{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T12:37:39Z","timestamp":1763987859525},"reference-count":57,"publisher":"Cambridge University Press (CUP)","issue":"1","license":[{"start":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T00:00:00Z","timestamp":1522713600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AIEDAM"],"published-print":{"date-parts":[[2019,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Design protocol data analysis methods form a well-known set of techniques used by design researchers to further understand the conceptual design process. Verbal protocols are a popular technique used to analyze design activities. However, verbal protocols are known to have some limitations. A recurring problem in design protocol analysis is to segment and code protocol data into logical and semantic units. This is usually a manual step and little work has been done on fully automated segmentation techniques. Physiological signals such as electroencephalograms (EEG) can provide assistance in solving this problem. Such problems are typical inverse problems that occur in the line of research. A thought process needs to be reconstructed from its output, an EEG signal. We propose an EEG-based method for design protocol coding and segmentation. We provide experimental validation of our methods and compare manual segmentation by domain experts to algorithmic segmentation using EEG. The best performing automated segmentation method (when manual segmentation is the baseline) is found to have an average deviation from manual segmentations of 2 s. Furthermore, EEG-based segmentation can identify cognitive structures that simple observation of design protocols cannot. EEG-based segmentation does not replace complex domain expert segmentation but rather complements it. Techniques such as verbal protocols are known to fail in some circumstances. EEG-based segmentation has the added feature that it is fully automated and can be readily integrated in engineering systems and subsystems. It is effectively a window into the mind.<\/jats:p>","DOI":"10.1017\/s0890060417000622","type":"journal-article","created":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T05:08:07Z","timestamp":1522732087000},"page":"11-23","source":"Crossref","is-referenced-by-count":22,"title":["Segmentation of design protocol using EEG"],"prefix":"10.1017","volume":"33","author":[{"given":"Philon","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Thanh An","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"56","published-online":{"date-parts":[[2018,4,3]]},"reference":[{"key":"S0890060417000622_ref1","first-page":"119","volume-title":"About: Designing-Analysing Design Meetings","author":"Akin","year":"2009"},{"key":"S0890060417000622_ref48","first-page":"361","volume-title":"About: Designing \u2013 Analysing Design Meetings","author":"Stacey","year":"2009"},{"key":"S0890060417000622_ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.intell.2015.01.012"},{"key":"S0890060417000622_ref9","first-page":"119","volume-title":"About: Designing \u2013 Analysing Design Meetings","author":"Dong","year":"2009"},{"key":"S0890060417000622_ref26","doi-asserted-by":"publisher","DOI":"10.1006\/nimg.2002.1070"},{"key":"S0890060417000622_ref6","first-page":"1","volume-title":"Analyzing Design Activity","author":"Cross","year":"1996"},{"key":"S0890060417000622_ref5","doi-asserted-by":"crossref","unstructured":"Chiu I and Shu LH (2010) Potential limitations of verbal protocols in design experiments. In Proceedings of ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference (DTM).","DOI":"10.1115\/DETC2010-28675"},{"key":"S0890060417000622_ref19","doi-asserted-by":"publisher","DOI":"10.2307\/357589"},{"key":"S0890060417000622_ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF01580065"},{"key":"S0890060417000622_ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11412-007-9034-0"},{"key":"S0890060417000622_ref53","unstructured":"V\u00f6lker J , Hitzler P and Cimiano P (2012) Acquisition of owl dl axioms from lexical resources. In Proceedings of the 4th European conference on The Semantic Web, pp. 670\u2013685."},{"key":"S0890060417000622_ref7","first-page":"101","volume-title":"About: Designing \u2013 Analyzing Design Meetings","author":"Dantec","year":"2009"},{"key":"S0890060417000622_ref11","volume-title":"Protocol Analysis: Verbal Reports as Data","author":"Ericsson","year":"1984"},{"key":"S0890060417000622_ref49","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-694X(97)00008-2"},{"key":"S0890060417000622_ref45","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.122.2.166"},{"key":"S0890060417000622_ref41","doi-asserted-by":"publisher","DOI":"10.1109\/10.391164"},{"key":"S0890060417000622_ref13","volume-title":"Brain States Analysis for Direct Brain-computer Communication","author":"Freudiger","year":"2003"},{"key":"S0890060417000622_ref35","unstructured":"NASA (1986) Nasa Task Load Index (TLX) v. 1.0 Manual."},{"key":"S0890060417000622_ref15","first-page":"26","article-title":"Design prototypes: a knowledge representation schema for design","volume":"11","author":"Gero","year":"1990","journal-title":"AI Magazine"},{"key":"S0890060417000622_ref22","volume-title":"Attention and Effort","author":"Kahneman","year":"1973"},{"key":"S0890060417000622_ref27","doi-asserted-by":"publisher","DOI":"10.2307\/1423365"},{"key":"S0890060417000622_ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-016-1196-z"},{"key":"S0890060417000622_ref47","doi-asserted-by":"publisher","DOI":"10.1177\/0741088389006004003"},{"key":"S0890060417000622_ref4","first-page":"113","volume-title":"Brain-Computer Interfaces: Revolutionizing Human-Computer Interaction","author":"Blankertz","year":"2010"},{"key":"S0890060417000622_ref12","first-page":"1608","article-title":"Verbal vulnerability of perceptual expertise","volume":"21","author":"Fallshore","year":"1993","journal-title":"Journal of Experimental Psychology: Learning, Memory and Cognition"},{"key":"S0890060417000622_ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jneumeth.2003.10.009"},{"key":"S0890060417000622_ref50","unstructured":"Tang Y and Zeng Y (2009) Quantifying designer's mental stress in the conceptual design process using kinesics study. In Proceedings of the 17th international conference on engineering design."},{"key":"S0890060417000622_ref58","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511596889"},{"key":"S0890060417000622_ref17","doi-asserted-by":"publisher","DOI":"10.7771\/1932-6246.1172"},{"key":"S0890060417000622_ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2008.03.001"},{"key":"S0890060417000622_ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1083-0_10"},{"key":"S0890060417000622_ref56","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.60.2.181"},{"key":"S0890060417000622_ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333115"},{"key":"S0890060417000622_ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0013-4694(87)90025-3"},{"key":"S0890060417000622_ref36","unstructured":"Nguyen P , Nguyen TA and Zeng Y (2015) Physiologically based segmentation of design protocol. In Proceedings of the International Conference on Engineering Design (ICED)."},{"key":"S0890060417000622_ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2009.05.002"},{"key":"S0890060417000622_ref30","first-page":"137","volume-title":"About: Designing \u2013 Analysing Design Meetings","author":"Matthews","year":"2009"},{"key":"S0890060417000622_ref42","doi-asserted-by":"publisher","DOI":"10.1080\/00140137408931355"},{"key":"S0890060417000622_ref32","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/BF01607155","article-title":"Understanding conceptual electronic design using protocol analysis","volume":"10","author":"McNeill","year":"1998","journal-title":"Research in Engineering Design"},{"key":"S0890060417000622_ref21","article-title":"Protocol analysis in design research: a review","author":"Jiang","year":"2009","journal-title":"IASDR (International Association of Societies of Design Research) 2009"},{"key":"S0890060417000622_ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BF01819547"},{"key":"S0890060417000622_ref37","doi-asserted-by":"publisher","DOI":"10.1115\/DETC2010-28477"},{"key":"S0890060417000622_ref38","volume-title":"Proceedings of Tools and Methods of Competitive Engineering (TMCE)","author":"Nguyen","year":"2012"},{"key":"S0890060417000622_ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2013.10.002"},{"key":"S0890060417000622_ref44","unstructured":"Schooler JW and Engstler-Schooler TY (1993) Verbal overshadowing of visual memories: some things are better left unsaid. Cognitive Psychology 17, 31\u201371."},{"key":"S0890060417000622_ref51","unstructured":"Ullman D , Stauffer L and Dietterich T (1987) Preliminary results of and experimental study of the mechanical design process. In Proceedings of the NSF Workshop on Design Theory and Methodology."},{"key":"S0890060417000622_ref52","volume-title":"About: Designing \u2013 Analysing Design Meetings","author":"Visser","year":"2008"},{"key":"S0890060417000622_ref33","first-page":"623","article-title":"Premonitions of insight predict impending error","volume":"12","author":"Metcalfe","year":"1986","journal-title":"Journal of Experimental Psychology: Learning, Memory, and Cognition"},{"key":"S0890060417000622_ref54","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.1994.tb00621.x"},{"key":"S0890060417000622_ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-694X(97)00015-X"},{"key":"S0890060417000622_ref46","unstructured":"Schooler JW , Ryan R and Reder LM (1991) Better the second time around: Representation reverses verbalization's impairment of face recognition. In International Conference on Memory."},{"key":"S0890060417000622_ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s004060050088"},{"key":"S0890060417000622_ref16","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2014.00241"},{"key":"S0890060417000622_ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9733-5_6"},{"key":"S0890060417000622_ref55","doi-asserted-by":"publisher","DOI":"10.1177\/0146167293193010"},{"key":"S0890060417000622_ref3","first-page":"137","volume-title":"About: Designing \u2013 Analysing Design Meetings","author":"Ball","year":"2009"},{"key":"S0890060417000622_ref24","first-page":"213","volume-title":"About: Designing \u2013 Analysing Design Meetings","author":"Kan","year":"2009"}],"container-title":["Artificial Intelligence for Engineering Design, Analysis and Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/S0890060417000622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T15:42:22Z","timestamp":1555083742000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/S0890060417000622\/type\/journal_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,3]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["S0890060417000622"],"URL":"https:\/\/doi.org\/10.1017\/s0890060417000622","relation":{},"ISSN":["0890-0604","1469-1760"],"issn-type":[{"value":"0890-0604","type":"print"},{"value":"1469-1760","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,3]]}}}