نتایج جستجو برای: removable

تعداد نتایج: 3907  

2015
Khaja Amjad Hussain Saleh Nasser Azzeghaibi Bassel Tarakji SenthilRajan R. S Syed Sirajuddin Sandeep S Prabhu

As the number of aged people in the world is growing, the need to provide patients with tooth alternate through removable partial dentures is equally growing. There are adversarial effects that should be kept in mind which might disturb the remaining teeth; specially, the abutments and the supporting tissues. These effects might spread to the muscles of mastication and also to the supporting pe...

2008
ALBERTO SARACCO GIUSEPPE TOMASSINI

Let X be a (connected and reduced) complex space. A qcollar of X is a bounded domain whose boundary is a union of a strongly q-pseudoconvex, a strongly q-pseudoncave and two flat (i.e. locally zero sets of pluriharmonic functions) hypersurfaces. Finiteness and vanishing cohomology theorems obtained in [17], [18] for semi q-coronae are generalized in this context and lead to results on extension...

Journal: :J. Comb. Theory, Ser. B 1997
Luis A. Goddyn Jan van den Heuvel Sean McGuinness

We prove the following conjecture of Bill Jackson ( J. London Math. Soc. (2) 21 (1980) p. 391). If G is a 2-connected multigraph with minimum degree at least 4 and containing no Petersen minor, then G contains a circuit C such that G E(C) is 2-connected. In fact, G has at least two edge-disjoint circuits which can serve as C. Until now, the conjecture had been veri ed only for planar graphs and...

1993
Howard Alt

Since the dawn of time (or at least Jan 1, 1970) it has been difficult for the common user to take advantage of removable media under UNIX. The traditional UNIX approach to dealing with removable media has been to let programs name the device containing the media, and to leave it to the operator (or user) to ensure that the right media is in the device named. We have implemented the opposite ap...

2007
Lawrence A. Harris LAWRENCE A. HARRIS

Let A be a C*-algebra with identity and suppose A has real rank 0. Suppose a complex-valued function is holomorphic and bounded on the intersection of the open unit ball of A and the identity component of the set of invertible elements of A. We show that then the function has a holomorphic extension to the entire open unit ball of A. Further, we show that this does not hold when A = C(S), where...

Journal: :Graphs and Combinatorics 2004
Jichang Wu Xueliang Li

Let G be a 4-connected graph. For an edge e of G, we do the following operations on G: first, delete the edge e from G, resulting the graph G e; second, for all vertices x of degree 3 in G e, delete x from G e and then completely connect the 3 neighbors of x by a triangle. If multiple edges occur, we use single edges to replace them. The final resultant graph is denoted by G e. If G e is 4-conn...

Journal: :Nihon Hotetsu Shika Gakkai zasshi 2008
Takashi Matsuura

PATIENT A 39-year-old female patient was admitted with mobility of maxillary anterior fixed partial denture. She was diagnosed as severe chronic periodontitis of abutment teeth of the denture, left alveolus cleft, and anterior/posterior crossbites. The crossbites were improved by prosthetic approach using an implant-supported fixed partial denture with a removable gingival veneer at the anterio...

Journal: :International Journal of Orthodontia 1916

Journal: :Stomatologija 2008
Irena Jirgensone Andra Liepa Andris Abeltins

Anterior crossbite correction in early mixed dentition is highly recommended as this kind of malocclusion do not diminish with age. Uncorrected anterior crossbite may lead to abnormal wear of the lower incisors, dental compensation of mandibular incisors leading to thinning of labial alveolar plate and/or gingival recession. There are several methods for solving this problem. In this article we...

Journal: :JUSPN 2010
Talal H. Noor Mohammad Hweidi Ahmed Mohiuddin Damith Chinthana Ranasinghe

Email systems and removable storage devices are the two most popular and user-friendly mechanisms of file exchange that provide privacy preserving and security for data communication. Most previous work has focused on mitigating external attacks on data communication by improving data encryption and integrity techniques. In this paper, we present a novel anonymization-based framework (Stenog-Sh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید