There is a need for validated, theory-driven methods for memory detection. We review how physiological, neurophysiological, and oculomotor measures can be utilized to reveal concealed memories. Recent advances and future directions are discussed in light of the potential of eye-tracking to improve detection efficiency and resolve problems in real-world settings.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1016/j.tics.2022.08.019 | DOI Listing |
Aging Ment Health
January 2025
School of Nursing, Johns Hopkins University, Baltimore, MD, USA.
Objectives: This scoping review aims to map out the coping strategies among Persons with Mild Cognitive Impairment (PwMCI) and Persons with Mild Dementia (PwMD), identifying the facilitators and the barriers to the use of the strategies.
Method: We conducted a systematic search of peer-reviewed studies in PubMed, CINAHL, EMBASE, and PsycINFO. Under the guidance of the Coping Circumflex Model, we identified coping strategies and then conducted thematic synthesis.
Int J Psychophysiol
January 2025
Faculty of Psychology, University of Warsaw, Poland.
Lukács et al. (2017) enhanced the Reaction Time Concealed Information Test (RT CIT) by incorporating "filler" items. Fillers are intended to increase attention and cognitive load, which should potentially enhance the P300 based CIT (P300-CIT) too.
View Article and Find Full Text PDFMemory
January 2025
Department of Psychology, University of Portsmouth, Portsmouth, UK.
Many witnesses are intoxicated at crime scenes, yet little is known of their ability to accurately describe perpetrators to police. We therefore explored the impact of alcohol on delayed verbal face recall across two experiments. Participants were administered an alcoholic or non-alcoholic beverage prior to viewing either one or two unfamiliar female faces, which they described from memory the following day while in a sober state.
View Article and Find Full Text PDFCommun Biol
December 2024
Jane Goodall Institute Spain in Senegal, Dindefelo Biological Station, Kedougou, Senegal.
Nanoscale Horiz
December 2024
Department of Materials Science and Engineering and Inter-University Semiconductor Research Center, Seoul National University Gwanak-ro 1, Gwanak-gu, Seoul 08826, Republic of Korea.
The importance of hardware security increases significantly to protect the vast amounts of private data stored on edge devices. Physical unclonable functions (PUFs) are gaining prominence as hardware security primitives due to their ability to generate true random digital keys by exploiting the inherent randomness of the physical devices. Traditional approaches, however, require significant data movement between memory units and PUF generation circuits to perform encryption, presenting considerable energy efficiency and security challenges.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!