منابع مشابه
Edge-tenacity in Networks
Numerous networks as, for example, road networks, electrical networks and communication networks can be modeled by a graph. Many attempts have been made to determine how well such a network is "connected" or stated differently how much effort is required to break down communication in the system between at least some nodes. Two well-known measures that indicate how "reliable" a graph is are the...
متن کاملsecuritization of mortality risks in life annuities
insurers have in the past few decades faced longevity risks - the risk that annuitants survive more than expected - and therefore need a new approach to manage this new risk. in this dissertation we survey methods that hedge longevity risks. these methods use securitization to manage risk, so using modern financial and insurance pricing models, especially wang transform and actuarial concepts, ...
15 صفحه اولUse dependence of presynaptic tenacity.
Recent studies indicate that synaptic vesicles (SVs) are continuously interchanged among nearby synapses at very significant rates. These dynamics and the lack of obvious barriers confining synaptic vesicles to specific synapses would seem to challenge the ability of synapses to maintain a constant amount of synaptic vesicles over prolonged time scales. Moreover, the extensive mobilization of s...
متن کاملTenacity of avian influenza viruses.
The goal of this review is to provide an overview of existing research on the environmental tenacity of avian influenza (AI) viruses, to identify gaps in our current understanding, and discuss how this information relates to AI control, eradication, and prevention. We are just beginning to understand the environmental factors that affect infectivity and the extent of variation in environmental ...
متن کاملSome Results on Tenacity of Graphs∗
The tenacity of an incomplete connected graph G is defined as T (G) = min{ |S|+m(G−S) ω(G−S) : S ⊂ V (G), ω(G− S) > 1}, where ω(G− S) and m(G− S), respectively, denote the number of components and the order of a largest component inG−S. This is a reasonable parameter to measure the vulnerability of networks, as it takes into account both the amount of work done to damage the network and how bad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific American
سال: 1917
ISSN: 0036-8733
DOI: 10.1038/scientificamerican03031917-133asupp