Dataanalysis

Back to Lab Instructions
Back to LabWiki

Data Analysis

Note: has not been updated since 2013, with no mention of Python?!

Phpmyadmin

  • Experiments done in flash that utilize database driven data storage have to have their data accessed through a utility known as phpmyadmin.
  • Phpmyadmin stores all the data of every experiment ever run through this system. therefore do not muck about! This is real raw data, thousands and thousands of precious subjects. don't mess around in here.
  • If you need to get data out of the database, instructions are here.

Getting DirectRT data

  • Experiments using DirectRT have their data stored locally on every computer. Therefore you must go around and get the data off the testing room computers and onto the server.
    • Within each experimental folder on every computer there is a data folder, with an excel sheet for every subject.
    • Normally we use the LOG files as compared to the simple numbered files, as they contain all the juicy details that make us happy.

Graphing

  • Here at the ABCwest Lab we are graphing snobs. Do not ever, ever, ever use graphs that have been made in Excel. Instead, use either a graphing package in R, or Prism, which was borne to earth on the wings of angels.
    • Prism is available on the server in the software folder.
      • Note that Prism can't handle pie charts or histograms, for that you can use SPSS, or R.

Statistics

  • There are several options for doing statistical analysis.

Storing Data Ran an experiment? Now it's time to store your data according to the IU use strategy. https://datamanagement.iu.edu/index.php

Not sure whether your data is critical, protected, restricted, or something else? READ THIS BEFORE SHARING YOUR DATA ANYWHERE WITH ANYONE.https://datamanagement.iu.edu/tools/data-storage-and-handling.php

Identity Finder: Tool for seeing whether there's identitifiable information on your PC: https://iuware.iu.edu/mac/title/2918

Please look over the PBS Personally Owned Devices Policy(2) The policy not only includes protections for IU but also for how you use these devices at home and away. Most of the requirements are common-sense approaches.

Our busy work/life can sometimes find us inadvertently storing personally-identifiable data on our workstations and other devices. In order to discover if this kind of sensitive data exists on your office desktop, IU provides an application/tool called Identity Finder (IDF) which works by scanning your workstation storage devices. Sometimes such data are deemed critical data here at IU and must be stored securely in Critical Data Infrastructure (see here(3)).

The PBS Data Policy for personally owned devices that are used to access IU-related materials and/or conduct IU-related work can be found here(2). Within the policy description you will find a link to the IU Knowledge Base article describing how to use the Identity Finder (IDF) tool. For desktop PCs that are in the department-supported management system (SCCM/UDM), the application will soon be made available via the software center on your computer (e.g., on Windows machines click on the Start Button at type “software center” in the search field, then view “applications”). No action will be necessary on your part to install the application (our IT team will “push” with application out as part of routine updates). For Apple desktops (iMacs, Mac-Minis), the download can be found here(4).

Please keep in mind that using Identity Finder (IDF) is in your best interest as well as that of the department and the university. In fact, if you have a desktop at home, we would highly recommend that you run an IDF scan there for the protection of your personal information on your home computer. For what to expect when you go to run Identity Finder look here(5).

Back to Lab Instructions
Back to LabWiki