23 research outputs found
Recommended from our members
Eye movement pattern in face recognition is associated with cognitive decline in the elderly
Conference Theme: Mind, Technology, and SocietyThe present study investigated the relationship between eye movement pattern in face recognition and cognitive perform-ance during natural aging through modeling and comparing eye movement of young (18-24 years) and older (65-81 years) adults using Hidden Markov Model (HMM) based approach. Young adults recognized faces better than older adults, particularly when measured by the false alarm rate. Older adults’ recognition performance, on the other hand, correlated with their cognitive status assessed by the Montreal Cognitive Assessment (MoCA). Eye movement analysis with HMM revealed two different strategies, namely “analytic” and “holistic”. Participants using the analytic strategy had better recognition performance (particularly in the false alarm rate) than those using the holistic strategy. Significantly more young adults adopted the analytic strategy; whereas more older adults adopted the holistic strategy. Interestingly, older adults with lower cognitive status were associated with higher likelihood of using the holistic strategy. These results suggest an association between holistic eye movement patterns and cognitive decline in the elderly.postprin
Recommended from our members
Understanding eye movements in face recognition with hidden Markov model
Fulltext in: http://mindmodeling.org/cogsci2013/papers/0085/paper0085.pdfIn this paper we propose a hidden Markov model (HMM)-based method to analyze eye movement data. We conducted a simple face recognition task and recorded eye movements and performance of the participants. We used a variational Bayesian framework for Gaussian mixture models to estimate the distribution of fixation locations and modelled the fixation and transition data using HMMs. We showed that using HMMs, we can describe individuals’ eye movement strategies with both fixation locations and transition probabilities. By clustering these HMMs, we found that the strategies can be categorized into two subgroups; one was more holistic and the other was more analytical. Furthermore, we found that correct and wrong recognitions were associated with distinctive eye movement strategies. The difference between these strategies lied in their transition probabilities
Scanning Signatures: A Graph Theoretical Model to Represent Visual Scanning Processes and A Proof of Concept Study in Biology Education
In this article we discuss, as a proof of concept, how a network model can be used to analyse gaze tracking data coming from a preliminary experiment carried out in a biodiversity education research project. We discuss the network model, a simple directed graph, used to represent the gaze tracking data in a way that is meaningful for the study of students’ biodiversity observations. Our network model can be thought of as a scanning signature of how a subject visually scans a scene. We provide a couple of examples of how it can be used to investigate the personal identification processes of a biologist and non-biologist when they are carrying out a task concerning the observation of species-specific characteristics of two bird species in the context of biology education research. We suggest that a scanning signature can be effectively used to compare the competencies of different persons and groups of people when they are making observations on specific areas of interests
Scanning Signatures: A Graph Theoretical Model to Represent Visual Scanning Processes and A Proof of Concept Study in Biology Education
In this article we discuss, as a proof of concept, how a network model can be used to analyse gaze tracking data coming from a preliminary experiment carried out in a biodiversity education research project. We discuss the network model, a simple directed graph, used to represent the gaze tracking data in a way that is meaningful for the study of students’ biodiversity observations. Our network model can be thought of as a scanning signature of how a subject visually scans a scene. We provide a couple of examples of how it can be used to investigate the personal identification processes of a biologist and non-biologist when they are carrying out a task concerning the observation of species-specific characteristics of two bird species in the context of biology education research. We suggest that a scanning signature can be effectively used to compare the competencies of different persons and groups of people when they are making observations on specific areas of interests
Patterns in Eyetracking Scanpaths and the Affecting Factors
Web pages are typically decorated with different kinds of visual elements that help sighted people complete their tasks. Unfortunately, people accessing web pages in constrained environments, such as visually disabled and small screen device users, cannot benefit from them. In our previous work, we show that tracking the eye movements of sighted users provide good understanding of how people use these visual elements. We also show that reengineering web pages by using these visual elements can improve people's experience in constrainted environments. However, in order to reengineering web pages based on eyetracking, we first need to aggregate, analyse and understand how a group of people's eyetracking data can be combined to create a common scanpath (namely, eye movement sequence) in terms of visual elements. This paper presents an algorithm that aims to achieve this. This algorithm was developed iteratively and experimentally evaluated with an eyetracking study. This study shows that the proposed algorithm is able to identify patterns in eyetracking scanpaths and it can work well with different number of participants. We then extended our experiments to investigate the effects of the task, gender and familiarity factors on common scanpaths. The results suggest that these factors can cause some differences in common scanpaths. This study also suggests that this algorithm can be improved by considering different techniques for preprocessing the data, by addressing the drawbacks of using the hierarchical structure and by taking into account the underlying cognitive processes