نتایج جستجو برای: case
تعداد نتایج: 1354883 فیلتر نتایج به سال:
background: gastric cancer is the second most common cause of death from cancer. as conflicting studies have recently been published, we aimed to evaluate the magnitude of the epidemiological evidence for an association between alcohol consumption and gastric cancer. methods: this study is a meta-analysis of case-control studies which have been performed during 1989 to 2007. we systematically r...
fusion is a rare occurrence in molar teeth. the purpose of this rare case presentation is to describe the nonsurgical endodontic treatment of maxillary molar. a 28-year-old patient was referred for endodontic treatment of her chronic apical abscess of right maxillary second molar. in the clinical examination, a sinus tract adjacent to involved tooth and a small crown of supernumerary tooth fuse...
objective: calpains are a family of ca 2+ dependent proteases. there is some evidence that calpains involved in fusion process that occurs between spermatozoa and the oocyte. the current study aimed to investigate the association of smoking with semen quality and µ-calpain level. materials and methods: this case-control study was conducted on 117 normospermia males between june 2013 and march ...
We study the asymptotic behavior of P(X − Y > u) as u → ∞, where X is subexponential, Y is positive and the random variables X,Y may be dependent. We give criteria under which the subtraction of Y does not change the tail behavior of X. It is also studied under which conditions the comonotonic copula represents the worst-case scenario for the asymptotic behavior in the sense of minimizing the t...
This work is a survey on a special minsum-maxmin bicriteria problem, known as the quickest path problem, that can model the transmission of data between two nodes of a network. Moreover, the authors review the problems of ranking the K quickest paths, and the K quickest loopless paths, and compare them in terms of the worst-case complexity order. The classification presented led to the proposal...
Misuse cases, the inverted version of a use case can be used to elicit security requirements. Abuse cases also are used in eliciting security requirements. Their notation appears to be similar. This paper presents a brief comparison between misuse cases and abuse cases. It is observed that misuse cases are able to model a wider range of mis-users and they also interact with use cases in interes...
In this paper we present a novel methodology for textual case-based reasoning. This technique is unique in that it automatically discovers case and similarity knowledge, is language independent, is scaleable and facilitates semantic similarity between cases to be carried out inherently without the need for domain knowledge. In addition it provides an insight into the thematical content of the c...
In brief, this license authorizes each and everybody to share (to copy, distribute and transmit) the work under the following conditions, without impairing or restricting the authors' moral rights: Attribution: The work must be attributed to its authors. Some format issues inherent in the e-media version may also appear in this print version.
We consider the problem of evaluating an expression consisting of unions and intersections of some sorted sets in the comparison model. Given the expression and the sizes of the sets, we are interested in the worst-case complexity of evaluating the expression in terms of the sizes of the sets. We assume the sets in the given expression are independent. We show a lower bound on this problem and ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید