports Server (NTRS)
Long, R. Allen; Goodson, Amanda (Technical Monitor)
2000-01-01
Getting caught up in the explanation of Fault Tree Analysis (FTA) minutiae is easy. In fact, most FTA literature tends to address FTA concepts and methodology. Yet there seems to be few articles addressing actual design changes resulting from the successful application of fault tree analysis. This paper demonstrates how fault tree analysis was used to identify and solve a potentially catastrophic mechanical problem at a rocket motor manufacturer. While developing the fault tree given in this example, the analyst was told by several organizations that the piece of equipment in question had been evaluated by several committees and organizations, and that the analyst was wasting his time. The fault tree/cutset analysis resulted in a joint-redesign of the control system by the tool engineering group and the fault tree analyst, as well as bragging rights for the analyst. (That the fault tree found problems where other engineering reviews had failed was not lost on the other engineering groups.) Even more interesting was that this was the analyst's first fault tree which further demonstrates how effective fault tree analysis can be in guiding (i.e., forcing) the analyst to take a methodical approach in evaluating complex systems.
NASA Astrophysics Data System (ADS)
Davenport, Jack H.
2016-05-01
Intelligence analysts demand rapid information fusion capabilities to develop and maintain accurate situational awareness and understanding of dynamic enemy threats in asymmetric military operations. The ability to extract relationships between people, groups, and locations from a variety of text datasets is critical to proactive decision making. The derived network of entities must be automatically created and presented to analysts to assist in decision making. DECISIVE ANALYTICS Corporation (DAC) provides capabilities to automatically extract entities, relationships between entities, semantic concepts about entities, and network models of entities from text and multi-source datasets. DAC's Natural Language Processing (NLP) Entity Analytics model entities as complex systems of attributes and interrelationships which are extracted from unstructured text via NLP algorithms. The extracted entities are automatically disambiguated via machine learning algorithms, and resolution recommendations are presented to the analyst for validation; the analyst's expertise is leveraged in this hybrid human/computer collaborative model. Military capability is enhanced by these NLP Entity Analytics because analysts can now create/update an entity profile with intelligence automatically extracted from unstructured text, thereby fusing entity knowledge from structured and unstructured data sources. Operational and sustainment costs are reduced since analysts do not have to manually tag and resolve entities.
Better Incident Response with SCOT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bruner, Todd
2015-04-01
SCOT is an incident response management system and knowledge base designed for incident responders by incident responders. SCOT increases the effectiveness of the team without adding undue burdens. Focused on reducing the friction between analysts and their tools, SCOT enables analysts to document and share their research and response efforts in near real time. Automatically identifying indicators and correlating those indicators, SCOT helps analysts discover and respond to advanced threats.
NASA Astrophysics Data System (ADS)
Bianchetti, Raechel Anne
Remotely sensed images have become a ubiquitous part of our daily lives. From novice users, aiding in search and rescue missions using tools such as TomNod, to trained analysts, synthesizing disparate data to address complex problems like climate change, imagery has become central to geospatial problem solving. Expert image analysts are continually faced with rapidly developing sensor technologies and software systems. In response to these cognitively demanding environments, expert analysts develop specialized knowledge and analytic skills to address increasingly complex problems. This study identifies the knowledge, skills, and analytic goals of expert image analysts tasked with identification of land cover and land use change. Analysts participating in this research are currently working as part of a national level analysis of land use change, and are well versed with the use of TimeSync, forest science, and image analysis. The results of this study benefit current analysts as it improves their awareness of their mental processes used during the image interpretation process. The study also can be generalized to understand the types of knowledge and visual cues that analysts use when reasoning with imagery for purposes beyond land use change studies. Here a Cognitive Task Analysis framework is used to organize evidence from qualitative knowledge elicitation methods for characterizing the cognitive aspects of the TimeSync image analysis process. Using a combination of content analysis, diagramming, semi-structured interviews, and observation, the study highlights the perceptual and cognitive elements of expert remote sensing interpretation. Results show that image analysts perform several standard cognitive processes, but flexibly employ these processes in response to various contextual cues. Expert image analysts' ability to think flexibly during their analysis process was directly related to their amount of image analysis experience. Additionally, results show that the basic Image Interpretation Elements continue to be important despite technological augmentation of the interpretation process. These results are used to derive a set of design guidelines for developing geovisual analytic tools and training to support image analysis.
Evaluating an employee wellness program.
Mukhopadhyay, Sankar; Wendel, Jeanne
2013-12-01
What criteria should be used to evaluate the impact of a new employee wellness program when the initial vendor contract expires? Published academic literature focuses on return-on-investment as the gold standard for wellness program evaluation, and a recent meta-analysis concludes that wellness programs can generate net savings after one or two years. In contrast, surveys indicate that fewer than half of these programs report net savings, and actuarial analysts argue that return-on-investment is an unrealistic metric for evaluating new programs. These analysts argue that evaluation of new programs should focus on contract management issues, such as the vendor's ability to: (i) recruit employees to participate and (ii) induce behavior change. We compute difference-in-difference propensity score matching estimates of the impact of a wellness program implemented by a mid-sized employer. The analysis includes one year of pre-implementation data and three years of post-implementation data. We find that the program successfully recruited a broad spectrum of employees to participate, and it successfully induced short-term behavior change, as manifested by increased preventive screening. However, the effects on health care expenditures are positive (but insignificant). If it is unrealistic to expect new programs to significantly reduce healthcare costs in a few years, then focusing on return-on-investment as the gold standard metric may lead to early termination of potentially useful wellness programs. Focusing short-term analysis of new programs on short-term measures may provide a more realistic evaluation strategy.
CASL Dakota Capabilities Summary
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adams, Brian M.; Simmons, Chris; Williams, Brian J.
2017-10-10
The Dakota software project serves the mission of Sandia National Laboratories and supports a worldwide user community by delivering state-of-the-art research and robust, usable software for optimization and uncertainty quantification. These capabilities enable advanced exploration and riskinformed prediction with a wide range of computational science and engineering models. Dakota is the verification and validation (V&V) / uncertainty quantification (UQ) software delivery vehicle for CASL, allowing analysts across focus areas to apply these capabilities to myriad nuclear engineering analyses.
2006-06-01
levels of automation applied as per Figure 13. .................................. 60 x THIS PAGE...models generated for this thesis were set to run for 60 minutes. To run the simulation for the set time, the analyst provides a random number seed to...1984). The IMPRINT 59 workload value of 60 has been used by a consensus of workload modeling SMEs to represent the ‘high’ threshold, while the
2009-03-01
making process (Skinner, 2001, 9). According to Clemen , before we can begin to apply any methodology to a specific decision problem, the analyst...it is possible to work with them to determine the values and objectives that relate to the decision in question ( Clemen , 2001, 21). Clemen ...value hierarchy is constructed, Clemen and Reilly suggest that a trade off is made between varying objectives. They introduce weights to determine
Analysis and Visualization of Relations in eLearning
NASA Astrophysics Data System (ADS)
Dráždilová, Pavla; Obadi, Gamila; Slaninová, Kateřina; Martinovič, Jan; Snášel, Václav
The popularity of eLearning systems is growing rapidly; this growth is enabled by the consecutive development in Internet and multimedia technologies. Web-based education became wide spread in the past few years. Various types of learning management systems facilitate development of Web-based courses. Users of these courses form social networks through the different activities performed by them. This chapter focuses on searching the latent social networks in eLearning systems data. These data consist of students activity records wherein latent ties among actors are embedded. The social network studied in this chapter is represented by groups of students who have similar contacts and interact in similar social circles. Different methods of data clustering analysis can be applied to these groups, and the findings show the existence of latent ties among the group members. The second part of this chapter focuses on social network visualization. Graphical representation of social network can describe its structure very efficiently. It can enable social network analysts to determine the network degree of connectivity. Analysts can easily determine individuals with a small or large amount of relationships as well as the amount of independent groups in a given network. When applied to the field of eLearning, data visualization simplifies the process of monitoring the study activities of individuals or groups, as well as the planning of educational curriculum, the evaluation of study processes, etc.
Problems of internalization: a button is a button is-not.
Rockwell, Shelley
2014-01-01
Analysts hope to help the patient internalize a relationship with the analyst that contrasts with the original archaic object relation. In this paper, the author describes particular difficulties in working with a patient whose defenses and anxieties were bulimic, her movement toward internalization inevitably undone. Several issues are considered: how does the nonsymbolizing patient come to internalize the analyst's understanding, and when this does not hold, what is the nature of the patient's subsequent methods of dispersal? When the patient can maintain connection to the analyst as a good object, even fleetingly, in the depressive position, the possibility of internalization and symbolic communication is increased. © 2014 The Psychoanalytic Quarterly, Inc.
Telling about the analyst's pregnancy.
Uyehara, L A; Austrian, S; Upton, L G; Warner, R H; Williamson, R A
1995-01-01
Pregnancy is one of several events in the life of an analyst which may affect an analysis, calling for special technical considerations. For the analyst, this exception to the tenet of anonymity, along with countertransference guilt, narcissistic preoccupation, heightened infantile conflicts, and intense patient responses, may stimulate anxiety that becomes focused on the timing and manner of informing the patient. For the patient, preoccupation with the timing of the telling may serve as a displacement from other meanings of the pregnancy. Candidate analysts may face particular difficulties managing the impact of their pregnancies on control cases. We address practical and technical considerations in telling, the transference and counter-transference surrounding it, ethical concerns, and the challenges of supervising a pregnant candidate.
USDA analyst review of the LACIE IMAGE-100 hybrid system test
NASA Technical Reports Server (NTRS)
Ashburn, P.; Buelow, K.; Hansen, H. L.; May, G. A. (Principal Investigator)
1979-01-01
Fifty operational segments from the U.S.S.R., 40 test segments from Canada, and 24 test segments from the United States were used to provide a wide range of geographic conditions for USDA analysts during a test to determine the effectiveness of labeling single pixel training fields (dots) using Procedure 1 on the 1-100 hybrid system, and clustering and classifying on the Earth Resources Interactive Processing System. The analysts had additional on-line capabilities such as interactive dot labeling, class or cluster map overlay flickers, and flashing of all dots of equal spectral value. Results on the 1-100 hybrid system are described and analyst problems and recommendations are discussed.
The Generic Spacecraft Analyst Assistant (gensaa): a Tool for Developing Graphical Expert Systems
NASA Technical Reports Server (NTRS)
Hughes, Peter M.
1993-01-01
During numerous contacts with a satellite each day, spacecraft analysts must closely monitor real-time data. The analysts must watch for combinations of telemetry parameter values, trends, and other indications that may signify a problem or failure. As the satellites become more complex and the number of data items increases, this task is becoming increasingly difficult for humans to perform at acceptable performance levels. At NASA GSFC, fault-isolation expert systems are in operation supporting this data monitoring task. Based on the lessons learned during these initial efforts in expert system automation, a new domain-specific expert system development tool named the Generic Spacecraft Analyst Assistant (GenSAA) is being developed to facilitate the rapid development and reuse of real-time expert systems to serve as fault-isolation assistants for spacecraft analysts. Although initially domain-specific in nature, this powerful tool will readily support the development of highly graphical expert systems for data monitoring purposes throughout the space and commercial industry.
Phase-change lines, scale breaks, and trend lines using Excel 2013.
Deochand, Neil; Costello, Mack S; Fuqua, R Wayne
2015-01-01
The development of graphing skills for behavior analysts is an ongoing process. Specialized graphing software is often expensive, is not widely disseminated, and may require specific training. Dixon et al. (2009) provided an updated task analysis for graph making in the widely used platform Excel 2007. Vanselow and Bourret (2012) provided online tutorials that outline some alternate methods also using Office 2007. This article serves as an update to those task analyses and includes some alternative and underutilized methods in Excel 2013. To examine the utility of our recommendations, 12 psychology graduate students were presented with the task analyses, and the experimenters evaluated their performance and noted feedback. The task analyses were rated favorably. © Society for the Experimental Analysis of Behavior.
2016-11-01
Display Design, Methods , and Results for a User Study by Christopher J Garneau and Robert F Erbacher Approved for public...NOV 2016 US Army Research Laboratory Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods ...January 2013–September 2015 4. TITLE AND SUBTITLE Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods
AN ANALYST'S UNCERTAINTY AND FEAR.
Chused, Judith Fingert
2016-10-01
The motivations for choosing psychoanalysis as a profession are many and differ depending on the psychology of the analyst. However, common to most psychoanalysts is the desire to forge a helpful relationship with the individuals with whom they work therapeutically. This article presents an example of what happens when an analyst is confronted by a patient for whom being in a relationship and being helped are intolerable. © 2016 The Psychoanalytic Quarterly, Inc.
Mander, Luke; Baker, Sarah J.; Belcher, Claire M.; Haselhorst, Derek S.; Rodriguez, Jacklyn; Thorn, Jessica L.; Tiwari, Shivangi; Urrego, Dunia H.; Wesseln, Cassandra J.; Punyasena, Surangi W.
2014-01-01
• Premise of the study: Humans frequently identify pollen grains at a taxonomic rank above species. Grass pollen is a classic case of this situation, which has led to the development of computational methods for identifying grass pollen species. This paper aims to provide context for these computational methods by quantifying the accuracy and consistency of human identification. • Methods: We measured the ability of nine human analysts to identify 12 species of grass pollen using scanning electron microscopy images. These are the same images that were used in computational identifications. We have measured the coverage, accuracy, and consistency of each analyst, and investigated their ability to recognize duplicate images. • Results: Coverage ranged from 87.5% to 100%. Mean identification accuracy ranged from 46.67% to 87.5%. The identification consistency of each analyst ranged from 32.5% to 87.5%, and each of the nine analysts produced considerably different identification schemes. The proportion of duplicate image pairs that were missed ranged from 6.25% to 58.33%. • Discussion: The identification errors made by each analyst, which result in a decline in accuracy and consistency, are likely related to psychological factors such as the limited capacity of human memory, fatigue and boredom, recency effects, and positivity bias. PMID:25202649
A note on notes: note taking and containment.
Levine, Howard B
2007-07-01
In extreme situations of massive projective identification, both the analyst and the patient may come to share a fantasy or belief that his or her own psychic reality will be annihilated if the psychic reality of the other is accepted or adopted (Britton 1998). In the example of' Dr. M and his patient, the paradoxical dilemma around note taking had highly specific transference meanings; it was not simply an instance of the generalized human response of distracted attention that Freud (1912) had spoken of, nor was it the destabilization of analytic functioning that I tried to describe in my work with Mr. L. Whether such meanings will always exist in these situations remains a matter to be determined by further clinical experience. In reopening a dialogue about note taking during sessions, I have attempted to move the discussion away from categorical injunctions about what analysis should or should not do, and instead to foster a more nuanced, dynamic, and pair-specific consideration of the analyst's functioning in the immediate context of the analytic relationship. There is, of course, a wide variety of listening styles among analysts, and each analyst's mental functioning may be affected differently by each patient whom the analyst sees. I have raised many questions in the hopes of stimulating an expanded discussion that will allow us to share our experiences and perhaps reach additional conclusions. Further consideration may lead us to decide whether note taking may have very different meanings for other analysts and analyst-patient pairs, and whether it may serve useful functions in addition to the one that I have described.
A psychoanalytical phenomenology of perversion.
Jiménez, Juan Pablo
2004-02-01
After stating that the current tasks of psychoanalytic research should fundamentally include the exploration of the analyst's mental processes in sessions with the patient, the author describes the analytical relation as one having an intersubjective nature. Seen from the outside, the analytical relation evidences two poles: a symmetric structural pole where both analyst and patient share a single world and a single approach to reality, and a functional asymmetric pole that defines the assignment of the respective roles. In the analysis of a perverse patient, the symmetry-asymmetry polarities acquire some very particular characteristics. Seen from the perspective of the analyst's subjectivity, perversion appears in the analyst's mind as a surreptitious and unexpected transgression of the basic agreement that facilitates and structures intersubjective encounters. It may go as far as altering the Aristotelian rules of logic. When coming into contact with the psychic reality of a perverse patient, what happens in the analyst's mind is that a world takes shape. This world is misleadingly coloured by an erotisation that sooner or later will acquire some characteristics of violence. The perverse nucleus, as a false reality, remains dangling in mid-air as an experience that is inaccessible to the analyst's empathy. The only way the analyst can reach it is from the 'periphery' of the patient's psychic reality, by trying in an indirect way to lead him back to his intersubjective roots. At this point, the author's intention is to explain this intersubjective phenomenon in terms of metapsychological and empirical research-based theories. Finally, some ideas on the psychogenesis of perversion are set forth.
