Search results for "xec"
showing 10 items of 533 documents
Parkinsonian Patients with Deficits in the Dysexecutive Spectrum are Impaired on Theory of Mind Tasks
2013
Understanding the mental states of others entails a number of cognitive processes known as Theory of Mind (ToM). A relationship between ToM deficits and executive disorders has been hypothesized in individuals with Parkinson's disease (PD). The present study was aimed at investigating the effect of dysexecutive deficits on ToM abilities in PD patients without dementia. Participants included 30 PD patients and 30 healthy subjects (HC). PD patients were divided into two groups according to their executive test performance: patients with poor (dysexecutive group; n = 15) and normal (executively unimpaired group; n = 15) performance. All participants were administered faux pas recognition writt…
Testing of Execution of Concurrent Processes
2020
Authors propose an algorithm for analysis of business processes to detect potentially incorrect results of concurrent processes execution. Our novel approach is to conclude necessary database isolation level from business process description. If traditional languages with loops and arithmetic operations (two-way counters) are used for business process descriptions, the problem of detecting incorrect execution of concurrent processes cannot be algorithmically solved. This paper introduces a simplified business processes description language CPL-1, a transaction mechanism and an algorithm that supports detection of incorrect results during the concurrent execution of business processes. Busin…
Corrigendum to “European Resuscitation Council Guidelines 2021: Executive summary” [Resuscitation (2021) 1–60]
2021
ISAdetect
2020
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…
Ring 17 syndrome: first clinical report without intellectual disability
2015
Ring chromosomes are rare abnormalities caused by the fusion of the telomeric regions. Three-ring chromosome syndromes (Cr 20, Cr 17 and Cr 14) cause epilepsy with variable phenotypes. In ring 17 patients with mild phenotype, some authors have shown an epilepsy syndrome similar to that of ring 20. We report the first case of a girl with ring chromosome 17 and a normal neurological and general cognitive profile. She had had, from 9 years old, focal pharmacoresistant epilepsy associated with episodes of non-convulsive status epilepticus with mainly autonomic features. Cytogenetic analysis revealed an abnormal karyotype characterised by the presence of de novo ring chromosome 17 in 19% of meta…
E-MIP: A new mechanism for dynamic coalition formation in a robot team
2004
When mobile robots colonies move in dynamic, not predictable and time variable environments, the problem now is on how can they achieve distributed solving strategies for solving complicate and difficult tasks. The development of a new robotic architecture for the coordination of robot colonies in dangerous and dynamic environments is outlined. The name of this new architecture is Economic Metaphor of Italian Politics (E-MIP), because it takes inspiration from the political organizations of Italian democratic governments, where the leader isn't only one robot but a government of three robots constitutes it while a second group of robots, the Robot Citizens, are the executor of the mission. …
An Approach to Data Quality Evaluation
2018
This research proposes a new approach to data quality evaluation comprising 3 aspects: (1) data object definition, which quality will be analyzed, (2) quality requirements specification for the data object using Domain Specific Language (DSL), (3) implementation of an executable data quality model that would enable scanning of data object and detect its shortages. Like the Model Driven Architecture (MDA) the data quality modelling is divided into platform independent (PIM) and platform-specific (PSM) models. PIM comprises informal specifications of data quality, PSM describes implementation of data quality model, thus making the data quality model executable. The approbation of the proposed…
The Impact of Inattention, Hyperactivity/Impulsivity Symptoms, and Executive Functions on Learning Behaviors of Children with ADHD
2017
Children diagnosed with attention deficit/hyperactivity disorder (ADHD) are at risk of experiencing lower academic achievement compared to their peers without ADHD. However, we have a limited understanding of the mechanisms underlying this association. Both the symptoms of the disorder and the executive functions can negatively influence learning behaviors, including motivation, attitude toward learning, or persistence, key aspects of the learning process. The first objective of this study was to compare different components of learning behaviors in children diagnosed with ADHD and typically developing (TD) children. The second objective was to analyze the relationships among learning behav…
Characterizing cognitive problem-solving strategies in patients’ everyday life: The case of patients with Type 1 diabetes
2021
Introduction:Numerous quantitative studies have shown the importance of executive functions (planning, attention, inhibition, and short-term memory) for diabetes treatment compliance. Those studies also point to the paucity of data on action strategies employed by persons with diabetes. The aim of this study is to characterize the action strategies used in six situations typically encountered by persons with Type 1 diabetes (no comorbidities).Methods:This qualitative multiple-case study concerns adult patients with no comorbidities. Eighteen patients were presented with six clinical vignettes portraying emblematic situations and then interviewed. After categorization, the 108 situations wer…
Risks of Concurrent Execution in E-Commerce Processes
2021
The development of ICT facilitates replacing the traditional buying and selling processes with e-commerce solutions. If several customers are served concurrently, e.g. at the same time, the processes can interference each other causing risks for both the buyer and the seller. The paper offers a method to identify purchase/sale risks in simultaneous multi-customer service processes. First, an exact model of buying-selling processes is created and the conditions for the correct process execution are formulated. Then an analysis of all the possible scenarios, including the concurrently executed buying-selling scenarios, is performed using a symbolic execution of process descriptions. The obtai…