<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Representing and inferring mental workload via defeasible reasoning: a comparison with the NASA Task Load Index and the Workload Profile</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lucas Rizzo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca Longo</string-name>
          <email>luca.longo@dit.ie</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Computing, Dublin Institute of Technology</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>The ADAPT global centre of excellence for digital content and media innovation</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>The NASA Task Load Index (N ASA T LX) and the Workload Profile (W P ) are likely the most employed instruments for subjective mental workload (MWL) measurement. Numerous areas have made use of these methods for assessing human performance and thusly improving the design of systems and tasks. Unfortunately, MWL is still a vague concept, with different definitions and no universal measure. This research investigates the use of defeasible reasoning to represent and assess MWL. Reasoning is defeasible when a conclusion, supported by a set of premises, can be retracted in the light of new information. In this empirical study, this type of reasoning is considered for modelling MWL, given the intrinsic uncertainty involved in assessing it. In particular, it is shown how the N ASA T LX and the W P can be translated into defeasible structures whose inferences can achieve similar validity of the original instruments, even when less information is available. It is also discussed how these structures can have a higher extensibility and how their inferences are more self-explanatory than the ones produced by the N ASA T LX and W P .</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Mental Workload (MWL) is a nebulous concept with no precise and broadly accepted
characterization. An oversimplified explanation might define it as the amount of
required cognitive work devoted in a specific task with limited execution time.
However, other elements such as frustration, physical demand and stress might also impact
general mental workload. Several fields of application have adopted MWL, such as
psychology, ergonomics and human-computer interaction [
        <xref ref-type="bibr" rid="ref23 ref27 ref7 ref8">23,7,8,27</xref>
        ]. The aim of
measuring MWL is to predict operator and system performance [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Optimal workload has
several beneficial effects such as user satisfaction, productivity and safety [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Despite
these benefits, modeling MWL is a fragmented task. Often the information necessary
for modelling it is uncertain, vague and contradictory [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. State-of-the-art MWL
measurement techniques do not take into consideration the inconsistency of the data used in
modelling it, which might lead to contradictions and loss of information. For example,
on one hand, if the time spent on a certain task is low, it is reasonable to assume that the
overall MWL exerted on that task is also low. On the other hand, if the effort invested
in the task is extremely high, then the contrary (high MWL) can be inferred. This type
of reasoning is referred, in formal logics, as defeasible reasoning. A defeasible concept
is built upon a set of interactive pieces of evidence (the reasons) that can become
defeated by additional reasons [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The assumption here is that this kind of reasoning
can be successfully applied for modelling MWL, since it is formed by several pieces
of evidence that can be retracted in the light of new evidence. A computational
implementation of defeasible reasoning is provided by Argumentation Theory (AT) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. AT
is aimed at constructing arguments, determining conflicts between them and deciding
which ones are eventually acceptable. The research question under investigation is: can
a multi-layer argument-based framework, built upon argumentation theory, compared
to state-of-the-art MWL inference techniques, enhance the modelling of mental
workload according to validity? An empirical user study has been conducted in a third-level
teaching environment with students from a post-graduate level in Ireland. At the end of
a selection of teaching sessions, their MWL has been assessed using two well-known
subjective mental workload assessment techniques: the NASA Task Load Index and the
Workload Profile. These were used as baselines to evaluate a novel MWL model built
upon defeasible reasoning and computationally implemented with AT. The inferential
capacity of this model was subsequently compared against the one of the baselines in
terms of validity.
      </p>
      <p>The remainder of this paper is organised as follows: section 2 presents related work
on MWL, its assessment techniques and criteria for their evaluation. Subsection 2.3
discusses MWL and how it can be seen as a defeasible phenomenon. The design of
the experiment and the methodologies adopted are explained in section 3. Section 4
presents results while section 5 concludes the study and indicates possible future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related work</title>
      <p>
        MWL is intrinsically complex and multifaceted [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] with no broadly accepted
definition. According to Cain [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] it could be intuitively defined as the total amount of
cognitive load necessary to perform a specific task under a limited extent of time. Measuring
MWL is fundamental in predicting human performance and thusly advising the design
of interfaces, information-based procedures and technologies [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. There are
distinctive methods that have been proposed for measuring MWL [
        <xref ref-type="bibr" rid="ref16 ref21 ref5">5,21,16</xref>
        ]. This paper adopts
the class of subjective measures. hhis class depends on the investigation of the
subjective feedback produced by humans interacting with an underlying task and system. The
feedback through surveys or questionnaires is often post-task. The most notable are the
N ASA T LX [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the Workload profile [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], and the Subjective Workload Assessment
Technique [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Other classes of measurement include task performance measures and
physiological measures. The first is regularly alluded to as primary and/or secondary
tasks measures and it concentrates on the estimation of the objective performance
accomplished by humans during the execution of an underlying assignment. Reaction
time to secondary tasks, number of errors, actions performed during the primary task
and task completion time are examples of performance measures; the second class is
based upon the investigation of physiological indicators and responses of the human
body. A few cases incorporate EEG (electroencephalogram), eye tracking and heart
rate measures.
2.1
      </p>
      <sec id="sec-2-1">
        <title>Criteria for development of MWL measurement methods</title>
        <p>
          Several criteria have been proposed for the selection and development of measurement
techniques [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Since the goal of this study is to investigate the ability of defeasible
reasoning, through AT, to represent and assess MWL, the focus is on one specific criteria
namely validity. In general, it is used to determine whether the measurement instrument
is actually measuring MWL. Two forms are usually employed in Psychology.
– face validity: it is the extent to which a certain test is subjectively perceived by
subjects as covering the concept it purports to measure. In other words, if the workload
subjectively reported appears to be valid to participants of the experiment.
– convergent validity: it demonstrates the extend to which different MWL techniques
correlate to each other [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
        </p>
        <p>
          In literature, face and convergent validity are generally calculated adopting statistical
correlation coefficients [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ].
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>The NASA-Task Load Index and the Workload Profile</title>
        <p>
          This study makes use of two subjective measures of mental workload that have been
broadly utilized in many research studies in the most recent decades: the NASA-Task
Load Index (N ASA T LX) [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and the the Workload Profile (W P ) [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. The first was
initially created in the field of aviation [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and has been utilized over an extensive range
of applications, including transportation, cognitive psychology and human-computer
interaction [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. It is a combination of six factors believed to influence mental workload:
mental, temporal and physical demand, frustration, effort and performance (table 8 in
the appendices). Each factor is evaluated with a subjective judgment combined with a
weight w calculated via a paired comparison procedure. Subjects are required to
decide, for each possible pair (binomial coefficient of the 6 factors 26 = 15), ‘which of
the two contributed the most to mental workload during the task’, such as ‘Frustration
or Effort?’, ‘Performance or Temporal Demand?’, and so forth. The weights w are the
number of preferences, for each dimension, in the 15 answer set (the number of times
that each dimension was chosen). For this situation, the range is from 0 (not
significant) to 5 (more significant than any other attribute). Ultimately, the final MWL score is
calculated as a weighted average, considering the subjective rating of each attribute di
(for the 6 dimensions) and the correspondent weights wi (eq. 1). Another MWL
assessment technique is the Workload Profile which is based on the Multiple Resource Theory
(MRT) [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. In contrast to the N ASA T LX, it is built upon 8 dimensions: context
bias, speech response, manual response, auditory resources, visual resources, task and
space, verbal material and selection of response (table 9). The user is requested to rate
the extent of attentional resources, in the range 0 to 1, for each dimension which are in
turn summed (eq. 2).
        </p>
        <p>TLXMWL =</p>
        <p>6
X di</p>
        <p>1
wi 15
(1)</p>
        <p>8
X di
i=1
WPMWL =
(2)
2.3</p>
      </sec>
      <sec id="sec-2-3">
        <title>Mental Workload as a defeasible phenomenon</title>
        <p>
          Different studies suggest that mental workload is supposedly formed by inconsistent
pieces of evidence supporting contradictory levels of MWL which are retractable in
the light of new information [
          <xref ref-type="bibr" rid="ref10 ref12">10,12</xref>
          ]. For example, taking into account some of the
N ASA T LX attributes (table 8) the following arguments could be shaped:
– If user has reported high effort then perceived MWL is believed to be high
– If user has reported low mental demand then perceived MWL is believed to be low
        </p>
        <p>
          Since there are different levels of MWL which can be inferred (low, high), a
workload designer might be uncertain about the best assessment, unless there is some sort
of preference helping the reasoning process. However, preferentiality might not be the
most appropriate technique to settle the dispute. For instance, high effort could be
acknowledged as inconsistent in a scenario in which the user has also reported low
mental demand. State-of-the-art MWL inference techniques do not provide the possibility
to consider such cases. Inconsistent pieces of evidence are aggregated together which
might lead to contradictions and loss of information. Here it is argued that defeasible
reasoning might have an important role in improving the representation and inference
of MWL when compared to the N ASA T LX and the W P instruments. AT is a
computational approach to model defeasible reasoning, including activities such as
formalisation of arguments, counterarguments, preferences and conflict resolution strategies
[
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. These activities, emerged in the literature, can be clustered in a 5 layer schema
[
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] as depicted in figure 1.
        </p>
        <sec id="sec-2-3-1">
          <title>1) structure of arguments</title>
        </sec>
        <sec id="sec-2-3-2">
          <title>2) conflicts of arguments</title>
        </sec>
        <sec id="sec-2-3-3">
          <title>Translation of</title>
          <p>knowledge-base
into interactive
defeasible arguments
Elicitation of
knowledge-base &amp;
resolution of
inconsistencies</p>
        </sec>
        <sec id="sec-2-3-4">
          <title>3) evaluation of conflicts</title>
        </sec>
        <sec id="sec-2-3-5">
          <title>4) dialectical status of arguments</title>
        </sec>
        <sec id="sec-2-3-6">
          <title>Final inference</title>
        </sec>
        <sec id="sec-2-3-7">
          <title>5) accrual of acceptable arguments</title>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>Layer 1 - Definition of the structure of arguments. The knowledge-base of a designer</title>
        <p>in relation to MWL can be initially represented as a set of forecast arguments like:</p>
        <p>Argument : premises ! conclusion</p>
        <p>This is a structure composed by a set of premises related to a given workload
attribute and a conclusion derivable by applying an inference rule !. A set of premises
represents a set of reasons to believe that mental workload is likely to fall within a
certain region (example low or high). In this research study, these regions are treated as
conclusions of reasoning arguments and their ranges have been established as below:
– U : underload [0::32] 2 &lt;
– F : fitting lower load [33::49] 2 &lt;
– F +: fitting upper load [50::66] 2 &lt;
– O: overload [67::100] 2 &lt;</p>
        <p>
          Some arguments proposed to model mental workload along with their activation
ranges are listed in table 1. In this case only the information available in the original
NASA Task Load Index instrument is taken. Note that this is just a possible list of
arguments but other definitions are possible. It is important to highlight that, as designers,
we don’t feel physical load should be considered as a dimension in the inference, thus
it is not taken into consideration.
MD1: [ mental demand 2 [0, 32] ! U]
MD2: [ mental demand 2 [33, 49] ! F ]
MD3: [ mental demand 2 [50, 66] ! F+]
MD4: [ mental demand 2 [67, 100] ! O]
TD1: [ temporal demand 2 [0, 32] ! U]
TD2: [ temporal demand 2 [33, 49] ! F ]
TD3: [ temporal demand 2 [50, 66] ! F+]
TD4: [ temporal demand 2 [67, 100] ! O]
PF1: [ performance 2 [32, 0] ! O]
PF2: [ performance 2 [49, 33] ! F+]
PF3: [ performance 2 [66, 50] ! F ]
PF4: [ performance 2 [100, 67] ! U]
EF1: [ effort 2 [0, 32] ! U]
EF2: [ effort 2 [33, 49] ! F ]
EF3: [ effort 2 [50, 66] ! F+]
EF4: [ effort 2 [67, 100] ! O]
FR1: [ frustration 2 [0, 32] ! U]
FR2: [ frustration 2 [67, 100] ! O]
Layer 2 - Definition of the conflicts of arguments: The previous monological
structure (forecast arguments, layer 1, section 3), aimed at internally representing an
argument, is complemented by dialogical structures, which are focused on the relationships
among arguments. A dialogical structure investigates the issue of invalid arguments that
appear to be valid (fallacious arguments). According to [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], this type of argument can
be referred to as mitigating argument. It is an undermining inference ) that links a set
or premises to an argument B, negating its validity.
        </p>
        <p>Argument : premises ) B</p>
        <p>The notion of mitigating argument allows a designer to model possible conflicts
between arguments. Conflict, often known as attack or counterargument, is an
important notion in defeasible reasoning. Here, two types of conflicts are defined: rebutting
and undercutting. A rebutting attack occurs when a forecast argument negates the
conclusions of another argument. A rebuttal attack is symmetrical so it holds that if an
argument A rebuts B (,), then also B rebuts A. This type of attack models special
scenarios that are believed to be logically improbable. Table 2 lists the rebutting attacks
proposed in this study, that occur between the forecast arguments defined in table 1.</p>
        <p>
          An undercutting attack occurs when the target argument uses a defeasible (tentative)
inference rule, thus it can be attacked on its inference by arguing that there is a special
case that does not allow the application of the defeasible inference rule [
          <xref ref-type="bibr" rid="ref18 ref19">18,19</xref>
          ]. In
contrast to rebutting, an undercutting attack does not negate the conclusion of its target
argument, rather it argues that the target’s conclusions is not supported by its premises
and, as a consequence, cannot be drawn. Table 3 lists undercutting attacks developed
using the forecast arguments in table 1.
U1: [perform. 2 [67, 100] ) FR2] U2: [perform. 2 [0, 32] ) FR1]
U3a: [effort 2 [67, 100] &amp; perform. 2 [0, 32] U4a: [effort 2 [0, 32] &amp; perform. 2 [67, 100]
) MD1] ) MD4]
U3b: [effort 2 [67, 100] &amp; perform. 2 [0, 32] U4b: [effort 2 [0, 32] &amp; perform. 2 [67, 100]
) TD1] ) TD4]
        </p>
        <p>
          The set of arguments, forecast and mitigating (nodes) as well as the set of attacks,
rebutting and undercutting (links) can be seen as a graph, now on referred to as
argumentation framework. This represents a knowledge-base of a designer that can be now
elicited for assessing mental workload. Fig. 2 illustrates an argumentation framework
using the arguments in tables 1, 2 and 3.
Layer 3 - evaluation of the conflicts of arguments: Once the knowledge-base of a
designer is formally translated into an argumentation framework, it can be now elicited
with inputs provided by human subjects. These inputs activate some of the arguments
in the argumentation framework, discarding others. For example, if a human subject
rated the mental demand question of table 8 with a value of 80, then argument M D4 is
activated, while arguments M D1; M D2 and M D3 are discarded. Based on the inputs
gathered from the original N ASA T LX questionnaire (table 8), a sub-argumentation
framework emerges, that can be evaluated against inconsistencies and used to compute
the dialectical status of each argument. It is important to highlight that in this study
all types of attacks assume a form of a binary relation between two arguments. Once
the arguments of an attack are activated, the attack is automatically considered valid.
However, in other domains it is possible that the evaluation of attacks are made through
the preferentiality of arguments or strength of arguments, or through the preferentiality
of attacks or strength of an attack relation [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          Layer 4 - definition of the dialectical status of arguments: In order to investigate the
potential inconsistencies that might emerge from the interaction of activated arguments
(sub-argumentation framework emerged in layer 3), Dung-style acceptability semantics
are applied [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. The underlying idea is that, given a set of arguments, where some of
them defeat (attack) others, a decision is to be taken to determine which arguments
can ultimately be accepted. Merely looking at an argument’s defeaters to determine
the acceptability status of an argument is not enough: it is also important to determine
whether the defeaters are defeated themselves. An argument B defeats argument A if
and only if B is a reason against A. If the internal structure of arguments and the reasons
why they defeat each other are not considered, an abstract argumentation framework
(AAF ) emerges [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. An AAF is a pair &lt; Arg; attacks &gt; where:
– Arg is a finite set of (abstract) arguments,
– attacks Arg Arg is binary relation over Arg.
        </p>
        <p>
          Given sets X; Y Arg of arguments, X attacks Y if and only if there exists x 2 X
and y 2 Y such that (x; y) 2 attacks. The question is which arguments should
ultimately be accepted and a formal criterion that determines it is needed. In the literature,
this criterion is known as semantics: given an AAF, it specifies zero or more sets of
acceptable arguments, called extensions. Various argument-based semantics have been
proposed [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], but here the focus is on the preferred and grounded semantics proposed
in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. A set X Arg of argument is
– admissible iff X does not attack itself and X attacks every set of arguments Y such
that Y attacks X ;
– complete iff X is admissible and X contains all arguments it defends, where X
defends x if and only if X attacks all attacks agains x;
– grounded iff X is minimally complete (with respect to );
– preferred iff X is maximally admissible (respect to )
        </p>
        <p>Grounded semantics always produce an unique extension, while preferred
semantics can produce one or more extensions (conflict free set of arguments). In case just
one extension is produced, this coincides with the grounded extension. However, in
case multiple extensions are computed, a quantification of the credibility of each
extension is needed. Here it is argued that the cardinality of an extension is an important
factor: intuitively, an extension with a higher cardinality can be seen as more credible
than extensions with lower cardinality as it contains more pieces of evidence that are
consistent with each other. Figure 2 illustrates examples of grounded and preferred
extensions emerged from layer 4 for a user who has answered the questions of the original
N ASA T LX (table 8).</p>
      </sec>
      <sec id="sec-2-5">
        <title>Layer 5 - Accrual of acceptable arguments and computation of MWL: Given a set</title>
        <p>of extensions, the final step is to infer an index of mental workload. As defined before,
(a) Sub-argumentation framework (activated)
(b) Computed grounded extension
(c) Computed preferred extension 1
(d) Computed preferred extension 2
Fig. 3: Example of different extensions generated by the same input. White nodes have
no status, quarter filled nodes are activated ,half filled nodes are accepted and X-nodes
are rejected. Hypothetical set of input values: Mental demand: 77, Temporal demand:
53, Effort: 74, Performance: 81, Frustration: 23, Physical demand: not considered.
two typologies of arguments have been formalised: forecast and mitigating. A preferred
or grounded extension can contain both types. However, just forecast arguments
support a conclusion (workload level) that can be considered for the final inference of a
single index of mental workload. The value v of a forecast argument is essentially a
linear relationship from the range of the argument’s premise to the range of the
argument’s conclusion3. Finally, mitigating arguments already played their role (through
their attacks against other arguments), contributing to the computation of the acceptable
extensions. Therefore, for each forecast argument in an extension, a value is computed
and the final MWL index is given by the aggregation of these figures. This aggregation
might be done in different ways, according to the designer’s choice. For instance, one
possible way is to calculate the average, however, other domains might require different
calculations like the median, the weighted average or the sum. This study investigates
the use of different accrual strategies: the average, the weighted average and the median
of values v. For the weighted average, weights are the number of times the attribute
on the premise of a forecast argument was chosen in the N ASA T LX pairwise
comparison process.
3.1</p>
      </sec>
      <sec id="sec-2-6">
        <title>Knowledge bases</title>
        <p>While figure 2 presents a possible translation of the N ASA T LX into an
argumentation framework, other translations can be designed. A second argumentation framework
3 For instance if argument MD1 is activated, with reported mental demand equal 32, then
vMD1 = 32, while if PF1 is activated, with reported performance equal 0, then vP F 1 = 100.
using the N ASA T LX attributes is suggested. In this case, it takes into
consideration the paired comparison procedure, as part of the original N ASA T LX instrument
(section 2.2), to produce 14 new undercutting attacks listed in table 4 and depicted in
figure 4.
U5: [FrustrationOrEffort = effort &amp; effort 2 [0, 32] &amp; frustration 2 [67, 100] ) FR2]
U6: [FrustrationOrEffort = frustration &amp; effort 2 [0, 32] &amp; frustration 2 [67, 100] ) EF1]
U7: [MentalOrEffort = effort &amp; effort 2 [0, 32] &amp; mental demand 2 [67, 100] ) MD4]
U8: [MentalOrEffort = mental demand &amp; effort 2 [0, 32] &amp; mental demand 2 [67, 100] ) EF1]
U9: [FrustrationOrEffort = effort &amp; effort 2 [67, 100] &amp; frustration 2 [0, 32] ) FR1]
U10: [FrustrationOrEffort = frustration &amp; effort 2 [67, 100] &amp; frustration 2 [0, 32] ) EF4]
U11: [TempOrFrustration = frustration &amp; temporal 2 [67, 100] &amp; frustration 2 [0, 32] ) TD4]
U12: [TempOrFrustration = temporal &amp; temporal 2 [67, 100] &amp; frustration 2 [0, 32] ) FR1]
U13: [FrustrationOrMental = frustration &amp; frustration 2 [0, 32] &amp; mental 2 [67, 100] ) MD4]
U14: [FrustrationOrMental = mental &amp; frustration 2 [0, 32] &amp; mental 2 [67, 100] ) FR1]
U15: [TempOrFrustration = frustration &amp; temporal 2 [0, 32] &amp; frustration 2 [67, 100] ) TD1]
U16: [TempOrFrustration = temporal &amp; temporal 2 [0, 32] &amp; frustration 2 [67, 100] ) FR2]
U17: [FrustrationOrMental = frustration &amp; frustration 2 [67, 100] &amp; mental 2 [0, 32] ) MD1]
U18: [FrustrationOrMental = mental &amp; frustration 2 [67, 100] &amp; mental 2 [0, 32] ) FR2]</p>
        <p>Finally, a third argumentation framework is also proposed using only the W P
attributes (table 9). The nature of these attributes is more self-sufficient (in contrast with
the N ASA T LX attributes). In this case only forecast arguments are designed (table
5 and graphical representation in figure 5). The reason to propose this knowledge-base
is to demonstrate that the 5-layer schema described in section 3, can be used even in the
absence of conflicting arguments. While one of the biggest advantages of the system
is lost, it remains the possibility to update the knowledge-base with new attributes and
arguments or carry out the accrual of accepted arguments in different fashions.
Different knowledge-bases, computational semantics and accrual strategies were
employed in this study, making use of the 5-layer schema of section 3 . Four different
configurations were created, as listed in table 6.</p>
        <p>Using the N ASA T LX and the W P subjective scales, the mental workload
experienced by master and PhD students in different teaching sessions was measured
and their attributes used to elicit models described in table 6. Three different topics
of the module “research methods” in the school of computing, at Dublin Institute of
Technology, were evaluated in different semesters during the period 2015-2017. These
topics were: ‘Science’, ‘The Scientific method’, ‘Research planning’ and ‘Literature
review’. Three delivery methods were used across different teaching sessions:
– A) a one-way traditional lecture delivered by means of slides.
– B) a one-way multimedia lecture delivered by means of videos.
– C) a one-way multimedia lecture (B) followed by a collaborative activity where
students had printed handouts of viewed content (A).</p>
        <p>
          The number of students of each task can be seen in table 7. The average time for
the ‘Science’ lectures for each delivery method were: (A) 61 minutes, (B) 18 minutes
(exact time) and (C) 58 minutes. Following that the average time for ‘The Scientific
method’, ‘Research planning’ and ‘Literature review’ lectures were respectively: (A)
46, 54 and 64 minutes, (B) 28, 11 and 19 minutes (exact times), (C) 50, 79, and 77
minutes. The students were from 16 different nationalities and their age was in the range
[
          <xref ref-type="bibr" rid="ref22">22, 74</xref>
          ] (average 33.7 and standard deviation of 7.3 years). Students were asked to fill in
questionnaires associated to the two mental workload assessment instruments: the Nasa
Task Load Index (N ASA T LX) and the Workload Profile (W P ). Each questionnaire
had also a scale in the range [0::100] 2 @ in which the student had to inform what, in his
opinion, was the MWL imposed by the task (table 10 in the appendices). The dataset had
missing values for individual columns of the pairwise variables in the N ASA T LX
measurement. Data imputation was used to estimate the missing values. The imputation
method used logistic regression, in line with other studies [
          <xref ref-type="bibr" rid="ref2 ref25">2,25</xref>
          ].
Collected answers from the questionnaire of the two MWL instruments (tables 8 and
9) were used to elicit the argumentation frameworks of each designed model (table 6).
The distributions of the MWL scores produced by defeasible models were correlated
against the ones produced by the N ASA T LX and the W P to test their convergent
validity (definition in section 2.1). Additionally, the MWL indexes produced by the
designed defeasible models and the two baseline models were correlated against the
self-reported MWL scores (table 10), to test face validity (definition in section 2.1).
Self-report scores are referred to as SR-MWL. In order to select the most appropriate
correlation statistic, a test of the normality of the MWL indexes distributions generated
by all models and self-reported scores, was performed using the Shapiro-Wilk test. The
significance was reported as following: N 1 3, W P and N ASA T LX &gt; 0:05,
W 1 and SR M W L &lt; 0:01. This indicates that Spearman should be applied for
correlations of W 1 and SR M W L scores, while Pearson should be applied for the
others. Results are depicted in figure 6.
In line with other studies [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] face validity was assessed using correlation coefficients.
From figure 6 it is possible to observe that the baseline instruments (N ASA T LX,
W P ), presented a moderated correlation with the SR M W L scores, 0:46 and 0:412
respectively. The results for the designed defeasible models (N 1 N 3, W 1) are similar,
indicating that the inferential capacity of these is approximately the same of the
stateof-the-art MWL measurement techniques. Finally, it is important to highlight the small
0:8
n
tio0:6
a
l
e
rro0:4
C
0:2
0
improvement of model N 3 when compared to N 1 and N 2. It demonstrates the positive
effect of including additional information provided by the paired comparison procedure,
as done in layers 2 (new undercutting attacks) and 5 (weights to arguments).
According to definition in section 2.1, convergent validity is aimed at demonstrating
whether a model correlates with other models of MWL. From figure 6 it is possible to
observe that the defeasible models N 1 3 achieved a moderate to high correlation with
N ASA T LX (correlation coefficient between 0:53 and 0:65), with the highest one
achieved by N 3. Since N 3 make use of additional information provided by the paired
comparison procedure a higher correlation with N ASA T LX was expected. As for
W P and W 1 it is possible to observe an extremely high correlation (0.94 coefficient),
indicating that the only difference between the two techniques (in the accrual stage,
layer 5) did not had significant impact on the MWL assessments.
Analysis of face validity indicates that the generated inferences, by defeasible models
(N 1 N 3), are in line with the subjective interpretation of MWL by respondents.
Differences between models N 1 and N 2 point out preferred semantics as more relevant
for the definition of the dialectical status of arguments in contrast with the grounded
semantics. Preferred extensions take a credulous view on which arguments can be
accepted while grounded extensions provide a skeptical view. This difference illustrates
how the credulous view is more in line with the perceived MWL by participants of
the study, according to the correlation coefficients obtained for face validity. Defeasible
models also achieved a moderate-high correlation for convergent validity. It
demonstrates that defeasible reasoning was capable of assessing MWL even with the same or
less attributes than state-of-the-art MWL subjective measurement techniques. For
instance, models N 1 and N 2 make use of only 5 attributes, while N ASA T LX makes
use of 6 attributes plus 15 preferences among attributes. Furthermore, baseline
instruments are static and difficult to be updated. The N ASA T LX pair-wise comparison
indeed is a basic form of reasoning, giving importance to each considered attribute, but
it has problems in the case another dimension, believed to be useful for assessing MWL,
needs to be added. As for W P , it is a simple sum, so no form of reasoning is involved.
Certainly, it can be easily updated adding dimensions and summing all of them.
However, its defeasible counterpart can offer a reasoning chain that can be better described,
since it uses the language of arguments. This self-explanatory capacity is in line with
some of the appealing properties of AT as suggested in the literature [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Eventually,
the proposed 5-layer schema (section 3) allows the comparison of different
knowledgebases and it seems more appealing and dynamic when compared to fixed formulas used
within the N ASA T LX and the W P models.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusion and future work</title>
      <p>This research investigated the use of defeasible reasoning to represent and assess
mental workload (MWL). Two well-known subjective MWL assessment techniques, namely
the NASA Task Load Index and the Workload Profile, were selected as baseline
instruments. A formal 5-layer schema, as emerged in literature, has been used for reasoning
defeasibly. In details, defeasible models of MWL has been constructed fully or partially
using the information carried in the baseline instruments. A user study has been
conducted in an educational context to assess the mental workload imposed by different
teaching methods on students. Questionnaires were used to gather data from students,
which served as the input for the baseline and the defeasible models. In turn, the
inferences produced by these models were methodically compared against each other and
against a self reported MWL score provided by students. This comparison was aimed
at investigating the face validity and the convergent validity of generated inferences.
Findings suggest that defeasible reasoning is a promising avenue for the assessment
of MWL. It offers a similar or better inferential capacity than the baselines models,
even in the presence of partial information. It also allows the comparison of different
knowledge-bases of MWL designers, supporting MWL research. The 5-layer schema
support MWL practitioners to represent their knowledge and to perform inference under
uncertainty by using a language closer to the way they usually reason. Future work will
be focused on the replication of the approach adopted in this empirical study by
employing other knowledge-bases provided by other MWL designers. Different practical
domains will be considered in order to gauge the capability of discriminating significant
variations in MWL.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgments</title>
      <p>Lucas Middeldorf Rizzo acknowledges CNPq (Conselho Nacional de Desenvolvimento
Científico e Tecnológico) for his Science Without Borders scholarship n.232822/2014.0.</p>
    </sec>
    <sec id="sec-5">
      <title>Appendix</title>
      <sec id="sec-5-1">
        <title>Questionnaires</title>
        <p>Dimension
How much mental and perceptual activity was required (e.g. thinking, deciding, calculating,
remembering, looking, searching, etc.)? Was the task easy or demanding, simple or complex, exacting or
forgiving?
How much physical activity was required (e.g. pushing, pulling, turning, controlling, activating,
etc.)? Was the task easy or demanding, slow or brisk, slack or strenuous, restful or laborious?
How much time pressure did you feel due to the rate or pace at which the tasks or task elements
occurred? Was the pace slow and leisurely or rapid and frantic?
How hard did you have to work (mentally and physically) to accomplish your level of performance?
How successful do you think you were in accomplishing the goals, of the task set by the
experimenter (or yourself)? How satisfied were you with your performance in accomplishing these goals?
How insecure, discouraged, irritated, stressed and annoyed versus secure, gratified, content, relaxed
and complacent did you feel during the task?
How much attention was required for selecting the proper response channel and its execution?
(manual - keyboard/mouse, or speech - voice)
How much attention was required for spatial processing (spatially pay attention around you)?
How much attention was required for verbal material (eg. reading or processing linguistic material
or listening to verbal conversations)?
How much attention was required for executing the task based on the information visually received
(through eyes)?
How much attention was required for executing the task based on the information auditorily
received (ears)?
How much attention was required for manually respond to the task (eg. keyboard/mouse usage)?
How much attention was required for producing the speech response(eg. engaging in a conversation
or talk or answering questions)?
How much attention was required for activities like remembering, problem-solving,
decisionmaking and perceiving (eg. detecting, recognizing and identifying objects)?</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An introduction to argumentation semantics</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          <volume>26</volume>
          (
          <issue>4</issue>
          ),
          <fpage>365</fpage>
          -
          <lpage>410</lpage>
          (
          <year>November 2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Brand</surname>
          </string-name>
          , J.:
          <article-title>Development, implementation and evaluation of multiple imputation strategies for the statistical analysis of incomplete data sets</article-title>
          .
          <source>Ph.D. thesis</source>
          , University Rotterdam (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Cain</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A review of the mental workload literature</article-title>
          .
          <source>Tech. rep., Defence research and development Toronto (Canada)</source>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artificial intelligence</source>
          <volume>77</volume>
          (
          <issue>2</issue>
          ),
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Eggemeier</surname>
            ,
            <given-names>F.T.</given-names>
          </string-name>
          :
          <article-title>Properties of workload assessment techniques</article-title>
          .
          <source>Advances in Psychology 52</source>
          ,
          <fpage>41</fpage>
          -
          <lpage>62</lpage>
          (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>García</surname>
            ,
            <given-names>D.C.M.A.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.R.</given-names>
          </string-name>
          :
          <article-title>Strong and weak forms of abstract argument defense</article-title>
          .
          <source>Computational Models of Argument: Proceedings of COMMA 2008 172</source>
          ,
          <issue>216</issue>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Hart</surname>
            ,
            <given-names>S.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staveland</surname>
            ,
            <given-names>L.E.</given-names>
          </string-name>
          :
          <article-title>Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research</article-title>
          . Advances in Psychology 52(C),
          <volume>139</volume>
          -
          <fpage>183</fpage>
          (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Human-Computer Interaction and Human Mental Workload: Assessing Cognitive Engagement in the World Wide Web</article-title>
          , pp.
          <fpage>402</fpage>
          -
          <lpage>405</lpage>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Formalising human mental workload as non-monotonic concept for adaptive and personalised web-design</article-title>
          .
          <source>In: UMAP</source>
          , pp.
          <fpage>369</fpage>
          -
          <lpage>373</lpage>
          . Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A defeasible reasoning framework for human mental workload representation and assessment</article-title>
          .
          <source>Behaviour and Information Technology</source>
          <volume>34</volume>
          (
          <issue>8</issue>
          ),
          <fpage>758</fpage>
          -
          <lpage>786</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Mental workload in medicine: Foundations, applications, open problems, challenges and future perspectives</article-title>
          .
          <source>In: 2016 IEEE 29th International Symposium on ComputerBased Medical Systems (CBMS)</source>
          . pp.
          <fpage>106</fpage>
          -
          <lpage>111</lpage>
          (
          <year>June 2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Defeasible reasoning and argument-based systems in medical fields: An informal overview</article-title>
          .
          <source>In: Computer-Based Medical Systems (CBMS)</source>
          ,
          <year>2014</year>
          IEEE 27th International Symposium on. pp.
          <fpage>376</fpage>
          -
          <lpage>381</lpage>
          . IEEE (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>On the relationship between perception of usability and subjective mental workload of web interfaces</article-title>
          .
          <source>In: Web Intelligence and Intelligent Agent Technology (WI-IAT)</source>
          ,
          <source>2015 IEEE/WIC/ACM Int. Conf. on. vol. 1</source>
          , pp.
          <fpage>345</fpage>
          -
          <lpage>352</lpage>
          . IEEE (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hederman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Argumentation Theory for Decision Support in Health-Care: A Comparison with Machine Learning</article-title>
          , pp.
          <fpage>168</fpage>
          -
          <lpage>180</lpage>
          . Springer, Cham (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Matt</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morgem</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Combining statistics and arguments to compute trust</article-title>
          .
          <source>In: 9th International Conference on Autonomous Agents and Multiagent Systems</source>
          , Toronto, Canada. vol.
          <volume>1</volume>
          , pp.
          <fpage>209</fpage>
          -
          <lpage>216</lpage>
          . ACM (May
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Moustafa</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Assessment of Mental Workload: A Comparison of Machine Learning Methods and Subjective Assessment Techniques</article-title>
          , pp.
          <fpage>30</fpage>
          -
          <lpage>50</lpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>O</given-names>
            <surname>'Donnell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Eggemeier</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          :
          <article-title>Workload assessment methodology</article-title>
          .
          <source>Handbook of Perception and Human Performance</source>
          . Volume
          <volume>2</volume>
          .
          <string-name>
            <given-names>Cognitive</given-names>
            <surname>Processes</surname>
          </string-name>
          and
          <string-name>
            <given-names>Performance. KR</given-names>
            <surname>Boff</surname>
          </string-name>
          , L. Kaufman and JP Thomas. John Wiley and Sons, Inc (
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Pollock</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Knowledge and justification</article-title>
          . Princeton University press, Princeton (
          <year>1974</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Pollock</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Defeasible reasoning</article-title>
          .
          <source>Cognitive Science</source>
          <volume>11</volume>
          (
          <issue>4</issue>
          ),
          <fpage>481</fpage>
          -
          <lpage>518</lpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Reid</surname>
            ,
            <given-names>G.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nygren</surname>
            ,
            <given-names>T.E.</given-names>
          </string-name>
          :
          <article-title>The Subjective Workload Assessment Technique: A Scaling Procedure for Measuring Mental Workload</article-title>
          .
          <source>Adv. Psychol</source>
          . 52(C),
          <volume>185</volume>
          -
          <fpage>218</fpage>
          (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Rizzo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Delany</surname>
            ,
            <given-names>S.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Modeling Mental Workload Via RuleBased Expert System: A Comparison with NASA-TLX and Workload Profile</article-title>
          , pp.
          <fpage>215</fpage>
          -
          <lpage>229</lpage>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Rubio</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Díaz</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martín</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puente</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          :
          <article-title>Evaluation of subjective mental workload: A comparison of swat, nasa-tlx, and workload profile methods</article-title>
          .
          <source>Applied Psychology</source>
          <volume>53</volume>
          (
          <issue>1</issue>
          ),
          <fpage>61</fpage>
          -
          <lpage>86</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Tracy</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Albers</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          , Stc:
          <article-title>Measuring cognitive load to test the usability of web sites</article-title>
          .
          <source>STC's 53rd Annu. Conf. Proc. 2005</source>
          pp.
          <fpage>256</fpage>
          -
          <lpage>260</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Tsang</surname>
            ,
            <given-names>P.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Velazquez</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          :
          <article-title>Diagnosticity and multidimensional subjective workload ratings</article-title>
          .
          <source>Ergonomics</source>
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <fpage>358</fpage>
          -
          <lpage>381</lpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>White</surname>
            ,
            <given-names>I.R.</given-names>
          </string-name>
          , Daniel,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Royston</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>Avoiding bias due to perfect prediction in multiple imputation of incomplete categorical variables</article-title>
          .
          <source>Computational Statistics and Data Analysis</source>
          <volume>54</volume>
          (
          <issue>10</issue>
          ),
          <fpage>2267</fpage>
          -
          <lpage>2275</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Wickens</surname>
          </string-name>
          , C.D.:
          <article-title>Processing resources and attention</article-title>
          . Multiple-task performance pp.
          <fpage>3</fpage>
          -
          <lpage>34</lpage>
          (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Young</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stanton</surname>
            ,
            <given-names>N.A.</given-names>
          </string-name>
          :
          <article-title>Mental workload: theory, measurement, and application</article-title>
          . In: Karwowski,
          <string-name>
            <surname>W</surname>
          </string-name>
          . (ed.)
          <article-title>International encyclopedia of ergonomics and human factors</article-title>
          , vol.
          <volume>1</volume>
          , pp.
          <fpage>818</fpage>
          -
          <lpage>821</lpage>
          . Taylor &amp; Francis, 2nd edn. (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>