To see the other types of publications on this topic, follow the link: Memory acquisition.

Journal articles on the topic 'Memory acquisition'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Memory acquisition.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

SEBEHELA, TUMELLANO. "PORTFOLIO FORMATION MEMORY." Annals of Financial Economics 11, no. 02 (June 2016): 1650010. http://dx.doi.org/10.1142/s201049521650010x.

Full text
Abstract:
Real estate investment trade (REIT) memory as illustrated by variations including their Greeks tend to vary during the [0;[Formula: see text]32] window of portfolio formation, i.e. acquisitions. This is partly due to acquisition activities and intensity which tend to be “higher” during the time to expiration. Prior REIT studies explored variances based on long-term measures without focusing on the discrete nature of variations. This article, empirically presents discrete variations at different points in time. Results illustrate that memory decreases as time to expiration approaches maturity. Given high intensity during acquisitions, one infers that memory illustrated in this paper is likely to be optimal one.
APA, Harvard, Vancouver, ISO, and other styles
2

Jung, Seungwon, Seunghee Seo, Yeog Kim, and Changhoon Lee. "Memory Layout Extraction and Verification Method for Reliable Physical Memory Acquisition." Electronics 10, no. 12 (June 9, 2021): 1380. http://dx.doi.org/10.3390/electronics10121380.

Full text
Abstract:
Physical memory acquisition is a prerequisite when performing memory forensics, referring to a set of techniques for acquiring and analyzing traces associated with user activity information, malware analysis, cyber incident response, and similar areas when the traces remain in the physical RAM. However, certain types of malware have applied anti-memory forensics techniques to evade memory analysis strategies or to make the acquisition process impossible. To disturb the acquisition process of physical memory, an attacker hooks the kernel API, which returns a map of the physical memory spaces, and modifies the return value of the API, specifically that typically used by memory acquisition tools. Moreover, an attacker modifies the kernel object referenced by the kernel API. This causes the system to crash during the memory acquisition process or causes the memory acquisition tools to incorrectly proceed with the acquisition. Even with a modification of one byte, called a one-byte modification attack, some tools fail to acquire memory. Therefore, specialized countermeasure techniques are needed for these anti-memory forensics techniques. In this paper, we propose a memory layout acquisition method which is robust to kernel API hooking and the one-byte modification attack on NumberOfRuns, the kernel object used to construct the memory layout in Windows. The proposed acquisition method directly accesses the memory, extracts the byte array, and parses it in the form of a memory layout. When we access the memory, we extract the _PHYSICAL_MEMORY_DESCRIPTOR structure, which is the basis of the memory layout without using the existing memory layout acquisition API. Furthermore, we propose a verification method that selects a reliable memory layout. We realize the verification method by comparing NumberOfRuns and the memory layout acquired via the kernel API, the registry, and the proposed method. The proposed verification method guarantees the reliability of the memory layout and helps secure memory image acquisition through a comparative verification with existing memory layout acquisition methods. We also conduct experiments to prove that the proposed method is resistant to anti-memory forensics techniques, confirming that there are no significant differences in time compared to the existing tools.
APA, Harvard, Vancouver, ISO, and other styles
3

Yehuda, Raz Ben, Erez Shlingbaum, Yuval Gershfeld, Shaked Tayouri, and Nezer Jacob Zaidenberg. "Hypervisor memory acquisition for ARM." Forensic Science International: Digital Investigation 37 (June 2021): 301106. http://dx.doi.org/10.1016/j.fsidi.2020.301106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stüttgen, Johannes, and Michael Cohen. "Anti-forensic resilient memory acquisition." Digital Investigation 10 (August 2013): S105—S115. http://dx.doi.org/10.1016/j.diin.2013.06.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Palutke, Ralph, and Felix Freiling. "Styx: Countering robust memory acquisition." Digital Investigation 24 (March 2018): S18—S28. http://dx.doi.org/10.1016/j.diin.2018.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adryana, Nadja, Niken Cahyani, and Erwid Jadied. "Static Code Analysis on The Effect of Virtual Secure Mode on Memory Acquisition with IDA." International Journal on Information and Communication Technology (IJoICT) 9, no. 1 (June 9, 2023): 1–13. http://dx.doi.org/10.21108/ijoict.v9i1.688.

Full text
Abstract:
Memory acquisition process is one of digital forensics act. There are several tools that support memory acquisition process. At this time, there is a feature named secure mode that can caused crash or error in memory acquisition tools system and caused the tools to be unusable, also the loss of the computer memory. This research is focusing on analyzing the acquisition tools that has error or crash when the device that is being used for memory acquisition is in secure mode. The analysis is being carried out using static code analysis method, which is one of the techniques of reverse engineering, using IDA. This study aims to find the cause of the crash or error in memory acquisition tools. The purpose of this study is to be useful for digital forensic tester in understanding the potential risk of the secure mode impact in acquisition process. The results of this study indicate that different operating system and different kernel which runs in the device are the reasons that memory acquisition tools cannot run properly on VSM environment being turned on.
APA, Harvard, Vancouver, ISO, and other styles
7

Baddeley, Alan D. "Modularity, working memory and language acquisition." Second Language Research 33, no. 3 (June 9, 2017): 299–311. http://dx.doi.org/10.1177/0267658317709852.

Full text
Abstract:
The concept of modularity is used to contrast the approach to working memory proposed by Truscott with the Baddeley and Hitch multicomponent model. This proposes four sub components comprising the central executive, an executive control system of limited attentional capacity that utilises storage based on separate but interlinked temporary storage subsystems. One, the phonological loop, is concerned with the temporary storage of verbal materials and another, the visuo-spatial sketchpad stores visual information. A fourth component, the episodic buffer, allows the various components to interact and enables their content to become available to conscious awareness. After a brief description of the relevance of the model to language acquisition, an account is given of the way in which it has developed in recent years and its relationship to other approaches to working memory.
APA, Harvard, Vancouver, ISO, and other styles
8

Busey, Thomas A., and Geoffrey R. Loftus. "Binocular information acquisition and visual memory." Journal of Experimental Psychology: Human Perception and Performance 24, no. 4 (1998): 1188–214. http://dx.doi.org/10.1037/0096-1523.24.4.1188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Balogh, tefan. "Memory Acquisition by Using Network Card." Journal of Cyber Security and Mobility 3, no. 1 (2014): 65–76. http://dx.doi.org/10.13052/jcsm2245-1439.314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reisfeld, Ralph A. "Memory T cells: death by acquisition." Blood 109, no. 6 (March 15, 2007): 2269–70. http://dx.doi.org/10.1182/blood-2007-01-064600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Verfaellie, Mieke, and Laird S. Cermak. "Acquisition of Generic Memory in Amnesia." Cortex 30, no. 2 (June 1994): 293–303. http://dx.doi.org/10.1016/s0010-9452(13)80200-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wentzell, Peter D., Stephen J. Vanslyke, and Adrian P. Wade. "Programming direct memory access data acquisition." TrAC Trends in Analytical Chemistry 9, no. 1 (January 1990): 3–8. http://dx.doi.org/10.1016/0165-9936(90)80009-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Rankin, Tom. "(Working) memory and L2 acquisition and processing." Second Language Research 33, no. 3 (May 5, 2016): 389–99. http://dx.doi.org/10.1177/0267658316645387.

Full text
Abstract:
This review evaluates two recent anthologies that survey research at the intersection of cognitive psychological investigations of (working) memory and issues in second language (L2), and bilingual processing and acquisition. The volumes cover similar ground by outlining the theoretical underpinnings of models of (working) memory as well as providing empirical tests of a range of topics in bilingual and L2 acquisition and use. However, while one volume focuses specifically on issues of working memory and L2 acquisition and processing, the other provides a broader overview of the interface between memory and bilingualism more generally. Taken together, the volumes present a large array of research and will be a valuable resource for students and researchers interested in issues in bilingual memory, processing and acquisition.
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Xuru, Rui Zhu, Chenglin Zhou, and Yifan Chen. "Distinct Effects of Acute Aerobic Exercise on Declarative Memory and Procedural Memory Formation." Brain Sciences 10, no. 10 (September 30, 2020): 691. http://dx.doi.org/10.3390/brainsci10100691.

Full text
Abstract:
Objective: To investigate the different effects of acute aerobic exercise on the formation of long-term declarative memory (DM) and procedural memory (PM). Methods: Twenty-two young men completed DM and PM tasks under three experimental conditions: pre-acquisition exercise, post-acquisition exercise, and no exercise (control). The DM task encompassed word learning, free recall tests both immediately and 1 h later, and a recognition test conducted 24 h after word learning. A serial reaction time task (SRTT) was utilized to assess exercise effects on PM. The SRTT included a sequence learning phase followed by sequence tests 1 h and 24 h later. The exercise program consisted of 30 min of moderate-intensity aerobic exercise. Results: In the DM task, compared to the control condition, pre-acquisition exercise, but not post-acquisition exercise, enhanced free recall performance significantly 1 h and 24 h later. The target word recognition rate and discriminative index (d′) of the recognition test were significantly enhanced in both exercise conditions compared to the control condition. In the PM task, we observed significantly reduced (improved) reaction times at the 24-h test in the post-acquisition exercise condition compared to in the control condition. Conclusion: Acute aerobic exercise may enhance long-term DM and PM via effects on different processing periods. For DM, exercise had a pronounced effect during the encoding period, whereas for PM, exercise was found to have an enhancing effect during the consolidation period.
APA, Harvard, Vancouver, ISO, and other styles
15

Rabia Mehmood. "Volatile Data Acquisition and Analysis by Using Memory Forensics Techniques." International Journal for Electronic Crime Investigation 7, no. 4 (April 15, 2024): 81–90. http://dx.doi.org/10.54692/ijeci.2023.0704169.

Full text
Abstract:
Memory forensics is a vital component of digital investigations, involving the analysis of volatile memory (RAM) in computer systems to gather evidence, identify malicious activities, and reconstruct cybercrime incidents. This paper provides an overview of memory forensics, highlighting its defini-tion, importance, purpose, and scope. It explores the evolution and significance of memory forensics in response to increasingly complex cyber threats. The memory forensics process is discussed, cover-ing memory acquisition and analysis. Legal and ethical considerations related to the admissibility of memory evidence and privacy protection are examined. The paper also discusses the types of memory, including physical and virtual memory, and their characteristics and significance in memory forensics. Furthermore, it explores the memory acquisition process, different methods, tools, and techniques used, as well as the importance of preserving evidence integrity. Finally, the paper introduces various tools for memory analysis, such as Volatility, Volatility Workbench, FTK Imager, Encase, Hibernation Recon, and Xplico, and highlights their role in extracting valuable evidence from memory dumps.
APA, Harvard, Vancouver, ISO, and other styles
16

Parekh, Mital, and Snehal Jani. "MEMORY FORENSIC: ACQUISITION AND ANALYSIS OF MEMORY AND ITS TOOLS COMPARISON." International Journal of Engineering Technologies and Management Research 5, no. 2 (April 27, 2020): 90–95. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.618.

Full text
Abstract:
The enhancement of technology has led to a considerable amount of growth in number of cases pertaining to cyber-crime and has raised an enormous challenge to tackle it effectively. There are various cyber forensic techniques and tools used to recover data from the devices to tackle cyber-crime. Present research paper focuses on performing memory forensic and analyzes the memory which contains many pieces of information relevant to forensic investigation, such as username, password, cryptographic keys, deleted files, deleted logs, running processes; that can be helpful to investigate the cyber-crime pining down the accused. The three main steps followed in memory forensic are acquiring, analyzing and recovering. Recovery of the evidences of crime from the volatile memory can be possible with the knowledge of different tools and techniques used in memory forensic. However, it is always tough to analyze volatile memory as it stays for a very short period. Not all tools can be used for memory forensic in every situation and therefore, it is important to have the knowledge of tools before applying to solve a particular cyber-crime. It is yet to establish on using a single tool for complete investigation, however, most of the tools used are successful in providing reasonable evidences. The present research paper provides an insight on analyzing the memory that stores relevant data, collection of evidences from the device(s), extraction of essential data using different memory forensic tools, tools useful for various purposes and the best suited tool for a particular situation.
APA, Harvard, Vancouver, ISO, and other styles
17

