نتایج جستجو برای: Lost Output

تعداد نتایج: 256421  

The main objective of this study is to estimate a part of road traffic injury costs including costs due to fatality and disability, which are related to lost social products. Lost output consists of costs, which are related to losses of national product or lost-income in death, hospitalization or physical disabilities. In recent years, the Disability-Adjusted Life Years (DALYs) has been used as...

Journal: :trauma monthly 0
hamid reza behnood department of civil engineering, imam khomeini international university, qazvin, ir iran; department of civil engineering, imam khomeini international university, qazvin, ir iran. tel: +98-9153143674 mashyaneh haddadi ministry of health and medical education, tehran, ir iran shadrokh sirous world health organization representative office, tehran, ir iran elaheh ainy safety promotion and injury prevention research center, shahid beheshti university of medical sciences, tehran ir iran reza rezaei ministry of health and medical education, tehran, ir iran

background road traffic injuries (rtis) impose a significant social and economic burden. objectives the objective of this study was to estimate the medical costs and economic burden caused by rti in iran methods the major components included in this study were medical costs, lost output, and indirect costs. cost components and their values in 2011 were obtained using previous data collected dur...

1999
Vladimir V. Usov

We discuss plausible locations of radiating regions in the magnetospheres of pulsars and argue that the mechanisms of pulsar radiation at different frequencies are closely connected with the locations of the radiating regions, especially in the radio range. If the region that is responsible for the bulk of the non-thermal radiation at some frequency is localized in the pulsar magnetosphere then...

2011
JILING CAO W. B. MOORS

In this paper, topological properties of Wijsman hyperspaces are investigated. We study the existence of isolated points in Wijsman hyperspaces. We show that every Tychonoff space can be embedded as a closed subspace in the Wijsman hyperspace of a complete metric space which is locally R.

2007
T. Joseph J. Fischer

We report 60 and 90 m observations of seven millisecond pulsars with the Infrared Space Observatory. The pulsar PSR B1257+12 is orbited by three planets, and other millisecond pulsars may be orbited by dust disks that represent planets that failed to form or their residue. We do not detect any infrared emission from the seven pulsars in our sample, and typical upper limits are 100 mJy. Using a ...

Background:  The objective of the study was to appraise the total dollar value of human life losses (TDVHL) associated with COVID-19 in Canada. Methods: The net output approach (also known as human capital approach) was applied in the dollar valuation of the 6,062 human life losses associated with COVID-19 in Canada as of 23 May 2020. The economic model was rerun five times: (a) using the nati...

2008
JILING CAO H. J. K. JUNNILA

In this paper, we show that for an almost locally separable metrizable space X, if its Wijsman hyperspace induced by one compatible metric is Baire, then X itself must be Baire. We also provide an example to demonstrate the necessity of separability.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده ادبیات و علوم انسانی 1392

abstract the present study investigated the effects of task types and involvement load hypothesis on incidental learning of 10 target words (tws) in junior high schools (jhss) in givi, ardabil. the tasks deployed in this study were two input-based tasks (reading plus dictionary use with an involvement index of 3, and reading plus gap-fill task with an involvement index of 2), and one output-ba...

2011
Jens Heider Matthias Boll

The paper highlights risks that accompany losing a locked iOS device regarding confidentiality of passwords stored in the keychain. It presents results of handson tests that show the possibility for attackers to reveal some of the keychain entries. For the described approach, the knowledge of the user’s secret passcode is not needed, as the protection provided by the passcode is bypassed.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید