scholarly journals S2-4 Understanding Mental Models Using Fisher's Method of Quantification

2018 ◽  
Vol 54 (Supplement) ◽  
pp. S2-4-S2-4
Author(s):  
Ryota MORI
1992 ◽  
Vol 60 (1) ◽  
pp. 99 ◽  
Author(s):  
M. R. Osborne

2020 ◽  
Vol 222 (2) ◽  
pp. 1195-1212 ◽  
Author(s):  
Joshua Carmichael ◽  
Robert Nemzek ◽  
Neill Symons ◽  
Mike Begnaud

SUMMARY Natural and human-made sources of transient energy often emit multiple geophysical signatures that include mechanical and electromagnetic waveforms. We present a constructive method to fuse and evaluate statistics that we derive from such multiphysics waveforms that improves our capability to detect small, near-ground explosions over similar methods that consume single signature waveforms. Our method advances Fisher's Combined Probability Test (Fisher's Method) to operate under both hypotheses of a binary test on noisy data and provide researchers with the density functions required to forecast the ability of Fisher's Method to screen fused explosion signatures from noise. We apply this method against 12 d, multisignature explosion and noise records to show (1) that a fused multiphysics waveform statistic that combines radio, acoustic and seismic waveform data can identify explosions roughly 0.8 magnitude units lower than an acoustic emission, STA/LTA detector for the same detection probability and (2) that we can quantitatively predict how this fused, multiphysics statistic performs with Fisher's Method. Our work thereby offers a baseline method for predictive waveform fusion that supports multiphenomenological explosion monitoring (multiPEM) and is applicable to any binary testing problem in observational geophysics.


2014 ◽  
Vol 6 (2) ◽  
pp. 154-162 ◽  
Author(s):  
Volha Tryputsen ◽  
Javier Cabrera ◽  
An De Bondt ◽  
Dhammika Amaratunga

PeerJ ◽  
2017 ◽  
Vol 5 ◽  
pp. e3068 ◽  
Author(s):  
Chris H.J. Hartgerink

Head et al. (2015) provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking). This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the distribution of reported p-values shows systematically more reported p-values for .01, .02, .03, .04, and .05 than p-values reported to three decimal places, due to apparent tendencies to round p-values to two decimal places. Head et al. (2015) correctly argue that an aggregate p-value distribution could show a bump below .05 when left-skew p-hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p-values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher’s method .04 < p < .05 and reanalyzed the data by adjusting the bin selection to .03875 < p ≤ .04 versus .04875 < p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p-hacking remains when we look at the entire range between .04 < p < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p-values. Moreover, inspecting the bins that include two-decimal reported p-values potentially increases sensitivity if strategic rounding down of p-values as a form of p-hacking is widespread. Given the far-reaching implications of supposed widespread p-hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p-hacking is found in this reanalysis, this does not mean that there is no p-hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p-hacking is ambiguous at best.


1991 ◽  
Vol 33 (3) ◽  
pp. 339-345 ◽  
Author(s):  
R. C. Elston

Sign in / Sign up

Export Citation Format

Share Document