Brod, G., U. Lindenberger, A. D. Wagner, and Y. L. Shing. "Knowledge Acquisition during Exam Preparation Improves Memory and Modulates Memory Formation." Journal of Neuroscience 36, no. 31 (August 3, 2016): 8103–11. http://dx.doi.org/10.1523/jneurosci.0045-16.2016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Knowlton, Barbara J., Matthew L. Shapiro, and David S. Olton. "Hippocampal seizures disrupt working memory performance but not reference memory acquisition." Behavioral Neuroscience 103, no. 5 (1989): 1144–47. http://dx.doi.org/10.1037/0735-7044.103.5.1144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Krüttner, Sebastian, Lisa Traunmüller, Ugur Dag, Katharina Jandrasits, Barbara Stepien, Nirmala Iyer, Lee G. Fradkin, Jasprina N. Noordermeer, Brett D. Mensh, and Krystyna Keleman. "Synaptic Orb2A Bridges Memory Acquisition and Late Memory Consolidation in Drosophila." Cell Reports 11, no. 12 (June 2015): 1953–65. http://dx.doi.org/10.1016/j.celrep.2015.05.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sprints, A. M. "Mechanisms of memory disturbance during stages of memory acquisition and fixation." Neuroscience and Behavioral Physiology 19, no. 5 (September 1989): 387–92. http://dx.doi.org/10.1007/bf01197870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Quach, Tu-Thach, Sapan Agarwal, Conrad D. James, Matthew J. Marinella, and James B. Aimone. "Sparse Data Acquisition on Emerging Memory Architectures." IEEE Access 7 (2019): 1685–93. http://dx.doi.org/10.1109/access.2018.2886931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sun, He, Kun Sun, Yuewu Wang, and Jiwu Jing. "Reliable and Trustworthy Memory Acquisition on Smartphones." IEEE Transactions on Information Forensics and Security 10, no. 12 (December 2015): 2547–61. http://dx.doi.org/10.1109/tifs.2015.2467356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Endress, Ansgar D., Marina Nespor, and Jacques Mehler. "Perceptual and memory constraints on language acquisition." Trends in Cognitive Sciences 13, no. 8 (August 2009): 348–53. http://dx.doi.org/10.1016/j.tics.2009.05.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Mattys, Sven L., and Alan Baddeley. "Working memory and second language accent acquisition." Applied Cognitive Psychology 33, no. 6 (April 10, 2019): 1113–23. http://dx.doi.org/10.1002/acp.3554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Yaqin, M. Ainul, Triawan Adi Cahyanto, and Nur Qadariyah Fitriyah. "Metode Live Memory Acquisition untuk Pencarian Artefak Digital Perangkat Memori Laptop Berdasarkan Simulasi Kasus Kejahatan Siber." BIOS : Jurnal Teknologi Informasi dan Rekayasa Komputer 2, no. 2 (December 16, 2021): 87–94. http://dx.doi.org/10.37148/bios.v2i2.28.

Full text
Abstract:
Information technology's hardware and software are constantly evolving. The rise in cybercrime cases is consistent with this trend. While operating systems can be hacked, personal data can be stolen and encrypted, making it impossible for users to access the information. Cybercriminals are using social media data to target personal information currently. Users' usernames, passwords, and other personal information can be stored in a device's memory, as well as browser cookies. Pre-analysis, analysis, and post-analysis are the three stages of the research process. "Live Memory Acquisition" is the proper method for obtaining data from a device's memory. There is digital evidence in the form of an email address, a password, Facebook, and PayPal accounts as well as a link URL discovered in the analysis of the results of the acquisition of artifact one. The results of the artifact 2 acquisition did not reveal any passwords. There was no evidence of email or Facebook passwords in the analysis of artifact 3 acquisition results, but the overall data test results showed that the total number of test results on artifact 1 was 100%, 57.14% on artifact 2, and 71.42% on artifact 3.
APA, Harvard, Vancouver, ISO, and other styles
26

Skodzik, Timo, Heinz Holling, and Anya Pedersen. "Long-Term Memory Performance in Adult ADHD." Journal of Attention Disorders 21, no. 4 (July 28, 2016): 267–83. http://dx.doi.org/10.1177/1087054713510561.

Full text
Abstract:
Objective: Memory problems are a frequently reported symptom in adult ADHD, and it is well-documented that adults with ADHD perform poorly on long-term memory tests. However, the cause of this effect is still controversial. The present meta-analysis examined underlying mechanisms that may lead to long-term memory impairments in adult ADHD. Method: We performed separate meta-analyses of measures of memory acquisition and long-term memory using both verbal and visual memory tests. In addition, the influence of potential moderator variables was examined. Results: Adults with ADHD performed significantly worse than controls on verbal but not on visual long-term memory and memory acquisition subtests. The long-term memory deficit was strongly statistically related to the memory acquisition deficit. In contrast, no retrieval problems were observable. Conclusion: Our results suggest that memory deficits in adult ADHD reflect a learning deficit induced at the stage of encoding. Implications for clinical and research settings are presented.
APA, Harvard, Vancouver, ISO, and other styles
27

Mayberry, Rachel I. "First-Language Acquisition After Childhood Differs From Second-Language Acquisition." Journal of Speech, Language, and Hearing Research 36, no. 6 (December 1993): 1258–70. http://dx.doi.org/10.1044/jshr.3606.1258.

Full text
Abstract:
This study determined whether the long-range outcome of first-language acquisition, when the learning begins after early childhood, is similar to that of second-language acquisition. Subjects were 36 deaf adults who had contrasting histories of spoken and sign language acquisition. Twenty-seven subjects were born deaf and began to acquire American Sign Language (ASL) as a first language at ages ranging from infancy to late childhood. Nine other subjects were born with normal hearing, which they lost in late childhood; they subsequently acquired ASL as a second language (because they had acquired spoken English as a first language in early childhood). ASL sentence processing was measured by recall of long and complex sentences and short-term memory for signed digits. Subjects who acquired ASL as a second language after childhood outperformed those who acquired it as a first language at exactly the same age. In addition, the performance of the subjects who acquired ASL as a first language declined in association with increasing age of acquisition. Effects were most apparent for sentence processing skills related to lexical identification, grammatical acceptability, and memory for sentence meaning. No effects were found for skills related to fine-motor production and pattern segmentation.
APA, Harvard, Vancouver, ISO, and other styles
28

Lafosse, Jose M., Sandra M. Mitchell, John R. Corboy, and Christopher M. Filley. "The Nature of Verbal Memory Impairment in Multiple Sclerosis: A List-Learning and Meta-analytic Study." Journal of the International Neuropsychological Society 19, no. 9 (September 23, 2013): 995–1008. http://dx.doi.org/10.1017/s1355617713000957.

Full text
Abstract:
AbstractThe primary purpose of this study was to test the hypothesis that multiple sclerosis (MS) patients have impaired acquisition rather than a retrieval deficit. Verbal memory impairment in MS was examined in 53 relapsing-remitting MS patients and 31 healthy controls (HC), and in a meta-analysis of studies that examined memory functioning in MS with list-learning tasks. The MS group demonstrated significantly lower acquisition and delayed recall performance than the HC group, and the meta-analysis revealed that the largest effect sizes were obtained for acquisition measures relative to delayed recall and recognition. Our data argue against a retrieval deficit as the sole explanation for verbal memory impairment in MS, and make a consistent case for the position that deficient acquisition contributes to the memory dysfunction of MS patients. Deficient acquisition may result from demyelination in relevant white matter tracts that reduces encoding efficiency as a result of impaired speed of information processing. (JINS, 2013, 19, 995–1008)
APA, Harvard, Vancouver, ISO, and other styles
29

Finardi, Kyria R., and Rosane Silveira. "Working memory capacity in the production and acquisition of a syntactic rule in L2 speech." Revista Brasileira de Linguística Aplicada 11, no. 1 (2011): 199–221. http://dx.doi.org/10.1590/s1984-63982011000100011.

Full text
Abstract:
This study investigates the extent to which working memory capacity is related to the production and acquisition of a syntactic structure of L2 speech. Information Processing Theory guides the research, as the authors assume the operation of a dual code cognitive system made up of a rule-based and a memory-based system (SKEHAN, 1998) responsible for analyzing and synthesizing language, respectively. L2 acquisition is also discussed in terms of processing input for meaning and form. Overall results show that working memory capacity is related to the production and acquisition of a syntactic structure in L2 speech, but this relationship is stronger for acquisition.
APA, Harvard, Vancouver, ISO, and other styles
30

Flores-Salgado, Elizabeth, and Aldo Falú Gutiérrez-Koyoc. "Working Memory and Cross-Linguistic Influence on Vocabulary Acquisition." Brain Sciences 14, no. 8 (August 9, 2024): 796. http://dx.doi.org/10.3390/brainsci14080796.

Full text
Abstract:
The purpose of this study was to analyze the cross-linguistic influence of previously learned languages and working memory capacities on the vocabulary performance of two different typological languages. The objectives of this study were (1) to compare the working memory capacities of bilingual adults in relation to the vocabulary performance of two different languages never learned by the participants, and (2) to analyze to what extent the typology of previously learned languages influences working memory capacities in relation to the vocabulary performance of French and Nahuatl. A group of 43 Mexican Spanish college students participated in this experimental study. The participants completed a series of working memory tasks in Nahuatl and French. The results showed that working memory capacities were lower in Nahuatl than in French. Thus, a correlation was found between their first and second language and vocabulary performance in French. We can consider the influence of previously learned languages as a significant factor in vocabulary acquisition in accordance with the participants’ working memory capacities.
APA, Harvard, Vancouver, ISO, and other styles
31

Thomas, Richard, Mikkel Malling Beck, Rune Rasmussen Lind, Line Korsgaard Johnsen, Svend Sparre Geertsen, Lasse Christiansen, Christian Ritz, Marc Roig, and Jesper Lundbye-Jensen. "Acute Exercise and Motor Memory Consolidation: The Role of Exercise Timing." Neural Plasticity 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6205452.

Full text
Abstract:
High intensity aerobic exercise amplifies offline gains in procedural memory acquired during motor practice. This effect seems to be evident when exercise is placed immediately after acquisition, during the first stages of memory consolidation, but the importance of temporal proximity of the exercise bout used to stimulate improvements in procedural memory is unknown. The effects of three different temporal placements of high intensity exercise were investigated following visuomotor skill acquisition on the retention of motor memory in 48 young (24.0 ± 2.5 yrs), healthy male subjects randomly assigned to one of four groups either performing a high intensity (90% Maximal Power Output) exercise bout at 20 min (EX90), 1 h (EX90+1), 2 h (EX90+2) after acquisition or rested (CON). Retention tests were performed at 1 d (R1) and 7 d (R7). At R1 changes in performance scores after acquisition were greater for EX90 than CON (p<0.001) and EX90+2 (p=0.001). At R7 changes in performance scores for EX90, EX90+1, and EX90+2 were higher than CON (p<0.001,p=0.008, andp=0.008, resp.). Changes for EX90 at R7 were greater than EX90+2 (p=0.049). Exercise-induced improvements in procedural memory diminish as the temporal proximity of exercise from acquisition is increased. Timing of exercise following motor practice is important for motor memory consolidation.
APA, Harvard, Vancouver, ISO, and other styles
32

Tabrizian, K., SS Musavi, M. Rigi, F. Hosseindadi, S. Kordi, F. Shamshirgaran, A. Bazi, J. Shahraki, R. Rezaee, and M. Hashemzaei. "Behavioral and molecular effects of intrahippocampal infusion of auraptene, resveratrol, and curcumin on H-89-induced deficits on spatial memory acquisition and retention in Morris water maze." Human & Experimental Toxicology 38, no. 7 (April 3, 2019): 775–84. http://dx.doi.org/10.1177/0960327119839160.

Full text
Abstract:
Our aim was to investigate the effects of resveratrol, auraptene, and curcumin on the spatial learning and spatial memory retention in the Morris water maze (MWM). The effects of 4-day bilateral intrahippocampal (i.h.) infusions of dimethyl sulfoxide (DMSO), H-89 as a protein kinase AII inhibitor, auraptene/H-89, resveratrol/H-89, and curcumin/H-89 were investigated on spatial memory acquisition in MWM. The rats were trained for 4 days; each day included one block of four trials. Post-training probe tests were performed on day 5 in acquisition test. For retention assessments, different animals were trained for 4 days and then infused (i.h.) with either DMSO, H-89, auraptene/H-89, resveratrol/H-89, or curcumin/H-89. The retention test was performed 48 h after the last training trial. The bilateral infusion of H-89 led to a significant impairment in spatial memory in acquisition and retention tests accompanied with a significant decrease in expressions of cAMP response-element binding (CREB) and pCREB proteins in hippocampus. Resveratrol and curcumin reversed the H-89-induced spatial memory acquisition and retention impairments with significant increases in both CREB and pCREB proteins expressions compared to H-89-treated animals. Auraptene showed significant effects in reversing H-89-induced impairments in spatial memory retention but not spatial memory acquisition.
APA, Harvard, Vancouver, ISO, and other styles
33

Sudhakaran, Sneha, Aisha Ali-Gombe, Andrew Case, and Golden Richard III. "Evaluating the Reliability of Android Userland Memory Forensics." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 423–32. http://dx.doi.org/10.34190/iccws.17.1.54.

Full text
Abstract:
Memory Forensics is one of the most important emerging areas in computer forensics. In memory forensics, analysis of userland memory is a technique that analyses per-process runtime data structures and extracts significant evidence for application-specific investigations. In this research, our focus is to examine the critical challenges faced by process memory acquisition that can impact object and data recovery. Particularly, this research work seeks to address the issues of consistency and reliability in userland memory forensics on Android. In real-world investigations, memory acquisition tools record the information when the device is running. In such scenarios, each application’s memory content may be in flux due to updates that are in progress, garbage collection activities, changes in process states, etc. In this paper we focus on various runtime activities such as garbage collection and process states and the impact they have on object recovery in userland memory forensics. The outcome of the research objective is to assess the reliability of Android userland memory forensic tools by providing new research directions for efficiently developing a metric study to measure the reliability. We evaluated our research objective by analysing memory dumps acquired from 30 apps in different Process Acquisition Modes. The Process Acquisition Mode (PAM) is the memory dump of a process that is extracted while external runtime factors are triggered. Our research identified an inconsistency in the number of objects recovered from analysing the process memory dumps with runtime factors included. Particularly, the evaluation results revealed differences in the count of objects recovered in different acquisition modes. We utilized Euclidean distance and covariance as the metrics for our study. These two metrics enabled the authors to identify how the change in the number of recovered objects in PAM impact forensic analysis. Our conclusion revealed that runtime factors could on average result in about 20% data loss, thus revealing these factors can have an obvious impact on object recovery.
APA, Harvard, Vancouver, ISO, and other styles
34

Zhang, Guang Zhi, Da Jun Yue, Feng Li Ding, and Yan Qun Xie. "Research on the Wireless Multi-Point Temperature Acquisition and SD Card Memory System." Advanced Materials Research 295-297 (July 2011): 2624–27. http://dx.doi.org/10.4028/www.scientific.net/amr.295-297.2624.

Full text
Abstract:
Combining the low power loss technology with SD card, this system is designed, which is convenient for us to obtain the temperature data of the environment and in which the temperature acquisition module and the data receive memory module are included. The temperature acquisition module is responsible for transmitting the acquired valid temperature value into the data receive memory module by wireless, while the data receive memory module mainly stored the received effective data into SD card after being processed. With the wireless temperature acquisition system, it is convenient for us to acquire and record the multi-point temperature values from the environment.
APA, Harvard, Vancouver, ISO, and other styles
35

Rao, Fang. "Influence of Working Memory Capacity on English Language Learning of High School Students School." Journal of Education and Educational Research 9, no. 3 (July 30, 2024): 408–13. http://dx.doi.org/10.54097/t9msct63.

Full text
Abstract:
In recent years, the relationship between working memory and second language acquisition has been a hot topic in the field of second language acquisition. The impact of second language learners’ working memory capacity on their second language acquisition is inconclusive. Researchers have called for further investigation into the role of working memory in second language development when reviewing literature on working memory in second language acquisition. called for further investigation into the role of working memory in second language development when reviewing literature on working memory in second language contexts and language contexts. Therefore, this study aims to explore whether and how working memory capacity affects overall English proficiency. The research question is: what is the correlation between high school students' working memory capacity and their English grades? This study used empirical research methods and randomly selected 37 high school students from a school in Dujiangyan, Chengdu as participants. empirical research methods and randomly selected 37 high school students from a school in Dujiangyan, Chengdu as participants. Data sources included Data sources included working memory capacity tests and English proficiency tests, both of which were conducted in the students’ classrooms. Descriptive statistics and Pearson correlation analysis were performed using SPSS 26.0 statistical analysis software. The study shows that there is a significant correlation between working memory capacity and English proficiency test scores. The correlation between The correlation between working memory and English proficiency test scores suggests that individual differences in working memory capacity can affect important cognitive activities such as listening, reading comprehension, reasoning, writing, and problem-solving. The correlation between working memory and English proficiency test scores suggests that individual differences in working memory capacity can affect important cognitive activities such as listening, reading comprehension, reasoning, writing, and problem-solving.
APA, Harvard, Vancouver, ISO, and other styles
36

Fuster, Joaquín M. "More than working memory rides on long-term memory." Behavioral and Brain Sciences 26, no. 6 (December 2003): 737. http://dx.doi.org/10.1017/s0140525x03300160.

Full text
Abstract:
Single-unit data from the cortex of monkeys performing working-memory tasks support the main point of the target article. Those data, however, also indicate that the activation of long-term memory is essential to the processing of all cognitive functions. The activation of cortical long-term memory networks is a key neural mechanism in attention (working memory is a form thereof), perception, memory acquisition and retrieval, intelligence, and language.
APA, Harvard, Vancouver, ISO, and other styles
37

Choi, Sungmook. "Gloss, Working Memory Capacity, and L2 Vocabulary Acquisition." Journal of Modern British & American Language & Literature 34, no. 3 (August 31, 2016): 247. http://dx.doi.org/10.21084/jmball.2016.08.34.3.247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Liu, Bin, Ying-xian Chang, Lian-ri Cong, Xia Wu, Hua Deng, Yang-chun Li, and Bo-wen Xu. "A Memory Acquisition Method for Android Application Forensics." Journal of Physics: Conference Series 1314 (October 2019): 012180. http://dx.doi.org/10.1088/1742-6596/1314/1/012180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Michas, Irene C., and Lucy A. Henry. "The link between phonological memory and vocabulary acquisition." British Journal of Developmental Psychology 12, no. 2 (June 1994): 147–63. http://dx.doi.org/10.1111/j.2044-835x.1994.tb00625.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Negro, V. C. "A battery operated bubble memory data-acquisition system." IEEE Transactions on Instrumentation and Measurement 37, no. 2 (June 1988): 305–8. http://dx.doi.org/10.1109/19.6072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Pérez, Libia Maritza, and Roberto Alvira. "The Acquisition of Vocabulary Through Three Memory Strategies." Colombian Applied Linguistics Journal 19, no. 1 (February 10, 2017): 103. http://dx.doi.org/10.14483/calj.v19n1.10032.

Full text
Abstract:
The present study reports on an action research study that explores the implications of applying three vocabulary strategies: word cards, association with pictures, and association with a topic through fables in the acquisition of new vocabulary in a group of EFL low-level proficiency teenagers in a public school in Espinal, Tolima, Colombia. The participants had never used vocabulary strategies before and struggled to memorize and recall words. Two types of questionnaires, a researcher’s journal, and vocabulary tests were the instruments used to gather data. The results showed that these strategies were effective to expand the range of words progressively and improve the ability to recall them. The study also found that these strategies involve cognitive and affective factors that can affect students’ perception about the strategies and their use. The implementation of the strategies highlighted the need to train teachers and learners in strategies intended to teach and learn vocabulary and to include them in the English language program in any school.
APA, Harvard, Vancouver, ISO, and other styles
42

Epstein, A., and C. Boulin. "High capacity, high speed histogramming data acquisition memory." IEEE Transactions on Nuclear Science 43, no. 1 (February 1996): 159. http://dx.doi.org/10.1109/23.486023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Carlson, Richard A., Boo Hock Khoo, Robin G. Yaure, and Walter Schneider. "Working memory and skill acquisition: Reply to Halpern." Journal of Experimental Psychology: General 119, no. 3 (September 1990): 333–34. http://dx.doi.org/10.1037/0096-3445.119.3.333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Carmack, Stephanie A., Carina L. Block, Kristin K. Howell, and Stephan G. Anagnostaras. "Methylphenidate enhances acquisition and retention of spatial memory." Neuroscience Letters 567 (May 2014): 45–50. http://dx.doi.org/10.1016/j.neulet.2014.03.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Xu, Zhi-Wei, Bing Hou, Yun-Feng Li, Yan Gao, Zhen-Tao Su, Guo-Shan Yang, Shi-Fu Zhao, Fu-Chu He, and Cheng-Gang Zhang. "Theophylline attenuates microwave-induced impairment of memory acquisition." Neuroscience Letters 412, no. 2 (January 2007): 129–33. http://dx.doi.org/10.1016/j.neulet.2006.10.059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Abel, Ted, and K. Matthew Lattal. "Molecular mechanisms of memory acquisition, consolidation and retrieval." Current Opinion in Neurobiology 11, no. 2 (April 2001): 180–87. http://dx.doi.org/10.1016/s0959-4388(00)00194-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Clark, David M., and K. Ravishankar. "Acquisition and decay rates in synaptically coded memory." Neural Networks 3, no. 5 (January 1990): 525–33. http://dx.doi.org/10.1016/0893-6080(90)90003-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Schatz, Bradley. "BodySnatcher: Towards reliable volatile memory acquisition by software." Digital Investigation 4 (September 2007): 126–34. http://dx.doi.org/10.1016/j.diin.2007.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Huebner, Ewa, Derek Bem, Frans Henskens, and Mark Wallis. "Persistent systems techniques in forensic acquisition of memory." Digital Investigation 4, no. 3-4 (September 2007): 129–37. http://dx.doi.org/10.1016/j.diin.2008.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Vömel, Stefan, and Johannes Stüttgen. "An evaluation platform for forensic memory acquisition software." Digital Investigation 10 (August 2013): S30—S40. http://dx.doi.org/10.1016/j.diin.2013.06.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography