Does the d2 Test of Attention only assess sustained attention? Evidence of working memory processes involved.

Appl Neuropsychol Adult

Laboratory of Aging and Neurodegenerative Disorder, Department of Psychology, Federal University of Paraiba, Joao Pessoa, Brazil.

Published: August 2024

The d2 Test of Attention (d2) is widely used for assessing sustained attention and we aimed at verifying whether working memory may be a secondary construct measured by d2. 70 university students were assessed using d2 conventional paper-and-pencil and computational version. The experimental group and control group performed the task with or without target key, respectively. Continuous Performance Test (CPT) and N-back (1 and 2-back) tasks were used to measure sustained attention and working memory, respectively. Computational d2 performance was predicted by CPT ( < .05; = .15) in the experimental group, and it was predicted by 2-back ( < .05; = .28) in the control group. Conventional d2 performance was predicted by 2-back for both control group ( = .01; = .20) and experimental group ( = .02, = .17). Results suggest the involvement of working memory in d2, possibly a secondary construct assessed by this instrument.

Download full-text PDF

Source
http://dx.doi.org/10.1080/23279095.2021.2023152DOI Listing

Publication Analysis

Top Keywords

working memory
16
experimental group
12
control group
12
test attention
8
sustained attention
8
memory secondary
8
secondary construct
8
performance predicted
8
predicted 2-back
8
2-back control
8

Similar Publications

Attention-Based PSO-LSTM for Emotion Estimation Using EEG.

Sensors (Basel)

December 2024

Department of Information and Electronic Engineering, International Hellenic University, 57001 Thessaloniki, Greece.

Recent advances in emotion recognition through Artificial Intelligence (AI) have demonstrated potential applications in various fields (e.g., healthcare, advertising, and driving technology), with electroencephalogram (EEG)-based approaches demonstrating superior accuracy compared to facial or vocal methods due to their resistance to intentional manipulation.

View Article and Find Full Text PDF

A Combined CNN-LSTM Network for Ship Classification on SAR Images.

Sensors (Basel)

December 2024

ENSTA Bretagne, Lab-STICC, UMR CNRS 6285, 29806 Brest, France.

Satellite SAR (synthetic aperture radar) imagery offers global coverage and all-weather recording capabilities, making it valuable for applications like remote sensing and maritime surveillance. However, its use in machine learning-based automatic target classification faces challenges, including the limited availability of SAR target training samples and the inherent constraints of SAR images, which provide less detailed features compared to natural images. These issues hinder the effective training of convolutional neural networks (CNNs) and complicate the transfer learning process due to the distinct imaging mechanisms of SAR and natural images.

View Article and Find Full Text PDF

Semantically-Enhanced Feature Extraction with CLIP and Transformer Networks for Driver Fatigue Detection.

Sensors (Basel)

December 2024

Department of Computer Science and Software Engineering, Concordia University, Montreal, QC H3G 1M8, Canada.

Drowsy driving is a leading cause of commercial vehicle traffic crashes. The trend is to train fatigue detection models using deep neural networks on driver video data, but challenges remain in coarse and incomplete high-level feature extraction and network architecture optimization. This paper pioneers the use of the CLIP (Contrastive Language-Image Pre-training) model for fatigue detection.

View Article and Find Full Text PDF

A Mixed Reality (MR) application using an optical see-through headset was developed to assess short-term spatial memory. A study with 29 participants was conducted. Data from this study were compared to two previous studies using mobile Augmented Reality (AR) and Virtual Reality (VR) with headsets.

View Article and Find Full Text PDF

Intrusion Detection Systems (IDSs) are a crucial component of modern corporate firewalls. The ability of IDS to identify malicious traffic is a powerful tool to prevent potential attacks and keep a corporate network secure. In this context, Machine Learning (ML)-based methods have proven to be very effective for attack identification.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!