Publications

38 Results
Skip to search filters

Rim-to-Rim Werables at The Canyon for Health (R2R WATCH): Physiological Cognitive and Biological Markers of Performance Decline in an Extreme Environment

Journal of Human Performance in Extreme Environments

Divis, Kristin; Abbott, Robert G.; Branda, Catherine B.; Avina, Glory E.; Femling, Jon F.; Huerta, Jose G.; Jelinkova, Lucie J.; Jennings, Jeremy K.; Pearce, Emily P.; Ries, Daniel R.; Sanchez, Danielle; Silva, Austin R.

Abstract not provided.

Analysis of social interaction narratives in unaffected siblings of children with ASD through latent Dirichlet allocation

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Newton, Victoria E.; Solis, Isabel; Avina, Glory E.; McClain, Jonathan T.; King, Cynthia; Ciesielski, Kristina T.Rewin

Children with autism spectrum disorders (ASD) and their unaffected siblings (US) are frequent targets of social bullying, which leads to severe physical, emotional, and social consequences. Understanding the risk factors is essential for developing preventative measures. We suggest that one such risk factor may be a difficulty to discriminate different biological body movements (BBM), a task that requires fast and flexible processing and interpretation of complex visual cues, especially during social interactions. Deficits in cognition of BBM have been reported in ASD. Since US display an autism endophenotype we expect that they will also display deficits in social interpretation of BBM. Methods. Participants: 8 US, 8 matched TD children, age 7-14; Tasks/Measurements: Social Blue Man Task: Narrative interpretation with a Latent Dirichlet Allocation [LDA] analysis; Social Experience Questionnaires with children and parents. Results. The US displayed as compared to TD: (i) low self-awareness of social bullying in contrast to high parental reports; (ii) reduced speed in identifying social cues; (iii) lower quality and repetitious wording in social interaction narratives (LDA). Conclusions. US demonstrate social endophenotype of autism reflected in delayed identification, interpretation and verbalization of social cues; these may constitute a high risk factor for becoming a victim of social bullying.

More Details

Rim-to-Rim wearables at the canyon for health (R2R WATCH): Experimental design and methodology

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Avina, Glory E.; Abbott, Robert G.; Anderson-Bergman, Clifford I.; Branda, Catherine B.; Divis, Kristin; Newton, Victoria E.; Pearce, Emily; Femling, Jon

The Rim-to-Rim Wearables At The Canyon for Health (R2R WATCH) study examines metrics recordable on commercial off the shelf (COTS) devices that are most relevant and reliable for the earliest possible indication of a health or performance decline. This is accomplished through collaboration between Sandia National Laboratories (SNL) and The University of New Mexico (UNM) where the two organizations team up to collect physiological, cognitive, and biological markers from volunteer hikers who attempt the Rim-to-Rim (R2R) hike at the Grand Canyon. Three forms of data are collected as hikers travel from rim to rim: physiological data through wearable devices, cognitive data through a cognitive task taken every 3 hours, and blood samples obtained before and after completing the hike. Data is collected from both civilian and warfighter hikers. Once the data is obtained, it is analyzed to understand the effectiveness of each COTS device and the validity of the data collected. We also aim to identify which physiological and cognitive phenomena collected by wearable devices are the most relatable to overall health and task performance in extreme environments, and of these ascertain which markers provide the earliest yet reliable indication of health decline. Finally, we analyze the data for significant differences between civilians’ and warfighters’ markers and the relationship to performance. This is a study funded by the Defense Threat Reduction Agency (DTRA, Project CB10359) and the University of New Mexico (The main portion of the R2R WATCH study is funded by DTRA. UNM is currently funding all activities related to bloodwork. DTRA, Project CB10359; SAND2017-1872 C). This paper describes the experimental design and methodology for the first year of the R2R WATCH project.

More Details

The art of research: Opportunities for a science-based approach

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Silva, Austin R.; Avina, Glory E.; Tsao, Jeffrey Y.

Research, the manufacture of knowledge, is currently practiced largely as an “art,” not a “science.” Just as science (understanding) and technology (tools) have revolutionized the manufacture of other goods and services, it is natural, perhaps inevitable, that they will ultimately also be applied to the manufacture of knowledge. In this article, we present an emerging perspective on opportunities for such application, at three different levels of the research enterprise. At the cognitive science level of the individual researcher, opportunities include: overcoming idea fixation and sloppy thinking, and balancing divergent and convergent thinking. At the social network level of the research team, opportunities include: overcoming strong links and groupthink, and optimally distributing divergent and convergent thinking between individuals and teams. At the research ecosystem level of the research institution and the larger national and international community of researchers, opportunities include: overcoming performance fixation, overcoming narrow measures of research impact, and overcoming (or harnessing) existential/social stress.

More Details

Improving analysis and decision-making through intelligent web crawling

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

McClain, Jonathan T.; Avina, Glory E.; Trumbo, Derek T.; Kittinger, Robert

Analysts across national security domains are required to sift through large amounts of data to find and compile relevant information in a form that enables decision makers to take action in high-consequence scenarios. However, even the most experienced analysts are unable to be 100 % consistent and accurate based on the entire dataset, unbiased towards familiar documentation, and are unable to synthesize and process large amounts of information in a small amount of time. Sandia National Laboratories has attempted to solve this problem by developing an intelligent web crawler called Huntsman. Huntsman acts as a personal research assistant by browsing the internet or offline datasets in a way similar to the human search process, only much faster (millions of documents per day), by submitting queries to search engines and assessing the usefulness of page results through analysis of full-page content with a suite of text analytics. This paper will discuss Huntsman’s capability to both mirror and enhance human analysts using intelligent web crawling with analysts-in-the-loop. The goal is to demonstrate how weaknesses in human cognitive processing can be compensated for by fusing human processes with text analytics and web crawling systems, which ultimately reduces analysts’ cognitive burden and increases mission effectiveness.

More Details

Collaboration between cognitive science and business management to benefit the government sector

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Avina, Glory E.

Cognitive science is an interdisciplinary science which studies the human dimension, drawing from academic disciplines such as psychology, linguistics, philosophy, and computer modeling. Business management is controlling, leading, monitoring, organizing, and planning critical information to bring useful resources and capabilities to a viable market. Finally, the government sector has many roles, but one primary goal is to bring innovative solutions to maintain and enhance national security. There currently is a gap in the government sector between applied research and solutions applicable to the national security field. This is a deep problem since a critical element to many national security issues is the human dimension and requires cognitive science approaches. One major cause to this gap is the separation between business management and cognitive science: scientific research is either not being tailored to the mission need or deployed at a time when it can best be absorbed by national security concerns. This paper addresses three major themes: (1) how cognitive science and business management benefits the government sector, (2) the current gaps that exist between cognitive science and business management, and (3) how cognitive science and business management may work to address government sector, national security needs.

More Details

Measuring Human Performance within Computer Security Incident Response Teams

McClain, Jonathan T.; Silva, Austin R.; Avina, Glory E.; Forsythe, James C.

Human performance has become a pertinent issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of personnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most organizations. As an alternative, the current research has focused on data collection during cyber security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college graduates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

More Details

A quantitative methodology for identifying attributes which contribute to performance for officers at the transportation security administration

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Avina, Glory E.; Kittinger, Robert; Speed, Ann S.

Performance at Transportation Security Administration (TSA) airport checkpoints must be consistently high to skillfully mitigate national security threats and incidents. To accomplish this, Transportation Security Officers (TSOs) must exceptionally perform in threat detection, interaction with passengers, and efficiency. It is difficult to measure the human attributes that contribute to high performing TSOs because cognitive ability such as memory, personality, and competence are inherently latent variables. Cognitive scientists at Sandia National Laboratories have developed a methodology that links TSOs’ cognitive ability to their performance. This paper discusses how the methodology was developed using a strict quantitative process, the strengths and weaknesses, as well as how this could be generalized to other non-TSA contexts. The scope of this project is to identify attributes that distinguished high and low TSO performance for the duties at the checkpoint that involved direct interaction with people going through the checkpoint.

More Details

Measuring expert and novice performance within computer security incident response teams

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Silva, Austin; Avina, Glory E.; McClain, Jonathan T.; Matzen, Laura E.; Forsythe, James C.

There is a great need for creating cohesive, expert cybersecurity incident response teams and training them effectively. This paper discusses new methodologies for measuring and understanding expert and novice differences within a cybersecurity environment to bolster training, selection, and teaming. This methodology for baselining and characterizing individuals and teams relies on relating eye tracking gaze patterns to psychological assessments, human-machine transaction monitoring, and electroencephalography data that are collected during participation in the game-based training platform Tracer FIRE. We discuss preliminary findings from two pilot studies using novice and professional teams.

More Details

Connecting the physical and psychosocial space to Sandia's mission

Avina, Glory E.; Silva, Austin R.

Sandia Labs has corporate, lab-wide efforts to enhance the research environment as well as improve physical space. However, these two efforts are usually done in isolation. The integration of physical space design with the nurturing of what we call psychosocial space can foster more efficient and effective creativity, innovation, collaboration, and performance. This paper presents a brief literature review on how academia and industry are studying the integration of physical and psychosocial space and focuses on the efforts that we, the authors, have made to improve the research environment in the Cyber Engineering Research Lab (CERL), home to Group 1460. Interviews with subject matter experts from Silicon Valley and the University of New Mexico plus changes to actual spaces in CERL provided us with six lessons learned when integrating physical and psychosocial space. We describe these six key takeaways in hopes that Sandia will see this area as an evolving research capability that Sandia can both contribute to and benefit from.

More Details
38 Results
38 Results