Chang, Jeff; Ip, Matthew; Yang, Michael; Wong, Brendon; Power, Theresa; Lin, Lisa; Xuan, Wei; Phan, Tri Giang; Leong, Rupert W
2016-04-01
Confocal laser endomicroscopy can dynamically assess intestinal mucosal barrier defects and increased intestinal permeability (IP). These are functional features that do not have corresponding appearance on histopathology. As such, previous pathology training may not be beneficial in learning these dynamic features. This study aims to evaluate the diagnostic accuracy, learning curve, inter- and intraobserver agreement for identifying features of increased IP in experienced and inexperienced analysts and pathologists. A total of 180 endoscopic confocal laser endomicroscopy (Pentax EC-3870FK; Pentax, Tokyo, Japan) images of the terminal ileum, subdivided into 6 sets of 30 were evaluated by 6 experienced analysts, 13 inexperienced analysts, and 2 pathologists, after a 30-minute teaching session. Cell-junction enhancement, fluorescein leak, and cell dropout were used to represent increased IP and were either present or absent in each image. For each image, the diagnostic accuracy, confidence, and quality were assessed. Diagnostic accuracy was significantly higher for experienced analysts compared with inexperienced analysts from the first set (96.7% vs 83.1%, P < .001) to the third set (95% vs 89.7, P = .127). No differences in accuracy were noted between inexperienced analysts and pathologists. Confidence (odds ratio, 8.71; 95% confidence interval, 5.58-13.57) and good image quality (odds ratio, 1.58; 95% confidence interval, 1.22-2.03) were associated with improved interpretation. Interobserver agreement κ values were high and improved with experience (experienced analysts, 0.83; inexperienced analysts, 0.73; and pathologists, 0.62). Intraobserver agreement was >0.86 for experienced observers. Features representative of increased IP can be rapidly learned with high inter- and intraobserver agreement. Confidence and image quality were significant predictors of accurate interpretation. Previous pathology training did not have an effect on learning. Copyright © 2016 American Society for Gastrointestinal Endoscopy. Published by Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Judith Alice; Long, Kevin Nicholas
2018-05-01
Sylgard® 184/Glass Microballoon (GMB) potting material is currently used in many NW systems. Analysts need a macroscale constitutive model that can predict material behavior under complex loading and damage evolution. To address this need, ongoing modeling and experimental efforts have focused on study of damage evolution in these materials. Micromechanical finite element simulations that resolve individual GMB and matrix components promote discovery and better understanding of the material behavior. With these simulations, we can study the role of the GMB volume fraction, time-dependent damage, behavior under confined vs. unconfined compression, and the effects of partial damage. These simulations are challengingmore » and push the boundaries of capability even with the high performance computing tools available at Sandia. We summarize the major challenges and the current state of this modeling effort, as an exemplar of micromechanical modeling needs that can motivate advances in future computing efforts.« less
MAGIC Computer Simulation. Volume 2: Analyst Manual, Part 1
1971-05-01
A review of the subject Magic Computer Simulation User and Analyst Manuals has been conducted based upon a request received from the US Army...1971 4. TITLE AND SUBTITLE MAGIC Computer Simulation Analyst Manual Part 1 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...14. ABSTRACT The MAGIC computer simulation generates target description data consisting of item-by-item listings of the target’s components and air
2013-11-01
by existing cyber-attack detection tools far exceeds the analysts’ cognitive capabilities. Grounded in perceptual and cognitive theory , many visual...Processes Inspired by the sense-making theory discussed earlier, we model the analytical reasoning process of cyber analysts using three key...analyst are called “working hypotheses”); each hypothesis could trigger further actions to confirm or disconfirm it. New actions will lead to new
Evaluating the O*NET Occupational Analysis System for Army Competency Development
2008-07-01
Experts (SMEs) and collecting ability and skill ratings using trained analysts. The results showed that Army SMEs as well as other types of analysts could...Sciences 2511 Jefferson Davis Highway, Arlington, Virginia 22202-3926 4 July 2008 Army Project Number Personnel and Training 665803D730 Analysis...using trained analysts. SMEs were non-commissioned officers (NCOs) or officers with several years of experience in the Army and their occupations, and
Physics-based and human-derived information fusion for analysts
NASA Astrophysics Data System (ADS)
Blasch, Erik; Nagy, James; Scott, Steve; Okoth, Joshua; Hinman, Michael
2017-05-01
Recent trends in physics-based and human-derived information fusion (PHIF) have amplified the capabilities of analysts; however with the big data opportunities there is a need for open architecture designs, methods of distributed team collaboration, and visualizations. In this paper, we explore recent trends in the information fusion to support user interaction and machine analytics. Challenging scenarios requiring PHIF include combing physics-based video data with human-derived text data for enhanced simultaneous tracking and identification. A driving effort would be to provide analysts with applications, tools, and interfaces that afford effective and affordable solutions for timely decision making. Fusion at scale should be developed to allow analysts to access data, call analytics routines, enter solutions, update models, and store results for distributed decision making.
W. Edwards Deming, quality analysis, and total behavior management.
Saunders, R R; Saunders, J L
1994-01-01
During the past 10 years, the inclusion of the word "quality" in descriptions of production methods, management approaches, educational systems, service system changes, and so forth, has grown exponentially. It appears that no new approach to any problem is likely to be given much consideration today without overt acknowledgment that some improvement in quality must be the outcome. The origins of the importance of quality are primarily rooted in the awakening recognition of the influence of W. Edwards Deming in the post-World War II restoration of Japanese industry. We provide a brief overview of Deming's approach to modernizing management methods and discuss recent criticisms from the field of organizational behavior management that his approach lacks emphasis on the role of reinforcement. We offer a different analysis of Deming's approach and relate its evolution to the contingencies of reinforcement for the behavior of consulting. We also provide an example of problem solving with Deming's approach in a social service setting familiar to many behavior analysts.
LoyalTracker: Visualizing Loyalty Dynamics in Search Engines.
Shi, Conglei; Wu, Yingcai; Liu, Shixia; Zhou, Hong; Qu, Huamin
2014-12-01
The huge amount of user log data collected by search engine providers creates new opportunities to understand user loyalty and defection behavior at an unprecedented scale. However, this also poses a great challenge to analyze the behavior and glean insights into the complex, large data. In this paper, we introduce LoyalTracker, a visual analytics system to track user loyalty and switching behavior towards multiple search engines from the vast amount of user log data. We propose a new interactive visualization technique (flow view) based on a flow metaphor, which conveys a proper visual summary of the dynamics of user loyalty of thousands of users over time. Two other visualization techniques, a density map and a word cloud, are integrated to enable analysts to gain further insights into the patterns identified by the flow view. Case studies and the interview with domain experts are conducted to demonstrate the usefulness of our technique in understanding user loyalty and switching behavior in search engines.
NASA Astrophysics Data System (ADS)
Markovits, Rebecca A.; Weinstein, Yana
2018-01-01
The fields of cognitive psychology and behavior analysis have undertaken separate investigations into effective learning strategies. These studies have led to several recommendations from both fields regarding teaching techniques that have been shown to enhance student performance. While cognitive psychology and behavior analysis have studied student performance independently from their different perspectives, the recommendations they make are remarkably similar. The lack of discussion between the two fields, despite these similarities, is surprising. The current paper seeks to remedy this oversight in two ways: first, by reviewing two techniques recommended by behavior analysts—guided notes and response cards—and comparing them to their counterparts in cognitive psychology that are potentially responsible for their effectiveness; and second, by outlining some other areas of overlap that could benefit from collaboration. By starting the discussion with the comparison of two specific recommendations for teaching techniques, we hope to galvanize a more extensive collaboration that will not only further the progression of both fields, but also extend the practical applications of the ensuing research.
NASA Technical Reports Server (NTRS)
Chamberlain, Robert G.; Duquette, William H.; Provenzano, Joseph P.; Brunzie, Theodore J.; Jordan, Benjamin
2011-01-01
The Athena simulation software supports an analyst from DoD or other federal agency in making stability and reconstruction projections for operational analyses in areas like Iraq or Afghanistan. It encompasses the use of all elements of national power: diplomatic, information, military, and economic (DIME), and anticipates their effects on political, military, economic, social, information, and infrastructure (PMESII) variables in real-world battle space environments. Athena is a stand-alone model that provides analysts with insights into the effectiveness of complex operations by anticipating second-, third-, and higher-order effects. For example, the first-order effect of executing a curfew may be to reduce insurgent activity, but it may also reduce consumer spending and keep workers home as second-order effects. Reduced spending and reduced labor may reduce the gross domestic product (GDP) as a third-order effect. Damage to the economy will have further consequences. The Athena approach has also been considered for application in studies related to climate change and the smart grid. It can be applied to any project where the impacts on the population and their perceptions are important, and where population perception is important to the success of the project.
Addressing the Need for Independence in the CSE Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Ferragut, Erik M; Sheldon, Frederick T
2011-01-01
Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computationalmore » infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.« less
Interactive Data Exploration with Smart Drill-Down
Joglekar, Manas; Garcia-Molina, Hector; Parameswaran, Aditya
2017-01-01
We present smart drill-down, an operator for interactively exploring a relational table to discover and summarize “interesting” groups of tuples. Each group of tuples is described by a rule. For instance, the rule (a, b, ⋆, 1000) tells us that there are a thousand tuples with value a in the first column and b in the second column (and any value in the third column). Smart drill-down presents an analyst with a list of rules that together describe interesting aspects of the table. The analyst can tailor the definition of interesting, and can interactively apply smart drill-down on an existing rule to explore that part of the table. We demonstrate that the underlying optimization problems are NP-Hard, and describe an algorithm for finding the approximately optimal list of rules to display when the user uses a smart drill-down, and a dynamic sampling scheme for efficiently interacting with large tables. Finally, we perform experiments on real datasets on our experimental prototype to demonstrate the usefulness of smart drill-down and study the performance of our algorithms. PMID:28210096
Analytic Steering: Inserting Context into the Information Dialog
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bohn, Shawn J.; Calapristi, Augustin J.; Brown, Shyretha D.
2011-10-23
An analyst’s intrinsic domain knowledge is a primary asset in almost any analysis task. Unstructured text analysis systems that apply un-supervised content analysis approaches can be more effective if they can leverage this domain knowledge in a manner that augments the information discovery process without obfuscating new or unexpected content. Current unsupervised approaches rely upon the prowess of the analyst to submit the right queries or observe generalized document and term relationships from ranked or visual results. We propose a new approach which allows the user to control or steer the analytic view within the unsupervised space. This process ismore » controlled through the data characterization process via user supplied context in the form of a collection of key terms. We show that steering with an appropriate choice of key terms can provide better relevance to the analytic domain and still enable the analyst to uncover un-expected relationships; this paper discusses cases where various analytic steering approaches can provide enhanced analysis results and cases where analytic steering can have a negative impact on the analysis process.« less
A preoccupation with object-representation: the Beckett-Bion case revisited.
Oppenheim, L
2001-08-01
Taking issue with the notion of a profound reciprocal influence of Samuel Beckett and his analyst, Wilfred Bion, based on supposition all too often passed as fact, the author refutes the idea that Bion's 'Attacks on linking' was based on his later-to-be famous patient. Choosing, rather, to apply Bion's concepts of transformation and assaults on verbal thought to Beckett's remarkably visual and highly dissociative writing, she finds in the analyst's work a means of exploring a startling preoccupation with object representation and an anxiety of remembrance constant throughout the writer's texts. Is this fixation attributable only to aesthetic strategy or does it say something about the writer's own inner representational world? Relating the writer's obsession to Bion's concepts and, moreover, its dissociative expression to the decathexis and blank mourning explored by Green, she uncovers within it a reflection of the kind of evocative memory disturbance identified with primary dyadic dysfunction. This application of Bion and Green to Beckett veers distinctly less towards psychohistory, however, than to how sublimation has rendered this object-relational failure an aesthetic success.
Development and verification of local/global analysis techniques for laminated composites
NASA Technical Reports Server (NTRS)
Griffin, O. Hayden, Jr.
1989-01-01
Analysis and design methods for laminated composite materials have been the subject of considerable research over the past 20 years, and are currently well developed. In performing the detailed three-dimensional analyses which are often required in proximity to discontinuities, however, analysts often encounter difficulties due to large models. Even with the current availability of powerful computers, models which are too large to run, either from a resource or time standpoint, are often required. There are several approaches which can permit such analyses, including substructuring, use of superelements or transition elements, and the global/local approach. This effort is based on the so-called zoom technique to global/local analysis, where a global analysis is run, with the results of that analysis applied to a smaller region as boundary conditions, in as many iterations as is required to attain an analysis of the desired region. Before beginning the global/local analyses, it was necessary to evaluate the accuracy of the three-dimensional elements currently implemented in the Computational Structural Mechanics (CSM) Testbed. It was also desired to install, using the Experimental Element Capability, a number of displacement formulation elements which have well known behavior when used for analysis of laminated composites.
Representation and presentation of requirements knowledge
NASA Technical Reports Server (NTRS)
Johnson, W. L.; Feather, Martin S.; Harris, David R.
1992-01-01
An approach to representation and presentation of knowledge used in the ARIES, an experimental requirements/specification environment, is described. The approach applies the notion of a representation architecture to the domain of software engineering and incorporates a strong coupling to a transformation system. It is characterized by a single highly expressive underlying representation, interfaced simultaneously to multiple presentations, each with notations of differing degrees of expressivity. This enables analysts to use multiple languages for describing systems and have these descriptions yield a single consistent model of the system.
Large-scale structural analysis: The structural analyst, the CSM Testbed and the NAS System
NASA Technical Reports Server (NTRS)
Knight, Norman F., Jr.; Mccleary, Susan L.; Macy, Steven C.; Aminpour, Mohammad A.
1989-01-01
The Computational Structural Mechanics (CSM) activity is developing advanced structural analysis and computational methods that exploit high-performance computers. Methods are developed in the framework of the CSM testbed software system and applied to representative complex structural analysis problems from the aerospace industry. An overview of the CSM testbed methods development environment is presented and some numerical methods developed on a CRAY-2 are described. Selected application studies performed on the NAS CRAY-2 are also summarized.
NASA Technical Reports Server (NTRS)
Isaacson, D.; Marchesin, D.; Paes-Leme, P. J.
1980-01-01
This paper is an expanded version of a talk given at the 1979 T.I.C.O.M. conference. It is a self-contained introduction, for applied mathematicians and numerical analysts, to quantum mechanics and quantum field theory. It also contains a brief description of the authors' numerical approach to the problems of quantum field theory, which may best be summarized by the question; Can we compute the eigenvalues and eigenfunctions of Schrodinger operators in infinitely many variables.
Fuzzy Linear Programming and its Application in Home Textile Firm
NASA Astrophysics Data System (ADS)
Vasant, P.; Ganesan, T.; Elamvazuthi, I.
2011-06-01
In this paper, new fuzzy linear programming (FLP) based methodology using a specific membership function, named as modified logistic membership function is proposed. The modified logistic membership function is first formulated and its flexibility in taking up vagueness in parameter is established by an analytical approach. The developed methodology of FLP has provided a confidence in applying to real life industrial production planning problem. This approach of solving industrial production planning problem can have feedback with the decision maker, the implementer and the analyst.
The Generalized Roy Model and the Cost-Benefit Analysis of Social Programs.
Eisenhauer, Philipp; Heckman, James J; Vytlacil, Edward
2015-04-01
The literature on treatment effects focuses on gross benefits from program participation. We extend this literature by developing conditions under which it is possible to identify parameters measuring the cost and net surplus from program participation. Using the generalized Roy model, we nonparametrically identify the cost, benefit, and net surplus of selection into treatment without requiring the analyst to have direct information on the cost. We apply our methodology to estimate the gross benefit and net surplus of attending college.
The Generalized Roy Model and the Cost-Benefit Analysis of Social Programs*
Eisenhauer, Philipp; Heckman, James J.; Vytlacil, Edward
2015-01-01
The literature on treatment effects focuses on gross benefits from program participation. We extend this literature by developing conditions under which it is possible to identify parameters measuring the cost and net surplus from program participation. Using the generalized Roy model, we nonparametrically identify the cost, benefit, and net surplus of selection into treatment without requiring the analyst to have direct information on the cost. We apply our methodology to estimate the gross benefit and net surplus of attending college. PMID:26709315
Visual analytics of anomaly detection in large data streams
NASA Astrophysics Data System (ADS)
Hao, Ming C.; Dayal, Umeshwar; Keim, Daniel A.; Sharma, Ratnesh K.; Mehta, Abhay
2009-01-01
Most data streams usually are multi-dimensional, high-speed, and contain massive volumes of continuous information. They are seen in daily applications, such as telephone calls, retail sales, data center performance, and oil production operations. Many analysts want insight into the behavior of this data. They want to catch the exceptions in flight to reveal the causes of the anomalies and to take immediate action. To guide the user in finding the anomalies in the large data stream quickly, we derive a new automated neighborhood threshold marking technique, called AnomalyMarker. This technique is built on cell-based data streams and user-defined thresholds. We extend the scope of the data points around the threshold to include the surrounding areas. The idea is to define a focus area (marked area) which enables users to (1) visually group the interesting data points related to the anomalies (i.e., problems that occur persistently or occasionally) for observing their behavior; (2) discover the factors related to the anomaly by visualizing the correlations between the problem attribute with the attributes of the nearby data items from the entire multi-dimensional data stream. Mining results are quickly presented in graphical representations (i.e., tooltip) for the user to zoom into the problem regions. Different algorithms are introduced which try to optimize the size and extent of the anomaly markers. We have successfully applied this technique to detect data stream anomalies in large real-world enterprise server performance and data center energy management.
Station Set Residual: Event Classification Using Historical Distribution of Observing Stations
NASA Astrophysics Data System (ADS)
Procopio, Mike; Lewis, Jennifer; Young, Chris
2010-05-01
Analysts working at the International Data Centre in support of treaty monitoring through the Comprehensive Nuclear-Test-Ban Treaty Organization spend a significant amount of time reviewing hypothesized seismic events produced by an automatic processing system. When reviewing these events to determine their legitimacy, analysts take a variety of approaches that rely heavily on training and past experience. One method used by analysts to gauge the validity of an event involves examining the set of stations involved in the detection of an event. In particular, leveraging past experience, an analyst can say that an event located in a certain part of the world is expected to be detected by Stations A, B, and C. Implicit in this statement is that such an event would usually not be detected by Stations X, Y, or Z. For some well understood parts of the world, the absence of one or more "expected" stations—or the presence of one or more "unexpected" stations—is correlated with a hypothesized event's legitimacy and to its survival to the event bulletin. The primary objective of this research is to formalize and quantify the difference between the observed set of stations detecting some hypothesized event, versus the expected set of stations historically associated with detecting similar nearby events close in magnitude. This Station Set Residual can be quantified in many ways, some of which are correlated with the analysts' determination of whether or not the event is valid. We propose that this Station Set Residual score can be used to screen out certain classes of "false" events produced by automatic processing with a high degree of confidence, reducing the analyst burden. Moreover, we propose that the visualization of the historically expected distribution of detecting stations can be immediately useful as an analyst aid during their review process.
2016-01-01
of data science within DIA and ensure the activities assist and inform DIA’s decisionmakers, analysts , and operators. The research addressed two key...by an analyst or researcher . This type of identifi- cation can be time-consuming and potentially full of errors. GENIE learns from ana- 1 Interview... analysts . The protocol can be found in Appendix A. The protocol was intended to elicit information in five broad research areas. First, we asked a
Grand Strategy: Contending Contemporary Analyst Views and Implications for the U.S. Navy
2011-11-01
Grand Strategy Contending Contemporary Analyst Views and Implications for the U.S. Navy Elbridge Colby CRM D0025423.A2/Final November...NOV 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Grand Strategy: Contending Contemporary Analyst Views...implications for the country, the U.S. armed forces, and the U.S. Navy. Two other categories—isolationism (an oft-mentioned contender in political
Proactive human-computer collaboration for information discovery
NASA Astrophysics Data System (ADS)
DiBona, Phil; Shilliday, Andrew; Barry, Kevin
2016-05-01
Lockheed Martin Advanced Technology Laboratories (LM ATL) is researching methods, representations, and processes for human/autonomy collaboration to scale analysis and hypotheses substantiation for intelligence analysts. This research establishes a machinereadable hypothesis representation that is commonsensical to the human analyst. The representation unifies context between the human and computer, enabling autonomy in the form of analytic software, to support the analyst through proactively acquiring, assessing, and organizing high-value information that is needed to inform and substantiate hypotheses.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Franklin, Lyndsey; Pirrung, Megan A.; Blaha, Leslie M.
Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated tool support in the effort to make their tasks more efficient, accurate, and timely. This tool support comes in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for exploring rich and noisy data sets. Cyber analysts, however, often speak of a need for tools which help them merge the data they already have and help them establish appropriate baselines against which to compare potential anomalies. Furthermore, existing threat modelsmore » that cyber analysts regularly use to structure their investigation are not often leveraged in support tools. We report on our work with cyber analysts to understand they analytic process and how one such model, the MITRE ATT&CK Matrix [32], is used to structure their analytic thinking. We present our efforts to map specific data needed by analysts into the threat model to inform our eventual visualization designs. We examine data mapping for gaps where the threat model is under-supported by either data or tools. We discuss these gaps as potential design spaces for future research efforts. We also discuss the design of a prototype tool that combines machine-learning and visualization components to support cyber analysts working with this threat model.« less
The reality of the other: dreaming of the analyst.
Ferruta, Anna
2009-02-01
The author discusses the obstacles to symbolization encountered when the analyst appears in the first dream of an analysis: the reality of the other is represented through the seeming recognition of the person of the analyst, who is portrayed in undisguised form. The interpretation of this first dream gives rise to reflections on the meaning of the other's reality in analysis: precisely this realistic representation indicates that the function of the other in the construction of the psychic world has been abolished. An analogous phenomenon is observed in the countertransference, as the analyst's mental processes are occluded by an exclusively self-generated interpretation of the patient's psychic world. For the analyst too, the reality of the other proves not to play a significant part in the construction of her interpretation. A 'turning-point' dream after five years bears witness to the power of the transforming function performed by the other throughout the analysis, by way of the representation of characters who stand for the necessary presence of a third party in the construction of a personal psychic reality. The author examines the mutual denial of the other's otherness, as expressed by the vicissitudes of the transference and countertransference between analyst and patient, otherness being experienced as a disturbance of self-sufficient narcissistic functioning. The paper ends with an analysis of the transformations that took place in the analytic relationship.
Neurotechnology for intelligence analysts
NASA Astrophysics Data System (ADS)
Kruse, Amy A.; Boyd, Karen C.; Schulman, Joshua J.
2006-05-01
Geospatial Intelligence Analysts are currently faced with an enormous volume of imagery, only a fraction of which can be processed or reviewed in a timely operational manner. Computer-based target detection efforts have failed to yield the speed, flexibility and accuracy of the human visual system. Rather than focus solely on artificial systems, we hypothesize that the human visual system is still the best target detection apparatus currently in use, and with the addition of neuroscience-based measurement capabilities it can surpass the throughput of the unaided human severalfold. Using electroencephalography (EEG), Thorpe et al1 described a fast signal in the brain associated with the early detection of targets in static imagery using a Rapid Serial Visual Presentation (RSVP) paradigm. This finding suggests that it may be possible to extract target detection signals from complex imagery in real time utilizing non-invasive neurophysiological assessment tools. To transform this phenomenon into a capability for defense applications, the Defense Advanced Research Projects Agency (DARPA) currently is sponsoring an effort titled Neurotechnology for Intelligence Analysts (NIA). The vision of the NIA program is to revolutionize the way that analysts handle intelligence imagery, increasing both the throughput of imagery to the analyst and overall accuracy of the assessments. Successful development of a neurobiologically-based image triage system will enable image analysts to train more effectively and process imagery with greater speed and precision.
Dual coding: a cognitive model for psychoanalytic research.
Bucci, W
1985-01-01
Four theories of mental representation derived from current experimental work in cognitive psychology have been discussed in relation to psychoanalytic theory. These are: verbal mediation theory, in which language determines or mediates thought; perceptual dominance theory, in which imagistic structures are dominant; common code or propositional models, in which all information, perceptual or linguistic, is represented in an abstract, amodal code; and dual coding, in which nonverbal and verbal information are each encoded, in symbolic form, in separate systems specialized for such representation, and connected by a complex system of referential relations. The weight of current empirical evidence supports the dual code theory. However, psychoanalysis has implicitly accepted a mixed model-perceptual dominance theory applying to unconscious representation, and verbal mediation characterizing mature conscious waking thought. The characterization of psychoanalysis, by Schafer, Spence, and others, as a domain in which reality is constructed rather than discovered, reflects the application of this incomplete mixed model. The representations of experience in the patient's mind are seen as without structure of their own, needing to be organized by words, thus vulnerable to distortion or dissolution by the language of the analyst or the patient himself. In these terms, hypothesis testing becomes a meaningless pursuit; the propositions of the theory are no longer falsifiable; the analyst is always more or less "right." This paper suggests that the integrated dual code formulation provides a more coherent theoretical framework for psychoanalysis than the mixed model, with important implications for theory and technique. In terms of dual coding, the problem is not that the nonverbal representations are vulnerable to distortion by words, but that the words that pass back and forth between analyst and patient will not affect the nonverbal schemata at all. Using the dual code formulation, and applying an investigative methodology derived from experimental cognitive psychology, a new approach to the verification of interpretations is possible. Some constructions of a patient's story may be seen as more accurate than others, by virtue of their linkage to stored perceptual representations in long-term memory. We can demonstrate that such linking has occurred in functional or operational terms--through evaluating the representation of imagistic content in the patient's speech.
Evaluation of SNS Beamline Shielding Configurations using MCNPX Accelerated by ADVANTG
DOE Office of Scientific and Technical Information (OSTI.GOV)
Risner, Joel M; Johnson, Seth R.; Remec, Igor
2015-01-01
Shielding analyses for the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory pose significant computational challenges, including highly anisotropic high-energy sources, a combination of deep penetration shielding and an unshielded beamline, and a desire to obtain well-converged nearly global solutions for mapping of predicted radiation fields. The majority of these analyses have been performed using MCNPX with manually generated variance reduction parameters (source biasing and cell-based splitting and Russian roulette) that were largely based on the analyst's insight into the problem specifics. Development of the variance reduction parameters required extensive analyst time, and was often tailored to specific portionsmore » of the model phase space. We previously applied a developmental version of the ADVANTG code to an SNS beamline study to perform a hybrid deterministic/Monte Carlo analysis and showed that we could obtain nearly global Monte Carlo solutions with essentially uniform relative errors for mesh tallies that cover extensive portions of the model with typical voxel spacing of a few centimeters. The use of weight window maps and consistent biased sources produced using the FW-CADIS methodology in ADVANTG allowed us to obtain these solutions using substantially less computer time than the previous cell-based splitting approach. While those results were promising, the process of using the developmental version of ADVANTG was somewhat laborious, requiring user-developed Python scripts to drive much of the analysis sequence. In addition, limitations imposed by the size of weight-window files in MCNPX necessitated the use of relatively coarse spatial and energy discretization for the deterministic Denovo calculations that we used to generate the variance reduction parameters. We recently applied the production version of ADVANTG to this beamline analysis, which substantially streamlined the analysis process. We also tested importance function collapsing (in space and energy) capabilities in ADVANTG. These changes, along with the support for parallel Denovo calculations using the current version of ADVANTG, give us the capability to improve the fidelity of the deterministic portion of the hybrid analysis sequence, obtain improved weight-window maps, and reduce both the analyst and computational time required for the analysis process.« less
Techniques for automatic large scale change analysis of temporal multispectral imagery
NASA Astrophysics Data System (ADS)
Mercovich, Ryan A.
Change detection in remotely sensed imagery is a multi-faceted problem with a wide variety of desired solutions. Automatic change detection and analysis to assist in the coverage of large areas at high resolution is a popular area of research in the remote sensing community. Beyond basic change detection, the analysis of change is essential to provide results that positively impact an image analyst's job when examining potentially changed areas. Present change detection algorithms are geared toward low resolution imagery, and require analyst input to provide anything more than a simple pixel level map of the magnitude of change that has occurred. One major problem with this approach is that change occurs in such large volume at small spatial scales that a simple change map is no longer useful. This research strives to create an algorithm based on a set of metrics that performs a large area search for change in high resolution multispectral image sequences and utilizes a variety of methods to identify different types of change. Rather than simply mapping the magnitude of any change in the scene, the goal of this research is to create a useful display of the different types of change in the image. The techniques presented in this dissertation are used to interpret large area images and provide useful information to an analyst about small regions that have undergone specific types of change while retaining image context to make further manual interpretation easier. This analyst cueing to reduce information overload in a large area search environment will have an impact in the areas of disaster recovery, search and rescue situations, and land use surveys among others. By utilizing a feature based approach founded on applying existing statistical methods and new and existing topological methods to high resolution temporal multispectral imagery, a novel change detection methodology is produced that can automatically provide useful information about the change occurring in large area and high resolution image sequences. The change detection and analysis algorithm developed could be adapted to many potential image change scenarios to perform automatic large scale analysis of change.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bogen, Paul Logasa; McKenzie, Amber T; Gillen, Rob
Forensic document analysis has become an important aspect of investigation of many different kinds of crimes from money laundering to fraud and from cybercrime to smuggling. The current workflow for analysts includes powerful tools, such as Palantir and Analyst s Notebook, for moving from evidence to actionable intelligence and tools for finding documents among the millions of files on a hard disk, such as FTK. However, the analysts often leave the process of sorting through collections of seized documents to filter out the noise from the actual evidence to a highly labor-intensive manual effort. This paper presents the Redeye Analysismore » Workbench, a tool to help analysts move from manual sorting of a collection of documents to performing intelligent document triage over a digital library. We will discuss the tools and techniques we build upon in addition to an in-depth discussion of our tool and how it addresses two major use cases we observed analysts performing. Finally, we also include a new layout algorithm for radial graphs that is used to visualize clusters of documents in our system.« less
The Analyst's "Use" of Theory or Theories: The Play of Theory.
Cooper, Steven H
2017-10-01
Two clinical vignettes demonstrate a methodological approach that guides the analyst's attention to metaphors and surfaces that are the focus of different theories. Clinically, the use of different theories expands the metaphorical language with which the analyst tries to make contact with the patient's unconscious life. Metaphorical expressions may be said to relate to each other as the syntax of unconscious fantasy (Arlow 1979). The unconscious fantasy itself represents a metaphorical construction of childhood experience that has persisted, dynamically expressive and emergent into adult life. This persistence is evident in how, in some instances, long periods of an analysis focus on translating one or a few metaphors, chiefly because the manifest metaphorical expressions of a central theme regularly lead to better understanding of an unconscious fantasy. At times employing another model or theory assists in a level of self-reflection about clinical understanding and clinical decisions. The analyst's choice of theory or theories is unique to the analyst and is not prescriptive, except as illustrating a way to think about these issues. The use of multiple models in no way suggests or implies that theories may be integrated.
On radicalizing behaviorism: A call for cultural analysis
Malagodi, E. F.
1986-01-01
Our culture at large continues many practices that work against the well-being of its members and its chances for survival. Our discipline has failed to realize its potential for contributing to the understanding of these practices and to the generation of solutions. This failure of realization is in part a consequence of the general failure of behavior analysts to view social and cultural analysis as a fundamental component of radical behaviorism. This omission is related to three prevailing practices of our discipline. First, radical behaviorism is characteristically defined as a “philosophy of science,” and its concerns are ordinarily restricted to certain epistemological issues. Second, theoretical extensions to social and cultural phenomena too often depend solely upon principles derived from the analysis of behavior. Third, little attention has been directed at examining the relationships that do, or that should, exist between our discipline and related sciences. These practices themselves are attributed to certain features of the history of our field. Two general remedies for this situation are suggested: first, that radical behaviorism be treated as a comprehensive world view in which epistemological, psychological, and cultural analyses constitute interdependent components; second, that principles derived from compatible social-science disciplines be incorporated into radical behaviorism. PMID:22478643
NASA Astrophysics Data System (ADS)
Margitus, Michael R.; Tagliaferri, William A., Jr.; Sudit, Moises; LaMonica, Peter M.
2012-06-01
Understanding the structure and dynamics of networks are of vital importance to winning the global war on terror. To fully comprehend the network environment, analysts must be able to investigate interconnected relationships of many diverse network types simultaneously as they evolve both spatially and temporally. To remove the burden from the analyst of making mental correlations of observations and conclusions from multiple domains, we introduce the Dynamic Graph Analytic Framework (DYGRAF). DYGRAF provides the infrastructure which facilitates a layered multi-modal network analysis (LMMNA) approach that enables analysts to assemble previously disconnected, yet related, networks in a common battle space picture. In doing so, DYGRAF provides the analyst with timely situation awareness, understanding and anticipation of threats, and support for effective decision-making in diverse environments.
NASA Astrophysics Data System (ADS)
Kuzma, H. A.; Arehart, E.; Louie, J. N.; Witzleben, J. L.
2012-04-01
Listening to the waveforms generated by earthquakes is not new. The recordings of seismometers have been sped up and played to generations of introductory seismology students, published on educational websites and even included in the occasional symphony. The modern twist on earthquakes as music is an interest in using state-of-the-art computer algorithms for seismic data processing and evaluation. Algorithms such as such as Hidden Markov Models, Bayesian Network models and Support Vector Machines have been highly developed for applications in speech recognition, and might also be adapted for automatic seismic data analysis. Over the last three years, the International Data Centre (IDC) of the Comprehensive Test Ban Treaty Organization (CTBTO) has supported an effort to apply computer learning and data mining algorithms to IDC data processing, particularly to the problem of weeding through automatically generated event bulletins to find events which are non-physical and would otherwise have to be eliminated by the hand of highly trained human analysts. Analysts are able to evaluate events, distinguish between phases, pick new phases and build new events by looking at waveforms displayed on a computer screen. Human ears, however, are much better suited to waveform processing than are the eyes. Our hypothesis is that combining an auditory representation of seismic events with visual waveforms would reduce the time it takes to train an analyst and the time they need to evaluate an event. Since it takes almost two years for a person of extraordinary diligence to become a professional analyst and IDC contracts are limited to seven years by Treaty, faster training would significantly improve IDC operations. Furthermore, once a person learns to distinguish between true and false events by ear, various forms of audio compression can be applied to the data. The compression scheme which yields the smallest data set in which relevant signals can still be heard is likely an excellent candidate from which to draw features that can be fed into machine learning algorithms since it contains a compact numerical representation of the information that humans need to evaluate events. The challenge in this work is that, although it is relatively easy to pick out earthquake arrivals in waveform data from a single station, when stations are combined the addition of background noise tends to confuse and overwhelm the listener. To solve this problem, we rely on techniques such as the slowing down of recordings without altering the pitch which are used by ethnomusicologists to understand highly complex rhythms and sounds. We work with professional musicians and recorders to mix the data from different seismic stations in a way which reduces noise and preserves the uniqueness of each station.
Self psychology as a shift away from the paranoid strain in classical analytic theory.
Terman, David M
2014-12-01
Classical psychoanalytic theory has a paranoid strain. There is, in effect, an "evil other"--the id--within each individual that must be tamed in development and confronted and worked through as resistance in treatment. This last has historically endgendered an adversarial relationship between patient and analyst. This paranoid strain came from a paranoid element in Freud's personality that affected his worldview, his relationships, and his theory. Self psychology offers a different view of development and conflict. It stresses the child's need for responsiveness from and admiration of caretakers in order to develop a well-functioning self. Though severe behavioral and character problems may result from faults in the process of self-construction, the essential need is not instinctual discharge but connection. Hence the long-assumed opposition between individual needs and social institutions or between patient and analyst is no longer inevitable or universal. Rather, an understanding of the primary need for connection creates both a different interpretive stance and a more cooperative ambience. These changes in theory and technique are traced to Kohut's personal struggles to emancipate himself from his paranoid mother. © 2014 by the American Psychoanalytic Association.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olama, Mohammed M; Nutaro, James J; Sukumar, Sreenivas R
2013-01-01
The success of data-driven business in government, science, and private industry is driving the need for seamless integration of intra and inter-enterprise data sources to extract knowledge nuggets in the form of correlations, trends, patterns and behaviors previously not discovered due to physical and logical separation of datasets. Today, as volume, velocity, variety and complexity of enterprise data keeps increasing, the next generation analysts are facing several challenges in the knowledge extraction process. Towards addressing these challenges, data-driven organizations that rely on the success of their analysts have to make investment decisions for sustainable data/information systems and knowledge discovery. Optionsmore » that organizations are considering are newer storage/analysis architectures, better analysis machines, redesigned analysis algorithms, collaborative knowledge management tools, and query builders amongst many others. In this paper, we present a concept of operations for enabling knowledge discovery that data-driven organizations can leverage towards making their investment decisions. We base our recommendations on the experience gained from integrating multi-agency enterprise data warehouses at the Oak Ridge National Laboratory to design the foundation of future knowledge nurturing data-system architectures.« less
Training for spacecraft technical analysts
NASA Technical Reports Server (NTRS)
Ayres, Thomas J.; Bryant, Larry
1989-01-01
Deep space missions such as Voyager rely upon a large team of expert analysts who monitor activity in the various engineering subsystems of the spacecraft and plan operations. Senior teammembers generally come from the spacecraft designers, and new analysts receive on-the-job training. Neither of these methods will suffice for the creation of a new team in the middle of a mission, which may be the situation during the Magellan mission. New approaches are recommended, including electronic documentation, explicit cognitive modeling, and coached practice with archived data.
What's in a name: what analyst and patient call each other.
Barron, Grace Caroline
2006-01-01
Awkward moments often arise between patient and analyst involving the question, "What do we call each other?" The manner in which the dyad address each other contains material central to the patient's inner life. Names, like dreams, deserve a privileged status as providing a royal road into the paradoxical analytic relationship and the unconscious conflicts that feed it. Whether an analyst addresses the patient formally, informally, or not at all, awareness of the issues surrounding names is important.
Finite Element Analysis of the LOLA Receiver Telescope Lens
NASA Technical Reports Server (NTRS)
Matzinger, Elizabeth
2007-01-01
This paper presents the finite element stress and distortion analysis completed on the Receiver Telescope lens of the Lunar Orbiter Laser Altimeter (LOLA). LOLA is one of six instruments on the Lunar Reconnaissance Orbiter (LRO), scheduled to launch in 2008. LOLA's main objective is to produce a high-resolution global lunar topographic model to aid in safe landings and enhance surface mobility in future exploration missions. The Receiver Telescope captures the laser pulses transmitted through a diffractive optical element (DOE) and reflected off the lunar surface. The largest lens of the Receiver Telescope, Lens 1, is a 150 mm diameter aspheric lens originally designed to be made of BK7 glass. The finite element model of the Receiver Telescope Lens 1 is comprised of solid elements and constrained in a manner consistent with the behavior of the mounting configuration of the Receiver Telescope tube. Twenty-one temperature load cases were mapped to the nodes based on thermal analysis completed by LOLA's lead thermal analyst, and loads were applied to simulate the preload applied from the ring flexure. The thermal environment of the baseline design (uncoated BK7 lens with no baffle) produces large radial and axial gradients in the lens. These large gradients create internal stresses that may lead to part failure, as well as significant bending that degrades optical performance. The high stresses and large distortions shown in the analysis precipitated a design change from BK7 glass to sapphire.
Classification and analysis of the Rudaki's Area
NASA Astrophysics Data System (ADS)
Zambon, F.; De sanctis, M.; Capaccioni, F.; Filacchione, G.; Carli, C.; Ammannito, E.; Frigeri, A.
2011-12-01
During the first two MESSENGER flybys the Mercury Dual Imaging System (MDIS) has mapped 90% of the Mercury's surface. An effective way to study the different terrain on planetary surfaces is to apply classification methods. These are based on clustering algorithms and they can be divided in two categories: unsupervised and supervised. The unsupervised classifiers do not require the analyst feedback and the algorithm automatically organizes pixels values into classes. In the supervised method, instead, the analyst must choose the "training area" that define the pixels value of a given class. We applied an unsupervised classifier, ISODATA, to the WAC filter images of the Rudaki's area where several kind of terrain have been identified showing differences in albedo, topography and crater density. ISODATA classifier divides this region in four classes: 1) shadow regions, 2) rough regions, 3) smooth plane, 4) highest reflectance area. ISODATA can not distinguish the high albedo regions from highly reflective illuminated edge of the craters, however the algorithm identify four classes that can be considered different units mainly on the basis of their reflectances at the various wavelengths. Is not possible, instead, to extrapolate compositional information because of the absence of clear spectral features. An additional analysis was made using ISODATA to choose the "training area" for further supervised classifications. These approach would allow, for example, to separate more accurately the edge of the craters from the high reflectance areas and the low reflectance regions from the shadow areas.
77 FR 11617 - Data Collection Available for Public Comments and Recommendations
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-27
... the quality of the collection, to Sandra Johnston, Program Analyst, Office of Financial Assistance... CONTACT: Sandra Johnston, Program Analyst, 202- 205-7528, Sandra[email protected] Curtis B. Rich...
Cognitive task analysis of network analysts and managers for network situational awareness
NASA Astrophysics Data System (ADS)
Erbacher, Robert F.; Frincke, Deborah A.; Wong, Pak Chung; Moody, Sarah; Fink, Glenn
2010-01-01
The goal of our project is to create a set of next-generation cyber situational-awareness capabilities with applications to other domains in the long term. The situational-awareness capabilities being developed focus on novel visualization techniques as well as data analysis techniques designed to improve the comprehensibility of the visualizations. The objective is to improve the decision-making process to enable decision makers to choose better actions. To this end, we put extensive effort into ensuring we had feedback from network analysts and managers and understanding what their needs truly are. This paper discusses the cognitive task analysis methodology we followed to acquire feedback from the analysts. This paper also provides the details we acquired from the analysts on their processes, goals, concerns, etc. A final result we describe is the generation of a task-flow diagram.
Self-confidence in financial analysis: a study of younger and older male professional analysts.
Webster, R L; Ellis, T S
2001-06-01
Measures of reported self-confidence in performing financial analysis by 59 professional male analysts, 31 born between 1946 and 1964 and 28 born between 1965 and 1976, were investigated and reported. Self-confidence in one's ability is important in the securities industry because it affects recommendations and decisions to buy, sell, and hold securities. The respondents analyzed a set of multiyear corporate financial statements and reported their self-confidence in six separate financial areas. Data from the 59 male financial analysts were tallied and analyzed using both univariate and multivariate statistical tests. Rated self-confidence was not significantly different for the younger and the older men. These results are not consistent with a similar prior study of female analysts in which younger women showed significantly higher self-confidence than older women.
An eye tracking study of bloodstain pattern analysts during pattern classification.
Arthur, R M; Hoogenboom, J; Green, R D; Taylor, M C; de Bruin, K G
2018-05-01
Bloodstain pattern analysis (BPA) is the forensic discipline concerned with the classification and interpretation of bloodstains and bloodstain patterns at the crime scene. At present, it is unclear exactly which stain or pattern properties and their associated values are most relevant to analysts when classifying a bloodstain pattern. Eye tracking technology has been widely used to investigate human perception and cognition. Its application to forensics, however, is limited. This is the first study to use eye tracking as a tool for gaining access to the mindset of the bloodstain pattern expert. An eye tracking method was used to follow the gaze of 24 bloodstain pattern analysts during an assigned task of classifying a laboratory-generated test bloodstain pattern. With the aid of an automated image-processing methodology, the properties of selected features of the pattern were quantified leading to the delineation of areas of interest (AOIs). Eye tracking data were collected for each AOI and combined with verbal statements made by analysts after the classification task to determine the critical range of values for relevant diagnostic features. Eye-tracking data indicated that there were four main regions of the pattern that analysts were most interested in. Within each region, individual elements or groups of elements that exhibited features associated with directionality, size, colour and shape appeared to capture the most interest of analysts during the classification task. The study showed that the eye movements of trained bloodstain pattern experts and their verbal descriptions of a pattern were well correlated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boggs, Paul T.; Althsuler, Alan; Larzelere, Alex R.
2005-08-01
The Design-through-Analysis Realization Team (DART) is chartered with reducing the time Sandia analysts require to complete the engineering analysis process. The DART system analysis team studied the engineering analysis processes employed by analysts in Centers 9100 and 8700 at Sandia to identify opportunities for reducing overall design-through-analysis process time. The team created and implemented a rigorous analysis methodology based on a generic process flow model parameterized by information obtained from analysts. They also collected data from analysis department managers to quantify the problem type and complexity distribution throughout Sandia's analyst community. They then used this information to develop a communitymore » model, which enables a simple characterization of processes that span the analyst community. The results indicate that equal opportunity for reducing analysis process time is available both by reducing the ''once-through'' time required to complete a process step and by reducing the probability of backward iteration. In addition, reducing the rework fraction (i.e., improving the engineering efficiency of subsequent iterations) offers approximately 40% to 80% of the benefit of reducing the ''once-through'' time or iteration probability, depending upon the process step being considered. Further, the results indicate that geometry manipulation and meshing is the largest portion of an analyst's effort, especially for structural problems, and offers significant opportunity for overall time reduction. Iteration loops initiated late in the process are more costly than others because they increase ''inner loop'' iterations. Identifying and correcting problems as early as possible in the process offers significant opportunity for time savings.« less
Seeing, mirroring, desiring: the impact of the analyst's pregnant body on the patient's body image.
Yakeley, Jessica
2013-08-01
The paper explores the impact of the analyst's pregnant body on the course of two analyses, a young man, and a young woman, specifically focusing on how each patient's visual perception and affective experience of being with the analyst's pregnant body affected their own body image and subjective experience of their body. The pre-verbal or 'subsymbolic' material evoked in the analyses contributed to a greater understanding of the patients' developmental experiences in infancy and adolescence, which had resulted in both carrying a profoundly distorted body image into adulthood. The analyst's pregnancy offered a therapeutic window in which a shift in the patient's body image could be initiated. Clinical material is presented in detail with reference to the psychoanalytic literature on the pregnant analyst, and that of the development of the body image, particularly focusing on the role of visual communication and the face. The author proposes a theory of psychic change, drawing on Bucci's multiple code theory, in which the patients' unconscious or 'subsymbolic' awareness of her pregnancy, which were manifest in their bodily responses, feeling states and dreams, as well as in the analyst s countertransference, could gradually be verbalized and understood within the transference. Thus visual perception, or 'external seeing', could gradually become 'internal seeing', or insight into unconscious phantasies, leading to a shift in the patients internal object world towards a less persecutory state and more realistic appraisal of their body image. Copyright © 2013 Institute of Psychoanalysis.
Collaborative interactive visualization: exploratory concept
NASA Astrophysics Data System (ADS)
Mokhtari, Marielle; Lavigne, Valérie; Drolet, Frédéric
2015-05-01
Dealing with an ever increasing amount of data is a challenge that military intelligence analysts or team of analysts face day to day. Increased individual and collective comprehension goes through collaboration between people. Better is the collaboration, better will be the comprehension. Nowadays, various technologies support and enhance collaboration by allowing people to connect and collaborate in settings as varied as across mobile devices, over networked computers, display walls, tabletop surfaces, to name just a few. A powerful collaboration system includes traditional and multimodal visualization features to achieve effective human communication. Interactive visualization strengthens collaboration because this approach is conducive to incrementally building a mental assessment of the data meaning. The purpose of this paper is to present an overview of the envisioned collaboration architecture and the interactive visualization concepts underlying the Sensemaking Support System prototype developed to support analysts in the context of the Joint Intelligence Collection and Analysis Capability project at DRDC Valcartier. It presents the current version of the architecture, discusses future capabilities to help analyst(s) in the accomplishment of their tasks and finally recommends collaboration and visualization technologies allowing to go a step further both as individual and as a team.
SnapShot: Visualization to Propel Ice Hockey Analytics.
Pileggi, H; Stolper, C D; Boyle, J M; Stasko, J T
2012-12-01
Sports analysts live in a world of dynamic games flattened into tables of numbers, divorced from the rinks, pitches, and courts where they were generated. Currently, these professional analysts use R, Stata, SAS, and other statistical software packages for uncovering insights from game data. Quantitative sports consultants seek a competitive advantage both for their clients and for themselves as analytics becomes increasingly valued by teams, clubs, and squads. In order for the information visualization community to support the members of this blossoming industry, it must recognize where and how visualization can enhance the existing analytical workflow. In this paper, we identify three primary stages of today's sports analyst's routine where visualization can be beneficially integrated: 1) exploring a dataspace; 2) sharing hypotheses with internal colleagues; and 3) communicating findings to stakeholders.Working closely with professional ice hockey analysts, we designed and built SnapShot, a system to integrate visualization into the hockey intelligence gathering process. SnapShot employs a variety of information visualization techniques to display shot data, yet given the importance of a specific hockey statistic, shot length, we introduce a technique, the radial heat map. Through a user study, we received encouraging feedback from several professional analysts, both independent consultants and professional team personnel.
NASA Astrophysics Data System (ADS)
Le Bras, Ronan; Kushida, Noriyuki; Mialle, Pierrick; Tomuta, Elena; Arora, Nimar
2017-04-01
The Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) has been developing a Bayesian method and software to perform the key step of automatic association of seismological, hydroacoustic, and infrasound (SHI) parametric data. In our preliminary testing in the CTBTO, NET_VISA shows much better performance than its currently operating automatic association module, with a rate for automatic events matching the analyst-reviewed events increased by 10%, signifying that the percentage of missed events is lowered by 40%. Initial tests involving analysts also showed that the new software will complete the automatic bulletins of the CTBTO by adding previously missed events. Because products by the CTBTO are also widely distributed to its member States as well as throughout the seismological community, the introduction of a new technology must be carried out carefully, and the first step of operational integration is to first use NET-VISA results within the interactive analysts' software so that the analysts can check the robustness of the Bayesian approach. We report on the latest results both on the progress for automatic processing and for the initial introduction of NET-VISA results in the analyst review process
Conceptualisation of clinical facts in the analytic process.
Riesenberg-Malcolm, R
1994-12-01
In this paper the author discusses what she understands to be a clinical fact, stressing that it takes place within the analytic situation between patient and analyst. It is in the process of conceptualising the fact that the analyst comes to define it. In order to conceptualise, the analyst must have a frame of reference, a theoretical basis through which he perceives his patient's communications and is able to give meaning to them. In analytic work, the analyst uses his theory in mainly two ways. When working with his patient it operates mostly unconsciously, but interspersed by quick more conscious thinking. When away from the patient, theory needs to come to the front of the analyst's mind, consciously used by him. A clinical case is used to illustrate these two aspects of theoretical work. In the material presented, aspects of a first session are tentatively conceptualised. Then material from the same patient some years later is described, the method of working and the way of understanding is discussed and thus the process of conceptualising can be illustrated. The theme of hope has been singled out as a linking point between the earlier and later pieces of material.
Progressive Visual Analytics: User-Driven Visual Exploration of In-Progress Analytics.
Stolper, Charles D; Perer, Adam; Gotz, David
2014-12-01
As datasets grow and analytic algorithms become more complex, the typical workflow of analysts launching an analytic, waiting for it to complete, inspecting the results, and then re-Iaunching the computation with adjusted parameters is not realistic for many real-world tasks. This paper presents an alternative workflow, progressive visual analytics, which enables an analyst to inspect partial results of an algorithm as they become available and interact with the algorithm to prioritize subspaces of interest. Progressive visual analytics depends on adapting analytical algorithms to produce meaningful partial results and enable analyst intervention without sacrificing computational speed. The paradigm also depends on adapting information visualization techniques to incorporate the constantly refining results without overwhelming analysts and provide interactions to support an analyst directing the analytic. The contributions of this paper include: a description of the progressive visual analytics paradigm; design goals for both the algorithms and visualizations in progressive visual analytics systems; an example progressive visual analytics system (Progressive Insights) for analyzing common patterns in a collection of event sequences; and an evaluation of Progressive Insights and the progressive visual analytics paradigm by clinical researchers analyzing electronic medical records.
DOT National Transportation Integrated Search
2010-06-01
This manual provides information and recommended procedures to be utilized by an agencys Weigh-in-Motion (WIM) Office Data Analyst to perform validation and quality control (QC) checks of WIM traffic data. This manual focuses on data generated by ...
SafetyAnalyst Testing and Implementation
DOT National Transportation Integrated Search
2009-03-01
SafetyAnalyst is a software tool developed by the Federal Highway Administration to assist state and local transportation agencies on analyzing safety data and managing their roadway safety programs. This research report documents the major tasks acc...
A Comparative Study of Automated Infrasound Detectors - PMCC and AFD with Analyst Review.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Park, Junghyun; Hayward, Chris; Zeiler, Cleat
Automated detections calculated by the progressive multi-channel correlation (PMCC) method (Cansi, 1995) and the adaptive F detector (AFD) (Arrowsmith et al., 2009) are compared to the signals identified by five independent analysts. Each detector was applied to a four-hour time sequence recorded by the Korean infrasound array CHNAR. This array was used because it is composed of both small (<100 m) and large (~1000 m) aperture element spacing. The four hour time sequence contained a number of easily identified signals under noise conditions that have average RMS amplitudes varied from 1.2 to 4.5 mPa (1 to 5 Hz), estimated withmore » running five-minute window. The effectiveness of the detectors was estimated for the small aperture, large aperture, small aperture combined with the large aperture, and full array. The full and combined arrays performed the best for AFD under all noise conditions while the large aperture array had the poorest performance for both detectors. PMCC produced similar results as AFD under the lower noise conditions, but did not produce as dramatic an increase in detections using the full and combined arrays. Both automated detectors and the analysts produced a decrease in detections under the higher noise conditions. Comparing the detection probabilities with Estimated Receiver Operating Characteristic (EROC) curves we found that the smaller value of consistency for PMCC and the larger p-value for AFD had the highest detection probability. These parameters produced greater changes in detection probability than estimates of the false alarm rate. The detection probability was impacted the most by noise level, with low noise (average RMS amplitude of 1.7 mPa) having an average detection probability of ~40% and high noise (average RMS amplitude of 2.9 mPa) average detection probability of ~23%.« less
Assessing the performance of regional landslide early warning models: the EDuMaP method
NASA Astrophysics Data System (ADS)
Calvello, M.; Piciullo, L.
2015-10-01
The paper proposes the evaluation of the technical performance of a regional landslide early warning system by means of an original approach, called EDuMaP method, comprising three successive steps: identification and analysis of the Events (E), i.e. landslide events and warning events derived from available landslides and warnings databases; definition and computation of a Duration Matrix (DuMa), whose elements report the time associated with the occurrence of landslide events in relation to the occurrence of warning events, in their respective classes; evaluation of the early warning model Performance (P) by means of performance criteria and indicators applied to the duration matrix. During the first step, the analyst takes into account the features of the warning model by means of ten input parameters, which are used to identify and classify landslide and warning events according to their spatial and temporal characteristics. In the second step, the analyst computes a time-based duration matrix having a number of rows and columns equal to the number of classes defined for the warning and landslide events, respectively. In the third step, the analyst computes a series of model performance indicators derived from a set of performance criteria, which need to be defined by considering, once again, the features of the warning model. The proposed method is based on a framework clearly distinguishing between local and regional landslide early warning systems as well as among correlation laws, warning models and warning systems. The applicability, potentialities and limitations of the EDuMaP method are tested and discussed using real landslides and warnings data from the municipal early warning system operating in Rio de Janeiro (Brazil).
Assessing the performance of regional landslide early warning models: the EDuMaP method
NASA Astrophysics Data System (ADS)
Calvello, M.; Piciullo, L.
2016-01-01
A schematic of the components of regional early warning systems for rainfall-induced landslides is herein proposed, based on a clear distinction between warning models and warning systems. According to this framework an early warning system comprises a warning model as well as a monitoring and warning strategy, a communication strategy and an emergency plan. The paper proposes the evaluation of regional landslide warning models by means of an original approach, called the "event, duration matrix, performance" (EDuMaP) method, comprising three successive steps: identification and analysis of the events, i.e., landslide events and warning events derived from available landslides and warnings databases; definition and computation of a duration matrix, whose elements report the time associated with the occurrence of landslide events in relation to the occurrence of warning events, in their respective classes; evaluation of the early warning model performance by means of performance criteria and indicators applied to the duration matrix. During the first step the analyst identifies and classifies the landslide and warning events, according to their spatial and temporal characteristics, by means of a number of model parameters. In the second step, the analyst computes a time-based duration matrix with a number of rows and columns equal to the number of classes defined for the warning and landslide events, respectively. In the third step, the analyst computes a series of model performance indicators derived from a set of performance criteria, which need to be defined by considering, once again, the features of the warning model. The applicability, potentialities and limitations of the EDuMaP method are tested and discussed using real landslides and warning data from the municipal early warning system operating in Rio de Janeiro (Brazil).
Glenn, Sigrid S.
1985-01-01
Behavior analysis and institutional economics are viewed as having common origins in the early 20th century effort to benefit from the conceptual revolution spurred by Darwin's synthesis. Institutional economics, initiated by Thorstein Veblen, appears to have failed to develop a progressive scientific technology, while behavior analysis has done so. It is suggested that institutional economics has been held back by lack of a synthesizing scientific mechanism that elucidates the relation between technological and ceremonial processes, the two cultural forces described by Veblen. The theory of institutional economist C. E. Ayres, built on Veblen's distinction, is used to clarify the concepts of technological and ceremonial processes for the reader. An analysis of the behavioral processes that might underlie the cultural processes described by Veblen/Ayres suggests that the experimental analysis of behavior has provided concepts that might function as a synthesizing mechanism for the social sciences and, in particular, institutional economics. The Veblen/Ayres dichotomy, now seen in terms of underlying behavioral processes, is used to examine the field of behavior analysis in terms of its origins, its relation to psychology and its current state. The paper concludes with a few practical suggestions as to how behavior analysts might work to enhance survival. PMID:22478617
Principles and procedures in forensic toxicology.
Wyman, John F
2012-09-01
The principles and procedures employed in a modern forensic toxicology lab are detailed in this review. Aspects of Behavioral and Postmortem toxicology, including certification of analysts and accreditation of labs, chain of custody requirements, typical testing services provided, rationale for specimen selection, and principles of quality assurance are discussed. Interpretation of toxicology results in postmortem specimens requires the toxicologist and pathologist to be cognizant of drug-drug interactions, drug polymorphisms and pharmacogenomics, the gross signs of toxic pathology, postmortem redistribution, confirmation of systemic toxicity in suspected overdoses, the possibility of developed tolerance, and the effects of decomposition on drug concentration.
2011-07-21
Phillips, Richard Spencer, and Leigh Warner. Catherine Whittington served as the Board Staff Analyst. PROCESS The Task Group conducted more than...Chair) Mr. Pierre Chao Mr. William Phillips Mr. Richard Spencer Ms. Leigh Warner DBB Staff Analyst Catherine Whittington 2 Methodology
Modernizing the Military Retirement System
2011-05-01
Patrick Gross, David Langstaff, Philip Odeen, Mark Ronald, Robert Stein, and Jack Zoeller. Catherine Whittington served as the Board Staff Analyst...Chair) Patrick Gross David Langstaff Philip Odeen Mark Ronald Robert Stein Jack Zoeller DBB Staff Analyst Catherine Whittington Methodology
Development of a Nevada Statewide Database for Safety Analyst Software
DOT National Transportation Integrated Search
2017-02-02
Safety Analyst is a software package developed by the Federal Highway Administration (FHWA) and twenty-seven participating state and local agencies including the Nevada Department of Transportation (NDOT). The software package implemented many of the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Grimaila, Michael R
2010-01-01
In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we discuss how this infrastructure can be used in the subject domain of mission assurance as defined as the full life-cycle engineering process to identify and mitigate design, production, test, and field support deficiencies of mission success. We address the opportunity to apply the Cyberspace Security Econometrics System (CSES) to Carnegie Mellon University and Software Engineering Institute s Mission Assurance Analysismore » Protocol (MAAP) in this context.« less
Plaut, Alfred B J
2005-02-01
In this paper the author explores the theoretical and technical issues relating to taking notes of analytic sessions, using an introspective approach. The paper discusses the lack of a consistent approach to note taking amongst analysts and sets out to demonstrate that systematic note taking can be helpful to the analyst. The author describes his discovery that an initial phase where as much data was recorded as possible did not prove to be reliably helpful in clinical work and initially actively interfered with recall in subsequent sessions. The impact of the nature of the analytic session itself and the focus of the analyst's interest on recall is discussed. The author then describes how he modified his note taking technique to classify information from sessions into four categories which enabled the analyst to select which information to record in notes. The characteristics of memory and its constructive nature are discussed in relation to the problems that arise in making accurate notes of analytic sessions.
Cognitive Task Analysis of Network Analysts and Managers for Network Situational Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Erbacher, Robert; Frincke, Deborah A.; Wong, Pak C.
The goal of the project was to create a set of next generation cyber situational awareness capabilities with applications to other domains in the long term. The goal is to improve the decision making process such that decision makers can choose better actions. To this end, we put extensive effort into ensuring we had feedback from network analysts and managers and understood what their needs truly were. Consequently, this is the focus of this portion of the research. This paper discusses the methodology we followed to acquire this feedback from the analysts, namely a cognitive task analysis. Additionally, this papermore » provides the details we acquired from the analysts. This essentially provides details on their processes, goals, concerns, the data and meta-data they analyze, etc. A final result we describe is the generation of a task-flow diagram.« less
Users manual for the US baseline corn and soybean segment classification procedure
NASA Technical Reports Server (NTRS)
Horvath, R.; Colwell, R. (Principal Investigator); Hay, C.; Metzler, M.; Mykolenko, O.; Odenweller, J.; Rice, D.
1981-01-01
A user's manual for the classification component of the FY-81 U.S. Corn and Soybean Pilot Experiment in the Foreign Commodity Production Forecasting Project of AgRISTARS is presented. This experiment is one of several major experiments in AgRISTARS designed to measure and advance the remote sensing technologies for cropland inventory. The classification procedure discussed is designed to produce segment proportion estimates for corn and soybeans in the U.S. Corn Belt (Iowa, Indiana, and Illinois) using LANDSAT data. The estimates are produced by an integrated Analyst/Machine procedure. The Analyst selects acquisitions, participates in stratification, and assigns crop labels to selected samples. In concert with the Analyst, the machine digitally preprocesses LANDSAT data to remove external effects, stratifies the data into field like units and into spectrally similar groups, statistically samples the data for Analyst labeling, and combines the labeled samples into a final estimate.
Interpersonal psychoanalysis' radical façade.
Hirsch, Irwin
2002-01-01
The participant-observation model initiated the relational turn, as well as the shift from modernism to postmodernism in psychoanalysis. This two-person, coparticipant conceptualization of the psychoanalytic situation moved psychoanalysis from the realm of alleged objective science toward intersubjectivity and hermeneutics. From this perspective, the analyst as subjective other is constantly engaged affectively with the patient in ways that are very often out of awareness. Analyst and patient both, for better or for worse, are believed to unwittingly influence one another. This description of the analytic dyad has led many to mistakingly conclude that interpersonal psychoanalysts advocate wittinly affective expressiveness, often in the form of deliberate self-disclosure of feelings, as part of a standard analytic stance. Upon closer examination, radical interventions are no more emblematic of interpersonal analysts than they are of analysts from most other traditions, though the interpersonalists have indeed expanded what had theretofore been a rather narrow repertoire of interventions.
Exploring the role of contextual information in bloodstain pattern analysis: A qualitative approach.
Osborne, Nikola K P; Taylor, Michael C; Zajac, Rachel
2016-03-01
During Bloodstain Pattern Analysis (BPA), an analyst may encounter various sources of contextual information. Although contextual bias has emerged as a valid concern for the discipline, little is understood about how contextual information informs BPA. To address this issue, we asked 15 experienced bloodstain pattern analysts from New Zealand and Australia to think aloud as they classified bloodstain patterns from two homicide cases. Analysts could request items of contextual information, and were required to state how each item would inform their analysis. Pathology reports and additional photographs of the scene were the most commonly requested items of information. We coded analysts' reasons for requesting contextual information--and the way in which they integrated this information--according to thematic analysis. We identified considerable variation in both of these variables, raising important questions about the role and necessity of contextual information in decisions about bloodstain pattern evidence. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Birisan, Mihnea; Beling, Peter
2011-01-01
New generations of surveillance drones are being outfitted with numerous high definition cameras. The rapid proliferation of fielded sensors and supporting capacity for processing and displaying data will translate into ever more capable platforms, but with increased capability comes increased complexity and scale that may diminish the usefulness of such platforms to human operators. We investigate methods for alleviating strain on analysts by automatically retrieving content specific to their current task using a machine learning technique known as Multi-Instance Learning (MIL). We use MIL to create a real time model of the analysts' task and subsequently use the model to dynamically retrieve relevant content. This paper presents results from a pilot experiment in which a computer agent is assigned analyst tasks such as identifying caravanning vehicles in a simulated vehicle traffic environment. We compare agent performance between MIL aided trials and unaided trials.
Semi-automated potentiometric titration method for uranium characterization.
Cristiano, B F G; Delgado, J U; da Silva, J W S; de Barros, P D; de Araújo, R M S; Lopes, R T
2012-07-01
The manual version of the potentiometric titration method has been used for certification and characterization of uranium compounds. In order to reduce the analysis time and the influence of the analyst, a semi-automatic version of the method was developed in the Brazilian Nuclear Energy Commission. The method was applied with traceability assured by using a potassium dichromate primary standard. The combined standard uncertainty in determining the total concentration of uranium was around 0.01%, which is suitable for uranium characterization. Copyright © 2011 Elsevier Ltd. All rights reserved.
Application of the SRI cloud-tracking technique to rapid-scan GOES observations
NASA Technical Reports Server (NTRS)
Wolf, D. E.; Endlich, R. M.
1980-01-01
An automatic cloud tracking system was applied to multilayer clouds associated with severe storms. The method was tested using rapid scan observations of Hurricane Eloise obtained by the GOES satellite on 22 September 1975. Cloud tracking was performed using clustering based either on visible or infrared data. The clusters were tracked using two different techniques. The data of 4 km and 8 km resolution of the automatic system yielded comparable in accuracy and coverage to those obtained by NASA analysts using the Atmospheric and Oceanographic Information Processing System.
A preliminary computer pattern analysis of satellite images of mature extratropical cyclones
NASA Technical Reports Server (NTRS)
Burfeind, Craig R.; Weinman, James A.; Barkstrom, Bruce R.
1987-01-01
This study has applied computerized pattern analysis techniques to the location and classification of features of several mature extratropical cyclones that were depicted in GOES satellite images. These features include the location of the center of the cyclone vortex core and the location of the associated occluded front. The cyclone type was classified in accord with the scheme of Troup and Streten. The present analysis was implemented on a personal computer; results were obtained within approximately one or two minutes without the intervention of an analyst.
Development of guidance for states transitioning to new safety analysis tools
NASA Astrophysics Data System (ADS)
Alluri, Priyanka
With about 125 people dying on US roads each day, the US Department of Transportation heightened the awareness of critical safety issues with the passage of SAFETEA-LU (Safe Accountable Flexible Efficient Transportation Equity Act---a Legacy for Users) legislation in 2005. The legislation required each of the states to develop a Strategic Highway Safety Plan (SHSP) and incorporate data-driven approaches to prioritize and evaluate program outcomes: Failure to do so resulted in funding sanctioning. In conjunction with the legislation, research efforts have also been progressing toward the development of new safety analysis tools such as IHSDM (Interactive Highway Safety Design Model), SafetyAnalyst, and HSM (Highway Safety Manual). These software and analysis tools are comparatively more advanced in statistical theory and level of accuracy, and have a tendency to be more data intensive. A review of the 2009 five-percent reports and excerpts from the nationwide survey revealed astonishing facts about the continuing use of traditional methods including crash frequencies and rates for site selection and prioritization. The intense data requirements and statistical complexity of advanced safety tools are considered as a hindrance to their adoption. In this context, this research aims at identifying the data requirements and data availability for SafetyAnalyst and HSM by working with both the tools. This research sets the stage for working with the Empirical Bayes approach by highlighting some of the biases and issues associated with the traditional methods of selecting projects such as greater emphasis on traffic volume and regression-to-mean phenomena. Further, the not-so-obvious issue with shorter segment lengths, which effect the results independent of the methods used, is also discussed. The more reliable and statistically acceptable Empirical Bayes methodology requires safety performance functions (SPFs), regression equations predicting the relation between crashes and exposure for a subset of roadway network. These SPFs, specific to a region and the analysis period are often unavailable. Calibration of already existing default national SPFs to the state's data could be a feasible solution, but, how well the state's data is represented is a legitimate question. With this background, SPFs were generated for various classifications of segments in Georgia and compared against the national default SPFs used in SafetyAnalyst calibrated to Georgia data. Dwelling deeper into the development of SPFs, the influence of actual and estimated traffic data on the fit of the equations is also studied questioning the accuracy and reliability of traffic estimations. In addition to SafetyAnalyst, HSM aims at performing quantitative safety analysis. Applying HSM methodology to two-way two-lane rural roads, the effect of using multiple CMFs (Crash Modification Factors) is studied. Lastly, data requirements, methodology, constraints, and results are compared between SafetyAnalyst and HSM.
Comparison of air-coupled GPR data analysis results determined by multiple analysts
NASA Astrophysics Data System (ADS)
Martino, Nicole; Maser, Ken
2016-04-01
Current bridge deck condition assessments using ground penetrating radar (GPR) requires a trained analyst to manually interpret substructure layering information from B-scan images in order to proceed with an intended analysis (pavement thickness, concrete cover, effects of rebar corrosion, etc.) For example, a recently developed method to rapidly and accurately analyze air-coupled GPR data based on the effects of rebar corrosion, requires that a user "picks" a layer of rebar reflections in each B-scan image collected along the length of the deck. These "picks" have information like signal amplitude and two way travel time. When a deck is new, or has little rebar corrosion, the resulting layer of rebar reflections is readily evident and there is little room for subjectivity. However, when a deck is severely deteriorated, the rebar layer may be difficult to identify, and different analysts may make different interpretations of the appropriate layer to analyze. One highly corroded bridge deck, was assessed with a number of nondestructive evaluation techniques including 2GHz air-coupled GPR. Two trained analysts separately selected the rebar layer in each B-scan image, choosing as much information as possible, even in areas of significant deterioration. The post processing of the selected data points was then completed and the results from each analyst were contour plotted to observe any discrepancies. The paper describes the differences between ground coupled and air-coupled GPR systems, the data collection and analysis methods used by two different analysts for one case study, and the results of the two different analyses.
Assessing the socioeconomic impact and value of open geospatial information
Pearlman, Francoise; Pearlman, Jay; Bernknopf, Richard; Coote, Andrew; Craglia, Massimo; Friedl, Lawrence; Gallo, Jason; Hertzfeld, Henry; Jolly, Claire; Macauley, Molly K.; Shapiro, Carl; Smart, Alan
2016-03-10
The workshop included 68 participants coming from international organizations, the U.S. public and private sectors, nongovernmental organizations, and academia. Participants included policy makers and analysts, financial analysts, economists, information scientists, geospatial practitioners, and other discipline experts.
QuEST for malware type-classification
NASA Astrophysics Data System (ADS)
Vaughan, Sandra L.; Mills, Robert F.; Grimaila, Michael R.; Peterson, Gilbert L.; Oxley, Mark E.; Dube, Thomas E.; Rogers, Steven K.
2015-05-01
Current cyber-related security and safety risks are unprecedented, due in no small part to information overload and skilled cyber-analyst shortages. Advances in decision support and Situation Awareness (SA) tools are required to support analysts in risk mitigation. Inspired by human intelligence, research in Artificial Intelligence (AI) and Computational Intelligence (CI) have provided successful engineering solutions in complex domains including cyber. Current AI approaches aggregate large volumes of data to infer the general from the particular, i.e. inductive reasoning (pattern-matching) and generally cannot infer answers not previously programmed. Whereas humans, rarely able to reason over large volumes of data, have successfully reached the top of the food chain by inferring situations from partial or even partially incorrect information, i.e. abductive reasoning (pattern-completion); generating a hypothetical explanation of observations. In order to achieve an engineering advantage in computational decision support and SA we leverage recent research in human consciousness, the role consciousness plays in decision making, modeling the units of subjective experience which generate consciousness, qualia. This paper introduces a novel computational implementation of a Cognitive Modeling Architecture (CMA) which incorporates concepts of consciousness. We apply our model to the malware type-classification task. The underlying methodology and theories are generalizable to many domains.
Enhanced visual perception through tone mapping
NASA Astrophysics Data System (ADS)
Harrison, Andre; Mullins, Linda L.; Raglin, Adrienne; Etienne-Cummings, Ralph
2016-05-01
Tone mapping operators compress high dynamic range images to improve the picture quality on a digital display when the dynamic range of the display is lower than that of the image. However, tone mapping operators have been largely designed and evaluated based on the aesthetic quality of the resulting displayed image or how perceptually similar the compressed image appears relative to the original scene. They also often require per image tuning of parameters depending on the content of the image. In military operations, however, the amount of information that can be perceived is more important than the aesthetic quality of the image and any parameter adjustment needs to be as automated as possible regardless of the content of the image. We have conducted two studies to evaluate the perceivable detail of a set of tone mapping algorithms, and we apply our findings to develop and test an automated tone mapping algorithm that demonstrates a consistent improvement in the amount of perceived detail. An automated, and thereby predictable, tone mapping method enables a consistent presentation of perceivable features, can reduce the bandwidth required to transmit the imagery, and can improve the accessibility of the data by reducing the needed expertise of the analyst(s) viewing the imagery.
A scalable architecture for extracting, aligning, linking, and visualizing multi-Int data
NASA Astrophysics Data System (ADS)
Knoblock, Craig A.; Szekely, Pedro
2015-05-01
An analyst today has a tremendous amount of data available, but each of the various data sources typically exists in their own silos, so an analyst has limited ability to see an integrated view of the data and has little or no access to contextual information that could help in understanding the data. We have developed the Domain-Insight Graph (DIG) system, an innovative architecture for extracting, aligning, linking, and visualizing massive amounts of domain-specific content from unstructured sources. Under the DARPA Memex program we have already successfully applied this architecture to multiple application domains, including the enormous international problem of human trafficking, where we extracted, aligned and linked data from 50 million online Web pages. DIG builds on our Karma data integration toolkit, which makes it easy to rapidly integrate structured data from a variety of sources, including databases, spreadsheets, XML, JSON, and Web services. The ability to integrate Web services allows Karma to pull in live data from the various social media sites, such as Twitter, Instagram, and OpenStreetMaps. DIG then indexes the integrated data and provides an easy to use interface for query, visualization, and analysis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harvey, Dustin Yewell
Echo™ is a MATLAB-based software package designed for robust and scalable analysis of complex data workflows. An alternative to tedious, error-prone conventional processes, Echo is based on three transformative principles for data analysis: self-describing data, name-based indexing, and dynamic resource allocation. The software takes an object-oriented approach to data analysis, intimately connecting measurement data with associated metadata. Echo operations in an analysis workflow automatically track and merge metadata and computation parameters to provide a complete history of the process used to generate final results, while automated figure and report generation tools eliminate the potential to mislabel those results. History reportingmore » and visualization methods provide straightforward auditability of analysis processes. Furthermore, name-based indexing on metadata greatly improves code readability for analyst collaboration and reduces opportunities for errors to occur. Echo efficiently manages large data sets using a framework that seamlessly allocates resources such that only the necessary computations to produce a given result are executed. Echo provides a versatile and extensible framework, allowing advanced users to add their own tools and data classes tailored to their own specific needs. Applying these transformative principles and powerful features, Echo greatly improves analyst efficiency and quality of results in many application areas.« less
Pattani, Reena; Marquez, Christine; Dinyarian, Camellia; Sharma, Malika; Bain, Julie; Moore, Julia E; Straus, Sharon E
2018-04-10
Despite the gender parity existing in medical schools for over three decades, women remain underrepresented in academic medical centers, particularly in senior ranks and in leadership roles. This has consequences for patient care, education, research, and workplace culture within healthcare organizations. This study was undertaken to explore the perspectives of faculty members at a single department of medicine on the impact of the existing gender gap on organizational effectiveness and workplace culture, and to identify systems-based strategies to mitigate the gap. The study took place at a large university department of medicine in Toronto, Canada, with six affiliated hospitals. In this qualitative study, semi-structured individual interviews were conducted between May and September 2016 with full-time faculty members who held clinical and university-based appointments. Transcripts of the interviews were analyzed using thematic analysis. Three authors independently reviewed the transcripts to determine a preliminary list of codes and establish a coding framework. A modified audit consensus coding approach was applied; a single analyst reviewed all the transcripts and a second analyst audited 20% of the transcripts in each round of coding. Following each round, inter-rater reliability was determined, discrepancies were resolved through discussion, and modifications were made as needed to the coding framework. The analysis revealed faculty members' perceptions of the gender gap, potential contributing factors, organizational impacts, and possible solutions to bridge the gap. Of the 43 full-time faculty members who participated in the survey (29 of whom self-identified as female), most participants were aware of the existing gender gap within academic medicine. Participants described social exclusion, reinforced stereotypes, and unprofessional behaviors as consequences of the gap on organizational effectiveness and culture. They suggested improvements in (1) the processes for recruitment, hiring, and promotion; (2) inclusiveness of the work environment; (3) structures for mentorship; and (4) ongoing monitoring of the gap. The existing gender gap in academic medicine may have negative consequences for organizational effectiveness and workplace culture but many systems-based strategies to mitigate the gap exist. Although these solutions warrant rigorous evaluation, they are feasible to institute within most healthcare organizations immediately.
The application test system: Experiences to date and future plans
NASA Technical Reports Server (NTRS)
May, G. A.; Ashburn, P.; Hansen, H. L. (Principal Investigator)
1979-01-01
The ATS analysis component is presented focusing on methods by which the varied data sources are used by the ATS analyst. Analyst training and initial processing of data is discussed along with short and long plans for the ATS.
DataQs analyst guide : best practices for federal and state agency users.
DOT National Transportation Integrated Search
2014-12-01
The DataQs Analyst Guide provides practical guidance and : best practices to address and resolve Requests for Data : Reviews (RDRs) submitted electronically to FMCSA by motor : carriers, commercial drivers, and other persons using the : DataQs system...
LACIE analyst interpretation keys
NASA Technical Reports Server (NTRS)
Baron, J. G.; Payne, R. W.; Palmer, W. F. (Principal Investigator)
1979-01-01
Two interpretation aids, 'The Image Analysis Guide for Wheat/Small Grains Inventories' and 'The United States and Canadian Great Plains Regional Keys', were developed during LACIE phase 2 and implemented during phase 3 in order to provide analysts with a better understanding of the expected ranges in color variation of signatures for individual biostages and of the temporal sequences of LANDSAT signatures. The keys were tested using operational LACIE data, and the results demonstrate that their use provides improved labeling accuracy in all analyst experience groupings, in all geographic areas within the U.S. Great Plains, and during all periods of crop development.
Gostečnik, Christian; Slavič, Tanja Repič; Lukek, Saša Poljak; Pate, Tanja; Cvetek, Robert
2017-08-01
The relationship between partners and the analyst is considered the most basic means for healing in contemporary psychoanalytic theories and analyses. It also holds as one of the most fundamental phenomenon's of psychoanalysis, so it comes as no surprise that it has always been deliberated over as an object of great interest as well as immense controversy. This same relationship, mutually co-created by the analyst and each individual and partner in analysis, represents also the core of sanctity and sacred space in contemporary psychoanalysis.
Evaluation of Bayesian Sequential Proportion Estimation Using Analyst Labels
NASA Technical Reports Server (NTRS)
Lennington, R. K.; Abotteen, K. M. (Principal Investigator)
1980-01-01
The author has identified the following significant results. A total of ten Large Area Crop Inventory Experiment Phase 3 blind sites and analyst-interpreter labels were used in a study to compare proportional estimates obtained by the Bayes sequential procedure with estimates obtained from simple random sampling and from Procedure 1. The analyst error rate using the Bayes technique was shown to be no greater than that for the simple random sampling. Also, the segment proportion estimates produced using this technique had smaller bias and mean squared errors than the estimates produced using either simple random sampling or Procedure 1.
When the analyst is ill: dimensions of self-disclosure.
Pizer, B
1997-07-01
This article examines questions related to the "inescapable," the "inadvertent," and the "deliberate" personal disclosures by an analyst. Technical and personal considerations that influence the analyst's decision to disclose, as well as the inherent responsibilities and potential clinical consequences involved in self-disclosure, are explored, with particular attention to transference-countertransference dynamics, therapeutic goals, and the negotiation of resistance. The author describes her clinical work during a period of prolonged illness, with case vignettes that illustrate how-self-disclosure may be regarded as both an occasional authentic requirement and a regular intrinsic component of clinical technique.
Psychotherapy in the aesthetic attitude.
Beebe, John
2010-04-01
Drawing upon the writings of Jungian analyst Joseph Henderson on unconscious attitudes toward culture that patients and analysts may bring to therapy, the author defines the aesthetic attitude as one of the basic ways that cultural experience is instinctively accessed and processed so that it can become part of an individual's self experience. In analytic treatment, the aesthetic attitude emerges as part of what Jung called the transcendent function to create new symbolic possibilities for the growth of consciousness. It can provide creative opportunities for new adaptation where individuation has become stuck in unconscious complexes, both personal and cultural. In contrast to formulations that have compared depth psychotherapy to religious ritual, philosophic discourse, and renewal of socialization, this paper focuses upon the considerations of beauty that make psychotherapy also an art. In psychotherapeutic work, the aesthetic attitude confronts both analyst and patient with the problem of taste, affects how the treatment is shaped and 'framed', and can grant a dimension of grace to the analyst's mirroring of the struggles that attend the patient's effort to be a more smoothly functioning human being. The patient may learn to extend the same grace to the analyst's fumbling attempts to be helpful. The author suggests that the aesthetic attitude is thus a help in the resolution of both countertransference and transference en route to psychological healing.
LG-ANALYST: linguistic geometry for master air attack planning
NASA Astrophysics Data System (ADS)
Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg
2003-09-01
We investigate the technical feasibility of implementing LG-ANALYST, a new software tool based on the Linguistic Geometry (LG) approach. The tool will be capable of modeling and providing solutions to Air Force related battlefield problems and of conducting multiple experiments to verify the quality of the solutions it generates. LG-ANALYST will support generation of the Fast Master Air Attack Plan (MAAP) with subsequent conversion into Air Tasking Order (ATO). An Air Force mission is modeled employing abstract board games (ABG). Such a mission may include, for example, an aircraft strike package moving to a target area with the opposing side having ground-to-air missiles, anti-aircraft batteries, fighter wings, and radars. The corresponding abstract board captures 3D air space, terrain, the aircraft trajectories, positions of the batteries, strategic features of the terrain, such as bridges, and their status, radars and illuminated space, etc. Various animated views are provided by LG-ANALYST including a 3D view for realistic representation of the battlespace and a 2D view for ease of analysis and control. LG-ANALYST will allow a user to model full scale intelligent enemy, plan in advance, re-plan and control in real time Blue and Red forces by generating optimal (or near-optimal) strategies for all sides of a conflict.
Human-machine analytics for closed-loop sense-making in time-dominant cyber defense problems
NASA Astrophysics Data System (ADS)
Henry, Matthew H.
2017-05-01
Many defense problems are time-dominant: attacks progress at speeds that outpace human-centric systems designed for monitoring and response. Despite this shortcoming, these well-honed and ostensibly reliable systems pervade most domains, including cyberspace. The argument that often prevails when considering the automation of defense is that while technological systems are suitable for simple, well-defined tasks, only humans possess sufficiently nuanced understanding of problems to act appropriately under complicated circumstances. While this perspective is founded in verifiable truths, it does not account for a middle ground in which human-managed technological capabilities extend well into the territory of complex reasoning, thereby automating more nuanced sense-making and dramatically increasing the speed at which it can be applied. Snort1 and platforms like it enable humans to build, refine, and deploy sense-making tools for network defense. Shortcomings of these platforms include a reliance on rule-based logic, which confounds analyst knowledge of how bad actors behave with the means by which bad behaviors can be detected, and a lack of feedback-informed automation of sensor deployment. We propose an approach in which human-specified computational models hypothesize bad behaviors independent of indicators and then allocate sensors to estimate and forecast the state of an intrusion. State estimates and forecasts inform the proactive deployment of additional sensors and detection logic, thereby closing the sense-making loop. All the while, humans are on the loop, rather than in it, permitting nuanced management of fast-acting automated measurement, detection, and inference engines. This paper motivates and conceptualizes analytics to facilitate this human-machine partnership.
17 CFR 200.17 - Chief Management Analyst.
Code of Federal Regulations, 2010 CFR
2010-04-01
...; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization...) Organizational structures and delegations of authority; (d) Management information systems and concepts; and (e... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Chief Management Analyst. 200...
17 CFR 200.17 - Chief Management Analyst.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Chief Management Analyst. 200.17 Section 200.17 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization...
DOT National Transportation Integrated Search
2016-07-01
To enable implementation of the American Association of State Highway Transportation (AASHTO) Highway Safety Manual using : SaftetyAnalyst (an AASHTOWare software product), the Arizona Department of Transportation (ADOT) studied the data assessment :...
Preparing Florida for deployment of SafetyAnalyst for all roads.
DOT National Transportation Integrated Search
2012-05-01
SafetyAnalyst is an advanced software system designed to provide the state and local highway agencies with a comprehensive set of tools to enhance their programming of site-specific highway safety improvements. As one of the 27 states that sponsored ...
Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system
NASA Astrophysics Data System (ADS)
Antony, Richard T.; Karakowski, Joseph A.
2010-04-01
A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.
Transient analysis mode participation for modal survey target mode selection using MSC/NASTRAN DMAP
NASA Technical Reports Server (NTRS)
Barnett, Alan R.; Ibrahim, Omar M.; Sullivan, Timothy L.; Goodnight, Thomas W.
1994-01-01
Many methods have been developed to aid analysts in identifying component modes which contribute significantly to component responses. These modes, typically targeted for dynamic model correlation via a modal survey, are known as target modes. Most methods used to identify target modes are based on component global dynamic behavior. It is sometimes unclear if these methods identify all modes contributing to responses important to the analyst. These responses are usually those in areas of hardware design concerns. One method used to check the completeness of target mode sets and identify modes contributing significantly to important component responses is mode participation. With this method, the participation of component modes in dynamic responses is quantified. Those modes which have high participation are likely modal survey target modes. Mode participation is most beneficial when it is used with responses from analyses simulating actual flight events. For spacecraft, these responses are generated via a structural dynamic coupled loads analysis. Using MSC/NASTRAN DMAP, a method has been developed for calculating mode participation based on transient coupled loads analysis results. The algorithm has been implemented to be compatible with an existing coupled loads methodology and has been used successfully to develop a set of modal survey target modes.
Gaensbauer, Theodore J; Jordan, Leslie
2009-08-01
Information on the long-term effects of early trauma and how such effects are manifested in treatment was obtained through interviews with thirty analysts who had treated an adult patient with a circumscribed trauma in the first four years of life. Childhood traumas fell into four categories: medical/accidental; separation/loss; witnessing a traumatic event; and physical/sexual abuse. Traumatic carryover was recorded in terms of explicit memories, implicit memories (somatic reliving, traumatic dreams, affective memories, behavioral reenactments, and transference phenomena), and global carryover effects (generalized traumatic affective states, defensive styles, patterns of object relating, and developmental disruptions). Linkages between the early trauma and adult symptomatology could be posited in almost every case, yet the clinical data supporting such linkages was often fragmented and ambiguous. Elements of patients' traumas appeared to be dispersed along variable avenues of expression and did not appear amenable to holistic, regressive reworking in treatment. The data did not support linear models of traumatic carryover or the idea that early traumatic experiences will be directly accessible in the course of an analysis. Factors that we believe help explain why traumatic aftereffects in our sample were so heterogeneous and difficult to track over the long term are discussed.
Uncertainty Quantification Techniques of SCALE/TSUNAMI
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rearden, Bradley T; Mueller, Don
2011-01-01
The Standardized Computer Analysis for Licensing Evaluation (SCALE) code system developed at Oak Ridge National Laboratory (ORNL) includes Tools for Sensitivity and Uncertainty Analysis Methodology Implementation (TSUNAMI). The TSUNAMI code suite can quantify the predicted change in system responses, such as k{sub eff}, reactivity differences, or ratios of fluxes or reaction rates, due to changes in the energy-dependent, nuclide-reaction-specific cross-section data. Where uncertainties in the neutron cross-section data are available, the sensitivity of the system to the cross-section data can be applied to propagate the uncertainties in the cross-section data to an uncertainty in the system response. Uncertainty quantification ismore » useful for identifying potential sources of computational biases and highlighting parameters important to code validation. Traditional validation techniques often examine one or more average physical parameters to characterize a system and identify applicable benchmark experiments. However, with TSUNAMI correlation coefficients are developed by propagating the uncertainties in neutron cross-section data to uncertainties in the computed responses for experiments and safety applications through sensitivity coefficients. The bias in the experiments, as a function of their correlation coefficient with the intended application, is extrapolated to predict the bias and bias uncertainty in the application through trending analysis or generalized linear least squares techniques, often referred to as 'data adjustment.' Even with advanced tools to identify benchmark experiments, analysts occasionally find that the application models include some feature or material for which adequately similar benchmark experiments do not exist to support validation. For example, a criticality safety analyst may want to take credit for the presence of fission products in spent nuclear fuel. In such cases, analysts sometimes rely on 'expert judgment' to select an additional administrative margin to account for gap in the validation data or to conclude that the impact on the calculated bias and bias uncertainty is negligible. As a result of advances in computer programs and the evolution of cross-section covariance data, analysts can use the sensitivity and uncertainty analysis tools in the TSUNAMI codes to estimate the potential impact on the application-specific bias and bias uncertainty resulting from nuclides not represented in available benchmark experiments. This paper presents the application of methods described in a companion paper.« less
Cardoso, Ricardo Lopes; Leite, Rodrigo Oliveira; de Aquino, André Carlos Busanelli
2016-01-01
Previous researches support that graphs are relevant decision aids to tasks related to the interpretation of numerical information. Moreover, literature shows that different types of graphical information can help or harm the accuracy on decision making of accountants and financial analysts. We conducted a 4×2 mixed-design experiment to examine the effects of numerical information disclosure on financial analysts' accuracy, and investigated the role of overconfidence in decision making. Results show that compared to text, column graph enhanced accuracy on decision making, followed by line graphs. No difference was found between table and textual disclosure. Overconfidence harmed accuracy, and both genders behaved overconfidently. Additionally, the type of disclosure (text, table, line graph and column graph) did not affect the overconfidence of individuals, providing evidence that overconfidence is a personal trait. This study makes three contributions. First, it provides evidence from a larger sample size (295) of financial analysts instead of a smaller sample size of students that graphs are relevant decision aids to tasks related to the interpretation of numerical information. Second, it uses the text as a baseline comparison to test how different ways of information disclosure (line and column graphs, and tables) can enhance understandability of information. Third, it brings an internal factor to this process: overconfidence, a personal trait that harms the decision-making process of individuals. At the end of this paper several research paths are highlighted to further study the effect of internal factors (personal traits) on financial analysts' accuracy on decision making regarding numerical information presented in a graphical form. In addition, we offer suggestions concerning some practical implications for professional accountants, auditors, financial analysts and standard setters.
Anderson, James; Chaturvedi, Alok; Cibulskis, Mike
2007-12-01
The U.S. Committee for Refugees and Immigrants estimated that there were over 33 million refugees and internally displaced persons (IDPs) in the world at the beginning of 2005. IDP/Refugee communities behave in complex ways making it difficult to make policy decisions regarding the provision of humanitarian aid and health and safety. This paper reports the construction of an agent-based model that has been used to study humanitarian assistance policies executed by governments and NGOs that provide for the health and safety of refugee communities. Agent-based modeling (ABM) was chosen because the more widely used alternatives impose unrealistic restrictions and assumptions on the system being modeled and primarily apply to aggregate data. We created intelligent agents representing institutions, organizations, individuals, infrastructure, and governments and analyzed the resulting interactions and emergent behavior using a Central Composite Design of Experiments with five factors. The resulting model allows policy makers and analysts to create scenarios, to make rapid changes in parameters, and provides a test bed for concepts and strategies. Policies can be examined to see how refugee communities might respond to alternative courses of action and how these actions are likely to affect the health and well-being of the community.
Research in the Restricted Problems of Three and Four Bodies Final Scientific Report
NASA Technical Reports Server (NTRS)
Richards, Paul B.; Bernstein, Irwin S.; Chai, Winchung A.; Cronin, Jane; Ellis, Jordan; Fine, William E.; Kass, Sheldon; Musa, Samuel A.; Russell, Lawrence H.
1968-01-01
Seven studies have been conducted on research in the existence and nature of solutions of the restricted problems of three and four bodies. The details and results of five of these research investigations have already been published, and the latest two studies will be published shortly. A complete bibliography of publications is included in this report. This research has been primarily qualitative and has yielded new information on the behavior of trajectories near the libration points in the Earth-Moon-Sun and Sun-Jupiter-Saturn systems, and on the existence of periodic trajectories about the libration points of the circular and elliptical restricted four-body models. We have also implemented Birkhoff's normalization process for conservative and nonconservative Hamiltonian systems with equilibrium points. This makes available a technique for analyzing stability properties of certain nonlinear dynamical systems, and we have applied this technique to the circular and elliptical restricted three-body models. A related study was also conducted to determine the feasibility of using cislunar periodic trajectories for various space missions. Preliminary results suggest that this concept is attractive for space flight safety operations in cislunar space. Results of this research will be of interest to mathematicians, particularly those working in ordinary differential equations, dynamical systems and celestial mechanics; to astronomers; and to space guidance and mission analysts.
Annalisa Gnoleba, MSA | Division of Cancer Prevention
Mrs. Annalisa Gnoleba is the Public Health Analyst for the Cancer Prevention Fellowship Program, Division of Cancer Prevention, National Cancer Institute. In this position, Mrs. Gnoleba serves as the analyst for developing and formulating short and long range public health program goals, objectives and policies. |
Report To The Secretary Of Defense - Global Logistics Management
2011-07-01
Spencer, and Leigh Warner. Catherine Whittington served as the Board’s Staff Analyst. PROCESS The Task Group conducted more than 30 interviews...Phillips Mr. Richard Spencer Ms. Leigh Warner DBB Staff Analyst Ms. Catherine Whittington 2 Methodology Reviewed DoD Directives and
Informed consent as a prescription calling for debate between analysts and researchers.
Rodríguez Quiroga de Pereira, Andrea; Messina, Verónica María; Sansalone, Paula Andrea
2012-08-01
This article is a review of the international scientific literature on informed consent and its use in some of the constituent organizations of the International Psychoanalytical Association (IPA). Because psychoanalysis comprises a theory based on practice, the dearth of clinical material for study, training and research purposes is a serious problem for analysts. Supervisions, presentations at scientific societies and congresses, publications and teaching material involve patients to an extent that goes beyond the work done in their sessions. Should consent be requested in these cases? This contribution addresses controversial and long-standing issues such as informed consent and confidentiality, audio recording of treatments, knowledge production, the ambivalence of participating subjects over time and the perspective of analysts and patients respectively. The authors consider the various alternative approaches available for the handling of these ethical dilemmas without losing sight of the patient's dignity and personal rights, while also taking account of the position of the analyst. Copyright © 2012 Institute of Psychoanalysis.
Internalization, separation-individuation, and the nature of therapeutic action.
Blatt, S J; Behrends, R S
1987-01-01
Based on the assumption that the mutative factors that facilitate growth in psychoanalysis involve the same fundamental mechanisms that lead to psychological growth in normal development, this paper considers the constant oscillation between gratification and deprivation leading to internalization as the central therapeutic mechanism of the psychoanalytic process. Patients experience the analytic process as a series of gratifying involvements and experienced incompatibilities that facilitate internalization, whereby the patient recovers lost or disrupted regulatory, gratifying interactions with the analyst, which are real or fantasied, by appropriating these interactions, transforming them into their own, enduring, self-generated functions and characteristics. Patients internalize not only the analyst's interpretive activity, but also the analyst's sensitivity, compassion and acceptance, and, in addition, their own activity in relation to the analyst such as free association. Both interpretation and the therapeutic relationship can contain elements of gratifying involvement and experienced incompatibility that lead to internalization and therefore both can be mutative factors in the therapeutic process.
On dreaming one's patient: reflections on an aspect of countertransference dreams.
Brown, Lawrence J
2007-07-01
This paper explores the phenomenon of the countertransference dream. Until very recently, such dreams have tended to be seen as reflecting either unanalyzed difficulties in the analyst or unexamined conflicts in the analytic relationship. While the analyst's dream of his/her patient may represent such problems, the author argues that such dreams may also indicate the ways in which the analyst comes to know the patient on a deep, unconscious level by processing the patient's communicative projective identifications. Two extended clinical examples of the author's countertransference dreams are offered. The author also discusses the use of countertransference dreams in psychoanalytic supervision.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-03
... (which is having at least three years prior experience within the immediately preceding six years involving securities or financial analysis) and pass the Supervisory Analyst (Series 16) qualification examination. Rather than passing the entire Supervisory Analyst qualification examination, such person may...
Directed area search using socio-biological vision algorithms and cognitive Bayesian reasoning
NASA Astrophysics Data System (ADS)
Medasani, S.; Owechko, Y.; Allen, D.; Lu, T. C.; Khosla, D.
2010-04-01
Volitional search systems that assist the analyst by searching for specific targets or objects such as vehicles, factories, airports, etc in wide area overhead imagery need to overcome multiple problems present in current manual and automatic approaches. These problems include finding targets hidden in terabytes of information, relatively few pixels on targets, long intervals between interesting regions, time consuming analysis requiring many analysts, no a priori representative examples or templates of interest, detecting multiple classes of objects, and the need for very high detection rates and very low false alarm rates. This paper describes a conceptual analyst-centric framework that utilizes existing technology modules to search and locate occurrences of targets of interest (e.g., buildings, mobile targets of military significance, factories, nuclear plants, etc.), from video imagery of large areas. Our framework takes simple queries from the analyst and finds the queried targets with relatively minimum interaction from the analyst. It uses a hybrid approach that combines biologically inspired bottom up attention, socio-biologically inspired object recognition for volitionally recognizing targets, and hierarchical Bayesian networks for modeling and representing the domain knowledge. This approach has the benefits of high accuracy, low false alarm rate and can handle both low-level visual information and high-level domain knowledge in a single framework. Such a system would be of immense help for search and rescue efforts, intelligence gathering, change detection systems, and other surveillance systems.
Counter-responses as organizers in adolescent analysis and therapy.
Richmond, M Barrie
2004-01-01
The author introduces Counter-response as a phenomological term to replace theory-burdened terms like counter-transference, counter-identification, and counter-resistance. He discusses the analyst's use of self (drawing on the comparison with Winnicott's use of the object) in processing the expectable destabilizing counter-reactions that occur in working therapeutically with disturbed adolescents and their parents. Further; he discusses the counter-reaction to the patient's narrative, acting-out, and how re-enactments can serve as an organizer for understanding the patient's inner life when the analyst formulates his/her counter-response. Emphasis is placed on the therapist forming his or her own narrative with the adolescent that takes into account the evoked counter-reaction. For this purpose, the author recommends the use of a combined counter-response and metaphor-orienting perspective to acknowledge and work with the denial, illusions, reversal of perspective, and catastrophic anxieties experienced with these adolescents. The counter-response perspective permits the emergence of the disturbed adolescent's novel narrative; however, since these experiences can be destabilizing or disruptive, the author also recommends the use of a personal metaphor to anticipate the reluctance to examining, processing, and formulating the analyst's dysphoric counter-reaction. With the use of the counter-response, the analyst's therapeutic ideal is to achieve a more optimal balance between using accepted narrative theories and exploring novel enactment experiences. His swimming metaphor stratagem is designed to keep the analyst in these difficult encounters.
How star women build portable skills.
Groysberg, Boris
2008-02-01
In May 2004, with the war for talent in high gear, Groysberg and colleagues from Harvard Business School wrote in these pages about the risks of hiring star performers away from competitors. After studying the fortunes of more than 1,000 star stock analysts, they found that when a star switched companies, not only did his performance plunge, so did the effectiveness of the group he joined and the market value of his new company. But further analysis of the data reveals that it's not that simple. In fact, one group of analysts reliably maintained star rankings even after changing employers: women. Unlike their male counterparts, female stars who switched firms performed just as well, in the aggregate, as those who stayed put. The 189 star women in the sample (18% of the star analysts studied) achieved a higher rank after switching firms than the men did. Why the discrepancy? First, says the author, the best female analysts appear to have built their franchises on portable, external relationships with clients and the companies they covered, rather than on relationships rooted within their firms. By contrast, male analysts built up greater firm- and team-specific human capital by investing more in the internal networks and unique capabilities and resources of their own companies. Second, women took greater care when assessing a prospective new employer. In this article, Groysberg explores the reasons behind the star women's portable performance.
MetaboAnalyst 3.0--making metabolomics more meaningful.
Xia, Jianguo; Sinelnikov, Igor V; Han, Beomsoo; Wishart, David S
2015-07-01
MetaboAnalyst (www.metaboanalyst.ca) is a web server designed to permit comprehensive metabolomic data analysis, visualization and interpretation. It supports a wide range of complex statistical calculations and high quality graphical rendering functions that require significant computational resources. First introduced in 2009, MetaboAnalyst has experienced more than a 50X growth in user traffic (>50 000 jobs processed each month). In order to keep up with the rapidly increasing computational demands and a growing number of requests to support translational and systems biology applications, we performed a substantial rewrite and major feature upgrade of the server. The result is MetaboAnalyst 3.0. By completely re-implementing the MetaboAnalyst suite using the latest web framework technologies, we have been able substantially improve its performance, capacity and user interactivity. Three new modules have also been added including: (i) a module for biomarker analysis based on the calculation of receiver operating characteristic curves; (ii) a module for sample size estimation and power analysis for improved planning of metabolomics studies and (iii) a module to support integrative pathway analysis for both genes and metabolites. In addition, popular features found in existing modules have been significantly enhanced by upgrading the graphical output, expanding the compound libraries and by adding support for more diverse organisms. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.
Human-machine interaction to disambiguate entities in unstructured text and structured datasets
NASA Astrophysics Data System (ADS)
Ward, Kevin; Davenport, Jack
2017-05-01
Creating entity network graphs is a manual, time consuming process for an intelligence analyst. Beyond the traditional big data problems of information overload, individuals are often referred to by multiple names and shifting titles as they advance in their organizations over time which quickly makes simple string or phonetic alignment methods for entities insufficient. Conversely, automated methods for relationship extraction and entity disambiguation typically produce questionable results with no way for users to vet results, correct mistakes or influence the algorithm's future results. We present an entity disambiguation tool, DRADIS, which aims to bridge the gap between human-centric and machinecentric methods. DRADIS automatically extracts entities from multi-source datasets and models them as a complex set of attributes and relationships. Entities are disambiguated across the corpus using a hierarchical model executed in Spark allowing it to scale to operational sized data. Resolution results are presented to the analyst complete with sourcing information for each mention and relationship allowing analysts to quickly vet the correctness of results as well as correct mistakes. Corrected results are used by the system to refine the underlying model allowing analysts to optimize the general model to better deal with their operational data. Providing analysts with the ability to validate and correct the model to produce a system they can trust enables them to better focus their time on producing higher quality analysis products.
The analyst's participation in the analytic process.
Levine, H B
1994-08-01
The analyst's moment-to-moment participation in the analytic process is inevitably and simultaneously determined by at least three sets of considerations. These are: (1) the application of proper analytic technique; (2) the analyst's personally-motivated responses to the patient and/or the analysis; (3) the analyst's use of him or herself to actualise, via fantasy, feeling or action, some aspect of the patient's conflicts, fantasies or internal object relationships. This formulation has relevance to our view of actualisation and enactment in the analytic process and to our understanding of a series of related issues that are fundamental to our theory of technique. These include the dialectical relationships that exist between insight and action, interpretation and suggestion, empathy and countertransference, and abstinence and gratification. In raising these issues, I do not seek to encourage or endorse wild analysis, the attempt to supply patients with 'corrective emotional experiences' or a rationalisation for acting out one's countertransferences. Rather, it is my hope that if we can better appreciate and describe these important dimensions of the analytic encounter, we can be better prepared to recognise, understand and interpret the continual streams of actualisation and enactment that are embedded in the analytic process. A deeper appreciation of the nature of the analyst's participation in the analytic process and the dimensions of the analytic process to which that participation gives rise may offer us a limited, although important, safeguard against analytic impasse.
Psychohistory before Hitler: early military analyses of German national psychology.
Bendersky, J W
1988-04-01
As part of a grandiose post-World War I psychological project to predict the behavior of nations, the U.S. Military Intelligence Division (MID) utilized racial and social psychological theories to explain an alleged problematic German national character. Though unsuccessful, this project has major significance in the history of psychohistory. For the newly discovered MID files reveal that ideas, attitudes, and biases many psychohistorians subsequently identified as manifestations of a peculiar German national character had previously been held by American officers and reputable psychologists. What American analysts would, in 1940, view as symptoms of a maladjusted German mind, their predecessors had, in 1920, considered valid scientific concepts.
NASA Astrophysics Data System (ADS)
Kirkpatrick, Jessica
2015-01-01
Jessica Kirkpatrick received her PhD in Astrophysics from Berkeley in 2012. After an exhaustive job search within academia and beyond, she accepted a job as a data scientist / analyst for the social network Yammer (acquired by Microsoft) and is now the Director of Data Science for Education Company InstaEDU. Now instead of spending her days finding patterns in the large scale structure of galaxies, she finds patterns in the behaviors of people. She'll talk about her transition from astrophysics to tech, compare and contrast the two fields, and give tips about how to land a tech job, and discuss useful tools which helped her with her transition.
Automating Phase Change Lines and Their Labels Using Microsoft Excel(R).
Deochand, Neil
2017-09-01
Many researchers have rallied against drawn in graphical elements and offered ways to avoid them, especially regarding the insertion of phase change lines (Deochand, Costello, & Fuqua, 2015; Dubuque, 2015; Vanselow & Bourret, 2012). However, few have offered a solution to automating the phase labels, which are often utilized in behavior analytic graphical displays (Deochand et al., 2015). Despite the fact that Microsoft Excel® is extensively utilized by behavior analysts, solutions to resolve issues in our graphing practices are not always apparent or user-friendly. Considering the insertion of phase change lines and their labels constitute a repetitious and laborious endeavor, any minimization in the steps to accomplish these graphical elements could offer substantial time-savings to the field. The purpose of this report is to provide an updated way (and templates in the supplemental materials) to add phase change lines with their respective labels, which stay embedded to the graph when they are moved or updated.
Training quality job interviews with adults with developmental disabilities.
Mozingo, D; Ackley, G B; Bailey, J S
1994-01-01
Supported work models of vocational integration have increased the employability of individuals with developmental disabilities. Interview questions most frequently used and corresponding responses considered most beneficial to job applicants were derived from an empirical analysis of the "hiring community" and served as a basis for the development of the verbal job interview skills training package evaluated in this research. Dependent measures were objective, behavioral indices of the quality of job interview responses. One-to-one training by a direct training staff, job coach, and a trained behavior analyst resulted in improved responding by all subjects as indicated in a multiple baseline design across interview questions. Improved quality in responding to questions generalized to variations in interview questions, to a novel interviewer, and in an in vivo interview situation. Finally, global measures of social validity support the value of the quality-of-response training.
Military Curricula for Vocational & Technical Education. Programmer/Analyst 4-4.
ERIC Educational Resources Information Center
Department of the Army, Washington, DC.
This program of instruction and various instructional materials for a secondary-postsecondary level course for programmer/analysts is one of a number of military-developed curriculum packages selected for adaptation to vocational instruction and curriculum development in a civilian setting. The eight-week, three-section course is designed to…
The Cluster Sensitivity Index: A Basic Measure of Classification Robustness
ERIC Educational Resources Information Center
Hom, Willard C.
2010-01-01
Analysts of institutional performance have occasionally used a peer grouping approach in which they compared institutions only to other institutions with similar characteristics. Because analysts historically have used cluster analysis to define peer groups (i.e., the group of comparable institutions), the author proposes and demonstrates with…
40 CFR Appendix A to Part 63 - Test Methods
Code of Federal Regulations, 2010 CFR
2010-07-01
... components by a different analyst). 3.3Surrogate Reference Materials. The analyst may use surrogate compounds... the variance of the proposed method is significantly different from that of the validated method by... variables can be determined in eight experiments rather than 128 (W.J. Youden, Statistical Manual of the...
ERIC Educational Resources Information Center
Ohio State Univ., Columbus. Center on Education and Training for Employment.
This publication contains 25 subjects appropriate for use in a competency list for the occupation of computer programmer/analyst, 1 of 12 occupations within the business/computer technologies cluster. Each unit consists of a number of competencies; a list of competency builders is provided for each competency. Titles of the 25 units are as…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-29
... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-81,827] Verizon Business Networks... Verizon Business Network Services, Inc., Senior Analyst-Service Program Delivery, Hilliard, Ohio (subject.... Specifically, the worker group supplies service program delivery services. At the request of the State of Ohio...
Staff - Patricia E. Gallagher | Alaska Division of Geological & Geophysical
Alaska's Mineral Industry Reports AKGeology.info Rare Earth Elements WebGeochem Engineering Geology Alaska Fairbanks and is currently working toward becoming a certified GIS professional. Position: GIS Analyst professional. Professional Experience 2013-present - Cartographer/GIS Analyst, State of Alaska, Division of
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-20
..., Multax, Inconen, CTS, Hi-Tec, Woods, Ciber, Kelly Services, Analysts International Corp, Comsys, Filter..., Comsys, Filter LLC, Excell, Entegee, Chipton-Ross, Ian Martin, Can-Tech, It Services, IDEX Solutions (NW..., Kelly Services, Analysts International Corp, Comsys, Filter LLC, Excell, Entegee, Chipton-Ross, Ian...
Driver Improvement Analyst; Basic Training Program. Student Study Guide.
ERIC Educational Resources Information Center
Hale, Allen
As part of the training package for Driver Improvement Analysts, this study guide is designed to serve as the basic reference source for the students/trainees. It reinforces and supplements subject material presented in the Instructor's Lesson Plans. Subjects covered are objectives and requirements, psychology of driving, characteristics of the…
From Franchise to Programming: Jobs in Cable Television.
ERIC Educational Resources Information Center
Stanton, Michael
1985-01-01
This article takes a look at some of the key jobs at every level of the cable industry. It discusses winning a franchise, building and running the system, and programing and production. Job descriptions include engineer, market analyst, programers, financial analysts, strand mappers, customer service representatives, access coordinator, and studio…
21 CFR 1304.23 - Records for chemical analysts.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Records for chemical analysts. 1304.23 Section 1304.23 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RECORDS AND REPORTS OF... authorized (by § 1301.22(b) of this chapter) to conduct chemical analysis with controlled substances shall...
2016-01-07
news. Both of these resemble typical activities of intelligence analysts in OSINT processing and production applications. We assessed two task...intelligence analysts in a number of OSINT processing and production applications. (5) Summary of the most important results In both settings
DOE Office of Scientific and Technical Information (OSTI.GOV)
BERG, MICHAEL; RILEY, MARSHALL
System assessments typically yield large quantities of data from disparate sources for an analyst to scrutinize for issues. Netmeld is used to parse input from different file formats, store the data in a common format, allow users to easily query it, and enable analysts to tie different analysis tools together using a common back-end.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-28
... Patricia Newman, Program Analyst, Office of Science Policy, National Center for Research Resources, 6701...: December 20, 2010. Meryl Sufian, Supervisory Health Science Policy Analyst, Office of Science Policy, NCRR... Evaluation of the Clinical and Translational Science Awards (CTSA) Initiative SUMMARY: Under the provisions...
28 CFR 16.96 - Exemption of Federal Bureau of Investigation Systems-limited access.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) would limit the ability of trained investigators and intelligence analysts to exercise their judgment in reporting on investigations and impede the development of criminal intelligence necessary for effective law... subsection (e)(5) would limit the ability of trained investigators and intelligence analysts to exercise...
NASA Astrophysics Data System (ADS)
Kruba, Steve; Meyer, Jim
Business process management suites (BPMS's) represent one of the fastest growing segments in the software industry as organizations automate their key business processes. As this market matures, it is interesting to compare it to Chris Anderson's 'Long Tail.' Although the 2004 "Long Tail" article in Wired magazine was primarily about the media and entertainment industries, it has since been applied (and perhaps misapplied) to other markets. Analysts describe a "Tail of BPM" market that is, perhaps, several times larger than the traditional BPMS product market. This paper will draw comparisons between the concepts in Anderson's article (and subsequent book) and the BPM solutions market.
Some thoughts about consciousness: from a quantum mechanics perspective.
Gargiulo, Gerald J
2013-08-01
The article explores some of the basic findings of quantum physics and information theory and their possible usefulness in offering new vistas for understanding psychoanalysis and the patient-analyst interchange. Technical terms are explained and placed in context, and examples of applying quantum models to clinical experience are offered. Given the complexity of the findings of quantum mechanics and information theory, the article aims only to introduce some of the major concepts from these disciplines. Within this framework the article also briefly addresses the question of mind as well as the problematic of reducing the experience of consciousness to neurological brain functioning.
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R
2013-01-01
Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards and defined failure scenarios. We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design principles and courses of action in making security-related decisions.
Dillenburger, Karola
2012-06-01
The number of children identified as having intellectual or developmental disability is rising worldwide and their education has been found wanting. It has been said that "they simply need better teaching." At the same time, there is an increasing evidence base that pedagogy that is based on the discipline of behaviour analysis offers the best prospect for individuals diagnosed with autism spectrum disorders. On the basis of this evidence, it is proposed that behaviour analysis should be applied more broadly to improve teaching for all children with intellectual or developmental disability.
The Model Analyst’s Toolkit: Scientific Model Development, Analysis, and Validation
2014-11-20
Government Contract N00014-12-C-0653 Charles River Analytics p. 7 The new MAT system can be downloaded from our FTP site with a username and...password that we provide. We also updated our web site to tell visitors about the new release and to tell them how to request a copy of the new software...hemorrhaging are being applied properly. Laparoscopic Surgery Training System (LASTS) (Phase II SBIR) US Navy’s Office of Naval Research (ONR) Under
2012-06-01
Military Operational Research , with special theme ‘The use of ‘soft’ methods in OR’. OR52 (7 – 9 September 2010, Royal Holloway University of London...on human judgement. Judgement-based OA applies the methods of ‘Soft Operational Research ’ developed in academia. It has appeared, however, that the...similarity between judgemental methods in operational research practice and a number of other modes of professional analytical practice. The closest
NASA Astrophysics Data System (ADS)
Rawles, Christopher; Thurber, Clifford
2015-08-01
We present a simple, fast, and robust method for automatic detection of P- and S-wave arrivals using a nearest neighbours-based approach. The nearest neighbour algorithm is one of the most popular time-series classification methods in the data mining community and has been applied to time-series problems in many different domains. Specifically, our method is based on the non-parametric time-series classification method developed by Nikolov. Instead of building a model by estimating parameters from the data, the method uses the data itself to define the model. Potential phase arrivals are identified based on their similarity to a set of reference data consisting of positive and negative sets, where the positive set contains examples of analyst identified P- or S-wave onsets and the negative set contains examples that do not contain P waves or S waves. Similarity is defined as the square of the Euclidean distance between vectors representing the scaled absolute values of the amplitudes of the observed signal and a given reference example in time windows of the same length. For both P waves and S waves, a single pass is done through the bandpassed data, producing a score function defined as the ratio of the sum of similarity to positive examples over the sum of similarity to negative examples for each window. A phase arrival is chosen as the centre position of the window that maximizes the score function. The method is tested on two local earthquake data sets, consisting of 98 known events from the Parkfield region in central California and 32 known events from the Alpine Fault region on the South Island of New Zealand. For P-wave picks, using a reference set containing two picks from the Parkfield data set, 98 per cent of Parkfield and 94 per cent of Alpine Fault picks are determined within 0.1 s of the analyst pick. For S-wave picks, 94 per cent and 91 per cent of picks are determined within 0.2 s of the analyst picks for the Parkfield and Alpine Fault data set, respectively. For the Parkfield data set, our method picks 3520 P-wave picks and 3577 S-wave picks out of 4232 station-event pairs. For the Alpine Fault data set, the method picks 282 P-wave picks and 311 S-wave picks out of a total of 344 station-event pairs. For our testing, we note that the vast majority of station-event pairs have analyst picks, although some analyst picks are excluded based on an accuracy assessment. Finally, our tests suggest that the method is portable, allowing the use of a reference set from one region on data from a different region using relatively few reference picks.
ListingAnalyst: A program for analyzing the main output file from MODFLOW
Winston, Richard B.; Paulinski, Scott
2014-01-01
ListingAnalyst is a Windows® program for viewing the main output file from MODFLOW-2005, MODFLOW-NWT, or MODFLOW-LGR. It organizes and displays large files quickly without using excessive memory. The sections and subsections of the file are displayed in a tree-view control, which allows the user to navigate quickly to desired locations in the files. ListingAnalyst gathers error and warning messages scattered throughout the main output file and displays them all together in an error and a warning tab. A grid view displays tables in a readable format and allows the user to copy the table into a spreadsheet. The user can also search the file for terms of interest.
Analytic process and dreaming about analysis.
Sirois, François
2016-12-01
Dreams about the analytic session feature a manifest content in which the analytic setting is subject to distortion while the analyst appears undisguised. Such dreams are a consistent yet infrequent occurrence in most analyses. Their specificity consists in never reproducing the material conditions of the analysis as such. This paper puts forward the following hypothesis: dreams about the session relate to some aspects of the analyst's activity. In this sense, such dreams are indicative of the transference neurosis, prefiguring transference resistances to the analytic elaboration of key conflicts. The parts taken by the patient and by the analyst are discussed in terms of their ability to signal a deepening of the analysis. Copyright © 2016 Institute of Psychoanalysis.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-21
... Shuler and Shane Subler, International Trade Compliance Analysts, to Susan Kuhbach, Director, Office 1... Compliance Analysts, Office 1, to Susan H. Kuhbach, Office Director, AD/CVD Operations, Office 1, entitled..., Office Director, AD/CVD Operations, Office 1, entitled ``Verification Report: Tianjin Pipe (Group...
2008-05-15
intelligence enterprise to describe the idea used in this monograph. 12 David Brooks, “The Elephantiasis of Reason,” The Atlantic Monthly. (January/February... Elephantiasis of Reason”. The Atlantic Monthly. (January/February, 2003). Boyd, Dennis & Bee, Helen. 2006. Lifespan Development. Fourth Edition. Allyn
Short term evaluation of harvesting systems for ecosystem management
Michael D. Erickson; Penn Peters; Curt Hassler
1995-01-01
Continuous time/motion studies have traditionally been the basis for productivity estimates of timber harvesting systems. The detailed data from such studies permits the researcher or analyst to develop mathematical relationships based on stand, system, and stem attributes for describing machine cycle times. The resulting equation(s) allow the analyst to estimate...
ERIC Educational Resources Information Center
Baker, Jason R.
2017-01-01
The goals of the present action research study were to understand intelligence analysts' perceptions of weapon systems visual recognition ("vis-recce") training and to determine the impact of a Critical Thinking Training (CTT) Seminar and Formative Assessments on unit-level intelligence analysts' "vis-recce" performance at a…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-02
... committee uses third-party analyst research and a proprietary fundamental process to make allocation... investment process: Step 1: The Sub-Adviser's use of third-party research consists of analyzing the consensus... analyst research and a proprietary fundamental process to make allocation decisions. Changes to the Fund's...
The Allocation of Visual Attention in Multimedia Search Interfaces
ERIC Educational Resources Information Center
Hughes, Edith Allen
2017-01-01
Multimedia analysts are challenged by the massive numbers of unconstrained video clips generated daily. Such clips can include any possible scene and events, and generally have limited quality control. Analysts who must work with such data are overwhelmed by its volume and lack of computational tools to probe it effectively. Even with advances…
Characteristics of the Navy Laboratory Warfare Center Technical Workforce
2013-09-29
Mathematics and Information Science (M&IS) Actuarial Science 1510 Computer Science 1550 Gen. Math & Statistics 1501 Mathematics 1520 Operations...Admin. Network Systems & Data Communication Analysts Actuaries Mathematicians Operations Research Analyst Statisticians Social Science (SS...workforce was sub-divided into six broad occupational groups: Life Science , Physical Science , Engineering, Mathematics, Computer Science and Information
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-27
... Program Manager Import Administration, from Emeka Chukwudebe, Case Analyst, Import administration, Re..., 2011. \\4\\ See Memorandum for All Interested Parties, from Emeka Chukwudebe, Case Analyst, Import... new shipper review to 300 days if it determines that the case is extraordinarily complicated. See 19...
The Effect of a Workload-Preview on Task-Prioritization and Task-Performance
ERIC Educational Resources Information Center
Minotra, Dev
2012-01-01
With increased volume and sophistication of cyber attacks in recent years, maintaining situation awareness and effective task-prioritization strategy is critical to the task of cybersecurity analysts. However, high levels of mental-workload associated with the task of cybersecurity analyst's limits their ability to prioritize tasks.…
Improving sensor data analysis through diverse data source integration
NASA Astrophysics Data System (ADS)
Casper, Jennifer; Albuquerque, Ronald; Hyland, Jeremy; Leveille, Peter; Hu, Jing; Cheung, Eddy; Mauer, Dan; Couture, Ronald; Lai, Barry
2009-05-01
Daily sensor data volumes are increasing from gigabytes to multiple terabytes. The manpower and resources needed to analyze the increasing amount of data are not growing at the same rate. Current volumes of diverse data, both live streaming and historical, are not fully analyzed. Analysts are left mostly to analyzing the individual data sources manually. This is both time consuming and mentally exhausting. Expanding data collections only exacerbate this problem. Improved data management techniques and analysis methods are required to process the increasing volumes of historical and live streaming data sources simultaneously. Improved techniques are needed to reduce an analysts decision response time and to enable more intelligent and immediate situation awareness. This paper describes the Sensor Data and Analysis Framework (SDAF) system built to provide analysts with the ability to pose integrated queries on diverse live and historical data sources, and plug in needed algorithms for upstream processing and filtering. The SDAF system was inspired by input and feedback from field analysts and experts. This paper presents SDAF's capabilities, implementation, and reasoning behind implementation decisions. Finally, lessons learned from preliminary tests and deployments are captured for future work.
Embodying analysis: the body and the therapeutic process.
Martini, Salvatore
2016-02-01
This paper considers the transfer of somatic effects from patient to analyst, which gives rise to embodied countertransference, functioning as an organ of primitive communication. By means of processes of projective identification, the analyst experiences somatic disturbances within himself or herself that are connected to the split-off complexes of the analysand. The analysty's own attempt at mind-body integration ushers the patient towards a progressive understanding and acceptance of his or her inner suffering. Such experiences of psychic contagion between patient and analyst are related to Jung's 'psychology of the transference' and the idea of the 'subtle body' as an unconscious shared area. The re-attribution of meaning to pre-verbal psychic experiences within the 'embodied reverie' of the analyst enables the analytic dyad to reach the archetypal energies and structuring power of the collective unconscious. A detailed case example is presented of how the emergence of the vitalizing connection between the psyche and the soma, severed through traumatic early relations with parents or carers, allows the instinctual impulse of the Self to manifest, thereby reactivating the process of individuation. © 2016, The Society of Analytical Psychology.
Brown, Lawrence J; Miller, Martin
2002-08-01
The use of the psychoanalyst's subjective reactions as a tool to better understand his/her patient has been a central feature of clinical thinking in recent decades. While there has been much discussion and debate about the analyst's use of countertransference in individual psychoanalysis, including possible disclosure of his/her feelings to the patient, the literature on supervision has been slower to consider such matters. The attention to parallel processes in supervision has been helpful in appreciating the impact of affects arising in either the analyst/patient or the supervisor/analyst dyads upon the analytic treatment and its supervision. This contribution addresses the ways in which overlapping aspects of the personalities of the supervisor, analyst and patient may intersect and create resistances in the treatment. That three-way intersection, described here as the triadic intersubjective matrix, is considered inevitable in all supervised treatments. A clinical example from the termination phase of a supervised analysis of an adolescent is offered to illustrate these points. Finally, the question of self-disclosure as an aspect of the supervisory alliance is also discussed.