To see the other types of publications on this topic, follow the link: Memory acquisition.

Journal articles on the topic 'Memory acquisition'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Memory acquisition.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

SEBEHELA, TUMELLANO. "PORTFOLIO FORMATION MEMORY." Annals of Financial Economics 11, no. 02 (2016): 1650010. http://dx.doi.org/10.1142/s201049521650010x.

Full text
Abstract:
Real estate investment trade (REIT) memory as illustrated by variations including their Greeks tend to vary during the [0;[Formula: see text]32] window of portfolio formation, i.e. acquisitions. This is partly due to acquisition activities and intensity which tend to be “higher” during the time to expiration. Prior REIT studies explored variances based on long-term measures without focusing on the discrete nature of variations. This article, empirically presents discrete variations at different points in time. Results illustrate that memory decreases as time to expiration approaches maturity. Given high intensity during acquisitions, one infers that memory illustrated in this paper is likely to be optimal one.
APA, Harvard, Vancouver, ISO, and other styles
2

Laleh, Fakhraee Faruji. "BRAIN Journal - Declarative vs. Procedural Memory: Roles in Second Language Acquisition." BRAIN - Broad Research in Artificial Intelligence and Neuroscience 3, no. 1 (2012): 37–49. https://doi.org/10.5281/zenodo.1042706.

Full text
Abstract:
ABSTRACT Memory is not a single faculty but is a combination of multiple distinct abilities (Schacter, 1987). The declarative-procedural distinction is used both with regard to knowledge and memory that stores this knowledge. Ellis (2008) used the terms explicit/implicit, and declarative/procedural interchangeably. In this article the researcher aims at identifying the different aspects of declarative/procedural memory, interaction between these two types of memory, and the role they may play in second language acquisition.
APA, Harvard, Vancouver, ISO, and other styles
3

Mital, Parekh, and Jani Snehal. "MEMORY FORENSIC: ACQUISITION AND ANALYSIS OF MEMORY AND ITS TOOLS COMPARISON." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 90–95. https://doi.org/10.5281/zenodo.1198968.

Full text
Abstract:
The enhancement of technology has led to a considerable amount of growth in number of cases pertaining to cyber crime and has raised an enormous challenge to tackle it effectively.  There are various cyber forensic techniques and tools used to recover data from the devices to tackle cyber crime. Present research paper focuses on performing memory forensic and analyzes the memory which contains many pieces of information relevant to forensic investigation, such as username, password, cryptographic keys, deleted files, deleted logs, running processes; that can be helpful to investigate the cyber crime pining down the accused. The three main steps followed in memory forensic are acquiring, analyzing and recovering. Recovery of the evidences of crime from the volatile memory can be possible with the knowledge of different tools and techniques used in memory forensic.  However, it is always tough to analyze volatile memory as it stays for a very short period. Not all tools can be used for memory forensic in every situation and therefore, it is important to have the knowledge of tools before applying to solve a particular cyber crime. It is yet to establish on using a single tool for complete investigation, however, most of the tools used are successful in providing reasonable evidences. The present research paper provides an insight on analyzing the memory that stores relevant data, collection of evidences from the device(s), extraction of essential data using different memory forensic tools, tools useful for various purposes and the best suited tool for a particular situation.  
APA, Harvard, Vancouver, ISO, and other styles
4

Kostadinov, O. "THE ROLE OF DIFFERENT TYPES OF MEMORY IN LANGUAGE ACQUISITION." Znanstvena misel journal, no. 91 (June 26, 2024): 77–79. https://doi.org/10.5281/zenodo.12541196.

Full text
Abstract:
Memory is a multifaceted concept encompassing encoding, storage, and retrieval processes, which play pivotal roles in various aspects of life, including everyday routines and complex tasks like learning a new language. Language acquisition heavily relies on various types of memory, making it an excellent example of how intricate and essential memory functions are in our cognitive processes. This article explores the interaction between sensory, short-term, and long-term memory, emphasizing their significance in learning and retaining a new language. We gain a better understanding of the cognitive mechanisms underlying language learning through an in-depth analysis of how memories form, store, and recall.
APA, Harvard, Vancouver, ISO, and other styles
5

Jung, Seungwon, Seunghee Seo, Yeog Kim, and Changhoon Lee. "Memory Layout Extraction and Verification Method for Reliable Physical Memory Acquisition." Electronics 10, no. 12 (2021): 1380. http://dx.doi.org/10.3390/electronics10121380.

Full text
Abstract:
Physical memory acquisition is a prerequisite when performing memory forensics, referring to a set of techniques for acquiring and analyzing traces associated with user activity information, malware analysis, cyber incident response, and similar areas when the traces remain in the physical RAM. However, certain types of malware have applied anti-memory forensics techniques to evade memory analysis strategies or to make the acquisition process impossible. To disturb the acquisition process of physical memory, an attacker hooks the kernel API, which returns a map of the physical memory spaces, and modifies the return value of the API, specifically that typically used by memory acquisition tools. Moreover, an attacker modifies the kernel object referenced by the kernel API. This causes the system to crash during the memory acquisition process or causes the memory acquisition tools to incorrectly proceed with the acquisition. Even with a modification of one byte, called a one-byte modification attack, some tools fail to acquire memory. Therefore, specialized countermeasure techniques are needed for these anti-memory forensics techniques. In this paper, we propose a memory layout acquisition method which is robust to kernel API hooking and the one-byte modification attack on NumberOfRuns, the kernel object used to construct the memory layout in Windows. The proposed acquisition method directly accesses the memory, extracts the byte array, and parses it in the form of a memory layout. When we access the memory, we extract the _PHYSICAL_MEMORY_DESCRIPTOR structure, which is the basis of the memory layout without using the existing memory layout acquisition API. Furthermore, we propose a verification method that selects a reliable memory layout. We realize the verification method by comparing NumberOfRuns and the memory layout acquired via the kernel API, the registry, and the proposed method. The proposed verification method guarantees the reliability of the memory layout and helps secure memory image acquisition through a comparative verification with existing memory layout acquisition methods. We also conduct experiments to prove that the proposed method is resistant to anti-memory forensics techniques, confirming that there are no significant differences in time compared to the existing tools.
APA, Harvard, Vancouver, ISO, and other styles
6

Yehuda, Raz Ben, Erez Shlingbaum, Yuval Gershfeld, Shaked Tayouri, and Nezer Jacob Zaidenberg. "Hypervisor memory acquisition for ARM." Forensic Science International: Digital Investigation 37 (June 2021): 301106. http://dx.doi.org/10.1016/j.fsidi.2020.301106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stüttgen, Johannes, and Michael Cohen. "Anti-forensic resilient memory acquisition." Digital Investigation 10 (August 2013): S105—S115. http://dx.doi.org/10.1016/j.diin.2013.06.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Palutke, Ralph, and Felix Freiling. "Styx: Countering robust memory acquisition." Digital Investigation 24 (March 2018): S18—S28. http://dx.doi.org/10.1016/j.diin.2018.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jack, Dyson, and Zargari Shahrzad. "Memory Forensics: comparing the correctness of memory captures from locked Windows 10 machines using different boot capture vectors." Latin-American Journal of Computing 9, no. 2 (2022): 36–51. https://doi.org/10.5281/zenodo.6762962.

Full text
Abstract:
Memory forensics is rapidly becoming a critical part of all digital forensic investigations. The value of information stored within a  computer memory is immense; failing to capture it could result in a substantial loss of evidence. However, it is becoming increasingly more common to find situations where standard memory acquisition tools do not work. The paper addresses how an investigator can capture the memory of a locked computer when authentication is not present. The proposed solution is to use a bootable memory acquisition tool, in this case, Passware Bootable Memory Imager. To enhance the findings, three different reboot methods will be tested to help identify what would happen if the recommended warm reboot is not possible. Using a warm reboot and a secure reboot, Passware Bootable Memory Imager was able to successfully acquire the memory of the locked machine, with the resulting captures being highly representative of the populated data. However, the memory samples collected after a cold reboot did not retain any populated data. These findings highlight that to capture the memory of a locked machine, the reboot method is highly successful, providing the correct method is followed.
APA, Harvard, Vancouver, ISO, and other styles
10

Adryana, Nadja, Niken Cahyani, and Erwid Jadied. "Static Code Analysis on The Effect of Virtual Secure Mode on Memory Acquisition with IDA." International Journal on Information and Communication Technology (IJoICT) 9, no. 1 (2023): 1–13. http://dx.doi.org/10.21108/ijoict.v9i1.688.

Full text
Abstract:
Memory acquisition process is one of digital forensics act. There are several tools that support memory acquisition process. At this time, there is a feature named secure mode that can caused crash or error in memory acquisition tools system and caused the tools to be unusable, also the loss of the computer memory. This research is focusing on analyzing the acquisition tools that has error or crash when the device that is being used for memory acquisition is in secure mode. The analysis is being carried out using static code analysis method, which is one of the techniques of reverse engineering, using IDA. This study aims to find the cause of the crash or error in memory acquisition tools. The purpose of this study is to be useful for digital forensic tester in understanding the potential risk of the secure mode impact in acquisition process. The results of this study indicate that different operating system and different kernel which runs in the device are the reasons that memory acquisition tools cannot run properly on VSM environment being turned on.
APA, Harvard, Vancouver, ISO, and other styles
11

Baddeley, Alan D. "Modularity, working memory and language acquisition." Second Language Research 33, no. 3 (2017): 299–311. http://dx.doi.org/10.1177/0267658317709852.

Full text
Abstract:
The concept of modularity is used to contrast the approach to working memory proposed by Truscott with the Baddeley and Hitch multicomponent model. This proposes four sub components comprising the central executive, an executive control system of limited attentional capacity that utilises storage based on separate but interlinked temporary storage subsystems. One, the phonological loop, is concerned with the temporary storage of verbal materials and another, the visuo-spatial sketchpad stores visual information. A fourth component, the episodic buffer, allows the various components to interact and enables their content to become available to conscious awareness. After a brief description of the relevance of the model to language acquisition, an account is given of the way in which it has developed in recent years and its relationship to other approaches to working memory.
APA, Harvard, Vancouver, ISO, and other styles
12

Busey, Thomas A., and Geoffrey R. Loftus. "Binocular information acquisition and visual memory." Journal of Experimental Psychology: Human Perception and Performance 24, no. 4 (1998): 1188–214. http://dx.doi.org/10.1037/0096-1523.24.4.1188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Balogh, tefan. "Memory Acquisition by Using Network Card." Journal of Cyber Security and Mobility 3, no. 1 (2014): 65–76. http://dx.doi.org/10.13052/jcsm2245-1439.314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Reisfeld, Ralph A. "Memory T cells: death by acquisition." Blood 109, no. 6 (2007): 2269–70. http://dx.doi.org/10.1182/blood-2007-01-064600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Verfaellie, Mieke, and Laird S. Cermak. "Acquisition of Generic Memory in Amnesia." Cortex 30, no. 2 (1994): 293–303. http://dx.doi.org/10.1016/s0010-9452(13)80200-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wentzell, Peter D., Stephen J. Vanslyke, and Adrian P. Wade. "Programming direct memory access data acquisition." TrAC Trends in Analytical Chemistry 9, no. 1 (1990): 3–8. http://dx.doi.org/10.1016/0165-9936(90)80009-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rankin, Tom. "(Working) memory and L2 acquisition and processing." Second Language Research 33, no. 3 (2016): 389–99. http://dx.doi.org/10.1177/0267658316645387.

Full text
Abstract:
This review evaluates two recent anthologies that survey research at the intersection of cognitive psychological investigations of (working) memory and issues in second language (L2), and bilingual processing and acquisition. The volumes cover similar ground by outlining the theoretical underpinnings of models of (working) memory as well as providing empirical tests of a range of topics in bilingual and L2 acquisition and use. However, while one volume focuses specifically on issues of working memory and L2 acquisition and processing, the other provides a broader overview of the interface between memory and bilingualism more generally. Taken together, the volumes present a large array of research and will be a valuable resource for students and researchers interested in issues in bilingual memory, processing and acquisition.
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Xuru, Rui Zhu, Chenglin Zhou, and Yifan Chen. "Distinct Effects of Acute Aerobic Exercise on Declarative Memory and Procedural Memory Formation." Brain Sciences 10, no. 10 (2020): 691. http://dx.doi.org/10.3390/brainsci10100691.

Full text
Abstract:
Objective: To investigate the different effects of acute aerobic exercise on the formation of long-term declarative memory (DM) and procedural memory (PM). Methods: Twenty-two young men completed DM and PM tasks under three experimental conditions: pre-acquisition exercise, post-acquisition exercise, and no exercise (control). The DM task encompassed word learning, free recall tests both immediately and 1 h later, and a recognition test conducted 24 h after word learning. A serial reaction time task (SRTT) was utilized to assess exercise effects on PM. The SRTT included a sequence learning phase followed by sequence tests 1 h and 24 h later. The exercise program consisted of 30 min of moderate-intensity aerobic exercise. Results: In the DM task, compared to the control condition, pre-acquisition exercise, but not post-acquisition exercise, enhanced free recall performance significantly 1 h and 24 h later. The target word recognition rate and discriminative index (d′) of the recognition test were significantly enhanced in both exercise conditions compared to the control condition. In the PM task, we observed significantly reduced (improved) reaction times at the 24-h test in the post-acquisition exercise condition compared to in the control condition. Conclusion: Acute aerobic exercise may enhance long-term DM and PM via effects on different processing periods. For DM, exercise had a pronounced effect during the encoding period, whereas for PM, exercise was found to have an enhancing effect during the consolidation period.
APA, Harvard, Vancouver, ISO, and other styles
19

Rabia Mehmood. "Volatile Data Acquisition and Analysis by Using Memory Forensics Techniques." International Journal for Electronic Crime Investigation 7, no. 4 (2024): 81–90. http://dx.doi.org/10.54692/ijeci.2023.0704169.

Full text
Abstract:
Memory forensics is a vital component of digital investigations, involving the analysis of volatile memory (RAM) in computer systems to gather evidence, identify malicious activities, and reconstruct cybercrime incidents. This paper provides an overview of memory forensics, highlighting its defini-tion, importance, purpose, and scope. It explores the evolution and significance of memory forensics in response to increasingly complex cyber threats. The memory forensics process is discussed, cover-ing memory acquisition and analysis. Legal and ethical considerations related to the admissibility of memory evidence and privacy protection are examined. The paper also discusses the types of memory, including physical and virtual memory, and their characteristics and significance in memory forensics. Furthermore, it explores the memory acquisition process, different methods, tools, and techniques used, as well as the importance of preserving evidence integrity. Finally, the paper introduces various tools for memory analysis, such as Volatility, Volatility Workbench, FTK Imager, Encase, Hibernation Recon, and Xplico, and highlights their role in extracting valuable evidence from memory dumps.
APA, Harvard, Vancouver, ISO, and other styles
20

Skodzik, Timo, Heinz Holling, and Anya Pedersen. "Long-Term Memory Performance in Adult ADHD." Journal of Attention Disorders 21, no. 4 (2016): 267–83. http://dx.doi.org/10.1177/1087054713510561.

Full text
Abstract:
Objective: Memory problems are a frequently reported symptom in adult ADHD, and it is well-documented that adults with ADHD perform poorly on long-term memory tests. However, the cause of this effect is still controversial. The present meta-analysis examined underlying mechanisms that may lead to long-term memory impairments in adult ADHD. Method: We performed separate meta-analyses of measures of memory acquisition and long-term memory using both verbal and visual memory tests. In addition, the influence of potential moderator variables was examined. Results: Adults with ADHD performed significantly worse than controls on verbal but not on visual long-term memory and memory acquisition subtests. The long-term memory deficit was strongly statistically related to the memory acquisition deficit. In contrast, no retrieval problems were observable. Conclusion: Our results suggest that memory deficits in adult ADHD reflect a learning deficit induced at the stage of encoding. Implications for clinical and research settings are presented.
APA, Harvard, Vancouver, ISO, and other styles
21

Yaqin, M. Ainul, Triawan Adi Cahyanto, and Nur Qadariyah Fitriyah. "Metode Live Memory Acquisition untuk Pencarian Artefak Digital Perangkat Memori Laptop Berdasarkan Simulasi Kasus Kejahatan Siber." BIOS : Jurnal Teknologi Informasi dan Rekayasa Komputer 2, no. 2 (2021): 87–94. http://dx.doi.org/10.37148/bios.v2i2.28.

Full text
Abstract:
Information technology's hardware and software are constantly evolving. The rise in cybercrime cases is consistent with this trend. While operating systems can be hacked, personal data can be stolen and encrypted, making it impossible for users to access the information. Cybercriminals are using social media data to target personal information currently. Users' usernames, passwords, and other personal information can be stored in a device's memory, as well as browser cookies. Pre-analysis, analysis, and post-analysis are the three stages of the research process. "Live Memory Acquisition" is the proper method for obtaining data from a device's memory. There is digital evidence in the form of an email address, a password, Facebook, and PayPal accounts as well as a link URL discovered in the analysis of the results of the acquisition of artifact one. The results of the artifact 2 acquisition did not reveal any passwords. There was no evidence of email or Facebook passwords in the analysis of artifact 3 acquisition results, but the overall data test results showed that the total number of test results on artifact 1 was 100%, 57.14% on artifact 2, and 71.42% on artifact 3.
APA, Harvard, Vancouver, ISO, and other styles
22

Parekh, Mital, and Snehal Jani. "MEMORY FORENSIC: ACQUISITION AND ANALYSIS OF MEMORY AND ITS TOOLS COMPARISON." International Journal of Engineering Technologies and Management Research 5, no. 2 (2020): 90–95. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.618.

Full text
Abstract:
The enhancement of technology has led to a considerable amount of growth in number of cases pertaining to cyber-crime and has raised an enormous challenge to tackle it effectively. There are various cyber forensic techniques and tools used to recover data from the devices to tackle cyber-crime. Present research paper focuses on performing memory forensic and analyzes the memory which contains many pieces of information relevant to forensic investigation, such as username, password, cryptographic keys, deleted files, deleted logs, running processes; that can be helpful to investigate the cyber-crime pining down the accused. The three main steps followed in memory forensic are acquiring, analyzing and recovering. Recovery of the evidences of crime from the volatile memory can be possible with the knowledge of different tools and techniques used in memory forensic. However, it is always tough to analyze volatile memory as it stays for a very short period. Not all tools can be used for memory forensic in every situation and therefore, it is important to have the knowledge of tools before applying to solve a particular cyber-crime. It is yet to establish on using a single tool for complete investigation, however, most of the tools used are successful in providing reasonable evidences. The present research paper provides an insight on analyzing the memory that stores relevant data, collection of evidences from the device(s), extraction of essential data using different memory forensic tools, tools useful for various purposes and the best suited tool for a particular situation.
APA, Harvard, Vancouver, ISO, and other styles
23

Brod, G., U. Lindenberger, A. D. Wagner, and Y. L. Shing. "Knowledge Acquisition during Exam Preparation Improves Memory and Modulates Memory Formation." Journal of Neuroscience 36, no. 31 (2016): 8103–11. http://dx.doi.org/10.1523/jneurosci.0045-16.2016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Knowlton, Barbara J., Matthew L. Shapiro, and David S. Olton. "Hippocampal seizures disrupt working memory performance but not reference memory acquisition." Behavioral Neuroscience 103, no. 5 (1989): 1144–47. http://dx.doi.org/10.1037/0735-7044.103.5.1144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Krüttner, Sebastian, Lisa Traunmüller, Ugur Dag, et al. "Synaptic Orb2A Bridges Memory Acquisition and Late Memory Consolidation in Drosophila." Cell Reports 11, no. 12 (2015): 1953–65. http://dx.doi.org/10.1016/j.celrep.2015.05.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Sprints, A. M. "Mechanisms of memory disturbance during stages of memory acquisition and fixation." Neuroscience and Behavioral Physiology 19, no. 5 (1989): 387–92. http://dx.doi.org/10.1007/bf01197870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Quach, Tu-Thach, Sapan Agarwal, Conrad D. James, Matthew J. Marinella, and James B. Aimone. "Sparse Data Acquisition on Emerging Memory Architectures." IEEE Access 7 (2019): 1685–93. http://dx.doi.org/10.1109/access.2018.2886931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sun, He, Kun Sun, Yuewu Wang, and Jiwu Jing. "Reliable and Trustworthy Memory Acquisition on Smartphones." IEEE Transactions on Information Forensics and Security 10, no. 12 (2015): 2547–61. http://dx.doi.org/10.1109/tifs.2015.2467356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Endress, Ansgar D., Marina Nespor, and Jacques Mehler. "Perceptual and memory constraints on language acquisition." Trends in Cognitive Sciences 13, no. 8 (2009): 348–53. http://dx.doi.org/10.1016/j.tics.2009.05.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Mattys, Sven L., and Alan Baddeley. "Working memory and second language accent acquisition." Applied Cognitive Psychology 33, no. 6 (2019): 1113–23. http://dx.doi.org/10.1002/acp.3554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Mayberry, Rachel I. "First-Language Acquisition After Childhood Differs From Second-Language Acquisition." Journal of Speech, Language, and Hearing Research 36, no. 6 (1993): 1258–70. http://dx.doi.org/10.1044/jshr.3606.1258.

Full text
Abstract:
This study determined whether the long-range outcome of first-language acquisition, when the learning begins after early childhood, is similar to that of second-language acquisition. Subjects were 36 deaf adults who had contrasting histories of spoken and sign language acquisition. Twenty-seven subjects were born deaf and began to acquire American Sign Language (ASL) as a first language at ages ranging from infancy to late childhood. Nine other subjects were born with normal hearing, which they lost in late childhood; they subsequently acquired ASL as a second language (because they had acquired spoken English as a first language in early childhood). ASL sentence processing was measured by recall of long and complex sentences and short-term memory for signed digits. Subjects who acquired ASL as a second language after childhood outperformed those who acquired it as a first language at exactly the same age. In addition, the performance of the subjects who acquired ASL as a first language declined in association with increasing age of acquisition. Effects were most apparent for sentence processing skills related to lexical identification, grammatical acceptability, and memory for sentence meaning. No effects were found for skills related to fine-motor production and pattern segmentation.
APA, Harvard, Vancouver, ISO, and other styles
32

Lafosse, Jose M., Sandra M. Mitchell, John R. Corboy, and Christopher M. Filley. "The Nature of Verbal Memory Impairment in Multiple Sclerosis: A List-Learning and Meta-analytic Study." Journal of the International Neuropsychological Society 19, no. 9 (2013): 995–1008. http://dx.doi.org/10.1017/s1355617713000957.

Full text
Abstract:
AbstractThe primary purpose of this study was to test the hypothesis that multiple sclerosis (MS) patients have impaired acquisition rather than a retrieval deficit. Verbal memory impairment in MS was examined in 53 relapsing-remitting MS patients and 31 healthy controls (HC), and in a meta-analysis of studies that examined memory functioning in MS with list-learning tasks. The MS group demonstrated significantly lower acquisition and delayed recall performance than the HC group, and the meta-analysis revealed that the largest effect sizes were obtained for acquisition measures relative to delayed recall and recognition. Our data argue against a retrieval deficit as the sole explanation for verbal memory impairment in MS, and make a consistent case for the position that deficient acquisition contributes to the memory dysfunction of MS patients. Deficient acquisition may result from demyelination in relevant white matter tracts that reduces encoding efficiency as a result of impaired speed of information processing. (JINS, 2013, 19, 995–1008)
APA, Harvard, Vancouver, ISO, and other styles
33

Finardi, Kyria R., and Rosane Silveira. "Working memory capacity in the production and acquisition of a syntactic rule in L2 speech." Revista Brasileira de Linguística Aplicada 11, no. 1 (2011): 199–221. http://dx.doi.org/10.1590/s1984-63982011000100011.

Full text
Abstract:
This study investigates the extent to which working memory capacity is related to the production and acquisition of a syntactic structure of L2 speech. Information Processing Theory guides the research, as the authors assume the operation of a dual code cognitive system made up of a rule-based and a memory-based system (SKEHAN, 1998) responsible for analyzing and synthesizing language, respectively. L2 acquisition is also discussed in terms of processing input for meaning and form. Overall results show that working memory capacity is related to the production and acquisition of a syntactic structure in L2 speech, but this relationship is stronger for acquisition.
APA, Harvard, Vancouver, ISO, and other styles
34

Flores-Salgado, Elizabeth, and Aldo Falú Gutiérrez-Koyoc. "Working Memory and Cross-Linguistic Influence on Vocabulary Acquisition." Brain Sciences 14, no. 8 (2024): 796. http://dx.doi.org/10.3390/brainsci14080796.

Full text
Abstract:
The purpose of this study was to analyze the cross-linguistic influence of previously learned languages and working memory capacities on the vocabulary performance of two different typological languages. The objectives of this study were (1) to compare the working memory capacities of bilingual adults in relation to the vocabulary performance of two different languages never learned by the participants, and (2) to analyze to what extent the typology of previously learned languages influences working memory capacities in relation to the vocabulary performance of French and Nahuatl. A group of 43 Mexican Spanish college students participated in this experimental study. The participants completed a series of working memory tasks in Nahuatl and French. The results showed that working memory capacities were lower in Nahuatl than in French. Thus, a correlation was found between their first and second language and vocabulary performance in French. We can consider the influence of previously learned languages as a significant factor in vocabulary acquisition in accordance with the participants’ working memory capacities.
APA, Harvard, Vancouver, ISO, and other styles
35

Thomas, Richard, Mikkel Malling Beck, Rune Rasmussen Lind, et al. "Acute Exercise and Motor Memory Consolidation: The Role of Exercise Timing." Neural Plasticity 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6205452.

Full text
Abstract:
High intensity aerobic exercise amplifies offline gains in procedural memory acquired during motor practice. This effect seems to be evident when exercise is placed immediately after acquisition, during the first stages of memory consolidation, but the importance of temporal proximity of the exercise bout used to stimulate improvements in procedural memory is unknown. The effects of three different temporal placements of high intensity exercise were investigated following visuomotor skill acquisition on the retention of motor memory in 48 young (24.0 ± 2.5 yrs), healthy male subjects randomly assigned to one of four groups either performing a high intensity (90% Maximal Power Output) exercise bout at 20 min (EX90), 1 h (EX90+1), 2 h (EX90+2) after acquisition or rested (CON). Retention tests were performed at 1 d (R1) and 7 d (R7). At R1 changes in performance scores after acquisition were greater for EX90 than CON (p<0.001) and EX90+2 (p=0.001). At R7 changes in performance scores for EX90, EX90+1, and EX90+2 were higher than CON (p<0.001,p=0.008, andp=0.008, resp.). Changes for EX90 at R7 were greater than EX90+2 (p=0.049). Exercise-induced improvements in procedural memory diminish as the temporal proximity of exercise from acquisition is increased. Timing of exercise following motor practice is important for motor memory consolidation.
APA, Harvard, Vancouver, ISO, and other styles
36

Tabrizian, K., SS Musavi, M. Rigi, et al. "Behavioral and molecular effects of intrahippocampal infusion of auraptene, resveratrol, and curcumin on H-89-induced deficits on spatial memory acquisition and retention in Morris water maze." Human & Experimental Toxicology 38, no. 7 (2019): 775–84. http://dx.doi.org/10.1177/0960327119839160.

Full text
Abstract:
Our aim was to investigate the effects of resveratrol, auraptene, and curcumin on the spatial learning and spatial memory retention in the Morris water maze (MWM). The effects of 4-day bilateral intrahippocampal (i.h.) infusions of dimethyl sulfoxide (DMSO), H-89 as a protein kinase AII inhibitor, auraptene/H-89, resveratrol/H-89, and curcumin/H-89 were investigated on spatial memory acquisition in MWM. The rats were trained for 4 days; each day included one block of four trials. Post-training probe tests were performed on day 5 in acquisition test. For retention assessments, different animals were trained for 4 days and then infused (i.h.) with either DMSO, H-89, auraptene/H-89, resveratrol/H-89, or curcumin/H-89. The retention test was performed 48 h after the last training trial. The bilateral infusion of H-89 led to a significant impairment in spatial memory in acquisition and retention tests accompanied with a significant decrease in expressions of cAMP response-element binding (CREB) and pCREB proteins in hippocampus. Resveratrol and curcumin reversed the H-89-induced spatial memory acquisition and retention impairments with significant increases in both CREB and pCREB proteins expressions compared to H-89-treated animals. Auraptene showed significant effects in reversing H-89-induced impairments in spatial memory retention but not spatial memory acquisition.
APA, Harvard, Vancouver, ISO, and other styles
37

Kim, Youngjoo, Sun-Young Lee, Juno Baik, Sunjin Lee, and Arum Kim. "American learners’ Korean language acquisition and their cognitive and psychological constraints." Korean Society of Bilingualism 49 (June 30, 2012): 59–86. https://doi.org/10.17296/korbil.2012..49.59.

Full text
Abstract:
This study investigates how learners’ cognitive and psychological factors affect acquisition of Korean language. 24 advanced learners participated in the experiment which measures learner’s individual variables such as grammatical judgement ability, proficiency, language aptitude, working memory, motivation, and anxiety. The variables were analyzed to explain what factors affect individual learners to make variations of grammar acquisition. Grammaticality judgement test reflects general proficiency and also relates to acquisition of individual grammatical items. Working memory and sound discrimination that is a component of language aptitude showed correlation with 84% of the grammatical categories measured. However, the influence of psychological factor, motivation or anxiety, was yielded up to be limited or indirect on acquisition. A multiple regression analysis was conducted to develop predictive model for the scores of grammaticality judgement test over the variables that were working memory, sound discrimination, integrative motivation, language analysis. The predictive model can explain development of acquisition according to learners’ individual characteristics and also predict factors which interfere with learners’ language acquisition.
APA, Harvard, Vancouver, ISO, and other styles
38

Sudhakaran, Sneha, Aisha Ali-Gombe, Andrew Case, and Golden Richard III. "Evaluating the Reliability of Android Userland Memory Forensics." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 423–32. http://dx.doi.org/10.34190/iccws.17.1.54.

Full text
Abstract:
Memory Forensics is one of the most important emerging areas in computer forensics. In memory forensics, analysis of userland memory is a technique that analyses per-process runtime data structures and extracts significant evidence for application-specific investigations. In this research, our focus is to examine the critical challenges faced by process memory acquisition that can impact object and data recovery. Particularly, this research work seeks to address the issues of consistency and reliability in userland memory forensics on Android. In real-world investigations, memory acquisition tools record the information when the device is running. In such scenarios, each application’s memory content may be in flux due to updates that are in progress, garbage collection activities, changes in process states, etc. In this paper we focus on various runtime activities such as garbage collection and process states and the impact they have on object recovery in userland memory forensics. The outcome of the research objective is to assess the reliability of Android userland memory forensic tools by providing new research directions for efficiently developing a metric study to measure the reliability. We evaluated our research objective by analysing memory dumps acquired from 30 apps in different Process Acquisition Modes. The Process Acquisition Mode (PAM) is the memory dump of a process that is extracted while external runtime factors are triggered. Our research identified an inconsistency in the number of objects recovered from analysing the process memory dumps with runtime factors included. Particularly, the evaluation results revealed differences in the count of objects recovered in different acquisition modes. We utilized Euclidean distance and covariance as the metrics for our study. These two metrics enabled the authors to identify how the change in the number of recovered objects in PAM impact forensic analysis. Our conclusion revealed that runtime factors could on average result in about 20% data loss, thus revealing these factors can have an obvious impact on object recovery.
APA, Harvard, Vancouver, ISO, and other styles
39

Broda, Mariana, Kaleriia Kovalova, Iryna Bezugla, Olesia Stoika, and Kateryna Mulyk. "ENHANCING FOREIGN LANGUAGE ACQUISITION." Conhecimento & Diversidade 17, no. 45 (2025): 166–82. https://doi.org/10.18316/rcd.v17i45.12371.

Full text
Abstract:
The article is devoted to analysing cognitive aspects of foreign language learning, including theoretical foundations, modern approaches and innovative technologies such as artificial intelligence and interactive tools. It emphasises the importance of considering cognitive processes, in particular memory, attention and motivation, to improve the efficiency of the learning process. The study’s relevance is driven by the need to improve the effectiveness of foreign language learning in the context of globalisation, multiculturalism and the development of information technology. Focusing on the cognitive aspects of learning allows us to consider learners’ individual characteristics, improving their motivation, engagement and learning. The article aims to study the cognitive aspects of foreign language learning and develop recommendations for implementing cognitively oriented methods in the educational process using innovative technologies. The methods included theoretical analysis of the literature, systematisation of methods, empirical survey of teachers and students, and quantitative and qualitative data analysis. The study results show that cognitive approaches contribute to effectively learning foreign language material. Teachers and students positively evaluate interactive methods and gamification, although there is a need to improve technical support. It has been found that individual cognitive styles, memory, attention and motivation are key factors in effective learning.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Guang Zhi, Da Jun Yue, Feng Li Ding, and Yan Qun Xie. "Research on the Wireless Multi-Point Temperature Acquisition and SD Card Memory System." Advanced Materials Research 295-297 (July 2011): 2624–27. http://dx.doi.org/10.4028/www.scientific.net/amr.295-297.2624.

Full text
Abstract:
Combining the low power loss technology with SD card, this system is designed, which is convenient for us to obtain the temperature data of the environment and in which the temperature acquisition module and the data receive memory module are included. The temperature acquisition module is responsible for transmitting the acquired valid temperature value into the data receive memory module by wireless, while the data receive memory module mainly stored the received effective data into SD card after being processed. With the wireless temperature acquisition system, it is convenient for us to acquire and record the multi-point temperature values from the environment.
APA, Harvard, Vancouver, ISO, and other styles
41

Rao, Fang. "Influence of Working Memory Capacity on English Language Learning of High School Students School." Journal of Education and Educational Research 9, no. 3 (2024): 408–13. http://dx.doi.org/10.54097/t9msct63.

Full text
Abstract:
In recent years, the relationship between working memory and second language acquisition has been a hot topic in the field of second language acquisition. The impact of second language learners’ working memory capacity on their second language acquisition is inconclusive. Researchers have called for further investigation into the role of working memory in second language development when reviewing literature on working memory in second language acquisition. called for further investigation into the role of working memory in second language development when reviewing literature on working memory in second language contexts and language contexts. Therefore, this study aims to explore whether and how working memory capacity affects overall English proficiency. The research question is: what is the correlation between high school students' working memory capacity and their English grades? This study used empirical research methods and randomly selected 37 high school students from a school in Dujiangyan, Chengdu as participants. empirical research methods and randomly selected 37 high school students from a school in Dujiangyan, Chengdu as participants. Data sources included Data sources included working memory capacity tests and English proficiency tests, both of which were conducted in the students’ classrooms. Descriptive statistics and Pearson correlation analysis were performed using SPSS 26.0 statistical analysis software. The study shows that there is a significant correlation between working memory capacity and English proficiency test scores. The correlation between The correlation between working memory and English proficiency test scores suggests that individual differences in working memory capacity can affect important cognitive activities such as listening, reading comprehension, reasoning, writing, and problem-solving. The correlation between working memory and English proficiency test scores suggests that individual differences in working memory capacity can affect important cognitive activities such as listening, reading comprehension, reasoning, writing, and problem-solving.
APA, Harvard, Vancouver, ISO, and other styles
42

Park, Eui-Ho, Nam-Soo Kim, Yeon-Kyung Lee, and June-Seek Choi. "N-Methyl-D-Aspartate (NMDA) Receptors in the Prelimbic Cortex Are Required for Short- and Long-Term Memory Formation in Trace Fear Conditioning." Life 12, no. 5 (2022): 672. http://dx.doi.org/10.3390/life12050672.

Full text
Abstract:
Accumulating evidence suggests that the medial prefrontal cortex (mPFC) has been implicated in the acquisition of fear memory during trace fear conditioning in which a conditional stimulus (CS) is paired with an aversive unconditional stimulus (UCS) separated by a temporal gap (trace interval, TI). However, little is known about the role of the prefrontal cortex for short- and long-term trace fear memory formation. Thus, we investigated how the prelimbic (PL) subregion within mPFC in rats contributes to short- and long-term trace fear memory formation using electrolytic lesions and d,l,-2-amino-5-phosphonovaleric acid (APV), an N-methyl-D-aspartate receptor (NMDAR) antagonist infusions into PL. In experiment 1, pre-conditioning lesions of PL impaired freezing to the CS as well as TI during the acquisition and retrieval sessions, indicating that PL is critically involved in trace fear memory formation. In experiment 2, temporary blockade of NMDA receptors in PL impaired the acquisition, but not the expression of short- and long-term trace fear memory. In addition, the inactivation of NMDAR in PL had little effect on locomotor activity, pre-pulse inhibition (PPI), or shock sensitivity. Taken together, these results suggest that NMDA receptor-mediated neurotransmission in PL is required for the acquisition of trace fear memory.
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Lian Hai, and Qiu Liang Xu. "Integrity and Fidelity Evaluation of Digital Evidence in Live Forensics." Applied Mechanics and Materials 571-572 (June 2014): 90–99. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.90.

Full text
Abstract:
The integrity and fidelity of digital evidence are very important in live forensics. Previous research has studied the uncertainty of live forensics based on different memory snapshots. However, this kind of method is not effective in practice. In fact, memory images are usually acquired by using forensics tools instead of using snapshots. Therefore, the integrity and fidelity of live evidence should be evaluated during the acquisition process. In this paper, we give a new viewpoint that memory acquisition can be regarded as a measurement of memory data. From this viewpoint, we evaluate the integrity and fidelity of live evidence in the process of physical memory acquisition. Firstly, several definitions about memory acquisition measure error are introduced to describe the trusty. Then, we analyze the experimental error and propose some suggestions on how to reduce it. A novel method is also developed to calculate the system error in detail. The results of a case study on Windows 7 and VMware virtual machine show that the experimental error has good accuracy and precision, which demonstrate the efficacy of the proposed reducing methods. The system error is also evaluated, that is, it accounts for the whole error from 30% to 50%. Last, a method is proposed to calculate changes or error of system process.
APA, Harvard, Vancouver, ISO, and other styles
44

Ellis, Nick C., and Richard Schmidt. "MORPHOLOGY AND LONGER DISTANCE DEPENDENCIES." Studies in Second Language Acquisition 19, no. 2 (1997): 145–71. http://dx.doi.org/10.1017/s0272263197002027.

Full text
Abstract:
This paper illustrates the advantages of laboratory research into SLA by describing two studies of acquisition of second language syntax. The first addresses the question of whether human morphological abilities can be understood in terms of associative processes or whether it is necessary to postulate rule-based symbol processing systems underlying these skills. We demonstrate that acquisition of L2 morphology shows frequency effects for both regular and irregular forms and that the acquisition course of learners' accuracy and reaction time can be accurately simulated by connectionist systems. The second concerns a bootstrapping account of SLA whereby processes of chunking in phonological memory underpin the acquisition of long-term memory for utterances and abstractions of grammatical regularities. It shows that phonological short-term memory is particularly important in the acquisition of long-distance dependencies. In both cases, it is argued that these aspects of SLA reflect associative learning processes. When SLA research is properly focused on acquisition, laboratory research allows investigation of the learners' exposure to evidence, their processes of perception and learning, and their resultant language representations.
APA, Harvard, Vancouver, ISO, and other styles
45

Fuster, Joaquín M. "More than working memory rides on long-term memory." Behavioral and Brain Sciences 26, no. 6 (2003): 737. http://dx.doi.org/10.1017/s0140525x03300160.

