نتایج جستجو برای: s family distribution

تعداد نتایج: 1651055  

Journal: :The American Mathematical Monthly 2012
William F. Trench

Suppose that −∞ < a < b < ∞, a ≤ u1n ≤ u2n ≤ · · · ≤ unn ≤ b, and a ≤ v1n ≤ v2n ≤ · · · ≤ vnn ≤ b for n ≥ 1. We simplify and strengthen Weyl’s definition of equal distribution of {{uin} n i=1} ∞ n=1 and {{vin} n i=1} ∞ n=1 by showing that the following statements are equivalent: (i) limn→∞ 1 n ∑n i=1 (F (uin) − F (vin)) = 0 for all F ∈ C[a, b], (ii) limn→∞ 1 n ∑n i=1 |uin − vin| = 0, (iii) limn...

Abbasi, Soheila, Atrkar Roshan, Z, Fadakar Sogheh, Reyhane, Khaleghdoost, Tahereh,

Introduction: Family is a social system in which disorder in one member can disrupt the entire family system. Proper understanding of family problems of mentally retarded children teaches children, their families and professionals working with them to alter their attitudes toward proper education and development planning. Objective: Aim of this study is to determine problems of families&rsquo...

Education and support based on family&rsquo;s needs may reduce anxiety and increase satisfaction of family members of hospitalized patients in Intensive Care Unit (ICU). This study was conducted to determine the effect of educational-supportive intervention on satisfaction of family members. In this quasi-experimental study, 154 participants of family members of hospitalized patients in ICU in ...

ژورنال: علوم زمین 2011
سید احمد علوی شهرام شفیعی‌ بافتی لیلا عبادی

کانسارهای رگه­‌ای گرمابیو مس پورفیری گسترش چشمگیری در واحدهای آتشفشانی ائوسن منطقه‌‌شهر بابک دارند. در اینمقاله، الگوهای ساختاری، ارتباط میان این  عناصر با جایگیری دایک­ها و تشکیل کانسارهای رگه­ای گرمابی و مس پورفیری در این منطقه مطالعه شده است. بررسی تصاویر ماهواره­ای و مشاهدات صحرایی، سه روند گسلی WNW-ESE، <span style="font-family: Times New ...

2013
Zahra Jafargholi

Let K ∈ {0, 1}n be a key distribution and let K ∈ S, where S is a family of distributions. From now on we call S a source. We want to use K as a secret key for some encryption scheme (Enc,Dec) to encrypt message m ∈ {0, 1}b. We take two approaches. Approach 1: Extract a traditional key R and use R to encrypt. R = Ext(K) where Ext is an extractor for distribution K. For example, if |R| = b set C...

Journal: :زن در توسعه و سیاست 0
فاطمه مدیری استادیار جامعه‏ شناسی، گروه مطالعات خانواده، ازدواج و طلاق، مؤسسۀ مطالعات و مدیریت جامع و تخصصی جمعیت کشور علی رحیمی کارشناس ارشد جمعیت‏ شناسی، گروه مطالعات خانواده، ازدواج و طلاق، مؤسسۀ مطالعات و مدیریت جامع و تخصصی جمعیت کشور

this paper aim to study effect of women&apos;s employment on family stability, compare dual-worker family with single-worker family. statistical population of quantitative cross-sectional survey was married in tehran. selected 1736 samples and was analyzed. multi-stage cluster sampling method was used and due to the different economic and social classes of people, selected 50 domains in tehran....

2013
Giuseppe D'Auria Francesc Peris-Bondia Mária Džunková Alex Mira Maria Carmen Collado Amparo Latorre Andrés Moya

Host-associated microbiota varies in distribution depending on the body area inhabited. Gut microbes are known to interact with the human immune system, maintaining gut homoeostasis. Thus, we studied whether secreted-IgA (S-IgA) coat specific microbial taxa without inducing strong immune responses. To do so, we fractionated gut microbiota by flow cytometry. We found that active and S-IgA-coated...

2006
Yasutaka Ihara

[Abstract] For each global field K, we shall construct and study a basic arithmetic function M (K) σ (z) on C parametrized by σ > 1/2, together with its Fourier transform M̃ (K) σ (z). This function M (K) σ (z) is closely related to the density measure for the distribution of values on C of the logarithmic derivatives of L-functions L(χ, s), where s is fixed, with Re(s) = σ, and χ runs over a (n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید