Search results for "Weakness"
showing 10 items of 198 documents
Diagnostic and therapeutic aspects of hemiplegic migraine
2020
Hemiplegic migraine (HM) is a clinically and genetically heterogeneous condition with attacks of headache and motor weakness which may be associated with impaired consciousness, cerebellar ataxia and intellectual disability. Motor symptoms usually last <72 hours and are associated with visual or sensory manifestations, speech impairment or brainstem aura. HM can occur as a sporadic HM or familiar HM with an autosomal dominant mode of inheritance. Mutations in CACNA1A, ATP1A2 and SCN1A encoding proteins involved in ion transport are implicated. The pathophysiology of HM is close to the process of typical migraine with aura, but appearing with a lower threshold and more severity. We review…
Pattern Dystrophy of the Macula in a Case of Steinert Disease
2013
<b><i>Introduction:</i></b> Myotonic dystrophies are typically associated with ocular complications like ptosis, weakness of the ocular muscle and cataracts, but also with less recognized retinal changes. <b><i>Case Report:</i></b> A 41-year-old female with type 1 myotonic dystrophy complained of progressive vision loss. Slit lamp examination revealed the presence of typical bilateral polychromatic cataract with posterior subcapsular component. Dilated fundus examination was remarkable for bilateral macular depigmented changes. Multimodal imaging analysis of the macula suggested the presence of a butterfly-shaped pattern dystrophy. <b>&l…
Somatic Symptoms among Children and Adolescents in Poland: A Confirmatory Factor Analytic Study of the Children Somatization Inventory.
2013
The aim of the present study was to examine the factor structure and psychometric properties of the short version of the Children’s Somatization Inventory (CSI-24) in Poland. The CSI-24 is a self-report questionnaire designed to assess somatic symptoms in children and adolescents. A total of 733 children and adolescents, aged 12 to 17 years, participated in this research. The participants for this study were recruited from urban and suburban schools of Opole province in South Western Poland. In addition to the CSI-24, all participants completed the Spence Children’s Anxiety Scale (SCAS) and the Strength and Difficulties Questionnaire (SDQ). The bifactor model that included the three domain-…
A Study on the Usage of Smartphone Apps in Fire Scenarios - Comparison between GDACSmobile and SmartRescue Apps
2015
In this paper, we present a thorough overview of the two recently developed applications in the field of emergency management. The applications titled GDACSmobile and SmartRescue are using mobile app and smartphone sensors as the main functionality respectively. Furthermore, we argue the differences and similarities of both applications and highlight their strengths and weaknesses. Finally, a critical scenario for fire emergency in a music festival is designed and the applicability of the features of each application in supporting the emergency management procedure is discussed. It is also argued how the aforementioned applications can support each other during emergencies and what the pote…
Different regulatory models of transfer of industrial property rights in the Baltic States: A plea for harmonized approach
2016
AbstractThe authors explore different models of transfer of industrial property on a comparative basis. The article demonstrates that these models differ on a country level and several models may be in use in one legal system. The authors analyze strengths and weaknesses and legal implications of these models in the three Baltic States both at the regulatory level and at the practical level through case studies. The authors conclude that would be preferable to use the model under which the register is vested with negative publicity and the transfer of ownership of industrial property is not made dependent on its recordation.
Systematic Literature Reviews and Meta-Analyses
2009
SUMMARY Background: Because of the rising number of scientific publications, it is important to have a means of jointly summarizing and assessing different studies on a single topic. Systematic literature reviews, meta-analyses of published data, and meta-analyses of individual data (pooled reanalyses) are now being published with increasing frequency. We here describe the essential features of these methods and discuss their strengths and weaknesses. Methods: This article is based on a selective literature search. The different types of review and meta-analysis are described, the methods used in each are outlined so that they can be evaluated, and a checklist is given for the assessment of…
Clarifying Skills and Competencies in Organisational Decision Making – Perceptions of Finnish Communication Professionals
2017
This paper seeks to better understand the skills and competencies that Public Relations (PR) professionals use in contributing to organisational decision-making processes. The data were collected by interviewing Finnish professionals using thematic semi-structured interviews. Overall, the results highlight a deep understanding of organisation management and decision-making processes. The most important competencies were business understanding and target group oriented thinking. The findings indicate that important skills are related to writing and social media. ‘Regarding personal attributes, interaction and tolerance to criticism were acknowledged as most crucial. The conclusions suggest t…
Towards powerful old age : association between hormone replacement therapy and skeletal muscle
2010
Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach
2021
Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and are used for testing a systems security before or after implementation, and such testing is carried out against the existing system. Threat modeling however focuses on the early stages of the system design when it is feasible and easy to fix security-related flaws and prevent possible damage caused by them. For example, STRIDE is one very popular threat modeling framework. A STRIDE threat modelling specialist deals with abstract categorizations o…
"If I don’t enjoy it, how are my kids going to enjoy it?" : case study in English grammar teaching
2015
The question over how grammar should be taught has been discussed amongst s everal linguistics scholars. Different grammar teaching methods present different focus on the target language, grammar and learner’s role. All of the methods have their strengths and weaknesses and in order to know which method to pick, one must know all the strengths and weaknesses of these methods. In this case study, a teacher from Central Finland was interviewed on her grammar teaching methods and the reasons behind these methods for fifth-graders. Factors influencing her selection of methods were the grammatical topic to be taught, learners’ different learning styles, relevance of the topic and the most natura…