نتایج جستجو برای: closure
تعداد نتایج: 53479 فیلتر نتایج به سال:
Any hereditarily finite set S can be represented as a finite pointed graph –dubbed membership graph– whose nodes denote elements of the transitive closure of {S} and whose edges model the membership relation. Membership graphs must be hyper-extensional –nodes are pairwise not bisimilar– and bisimilar nodes represent the same hereditarily finite set. It is worth to notice that the removal of eve...
Let 1 < q < p < ∞ and q ≤ r ≤ p. Let X be a reflexive Banach space satisfying a lower-lq-tree estimate and let T be a bounded linear operator from X which satisfies an upper-lp-tree estimate. Then T factors through a subspace of ( ∑ Fn)lr , where (Fn) is a sequence of finite-dimensional spaces. In particular, T factors through a subspace of a reflexive space with an (lp, lq) FDD. Similarly, let...
For a set Ω an unordered relation on Ω is a family R of subsets of Ω . If R is such a relation we let G(R) be the group of all permutations on Ω that preserve R, that is g belongs to G(R) if and only if x ∈R implies x ∈R. We are interested in permutation groups which can be represented as G= G(R) for a suitable unordered relation R on Ω . When this is the case, we say that G is defined by the r...
The orbits of a Borel subgroup acting on a symmetric variety G/H occur in several areas of mathematics. For example, these orbits and their closures are essential in the study of Harish Chandra modules (see [Vog83]). There are several descriptions of these orbits, but in practice it is actually very difficult and cumbersome to compute the orbits and their closures. Since the characterizations o...
Humans are “smart components” in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives provided to induce desired behavior. Sometimes these incentives are properly aligned, and the humans don’t represent a vulnerability. But often, a misalignment of incentives causes a weakness in the system that can be exploited b...
BACKGROUND The treatment of traumatic tympanic membrane perforations varies in different investigations, ranging from observation to early surgical repair. The present study aimed to focus on the closure rate and the closure time in a group of patients treated with a watchful waiting policy. METHODS The study comprised 133 consecutive patients with a total of 137 perforations. Data were evalu...
BACKGROUND Growing evidence in the orthopaedic arthroplasty literature supports the use of running bidirectional barbed suture (barbed suture) for closure of knee arthrotomies. More rapid wound closure and suture line integrity are described as its major advantages. No studies of barbed suture for the closure of posterior spinal wounds exist. The purpose of this project is to compare wound clos...
BACKGROUND In modern obstetrics caesarean sections are commonly used and in all caesarean sections either peritoneal closure is done or not. This cases series was conducted to record outcomes in our setup. METHODS Cases of caesarean sections were followed for adhesions and non-adhesions in peritoneal closure and non-closure cases from 1't January to December 2011 at DHQ Hospital Haripur. In n...
Aims: To evaluate the clinical significance of macular hole closure types assessed by optical coherence tomography (OCT). Methods: This study involved 34 eyes of 32 patients who had undergone anatomically successful idiopathic macular hole surgery. The closed macular holes were categorised into two patterns based on OCT; type 1 closure (closed without foveal neurosensory retinal defect) and typ...
Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal" mso-tsty...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید