This document provides instructions and examples for using Psychtoolbox functions in MATLAB and Octave to precisely control stimuli display and response timing in psychological experiments. It demonstrates how to use functions like Screen, KbCheck, KbWait, and KbQueue to control screen display, present visual stimuli, measure reaction times, and record keyboard responses with millisecond precision. Examples show how to set up simple, go/no-go, and choice reaction time experiments to study mental chronometry and measure processing latencies using different task conditions.
This document provides an overview of instance-based learning and k-nearest neighbors (kNN) classification. It discusses how kNN works by storing all training examples and classifying new instances based on the majority class of the k nearest neighbors. It covers selecting k, different distance functions, variants like distance-weighted and attribute-weighted kNN, and the strengths and weaknesses of the approach. The next class will discuss case-based reasoning and learning distance functions and prototypes.
This document discusses clustering methods using the EM algorithm. It begins with an overview of machine learning and unsupervised learning. It then describes clustering, k-means clustering, and how k-means can be formulated as an optimization of a biconvex objective function solved via an iterative EM algorithm. The document goes on to describe mixture models and how the EM algorithm can be used to estimate the parameters of a Gaussian mixture model (GMM) via maximum likelihood.
Kendall's tau is a nonparametric statistic that measures the ordinal association between two variables. It calculates the number of concordant and discordant pairs to determine the tau coefficient between -1 and 1, where higher positive values indicate a stronger monotonic relationship. Kendall's tau is often used as a hypothesis test of statistical dependence between variables and has advantages over Spearman's rho such as better statistical properties and direct interpretation. A partial correlation measures the relationship between two variables while controlling for one or more other variables. A scatter plot graphs the relationship between two quantitative variables with one on the x-axis and one on the y-axis to identify outliers, correlation, and the type of relationship.
Dive into an extensive analysis of heart disease classification, exploring key factors, trends, and predictive models for improved diagnosis and treatment strategies. Visit, https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/ for more
Hypothesis Tests that where distribution of underlying variables is free of parameters in termed as nonparametric tests. One such nonparametric tests is Kolmogorov Smirnov Test. Copy the link given below and paste it in new browser window to get more information on Kolmogorov Smirnov:- http://www.transtutors.com/homework-help/statistics/kolmogorov-smirnov.aspx
The Kolmogorov-Smirnov test is used to test if an observed frequency distribution matches an expected theoretical distribution. It compares the cumulative distribution functions of the observed and expected distributions. The test statistic is the largest difference between these cumulative distributions. If this difference is larger than a critical value from tables, the null hypothesis of a good fit is rejected. An example calculates the test statistic for observed data compared to a normal distribution, and finds it is less than the critical value so the null hypothesis is accepted.
Potential Solutions to the Fundamental Problem of Causal Inference: An OverviewEconomic Research Forum
Ragui Assaad- University of Minnesota
Caroline Krafft- ST. Catherine University
ERF Training on Applied Micro-Econometrics and Public Policy Evaluation
Cairo, Egypt July 25-27, 2016
www.erf.org.eg
This document provides an overview of instance-based learning and k-nearest neighbors (kNN) classification. It discusses how kNN works by storing all training examples and classifying new instances based on the majority class of the k nearest neighbors. It covers selecting k, different distance functions, variants like distance-weighted and attribute-weighted kNN, and the strengths and weaknesses of the approach. The next class will discuss case-based reasoning and learning distance functions and prototypes.
This document discusses clustering methods using the EM algorithm. It begins with an overview of machine learning and unsupervised learning. It then describes clustering, k-means clustering, and how k-means can be formulated as an optimization of a biconvex objective function solved via an iterative EM algorithm. The document goes on to describe mixture models and how the EM algorithm can be used to estimate the parameters of a Gaussian mixture model (GMM) via maximum likelihood.
Kendall's tau is a nonparametric statistic that measures the ordinal association between two variables. It calculates the number of concordant and discordant pairs to determine the tau coefficient between -1 and 1, where higher positive values indicate a stronger monotonic relationship. Kendall's tau is often used as a hypothesis test of statistical dependence between variables and has advantages over Spearman's rho such as better statistical properties and direct interpretation. A partial correlation measures the relationship between two variables while controlling for one or more other variables. A scatter plot graphs the relationship between two quantitative variables with one on the x-axis and one on the y-axis to identify outliers, correlation, and the type of relationship.
Dive into an extensive analysis of heart disease classification, exploring key factors, trends, and predictive models for improved diagnosis and treatment strategies. Visit, https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/ for more
Hypothesis Tests that where distribution of underlying variables is free of parameters in termed as nonparametric tests. One such nonparametric tests is Kolmogorov Smirnov Test. Copy the link given below and paste it in new browser window to get more information on Kolmogorov Smirnov:- http://www.transtutors.com/homework-help/statistics/kolmogorov-smirnov.aspx
The Kolmogorov-Smirnov test is used to test if an observed frequency distribution matches an expected theoretical distribution. It compares the cumulative distribution functions of the observed and expected distributions. The test statistic is the largest difference between these cumulative distributions. If this difference is larger than a critical value from tables, the null hypothesis of a good fit is rejected. An example calculates the test statistic for observed data compared to a normal distribution, and finds it is less than the critical value so the null hypothesis is accepted.
Potential Solutions to the Fundamental Problem of Causal Inference: An OverviewEconomic Research Forum
Ragui Assaad- University of Minnesota
Caroline Krafft- ST. Catherine University
ERF Training on Applied Micro-Econometrics and Public Policy Evaluation
Cairo, Egypt July 25-27, 2016
www.erf.org.eg
Learning Rx does not have to be boring like working your way through theoretical sermons about esoteric concepts like category theory and duality. Life is too short for that kind of abstract nonsense.
So what is a better way to spend a hot summer day with an ice-cold drink, or a cold winter night with a piping hot drink, than to learn Rx by writing an awesome platform game? In this talk, Erik will walk you through many of the features of Rx through programming a friendly bug to run across a lushy grassy meadow and jump for the stars.
Parallel R in snow (english after 2nd slide)Cdiscount
This presentation discusses parallelizing computations in R using the snow package. It demonstrates how to:
1. Create a cluster with multiple R sessions using makeCluster()
2. Split data across the sessions using clusterSplit() and export data to each node
3. Write functions to execute in parallel on each node using clusterEvalQ()
4. Collect the results, such as by summing outputs, to obtain the final parallelized computation. As an example, it shows how to parallelize the likelihood calculation for a probit regression model, reducing the computation time.
The document describes a scenario to analyze access between a constellation of 40 low-Earth orbit satellites and a ground station located at MathWorks Natick. A satellite scenario is created in MATLAB and the constellation satellites are added along with their orbital parameters. Each satellite is equipped with a conical sensor camera with a 90-degree field of view. The ground station representing MathWorks Natick is also added with a minimum elevation angle of 30 degrees. Access analysis is performed between each camera and the ground station to determine the times each camera can photograph the site. The results show the start and end times of access intervals for each camera over the 6-hour period from 1:00 PM to 7:00 PM UTC on May 12,
The document describes a scenario to analyze access between a constellation of 40 low-Earth orbit satellites and a ground station located at MathWorks Natick. A satellite scenario is created in MATLAB and the constellation satellites are added along with their orbital parameters. Each satellite is equipped with a conical sensor camera with a 90-degree field of view. The ground station representing MathWorks Natick is also added with a minimum elevation angle of 30 degrees. Access analysis is performed between each camera and the ground station to determine the times each camera can photograph the site. The results show the start and end times of each access interval over the 6-hour period.
"In today's digital world the mouse, not the pen is arguably mightier than the sword. Via a single click, countless security mechanisms may be completely bypassed. Run untrusted app? click ...allowed. Authorize keychain access? click ...allowed. Load 3rd-party kernel extension? click ...allowed. Authorize outgoing network connection? click ...allowed. Luckily security-conscious users will (hopefully) heed such warning dialogues—stopping malicious code in its tracks. But what if such clicks can be synthetically generated and interact with such prompts in a completely invisible way? Well, then everything pretty much goes to hell.
Of course OS vendors such as Apple are keenly aware of this 'attack' vector, and thus strive to design their UI in a manner that is resistant against synthetic events. Unfortunately they failed.
In this talk we'll discuss a vulnerability (CVE-2017-7150) found in all recent versions of macOS that allowed unprivileged code to interact with any UI component including 'protected' security dialogues. Armed with the bug, it was trivial to programmatically bypass Apple's touted 'User-Approved Kext' security feature, dump all passwords from the keychain, bypass 3rd-party security tools, and much more! And as Apple's patch was incomplete (surprise surprise) we'll drop an 0day that (still) allows unprivileged code to post synthetic events and bypass various security mechanisms on a fully patched macOS box!
And while it may seem that such synthetic interactions with the UI will be visible to the user, we'll discuss an elegant way to ensure they happen completely invisibly!"
The Ring programming language version 1.10 book - Part 70 of 212Mahmoud Samir Fayed
This document describes the source code for a 3D tic-tac-toe game written in Ring. It loads necessary libraries, initializes the game, and defines several classes to handle different aspects of the game like the game logic, background, cubes, interface, and checking for a winner. Key aspects include representing the game board as a 3D array, tracking the active player, mapping mouse clicks to board positions, and checking the board array after each turn to detect a win condition.
Use of an Oscilloscope - maXbox Starter33Max Kleiner
This is an oscilloscope introduction that uses several sources for input. My hope is that it encourages a few future scientists to experiment and get into touch with new waves ~.
Oscilloscopes are one of the few pieces of electronic equipment that plays multiple roles and can be used in the place of other electronics equipment.
The Ring programming language version 1.7 book - Part 64 of 196Mahmoud Samir Fayed
This document describes the source code for a 3D Tic-Tac-Toe game written in Ring. It includes documentation for classes that handle game logic, graphics, sound, and user interface. The core classes include GameLogic for tracking the game state, GameCube for rendering the game pieces as 3D cubes, GameInterface for user interaction and GameBackground/GameSound for additional elements. The code uses OpenGL and Allegro libraries for 3D rendering and multimedia functionality.
This is an outdated 20-minute overview of Reflex, a modern Perl library for building asynchronous, eventy classes and programs. Please see the extended dance remix I presented at YAPC::NA 2011 instead.
Here are the answers to the checkpoint questions:
1. The three expressions that appear inside the parentheses of a for loop are:
A) Initialization expression
B) Test expression
C) Update expression
2. A) i = 0
B) i < 50
C) i += 1
D) for i in range(0, 50, 1):
print("I love to program!")
3. A) 0, 2, 4, 6, 8, 10
B) 20, 18, 16
4. A while loop is best when you don't know how many times the loop needs to run up front. A for loop is best when you need to iterate a specific number of times
The Ring programming language version 1.8 book - Part 88 of 202Mahmoud Samir Fayed
This document discusses embedding Ring code within Ring programs and applications using the Ring virtual machine. It provides functions for executing Ring code in isolated environments to avoid conflicts between different code sections. Examples show initializing Ring states, running code within a state, passing variables between states, and executing Ring files and programs from within Ring applications. The ability to embed Ring programs within each other in a controlled way allows for modular and extensible Ring applications.
This document discusses various methods for measuring time on a computer system, including interval counting, cycle counters, and the Unix time command. It notes that two fundamental time scales exist: processor time (~10-9 sec) and external event time (~10-2 sec). Accuracy of interval counting depends on the timer interval length, and multiple measurements are needed to account for variability. Cycle counters provide very fine-grained time measurements but may be affected by cache effects and other processes. The K-best measurement scheme takes multiple time measurements and discards outliers to improve accuracy.
The document provides an index and overview of key Python coding concepts for students studying GCSE and IGCSE, including functions for printing, accepting user input, mathematical operators, conditional statements, loops, lists, dictionaries, reading and writing files, and an introduction to classes and objects. Each concept is given a page number and a brief code example and explanation to demonstrate its usage.
The Ring programming language version 1.5.3 book - Part 89 of 184Mahmoud Samir Fayed
The document describes embedding Ring code in Ring programs without sharing state. It allows quick integration of Ring programs and applications together without conflicts by executing Ring code in isolated environments. Functions like ring_state_init(), ring_state_runcode(), and ring_state_delete() are used to initialize a state, run code in it, and delete it. This prevents variables from one state being accessible from another. Serial execution of Ring applications is also demonstrated using ring_state_main().
The document discusses process management in operating systems. It covers process concepts like process states, process control blocks (PCBs), and process scheduling. It also covers operations on processes like creation using fork() and exec(), and inter-process communication mechanisms like pipes, shared memory, message queues, semaphores, signals, and FIFOs. Key process management functions like fork(), exec(), wait(), signal(), and alarm() are explained.
The document discusses performance testing and summarizes that:
1. Performance tests should closely simulate production environments including hardware, software, load, and isolation.
2. Extensive monitoring, logging, and profiling data should be collected to identify bottlenecks based on data rather than intuition.
3. Performance testing can be misleading without sufficient data due to issues like coordinated omission, so tools like Gatling and WRK2 that avoid this problem are recommended.
The Ring programming language version 1.7 book - Part 85 of 196Mahmoud Samir Fayed
The document discusses embedding Ring programs within other Ring programs using the ringvm library. It describes functions for running Ring code in isolated states to prevent conflicts, executing programs serially, passing variables between states, and running Ring programs from other programs while controlling memory management. The goal is to provide safe integration of Ring programs and applications.
1) Interoception, the sense of the internal state of one's body, affects perceptions of personal and interpersonal space. Higher interoceptive accuracy predicts a narrower boundary of personal space.
2) Proximity to others impacts autonomic reactions like arousal, with increased reactions closer to one's body. Higher interceptive awareness mediates these interactions between internal state and perceptions of proximity.
3) Synchronous cardio-visual stimulation can increase identification with another person's face, showing the role of interoception in perceptions of self and other. Interoceptive accuracy also predicts changes in body ownership.
More Related Content
Similar to Psychtoolbox (PTB) practical course by Volodymyr B. Bogdanov, Lyon/Kyiv 2018, Day 3
Learning Rx does not have to be boring like working your way through theoretical sermons about esoteric concepts like category theory and duality. Life is too short for that kind of abstract nonsense.
So what is a better way to spend a hot summer day with an ice-cold drink, or a cold winter night with a piping hot drink, than to learn Rx by writing an awesome platform game? In this talk, Erik will walk you through many of the features of Rx through programming a friendly bug to run across a lushy grassy meadow and jump for the stars.
Parallel R in snow (english after 2nd slide)Cdiscount
This presentation discusses parallelizing computations in R using the snow package. It demonstrates how to:
1. Create a cluster with multiple R sessions using makeCluster()
2. Split data across the sessions using clusterSplit() and export data to each node
3. Write functions to execute in parallel on each node using clusterEvalQ()
4. Collect the results, such as by summing outputs, to obtain the final parallelized computation. As an example, it shows how to parallelize the likelihood calculation for a probit regression model, reducing the computation time.
The document describes a scenario to analyze access between a constellation of 40 low-Earth orbit satellites and a ground station located at MathWorks Natick. A satellite scenario is created in MATLAB and the constellation satellites are added along with their orbital parameters. Each satellite is equipped with a conical sensor camera with a 90-degree field of view. The ground station representing MathWorks Natick is also added with a minimum elevation angle of 30 degrees. Access analysis is performed between each camera and the ground station to determine the times each camera can photograph the site. The results show the start and end times of access intervals for each camera over the 6-hour period from 1:00 PM to 7:00 PM UTC on May 12,
The document describes a scenario to analyze access between a constellation of 40 low-Earth orbit satellites and a ground station located at MathWorks Natick. A satellite scenario is created in MATLAB and the constellation satellites are added along with their orbital parameters. Each satellite is equipped with a conical sensor camera with a 90-degree field of view. The ground station representing MathWorks Natick is also added with a minimum elevation angle of 30 degrees. Access analysis is performed between each camera and the ground station to determine the times each camera can photograph the site. The results show the start and end times of each access interval over the 6-hour period.
"In today's digital world the mouse, not the pen is arguably mightier than the sword. Via a single click, countless security mechanisms may be completely bypassed. Run untrusted app? click ...allowed. Authorize keychain access? click ...allowed. Load 3rd-party kernel extension? click ...allowed. Authorize outgoing network connection? click ...allowed. Luckily security-conscious users will (hopefully) heed such warning dialogues—stopping malicious code in its tracks. But what if such clicks can be synthetically generated and interact with such prompts in a completely invisible way? Well, then everything pretty much goes to hell.
Of course OS vendors such as Apple are keenly aware of this 'attack' vector, and thus strive to design their UI in a manner that is resistant against synthetic events. Unfortunately they failed.
In this talk we'll discuss a vulnerability (CVE-2017-7150) found in all recent versions of macOS that allowed unprivileged code to interact with any UI component including 'protected' security dialogues. Armed with the bug, it was trivial to programmatically bypass Apple's touted 'User-Approved Kext' security feature, dump all passwords from the keychain, bypass 3rd-party security tools, and much more! And as Apple's patch was incomplete (surprise surprise) we'll drop an 0day that (still) allows unprivileged code to post synthetic events and bypass various security mechanisms on a fully patched macOS box!
And while it may seem that such synthetic interactions with the UI will be visible to the user, we'll discuss an elegant way to ensure they happen completely invisibly!"
The Ring programming language version 1.10 book - Part 70 of 212Mahmoud Samir Fayed
This document describes the source code for a 3D tic-tac-toe game written in Ring. It loads necessary libraries, initializes the game, and defines several classes to handle different aspects of the game like the game logic, background, cubes, interface, and checking for a winner. Key aspects include representing the game board as a 3D array, tracking the active player, mapping mouse clicks to board positions, and checking the board array after each turn to detect a win condition.
Use of an Oscilloscope - maXbox Starter33Max Kleiner
This is an oscilloscope introduction that uses several sources for input. My hope is that it encourages a few future scientists to experiment and get into touch with new waves ~.
Oscilloscopes are one of the few pieces of electronic equipment that plays multiple roles and can be used in the place of other electronics equipment.
The Ring programming language version 1.7 book - Part 64 of 196Mahmoud Samir Fayed
This document describes the source code for a 3D Tic-Tac-Toe game written in Ring. It includes documentation for classes that handle game logic, graphics, sound, and user interface. The core classes include GameLogic for tracking the game state, GameCube for rendering the game pieces as 3D cubes, GameInterface for user interaction and GameBackground/GameSound for additional elements. The code uses OpenGL and Allegro libraries for 3D rendering and multimedia functionality.
This is an outdated 20-minute overview of Reflex, a modern Perl library for building asynchronous, eventy classes and programs. Please see the extended dance remix I presented at YAPC::NA 2011 instead.
Here are the answers to the checkpoint questions:
1. The three expressions that appear inside the parentheses of a for loop are:
A) Initialization expression
B) Test expression
C) Update expression
2. A) i = 0
B) i < 50
C) i += 1
D) for i in range(0, 50, 1):
print("I love to program!")
3. A) 0, 2, 4, 6, 8, 10
B) 20, 18, 16
4. A while loop is best when you don't know how many times the loop needs to run up front. A for loop is best when you need to iterate a specific number of times
The Ring programming language version 1.8 book - Part 88 of 202Mahmoud Samir Fayed
This document discusses embedding Ring code within Ring programs and applications using the Ring virtual machine. It provides functions for executing Ring code in isolated environments to avoid conflicts between different code sections. Examples show initializing Ring states, running code within a state, passing variables between states, and executing Ring files and programs from within Ring applications. The ability to embed Ring programs within each other in a controlled way allows for modular and extensible Ring applications.
This document discusses various methods for measuring time on a computer system, including interval counting, cycle counters, and the Unix time command. It notes that two fundamental time scales exist: processor time (~10-9 sec) and external event time (~10-2 sec). Accuracy of interval counting depends on the timer interval length, and multiple measurements are needed to account for variability. Cycle counters provide very fine-grained time measurements but may be affected by cache effects and other processes. The K-best measurement scheme takes multiple time measurements and discards outliers to improve accuracy.
The document provides an index and overview of key Python coding concepts for students studying GCSE and IGCSE, including functions for printing, accepting user input, mathematical operators, conditional statements, loops, lists, dictionaries, reading and writing files, and an introduction to classes and objects. Each concept is given a page number and a brief code example and explanation to demonstrate its usage.
The Ring programming language version 1.5.3 book - Part 89 of 184Mahmoud Samir Fayed
The document describes embedding Ring code in Ring programs without sharing state. It allows quick integration of Ring programs and applications together without conflicts by executing Ring code in isolated environments. Functions like ring_state_init(), ring_state_runcode(), and ring_state_delete() are used to initialize a state, run code in it, and delete it. This prevents variables from one state being accessible from another. Serial execution of Ring applications is also demonstrated using ring_state_main().
The document discusses process management in operating systems. It covers process concepts like process states, process control blocks (PCBs), and process scheduling. It also covers operations on processes like creation using fork() and exec(), and inter-process communication mechanisms like pipes, shared memory, message queues, semaphores, signals, and FIFOs. Key process management functions like fork(), exec(), wait(), signal(), and alarm() are explained.
The document discusses performance testing and summarizes that:
1. Performance tests should closely simulate production environments including hardware, software, load, and isolation.
2. Extensive monitoring, logging, and profiling data should be collected to identify bottlenecks based on data rather than intuition.
3. Performance testing can be misleading without sufficient data due to issues like coordinated omission, so tools like Gatling and WRK2 that avoid this problem are recommended.
The Ring programming language version 1.7 book - Part 85 of 196Mahmoud Samir Fayed
The document discusses embedding Ring programs within other Ring programs using the ringvm library. It describes functions for running Ring code in isolated states to prevent conflicts, executing programs serially, passing variables between states, and running Ring programs from other programs while controlling memory management. The goal is to provide safe integration of Ring programs and applications.
Similar to Psychtoolbox (PTB) practical course by Volodymyr B. Bogdanov, Lyon/Kyiv 2018, Day 3 (20)
1) Interoception, the sense of the internal state of one's body, affects perceptions of personal and interpersonal space. Higher interoceptive accuracy predicts a narrower boundary of personal space.
2) Proximity to others impacts autonomic reactions like arousal, with increased reactions closer to one's body. Higher interceptive awareness mediates these interactions between internal state and perceptions of proximity.
3) Synchronous cardio-visual stimulation can increase identification with another person's face, showing the role of interoception in perceptions of self and other. Interoceptive accuracy also predicts changes in body ownership.
Brief review of literature on peripersinal space reserch and the paper by Buffacci and Iannetti - An Action Field Theory of Peripersonal Space. // Trends Cogn Sci. 2018
Psychtoolbox (PTB) practical course by Volodymyr B. Bogdanov, Kyiv 2017, Day 1Volodymyr Bogdanov
Day 1 of Psychtoolbox practical course is dedicated to MATLAB functions important for building experimental paradigms
The code file can be downloaded:
https://drive.google.com/file/d/0B7HyuFpj0ptpcXF4ZzcwaWpDRUU/view?usp=sharing
SPM 12 practical course by Volodymyr B. Bogdanov (Kyiv 2015, Day 2) Volodymyr Bogdanov
This document discusses statistical analysis of fMRI data from a 2-factor study on face recognition. It covers:
- Designing categorical and parametric models to analyze effects of factors "fame" and "repetition" of faces.
- Specifying contrasts to compare conditions and estimate main effects and interactions.
- Understanding design matrices, basis functions, and statistical tables from the analysis.
- Performing first-level analysis on individual data and second-level analysis to make inferences about the study population.
Immersive Learning That Works: Research Grounding and Paths ForwardLeonel Morgado
We will metaverse into the essence of immersive learning, into its three dimensions and conceptual models. This approach encompasses elements from teaching methodologies to social involvement, through organizational concerns and technologies. Challenging the perception of learning as knowledge transfer, we introduce a 'Uses, Practices & Strategies' model operationalized by the 'Immersive Learning Brain' and ‘Immersion Cube’ frameworks. This approach offers a comprehensive guide through the intricacies of immersive educational experiences and spotlighting research frontiers, along the immersion dimensions of system, narrative, and agency. Our discourse extends to stakeholders beyond the academic sphere, addressing the interests of technologists, instructional designers, and policymakers. We span various contexts, from formal education to organizational transformation to the new horizon of an AI-pervasive society. This keynote aims to unite the iLRN community in a collaborative journey towards a future where immersive learning research and practice coalesce, paving the way for innovative educational research and practice landscapes.
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills MN
By harnessing the power of High Flux Vacuum Membrane Distillation, Travis Hills from MN envisions a future where clean and safe drinking water is accessible to all, regardless of geographical location or economic status.
The technology uses reclaimed CO₂ as the dyeing medium in a closed loop process. When pressurized, CO₂ becomes supercritical (SC-CO₂). In this state CO₂ has a very high solvent power, allowing the dye to dissolve easily.
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...Sérgio Sacani
Context. With a mass exceeding several 104 M⊙ and a rich and dense population of massive stars, supermassive young star clusters
represent the most massive star-forming environment that is dominated by the feedback from massive stars and gravitational interactions
among stars.
Aims. In this paper we present the Extended Westerlund 1 and 2 Open Clusters Survey (EWOCS) project, which aims to investigate
the influence of the starburst environment on the formation of stars and planets, and on the evolution of both low and high mass stars.
The primary targets of this project are Westerlund 1 and 2, the closest supermassive star clusters to the Sun.
Methods. The project is based primarily on recent observations conducted with the Chandra and JWST observatories. Specifically,
the Chandra survey of Westerlund 1 consists of 36 new ACIS-I observations, nearly co-pointed, for a total exposure time of 1 Msec.
Additionally, we included 8 archival Chandra/ACIS-S observations. This paper presents the resulting catalog of X-ray sources within
and around Westerlund 1. Sources were detected by combining various existing methods, and photon extraction and source validation
were carried out using the ACIS-Extract software.
Results. The EWOCS X-ray catalog comprises 5963 validated sources out of the 9420 initially provided to ACIS-Extract, reaching a
photon flux threshold of approximately 2 × 10−8 photons cm−2
s
−1
. The X-ray sources exhibit a highly concentrated spatial distribution,
with 1075 sources located within the central 1 arcmin. We have successfully detected X-ray emissions from 126 out of the 166 known
massive stars of the cluster, and we have collected over 71 000 photons from the magnetar CXO J164710.20-455217.
Authoring a personal GPT for your research and practice: How we created the Q...Leonel Morgado
Thematic analysis in qualitative research is a time-consuming and systematic task, typically done using teams. Team members must ground their activities on common understandings of the major concepts underlying the thematic analysis, and define criteria for its development. However, conceptual misunderstandings, equivocations, and lack of adherence to criteria are challenges to the quality and speed of this process. Given the distributed and uncertain nature of this process, we wondered if the tasks in thematic analysis could be supported by readily available artificial intelligence chatbots. Our early efforts point to potential benefits: not just saving time in the coding process but better adherence to criteria and grounding, by increasing triangulation between humans and artificial intelligence. This tutorial will provide a description and demonstration of the process we followed, as two academic researchers, to develop a custom ChatGPT to assist with qualitative coding in the thematic data analysis process of immersive learning accounts in a survey of the academic literature: QUAL-E Immersive Learning Thematic Analysis Helper. In the hands-on time, participants will try out QUAL-E and develop their ideas for their own qualitative coding ChatGPT. Participants that have the paid ChatGPT Plus subscription can create a draft of their assistants. The organizers will provide course materials and slide deck that participants will be able to utilize to continue development of their custom GPT. The paid subscription to ChatGPT Plus is not required to participate in this workshop, just for trying out personal GPTs during it.
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfSelcen Ozturkcan
Ozturkcan, S., Berndt, A., & Angelakis, A. (2024). Mending clothing to support sustainable fashion. Presented at the 31st Annual Conference by the Consortium for International Marketing Research (CIMaR), 10-13 Jun 2024, University of Gävle, Sweden.
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...Leonel Morgado
Current descriptions of immersive learning cases are often difficult or impossible to compare. This is due to a myriad of different options on what details to include, which aspects are relevant, and on the descriptive approaches employed. Also, these aspects often combine very specific details with more general guidelines or indicate intents and rationales without clarifying their implementation. In this paper we provide a method to describe immersive learning cases that is structured to enable comparisons, yet flexible enough to allow researchers and practitioners to decide which aspects to include. This method leverages a taxonomy that classifies educational aspects at three levels (uses, practices, and strategies) and then utilizes two frameworks, the Immersive Learning Brain and the Immersion Cube, to enable a structured description and interpretation of immersive learning cases. The method is then demonstrated on a published immersive learning case on training for wind turbine maintenance using virtual reality. Applying the method results in a structured artifact, the Immersive Learning Case Sheet, that tags the case with its proximal uses, practices, and strategies, and refines the free text case description to ensure that matching details are included. This contribution is thus a case description method in support of future comparative research of immersive learning cases. We then discuss how the resulting description and interpretation can be leveraged to change immersion learning cases, by enriching them (considering low-effort changes or additions) or innovating (exploring more challenging avenues of transformation). The method holds significant promise to support better-grounded research in immersive learning.
The binding of cosmological structures by massless topological defectsSérgio Sacani
Assuming spherical symmetry and weak field, it is shown that if one solves the Poisson equation or the Einstein field
equations sourced by a topological defect, i.e. a singularity of a very specific form, the result is a localized gravitational
field capable of driving flat rotation (i.e. Keplerian circular orbits at a constant speed for all radii) of test masses on a thin
spherical shell without any underlying mass. Moreover, a large-scale structure which exploits this solution by assembling
concentrically a number of such topological defects can establish a flat stellar or galactic rotation curve, and can also deflect
light in the same manner as an equipotential (isothermal) sphere. Thus, the need for dark matter or modified gravity theory is
mitigated, at least in part.
ESR spectroscopy in liquid food and beverages.pptxPRIYANKA PATEL
With increasing population, people need to rely on packaged food stuffs. Packaging of food materials requires the preservation of food. There are various methods for the treatment of food to preserve them and irradiation treatment of food is one of them. It is the most common and the most harmless method for the food preservation as it does not alter the necessary micronutrients of food materials. Although irradiated food doesn’t cause any harm to the human health but still the quality assessment of food is required to provide consumers with necessary information about the food. ESR spectroscopy is the most sophisticated way to investigate the quality of the food and the free radicals induced during the processing of the food. ESR spin trapping technique is useful for the detection of highly unstable radicals in the food. The antioxidant capability of liquid food and beverages in mainly performed by spin trapping technique.
Gadgets for management of stored product pests_Dr.UPR.pdf
Psychtoolbox (PTB) practical course by Volodymyr B. Bogdanov, Lyon/Kyiv 2018, Day 3
1. “Day 3”:
Operating PTB functions on
MATLAB and GNU octave
Psychtoolbox (PTB)
practical course
by Volodymyr B. Bogdanov
vlabogd@yahoo.com
Kyiv/Lyon 2018
“This is really simple!”
ImpAct team, CRNL, Inserm
2. ScreenTiming Keyboard
Simplified experimental design
Inter-trial interval
Stimulus-stimulus interval
Stimulus-feedback interval
Set background
Prepare visual stimulus
Show stimulus
Clear the screen
Feedback time
Feedback quality (the key)
GetSecs
WaitSecs
Screen('OpenWindow‘)
Screen(‘DrawText’)
Screen(‘MakeTexture’)
Screen(‘Flip’)
KbCheck
KbWait
KbQueCheck
3. Good timing is critical !
Jean-Baptiste Mauzaisse
Le Temps montrant les
ruines qu'il amène
…because what we often
do is for studies of
perception, attention,
memory and other
mental processes is
Mental chronometry
5. Comparison of timing functions
% MATLAB
clear t; t1=clock; for i=1:10; t2=clock; t(i)=etime(t2, t1); pause(0.1); end;
% MATLAB + PsychToolbox
clear t; t1=GetSecs; for i=1:10; t2=GetSecs; t(i)=t2-t1; WaitSecs(0.1); end;
d=diff(t(2:end)); % point by point intervals of measured time
e=( max(d)-min(d) )*1000 % difference between maximal and minimal intervals in
milliseconds
% one interval:
t1=clock; pause(0.1); t2=clock; etime(t2, t1)
Loops are useful for a measure of variation in measured time intervals:
Calculation of serial intervals of temporal measures:
6. Keyboard
[ keyIsDown, seconds, keyCode ] = KbCheck
[secs, keyCode, deltaSecs] = KbReleaseWait
[secs, keyCode, deltaSecs] = KbPressWait
[secs, keyCode, deltaSecs] = KbStrokeWait
KbQueueCreate - create the queue.
KbQueueStart - start listening
KbQueueStop - stop listening
KbQueueCheck - check recorded keypresses
KbQueueRelease – delete the created queue
Interrupts script until keyboard input
(checks every 5 ms).
Works for background keypress
collection, good for brief single
keypresses.
If precise timing of the keypress is important, use:
KbCheck
KbWait or KbPressWait
KbQueueXXX
Current status of the keyboard,
used multiple times to create
keyboard status time series.
7. WaitSecs(1); % wait one sec so that all the keys are unpressed
for i=1:100000;
[keyIsDown(i),secs(i),keyCode]=KbCheck; % about 0.1 ms duration
end;
plot(secs-(secs(1)), keyIsDown); % plots status of keyboard against time of the sampling
KbCheck
[keyIsDown, secs, keyCode, deltaSecs] = KbCheck
Key was pressed?
1 – pressed
0 – no
Time of
keypress
256-element logical vector
indicating which key(s)
were pressed
Interval between the
current check and the
previous check
Test for keypresses with a looped KbCheck
8. [secs, keyCode, deltaSecs] = KbWait(devicenumber, forWhat, untilTime)
0 - Listen for key press
1 - Listen for key release
2 - Wait until all keys are released,
THEN wait for a key press
3 - Wait until all keys are released,
THEN wait for a key press
AND subsequent release
time to stop
waiting if no
kypress
KbWait (uses KbCheck)
devicenumber = GetKeyboardIndices
Time of
keypress
256-element logical vector
indicating which key(s)
were pressed
Interval between the
current check and the
previous check
WaitSecs(1);
secs(1)=GetSecs; % time of the start of waiting
disp('A')
[secs(2), keyCode, deltaSecs] = KbWait(0, 0, secs(1)+10);
delay=secs(2)-secs(1) % delay of the keypress
devicenumber
forWhat
untilTime: Start +10 sec
9. By default, all keystrokes are also sent to Matlabs window, generating some ugly
clutter. You can suppress this by calling ListenChar(2), so your MATLAB console
stays nice and clean.
Don't forget to call ListenChar(1) though before the end of your script.
ListenChar
DisableKeysForKbCheck
KbName('UnifyKeyNames') % assign unified keynames to all keys
KbName % press a key to get the name
KbName(‘DownArrow’) % check the index for this keyname
ans =
39
KbName('UpArrow') % check the code for this key
ans =
38
DisableKeysForKbCheck([38 39]);
Specify a vector of keycodes for keys which should be ignored by KbCheck and KbWait.
How to
identify the
key-indices?
10. KbQueue
[pressed, firstPress, firstRelease, lastPress, lastRelease] = KbQueueCheck
Array indicating
when keys were
first pressed
Array indicating
when keys were
first released
Key was pressed?
1 – pressed
0 – no
keyFlags = zeros(1,256); % an array of zeros
keyFlags([37 39])=1; % left and right arrows
KbQueueCreate(0, keyFlags); % initialize the Queue
WaitSecs(1); % wait until all keys are un-pressed
disp('A'); % stim.
secs(1)=GetSecs; % stim. time
KbQueueStart; % start recording
WaitSecs(5); % time for some keypresses
KbQueueStop; % stop recording
[pressed, firstPress, firstRelease, lastPress, lastRelease]=KbQueueCheck;
KbQueueRelease; % delete the created queue
firstPress(firstPress>0)-secs(1) % the post-cue of the first press of the keys
KbQueueCreate(deviceNumber, keyFlags) - create the queue.
KbQueueStart - start listening
KbQueueStop - stop listening
KbQueueCheck - check recorded keypresses
KbQueueRelease – delete the created queue
Selected keys
to acquire
12. Keyboard keypress: 15-20 ms
+ and uncertain delay, which depends on upcoming processes
Mouse keypress: 8-15 ms resolution
Limitations of feedback temporal resolution
The alternative can be the audio-input or specialized keypads,
compatible with Psychtoolbox, e.g. RTBox (300 USD+).
PsychRTBox
http://lobes.osu.edu/rt-box.php
14. Screen
Set background
Show shapes
Show text
Flip (refresh) the screen
Show textures(images)
Open/play movie
One of the most used function in Psychtoolbox.
It deals with a lot of tasks:
Prepare textures
We will use the most basic
options to build functional
scripts to run experiments
on Mental chronometry
15. Mental Chronometry
Using reaction times to understand cognitive
processes: subtractive method of latency
analysis to measure the time of internal mental
processes (1868).
Franciscus (Franz) Cornelius
Donders
Dutch ophthalmologist. 1818-1889
Detect
Stimulus
Press
Button
Detect
Stimulus
Press
ButtonDiscriminate
Feature
Detect
Stimulus
Press
Button 1
Discriminate
Feature
Choose
Button
Choice Reaction Time (CRT)
Simple Reaction Time task (RT)
Go/No-Go task (GnG)
No
Press
Press
Button 2
RT<GnG<CRT
GnG-RT: discrimination latency
CRT-GnG: response selection latency
16.
17. Write our script for the experiment of Donders
But first we need to know how to set the screen on
whichScreen = max(Screen('Screens')); % list the indexing of the screens
[ window, rect ] = Screen('OpenWindow', whichScreen, [175 175 175]);
% initialize working window on the first screen, gray background
COLOR – [R G B]
red – [255 0 0]
yellow – [255 255 0]
green – [0 255 0]
blue – [0 0 255]
black – [0 0 0]
gray – [175 175 175]
white – [255 255 255]
window
id of the onscreen window
where subsequent graphical
operations will be executed
rect
screen coordinates
(origin at upper left)
[x1 y1 x2 y2]
Screen
x1=0
y1=0
x2
y2
e.g. rect = [0 0 1336 768 ]
width
height
18. Why do we try to catch something?
To avoid freezing!
try
… your Psychtoolbox program
catch X
sca % stops all Psychtoolbox operations
end
This variable contains the error massage and the line of the error
19. DrawDot
HideCursor; % hide cursor
Mouse cursor which stays at the top of
the screen is not nice, so it is better to
remove it at the beginning of the script.
However, we wish to show something
instead, for example, a dot.
centerXY=[rect(3)/2 rect(4)/2];
% XY coordinates of the center of the screen
Screen('DrawDots', window, centerXY, 20, [0 0 0]);
% drawing a big black rectangular dot in the
center of the screen
size, in
pixels
color
This function draws a dot into the
frame back-buffer, which will be exposed at
the frame front-buffer only after the “flip”.
20. 'I was wondering what the mouse-trap
was for,' said Alice. 'It isn't very likely
there would be any mice on the horse's
back.‘
'Not very likely, perhaps,' said the
Knight; 'but, if they do come, I don't
choose to have them running all about.'
Flip
[VBLTimestamp]=Screen('Flip', window);
[VBLTimestamp]=Screen('Flip', window);
21. Time
Stimulus duration - 1 sec.
Stimulus duration - 1 sec.
Inter-stimulus interval (ISI) - 1 : 3 sec.
Keypress acquisition during
2 sec after stimulus onset
Stim. ISI Stim.
Key recorded
The structure of the experiment
2 sec
22. Conditions and inter-stimulus intervals
cond=repmat([1 2], 1, 5); % generate an array of conditions,
1 and 2 repeated 5 times (1 for red, 2 for green)
cond =
1 2 1 2 1 2 1 2 1 2
cond=cond(randperm(10)); % randomize order of conditions
cond =
1 1 1 1 2 2 2 1 2 2
ISI=repmat([0:0.5:2], 1, 2); % inter-stimulus intervals will have 5 specific values
ISI =
0 0.5 1.0 1.5 2.0 0 0.5 1.0 1.5 2.0
ISI=ISI(randperm(10)); % randomize ISI
ISI =
0 1.5 0.5 0 2.0 0.5 1.0 1.5 2.0 1.0
Predefined and randomized
23. RT=-ones(1, 10); % an array of ones
for recording of reaction times
RTkey=-ones(1, 10); % an array of
minus ones for recording of the keys
Prepare the KbCue object and data arrays in advance !
keyFlags = zeros(1,256); % an array of zeros
keyFlags([37 39])=1; % left and right arrows, left for red
KbQueueCreate(0, keyFlags); % initialize the Queue
Always remember the logic of the
White Knight!
24. Screen('DrawDots', window, centerXY, 20,
[250*(cond(i)==1) 250*(cond(i)==2) 0]); % colored dot
Presentation of color conditions in the for loop
Screen('DrawDots', window, centerXY, 20, [0 0 0]); % black dot
Screen(window, 'flip', VBLTimestamp+1);
Timing of the stimulus offset one second post-onset
color, red or green as a function of the cond(i)
[VBLTimestamp]=Screen(window, 'flip');
KbQueueStart; % start recording
Stimulus onset!
VBLTimestamp – the time of the vertical blink (VBL), which is the time of ongoing
screen refresh (see the PTB manual)
for i=1:10;…
end; % trial loop
25. [pressed, firstPress, firstRelease, lastPress, lastRelease]
=KbQueueCheck; % retrieve the created queue and clean it
if pressed==1;
RT(i)=firstPress(firstPress>0)-VBLTimestamp; % the
post-cue of the first press of the keys
RTkey(i)=find(firstPress>0);
end;
Retrieval of the outcome of recording of current trial’s response
Recording of the KbCue after a delay of 1 more second post-offset
WaitSecs(1); % in total waitong for responce up to 2 seconds
KbQueueStop; % stop recording
WaitSecs(0.5); KbQueueStart; WaitSecs(2);
[pressed, firstPress, firstRelease, lastPress, lastRelease]=KbQueueCheck
Reminder (how to test the functioning of KbQueueCheck):
26. Save data each run in a different file
t = clock; % current time
DateString = datestr(t, 'yyyy-mm-dd-HH-MM'); % convert it into a string
filename=['RT_results_', DateString]; % forming a filname string
save(filename, 'RT', 'RTkey', 'cond'); % saving imortant variables into a mat file
27. Analysis of the reaction time data
For the simple reaction time task one can analyze the RT variable, since
there is no "wrong answer". But we pick just RTs > 100 ms, whish rejects
misses (equal to -1)
good_RT=RT(RT>0.100);
n_RT=length(good_RT);
figure
hold on
plot([1:n_RT]/n_RT, good_RT, '.');
plot( [1, n_RT]/n_RT,[mean(good_RT), mean(good_RT)])
Plotting the individual RTs and the mean
28. For Go-NoGo task one picks just the responses of the right key (37) to
the first (red) condition
% 2. Go-NoGo just red
correct=(cond==1)*37; % left arrow for red
RT=RT(correct==RTkey);
Analysis of the Go-NoGo reaction time data
cond = 2 2 2 1 1 1 1 2 1 2
correct = 0 0 0 37 37 37 37 0 37 0
RTkey = -1 -1 -1 37 37 37 37 -1 37 -1
correct==RTkey
0 0 0 1 1 1 1 0 1 0
RT= -1 -1 -1 0,397 0,375 0,415 0,525 -1 0,686 -1
RT(correct==RTkey) = 0.397 0.375 0.415 0.525 0.686
plot([1:n_RT]/n_RT+1, good_RT, 'r.');
plot([1, n_RT]/n_RT+1, [mean(good_RT), mean(good_RT)], 'r')
29. % 3. 2-choise task, correct RTs
correct=(cond==1)*37+(cond==2)*39;
% left arrow for red,
% right arrow for green
RT=RT(correct==RTkey);
For two-choice reaction time task we must pick just the responses of the right key
(37) to the first (red) condition and left key (39) to the second (green) condition.
plot([1:n_RT]/n_RT+2, good_RT, 'r.');
plot([1, n_RT]/n_RT+2, [mean(good_RT), mean(good_RT)],
'r');
Analysis of the two-choice reaction time data
30. Posner letter matching task
Michael I. Posner
Professor Emeritus, Department
of Psychology Member, ION
Posner (1967) recognition of a pair of letters.
The simplest task was the physical match
task.
The next task was the name match task.
The rule match task (whether the two letters
presented both were vowels or consonants)
is the hardest one.
Physical match: AA + Bb – Cd – ef –
~70 ms
Name match: AA + Bb + Cd – ef –
~70 ms
Rule match: AA + Bb + Cd + ef –