Full text
Abstract:
Single-unit data from the cortex of monkeys performing working-memory tasks support the main point of the target article. Those data, however, also indicate that the activation of long-term memory is essential to the processing of all cognitive functions. The activation of cortical long-term memory networks is a key neural mechanism in attention (working memory is a form thereof), perception, memory acquisition and retrieval, intelligence, and language.
APA, Harvard, Vancouver, ISO, and other styles
46

Imam nur Aziz. "Leveraging Memory Strategies to Enhance Vocabulary Proficiency In English Language Education At An English Course In Indonesia." JEET, Journal of English Education and Technology 5, no. 03 (2024): 190–205. https://doi.org/10.59689/jeet.v5i03.145.

Full text
Abstract:
This study investigates the effectiveness of incorporating memory strategies to enhance students' vocabulary acquisition in an English course. The study followed a pre-experimental design and applied quantitative methods, which included three stages: pre-test assessment, memory strategy application, and post-test evaluation. The researcher used paired sample t-test analysis to assess the influence of memory methods on vocabulary acquisition, with a specific emphasis on the speaking phase. The research findings indicated a substantial enhancement in vocabulary learning, as shown by a considerable rise in the average score from 60.55 to 68.88. The reduction in standard deviation and standard error of mean further underscored the enhanced consistency and precision of the observed improvements. This research advises the ongoing incorporation of memory methods into language teaching. It offers educators and researchers invaluable information for developing dynamic and successful language learning settings. Therefore, it is essential to consider the constraints of this research. In addition, the findings of this research may serve as a foundation for the future development of more effective approaches to English language acquisition. The subsequent study is anticipated to examine the use of memory methods in a broader context of language acquisition.
APA, Harvard, Vancouver, ISO, and other styles
47

Luque, E. M., V. P. Carlini, L. M. Vincenti, et al. "Effects of hexarelin (a ghrelin analogue) on fertilisation and the pre- and postnatal development of mice." Reproduction, Fertility and Development 22, no. 6 (2010): 926. http://dx.doi.org/10.1071/rd09231.

Full text
Abstract:
Ghrelin (Ghr) has been associated with reproductive physiology and pre- and postnatal development. The objectives of the present study were to evaluate the effects of hexarelin (HEX; 100 or 200 µg kg−1 day−1), a therapeutic Ghr analogue, on: (1) embryo development 60 h post ovulation, induced pharmacologically, in pregnant mice; (2) the physical, neurobiological and sexual development of offspring of female mice injected with HEX during the first, second or third week of pregnancy or throughout the entire pregnancy; and (3) adult memory acquisition in these offspring. We also evaluated the effects of chronic HEX administration on memory acquisition in adult mice. Treatment of non-pregnant female mice with HEX decreased ovulation rate. However, treatment of pregnant mice with HEX at any time during pregnancy tended to accelerate offspring maturation, regardless of bodyweight. This effect was only significant on neurobiological parameters following treatment during the first week. HEX treatment during the first week and/or throughout the entire pregnancy resulted in impaired memory acquisition in the offspring, with female mice being more susceptible to these effects. Similar results were observed for the effects of chronic HEX treatment on memory acquisition in adult mice. In conclusion, HEX seems to exert differential effects depending on when it is administered. Because HEX has started to be used therapeutically, its deleterious effects on ovulation and memory acquisition must be further evaluated.
APA, Harvard, Vancouver, ISO, and other styles
48

Kalia, Vandana, Arif Khan, Laura Penny, and Surojit Sarkar. "Regulatory T cells are critical for effector-to-memory transition of CD8 T cells (110.24)." Journal of Immunology 188, no. 1_Supplement (2012): 110.24. http://dx.doi.org/10.4049/jimmunol.188.supp.110.24.

Full text
Abstract:
Abstract Memory differentiation involves a coordinate downregulation of effector functions, and progressive acquisition of memory properties. It is believed that abrogation of antigenic stimulation of T cells following pathogen clearance serves as a passive means for effector CD8 T cells to shut-off their effector functions, and transition into memory. Based on the well-established suppressive functions of Tregs on CD4 T cells, we hypothesized that Tregs aid memory CD8 T cell differentiation by actively suppressing the effector program in memory-fated cells. To test this hypothesis, we evaluated effector-memory transition of Ag-specific cells in the presence or absence of Tregs. Tregs were transiently deleted after Ag clearance using the FOXP3-DTR transgenic mice, following which key memory properties of recall proliferation upon secondary challenge, polyfunctionality and homeostatic proliferation were assessed. Consistent with our hypothesis, these studies revealed that effector program failed to downregulate in the absence of Tregs, and acquisition of all three functional memory properties was significantly hampered in the absence of Tregs. Removal of Tregs even after acquisition of optimal memory properties also led to a decline in memory function. Collectively, these studies present a novel mechanism by which Tregs serve to generate as well as maintain a functional memory CD8 T cell compartment by actively suppressing the effector program following antigen clearance.
APA, Harvard, Vancouver, ISO, and other styles
49

Choi, Sungmook. "Gloss, Working Memory Capacity, and L2 Vocabulary Acquisition." Journal of Modern British & American Language & Literature 34, no. 3 (2016): 247. http://dx.doi.org/10.21084/jmball.2016.08.34.3.247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Bin, Ying-xian Chang, Lian-ri Cong, et al. "A Memory Acquisition Method for Android Application Forensics." Journal of Physics: Conference Series 1314 (October 2019): 012180. http://dx.doi.org/10.1088/1742-6596/1314/1/012180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography